pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,70 +21,70 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
22
21
  @pulumi.input_type
23
22
  class SecretBackendRoleArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- key_type: pulumi.Input[builtins.str],
27
- algorithm_signer: Optional[pulumi.Input[builtins.str]] = None,
28
- allow_bare_domains: Optional[pulumi.Input[builtins.bool]] = None,
29
- allow_empty_principals: Optional[pulumi.Input[builtins.bool]] = None,
30
- allow_host_certificates: Optional[pulumi.Input[builtins.bool]] = None,
31
- allow_subdomains: Optional[pulumi.Input[builtins.bool]] = None,
32
- allow_user_certificates: Optional[pulumi.Input[builtins.bool]] = None,
33
- allow_user_key_ids: Optional[pulumi.Input[builtins.bool]] = None,
34
- allowed_critical_options: Optional[pulumi.Input[builtins.str]] = None,
35
- allowed_domains: Optional[pulumi.Input[builtins.str]] = None,
36
- allowed_domains_template: Optional[pulumi.Input[builtins.bool]] = None,
37
- allowed_extensions: Optional[pulumi.Input[builtins.str]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ key_type: pulumi.Input[_builtins.str],
26
+ algorithm_signer: Optional[pulumi.Input[_builtins.str]] = None,
27
+ allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ allow_empty_principals: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ allow_host_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ allow_user_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ allow_user_key_ids: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ allowed_critical_options: Optional[pulumi.Input[_builtins.str]] = None,
34
+ allowed_domains: Optional[pulumi.Input[_builtins.str]] = None,
35
+ allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ allowed_extensions: Optional[pulumi.Input[_builtins.str]] = None,
38
37
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
39
- allowed_users: Optional[pulumi.Input[builtins.str]] = None,
40
- allowed_users_template: Optional[pulumi.Input[builtins.bool]] = None,
41
- cidr_list: Optional[pulumi.Input[builtins.str]] = None,
42
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
43
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
44
- default_user: Optional[pulumi.Input[builtins.str]] = None,
45
- default_user_template: Optional[pulumi.Input[builtins.bool]] = None,
46
- key_id_format: Optional[pulumi.Input[builtins.str]] = None,
47
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
48
- name: Optional[pulumi.Input[builtins.str]] = None,
49
- namespace: Optional[pulumi.Input[builtins.str]] = None,
50
- not_before_duration: Optional[pulumi.Input[builtins.str]] = None,
51
- ttl: Optional[pulumi.Input[builtins.str]] = None):
38
+ allowed_users: Optional[pulumi.Input[_builtins.str]] = None,
39
+ allowed_users_template: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ cidr_list: Optional[pulumi.Input[_builtins.str]] = None,
41
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
42
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
43
+ default_user: Optional[pulumi.Input[_builtins.str]] = None,
44
+ default_user_template: Optional[pulumi.Input[_builtins.bool]] = None,
45
+ key_id_format: Optional[pulumi.Input[_builtins.str]] = None,
46
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
47
+ name: Optional[pulumi.Input[_builtins.str]] = None,
48
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
49
+ not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
50
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
52
51
  """
53
52
  The set of arguments for constructing a SecretBackendRole resource.
54
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted.
55
- :param pulumi.Input[builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
56
- :param pulumi.Input[builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
57
- :param pulumi.Input[builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
58
- :param pulumi.Input[builtins.bool] allow_empty_principals: Allow signing certificates with no
53
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted.
54
+ :param pulumi.Input[_builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
55
+ :param pulumi.Input[_builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
56
+ :param pulumi.Input[_builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
57
+ :param pulumi.Input[_builtins.bool] allow_empty_principals: Allow signing certificates with no
59
58
  valid principals (e.g. any valid principal). For backwards compatibility
60
59
  only. The default of false is highly recommended.
61
- :param pulumi.Input[builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
62
- :param pulumi.Input[builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
63
- :param pulumi.Input[builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
64
- :param pulumi.Input[builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
65
- :param pulumi.Input[builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
66
- :param pulumi.Input[builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
67
- :param pulumi.Input[builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
60
+ :param pulumi.Input[_builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
61
+ :param pulumi.Input[_builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
62
+ :param pulumi.Input[_builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
63
+ :param pulumi.Input[_builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
64
+ :param pulumi.Input[_builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
65
+ :param pulumi.Input[_builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
66
+ :param pulumi.Input[_builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
68
67
  identity template policies. Non-templated domains are also permitted.
69
- :param pulumi.Input[builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
68
+ :param pulumi.Input[_builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
70
69
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
71
70
  user key configuration, like key type and their lengths. Can be specified multiple times.
72
71
  *See Configuration-Options for more info*
73
- :param pulumi.Input[builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
74
- :param pulumi.Input[builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
75
- :param pulumi.Input[builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
76
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
77
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
78
- :param pulumi.Input[builtins.str] default_user: Specifies the default username for which a credential will be generated.
79
- :param pulumi.Input[builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
80
- :param pulumi.Input[builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
81
- :param pulumi.Input[builtins.str] max_ttl: Specifies the maximum Time To Live value.
82
- :param pulumi.Input[builtins.str] name: Specifies the name of the role to create.
83
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
72
+ :param pulumi.Input[_builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
73
+ :param pulumi.Input[_builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
74
+ :param pulumi.Input[_builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
75
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
76
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
77
+ :param pulumi.Input[_builtins.str] default_user: Specifies the default username for which a credential will be generated.
78
+ :param pulumi.Input[_builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
79
+ :param pulumi.Input[_builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
80
+ :param pulumi.Input[_builtins.str] max_ttl: Specifies the maximum Time To Live value.
81
+ :param pulumi.Input[_builtins.str] name: Specifies the name of the role to create.
82
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
84
83
  The value should not contain leading or trailing forward slashes.
85
84
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
85
  *Available only for Vault Enterprise*.
87
- :param pulumi.Input[builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
88
- :param pulumi.Input[builtins.str] ttl: Specifies the Time To Live value.
86
+ :param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
87
+ :param pulumi.Input[_builtins.str] ttl: Specifies the Time To Live value.
89
88
  """
90
89
  pulumi.set(__self__, "backend", backend)
91
90
  pulumi.set(__self__, "key_type", key_type)
@@ -140,57 +139,57 @@ class SecretBackendRoleArgs:
140
139
  if ttl is not None:
141
140
  pulumi.set(__self__, "ttl", ttl)
142
141
 
143
- @property
142
+ @_builtins.property
144
143
  @pulumi.getter
145
- def backend(self) -> pulumi.Input[builtins.str]:
144
+ def backend(self) -> pulumi.Input[_builtins.str]:
146
145
  """
147
146
  The path where the SSH secret backend is mounted.
148
147
  """
149
148
  return pulumi.get(self, "backend")
150
149
 
151
150
  @backend.setter
152
- def backend(self, value: pulumi.Input[builtins.str]):
151
+ def backend(self, value: pulumi.Input[_builtins.str]):
153
152
  pulumi.set(self, "backend", value)
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter(name="keyType")
157
- def key_type(self) -> pulumi.Input[builtins.str]:
156
+ def key_type(self) -> pulumi.Input[_builtins.str]:
158
157
  """
159
158
  Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
160
159
  """
161
160
  return pulumi.get(self, "key_type")
162
161
 
163
162
  @key_type.setter
164
- def key_type(self, value: pulumi.Input[builtins.str]):
163
+ def key_type(self, value: pulumi.Input[_builtins.str]):
165
164
  pulumi.set(self, "key_type", value)
166
165
 
167
- @property
166
+ @_builtins.property
168
167
  @pulumi.getter(name="algorithmSigner")
169
- def algorithm_signer(self) -> Optional[pulumi.Input[builtins.str]]:
168
+ def algorithm_signer(self) -> Optional[pulumi.Input[_builtins.str]]:
170
169
  """
171
170
  When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
172
171
  """
173
172
  return pulumi.get(self, "algorithm_signer")
174
173
 
175
174
  @algorithm_signer.setter
176
- def algorithm_signer(self, value: Optional[pulumi.Input[builtins.str]]):
175
+ def algorithm_signer(self, value: Optional[pulumi.Input[_builtins.str]]):
177
176
  pulumi.set(self, "algorithm_signer", value)
178
177
 
179
- @property
178
+ @_builtins.property
180
179
  @pulumi.getter(name="allowBareDomains")
181
- def allow_bare_domains(self) -> Optional[pulumi.Input[builtins.bool]]:
180
+ def allow_bare_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
182
181
  """
183
182
  Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
184
183
  """
185
184
  return pulumi.get(self, "allow_bare_domains")
186
185
 
187
186
  @allow_bare_domains.setter
188
- def allow_bare_domains(self, value: Optional[pulumi.Input[builtins.bool]]):
187
+ def allow_bare_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
189
188
  pulumi.set(self, "allow_bare_domains", value)
190
189
 
191
- @property
190
+ @_builtins.property
192
191
  @pulumi.getter(name="allowEmptyPrincipals")
193
- def allow_empty_principals(self) -> Optional[pulumi.Input[builtins.bool]]:
192
+ def allow_empty_principals(self) -> Optional[pulumi.Input[_builtins.bool]]:
194
193
  """
195
194
  Allow signing certificates with no
196
195
  valid principals (e.g. any valid principal). For backwards compatibility
@@ -199,84 +198,84 @@ class SecretBackendRoleArgs:
199
198
  return pulumi.get(self, "allow_empty_principals")
200
199
 
201
200
  @allow_empty_principals.setter
202
- def allow_empty_principals(self, value: Optional[pulumi.Input[builtins.bool]]):
201
+ def allow_empty_principals(self, value: Optional[pulumi.Input[_builtins.bool]]):
203
202
  pulumi.set(self, "allow_empty_principals", value)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter(name="allowHostCertificates")
207
- def allow_host_certificates(self) -> Optional[pulumi.Input[builtins.bool]]:
206
+ def allow_host_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
208
207
  """
209
208
  Specifies if certificates are allowed to be signed for use as a 'host'.
210
209
  """
211
210
  return pulumi.get(self, "allow_host_certificates")
212
211
 
213
212
  @allow_host_certificates.setter
214
- def allow_host_certificates(self, value: Optional[pulumi.Input[builtins.bool]]):
213
+ def allow_host_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
215
214
  pulumi.set(self, "allow_host_certificates", value)
216
215
 
217
- @property
216
+ @_builtins.property
218
217
  @pulumi.getter(name="allowSubdomains")
219
- def allow_subdomains(self) -> Optional[pulumi.Input[builtins.bool]]:
218
+ def allow_subdomains(self) -> Optional[pulumi.Input[_builtins.bool]]:
220
219
  """
221
220
  Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
222
221
  """
223
222
  return pulumi.get(self, "allow_subdomains")
224
223
 
225
224
  @allow_subdomains.setter
226
- def allow_subdomains(self, value: Optional[pulumi.Input[builtins.bool]]):
225
+ def allow_subdomains(self, value: Optional[pulumi.Input[_builtins.bool]]):
227
226
  pulumi.set(self, "allow_subdomains", value)
228
227
 
229
- @property
228
+ @_builtins.property
230
229
  @pulumi.getter(name="allowUserCertificates")
231
- def allow_user_certificates(self) -> Optional[pulumi.Input[builtins.bool]]:
230
+ def allow_user_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
232
231
  """
233
232
  Specifies if certificates are allowed to be signed for use as a 'user'.
234
233
  """
235
234
  return pulumi.get(self, "allow_user_certificates")
236
235
 
237
236
  @allow_user_certificates.setter
238
- def allow_user_certificates(self, value: Optional[pulumi.Input[builtins.bool]]):
237
+ def allow_user_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
239
238
  pulumi.set(self, "allow_user_certificates", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="allowUserKeyIds")
243
- def allow_user_key_ids(self) -> Optional[pulumi.Input[builtins.bool]]:
242
+ def allow_user_key_ids(self) -> Optional[pulumi.Input[_builtins.bool]]:
244
243
  """
245
244
  Specifies if users can override the key ID for a signed certificate with the `key_id` field.
246
245
  """
247
246
  return pulumi.get(self, "allow_user_key_ids")
248
247
 
249
248
  @allow_user_key_ids.setter
250
- def allow_user_key_ids(self, value: Optional[pulumi.Input[builtins.bool]]):
249
+ def allow_user_key_ids(self, value: Optional[pulumi.Input[_builtins.bool]]):
251
250
  pulumi.set(self, "allow_user_key_ids", value)
252
251
 
253
- @property
252
+ @_builtins.property
254
253
  @pulumi.getter(name="allowedCriticalOptions")
255
- def allowed_critical_options(self) -> Optional[pulumi.Input[builtins.str]]:
254
+ def allowed_critical_options(self) -> Optional[pulumi.Input[_builtins.str]]:
256
255
  """
257
256
  Specifies a comma-separated list of critical options that certificates can have when signed.
258
257
  """
259
258
  return pulumi.get(self, "allowed_critical_options")
260
259
 
261
260
  @allowed_critical_options.setter
262
- def allowed_critical_options(self, value: Optional[pulumi.Input[builtins.str]]):
261
+ def allowed_critical_options(self, value: Optional[pulumi.Input[_builtins.str]]):
263
262
  pulumi.set(self, "allowed_critical_options", value)
264
263
 
265
- @property
264
+ @_builtins.property
266
265
  @pulumi.getter(name="allowedDomains")
267
- def allowed_domains(self) -> Optional[pulumi.Input[builtins.str]]:
266
+ def allowed_domains(self) -> Optional[pulumi.Input[_builtins.str]]:
268
267
  """
269
268
  The list of domains for which a client can request a host certificate.
270
269
  """
271
270
  return pulumi.get(self, "allowed_domains")
272
271
 
273
272
  @allowed_domains.setter
274
- def allowed_domains(self, value: Optional[pulumi.Input[builtins.str]]):
273
+ def allowed_domains(self, value: Optional[pulumi.Input[_builtins.str]]):
275
274
  pulumi.set(self, "allowed_domains", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter(name="allowedDomainsTemplate")
279
- def allowed_domains_template(self) -> Optional[pulumi.Input[builtins.bool]]:
278
+ def allowed_domains_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
280
279
  """
281
280
  Specifies if `allowed_domains` can be declared using
282
281
  identity template policies. Non-templated domains are also permitted.
@@ -284,22 +283,22 @@ class SecretBackendRoleArgs:
284
283
  return pulumi.get(self, "allowed_domains_template")
285
284
 
286
285
  @allowed_domains_template.setter
287
- def allowed_domains_template(self, value: Optional[pulumi.Input[builtins.bool]]):
286
+ def allowed_domains_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
287
  pulumi.set(self, "allowed_domains_template", value)
289
288
 
290
- @property
289
+ @_builtins.property
291
290
  @pulumi.getter(name="allowedExtensions")
292
- def allowed_extensions(self) -> Optional[pulumi.Input[builtins.str]]:
291
+ def allowed_extensions(self) -> Optional[pulumi.Input[_builtins.str]]:
293
292
  """
294
293
  Specifies a comma-separated list of extensions that certificates can have when signed.
295
294
  """
296
295
  return pulumi.get(self, "allowed_extensions")
297
296
 
298
297
  @allowed_extensions.setter
299
- def allowed_extensions(self, value: Optional[pulumi.Input[builtins.str]]):
298
+ def allowed_extensions(self, value: Optional[pulumi.Input[_builtins.str]]):
300
299
  pulumi.set(self, "allowed_extensions", value)
301
300
 
302
- @property
301
+ @_builtins.property
303
302
  @pulumi.getter(name="allowedUserKeyConfigs")
304
303
  def allowed_user_key_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]:
305
304
  """
@@ -313,129 +312,129 @@ class SecretBackendRoleArgs:
313
312
  def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
314
313
  pulumi.set(self, "allowed_user_key_configs", value)
315
314
 
316
- @property
315
+ @_builtins.property
317
316
  @pulumi.getter(name="allowedUsers")
318
- def allowed_users(self) -> Optional[pulumi.Input[builtins.str]]:
317
+ def allowed_users(self) -> Optional[pulumi.Input[_builtins.str]]:
319
318
  """
320
319
  Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
321
320
  """
322
321
  return pulumi.get(self, "allowed_users")
323
322
 
324
323
  @allowed_users.setter
325
- def allowed_users(self, value: Optional[pulumi.Input[builtins.str]]):
324
+ def allowed_users(self, value: Optional[pulumi.Input[_builtins.str]]):
326
325
  pulumi.set(self, "allowed_users", value)
327
326
 
328
- @property
327
+ @_builtins.property
329
328
  @pulumi.getter(name="allowedUsersTemplate")
330
- def allowed_users_template(self) -> Optional[pulumi.Input[builtins.bool]]:
329
+ def allowed_users_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
331
330
  """
332
331
  Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
333
332
  """
334
333
  return pulumi.get(self, "allowed_users_template")
335
334
 
336
335
  @allowed_users_template.setter
337
- def allowed_users_template(self, value: Optional[pulumi.Input[builtins.bool]]):
336
+ def allowed_users_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
338
337
  pulumi.set(self, "allowed_users_template", value)
339
338
 
340
- @property
339
+ @_builtins.property
341
340
  @pulumi.getter(name="cidrList")
342
- def cidr_list(self) -> Optional[pulumi.Input[builtins.str]]:
341
+ def cidr_list(self) -> Optional[pulumi.Input[_builtins.str]]:
343
342
  """
344
343
  The comma-separated string of CIDR blocks for which this role is applicable.
345
344
  """
346
345
  return pulumi.get(self, "cidr_list")
347
346
 
348
347
  @cidr_list.setter
349
- def cidr_list(self, value: Optional[pulumi.Input[builtins.str]]):
348
+ def cidr_list(self, value: Optional[pulumi.Input[_builtins.str]]):
350
349
  pulumi.set(self, "cidr_list", value)
351
350
 
352
- @property
351
+ @_builtins.property
353
352
  @pulumi.getter(name="defaultCriticalOptions")
354
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
353
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
355
354
  """
356
355
  Specifies a map of critical options that certificates have when signed.
357
356
  """
358
357
  return pulumi.get(self, "default_critical_options")
359
358
 
360
359
  @default_critical_options.setter
361
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
360
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
362
361
  pulumi.set(self, "default_critical_options", value)
363
362
 
364
- @property
363
+ @_builtins.property
365
364
  @pulumi.getter(name="defaultExtensions")
366
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
365
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
367
366
  """
368
367
  Specifies a map of extensions that certificates have when signed.
369
368
  """
370
369
  return pulumi.get(self, "default_extensions")
371
370
 
372
371
  @default_extensions.setter
373
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
372
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
374
373
  pulumi.set(self, "default_extensions", value)
375
374
 
376
- @property
375
+ @_builtins.property
377
376
  @pulumi.getter(name="defaultUser")
378
- def default_user(self) -> Optional[pulumi.Input[builtins.str]]:
377
+ def default_user(self) -> Optional[pulumi.Input[_builtins.str]]:
379
378
  """
380
379
  Specifies the default username for which a credential will be generated.
381
380
  """
382
381
  return pulumi.get(self, "default_user")
383
382
 
384
383
  @default_user.setter
385
- def default_user(self, value: Optional[pulumi.Input[builtins.str]]):
384
+ def default_user(self, value: Optional[pulumi.Input[_builtins.str]]):
386
385
  pulumi.set(self, "default_user", value)
387
386
 
388
- @property
387
+ @_builtins.property
389
388
  @pulumi.getter(name="defaultUserTemplate")
390
- def default_user_template(self) -> Optional[pulumi.Input[builtins.bool]]:
389
+ def default_user_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
391
390
  """
392
391
  If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
393
392
  """
394
393
  return pulumi.get(self, "default_user_template")
395
394
 
396
395
  @default_user_template.setter
397
- def default_user_template(self, value: Optional[pulumi.Input[builtins.bool]]):
396
+ def default_user_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
398
397
  pulumi.set(self, "default_user_template", value)
399
398
 
400
- @property
399
+ @_builtins.property
401
400
  @pulumi.getter(name="keyIdFormat")
402
- def key_id_format(self) -> Optional[pulumi.Input[builtins.str]]:
401
+ def key_id_format(self) -> Optional[pulumi.Input[_builtins.str]]:
403
402
  """
404
403
  Specifies a custom format for the key id of a signed certificate.
405
404
  """
406
405
  return pulumi.get(self, "key_id_format")
407
406
 
408
407
  @key_id_format.setter
409
- def key_id_format(self, value: Optional[pulumi.Input[builtins.str]]):
408
+ def key_id_format(self, value: Optional[pulumi.Input[_builtins.str]]):
410
409
  pulumi.set(self, "key_id_format", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter(name="maxTtl")
414
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
413
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
415
414
  """
416
415
  Specifies the maximum Time To Live value.
417
416
  """
418
417
  return pulumi.get(self, "max_ttl")
419
418
 
420
419
  @max_ttl.setter
421
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
420
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
422
421
  pulumi.set(self, "max_ttl", value)
423
422
 
424
- @property
423
+ @_builtins.property
425
424
  @pulumi.getter
426
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
425
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
427
426
  """
428
427
  Specifies the name of the role to create.
429
428
  """
430
429
  return pulumi.get(self, "name")
431
430
 
432
431
  @name.setter
433
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
432
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
434
433
  pulumi.set(self, "name", value)
435
434
 
436
- @property
435
+ @_builtins.property
437
436
  @pulumi.getter
438
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
437
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
439
438
  """
440
439
  The namespace to provision the resource in.
441
440
  The value should not contain leading or trailing forward slashes.
@@ -445,101 +444,101 @@ class SecretBackendRoleArgs:
445
444
  return pulumi.get(self, "namespace")
446
445
 
447
446
  @namespace.setter
448
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
447
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
449
448
  pulumi.set(self, "namespace", value)
450
449
 
451
- @property
450
+ @_builtins.property
452
451
  @pulumi.getter(name="notBeforeDuration")
453
- def not_before_duration(self) -> Optional[pulumi.Input[builtins.str]]:
452
+ def not_before_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
454
453
  """
455
454
  Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
456
455
  """
457
456
  return pulumi.get(self, "not_before_duration")
458
457
 
459
458
  @not_before_duration.setter
460
- def not_before_duration(self, value: Optional[pulumi.Input[builtins.str]]):
459
+ def not_before_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
461
460
  pulumi.set(self, "not_before_duration", value)
462
461
 
463
- @property
462
+ @_builtins.property
464
463
  @pulumi.getter
465
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
464
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
466
465
  """
467
466
  Specifies the Time To Live value.
468
467
  """
469
468
  return pulumi.get(self, "ttl")
470
469
 
471
470
  @ttl.setter
472
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
471
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
473
472
  pulumi.set(self, "ttl", value)
474
473
 
475
474
 
476
475
  @pulumi.input_type
477
476
  class _SecretBackendRoleState:
478
477
  def __init__(__self__, *,
479
- algorithm_signer: Optional[pulumi.Input[builtins.str]] = None,
480
- allow_bare_domains: Optional[pulumi.Input[builtins.bool]] = None,
481
- allow_empty_principals: Optional[pulumi.Input[builtins.bool]] = None,
482
- allow_host_certificates: Optional[pulumi.Input[builtins.bool]] = None,
483
- allow_subdomains: Optional[pulumi.Input[builtins.bool]] = None,
484
- allow_user_certificates: Optional[pulumi.Input[builtins.bool]] = None,
485
- allow_user_key_ids: Optional[pulumi.Input[builtins.bool]] = None,
486
- allowed_critical_options: Optional[pulumi.Input[builtins.str]] = None,
487
- allowed_domains: Optional[pulumi.Input[builtins.str]] = None,
488
- allowed_domains_template: Optional[pulumi.Input[builtins.bool]] = None,
489
- allowed_extensions: Optional[pulumi.Input[builtins.str]] = None,
478
+ algorithm_signer: Optional[pulumi.Input[_builtins.str]] = None,
479
+ allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
480
+ allow_empty_principals: Optional[pulumi.Input[_builtins.bool]] = None,
481
+ allow_host_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
482
+ allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
483
+ allow_user_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
484
+ allow_user_key_ids: Optional[pulumi.Input[_builtins.bool]] = None,
485
+ allowed_critical_options: Optional[pulumi.Input[_builtins.str]] = None,
486
+ allowed_domains: Optional[pulumi.Input[_builtins.str]] = None,
487
+ allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
488
+ allowed_extensions: Optional[pulumi.Input[_builtins.str]] = None,
490
489
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
491
- allowed_users: Optional[pulumi.Input[builtins.str]] = None,
492
- allowed_users_template: Optional[pulumi.Input[builtins.bool]] = None,
493
- backend: Optional[pulumi.Input[builtins.str]] = None,
494
- cidr_list: Optional[pulumi.Input[builtins.str]] = None,
495
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
496
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
497
- default_user: Optional[pulumi.Input[builtins.str]] = None,
498
- default_user_template: Optional[pulumi.Input[builtins.bool]] = None,
499
- key_id_format: Optional[pulumi.Input[builtins.str]] = None,
500
- key_type: Optional[pulumi.Input[builtins.str]] = None,
501
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
502
- name: Optional[pulumi.Input[builtins.str]] = None,
503
- namespace: Optional[pulumi.Input[builtins.str]] = None,
504
- not_before_duration: Optional[pulumi.Input[builtins.str]] = None,
505
- ttl: Optional[pulumi.Input[builtins.str]] = None):
490
+ allowed_users: Optional[pulumi.Input[_builtins.str]] = None,
491
+ allowed_users_template: Optional[pulumi.Input[_builtins.bool]] = None,
492
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
493
+ cidr_list: Optional[pulumi.Input[_builtins.str]] = None,
494
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
495
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
496
+ default_user: Optional[pulumi.Input[_builtins.str]] = None,
497
+ default_user_template: Optional[pulumi.Input[_builtins.bool]] = None,
498
+ key_id_format: Optional[pulumi.Input[_builtins.str]] = None,
499
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
500
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
501
+ name: Optional[pulumi.Input[_builtins.str]] = None,
502
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
503
+ not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
504
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
506
505
  """
507
506
  Input properties used for looking up and filtering SecretBackendRole resources.
508
- :param pulumi.Input[builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
509
- :param pulumi.Input[builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
510
- :param pulumi.Input[builtins.bool] allow_empty_principals: Allow signing certificates with no
507
+ :param pulumi.Input[_builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
508
+ :param pulumi.Input[_builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
509
+ :param pulumi.Input[_builtins.bool] allow_empty_principals: Allow signing certificates with no
511
510
  valid principals (e.g. any valid principal). For backwards compatibility
512
511
  only. The default of false is highly recommended.
513
- :param pulumi.Input[builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
514
- :param pulumi.Input[builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
515
- :param pulumi.Input[builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
516
- :param pulumi.Input[builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
517
- :param pulumi.Input[builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
518
- :param pulumi.Input[builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
519
- :param pulumi.Input[builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
512
+ :param pulumi.Input[_builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
513
+ :param pulumi.Input[_builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
514
+ :param pulumi.Input[_builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
515
+ :param pulumi.Input[_builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
516
+ :param pulumi.Input[_builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
517
+ :param pulumi.Input[_builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
518
+ :param pulumi.Input[_builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
520
519
  identity template policies. Non-templated domains are also permitted.
521
- :param pulumi.Input[builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
520
+ :param pulumi.Input[_builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
522
521
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
523
522
  user key configuration, like key type and their lengths. Can be specified multiple times.
524
523
  *See Configuration-Options for more info*
525
- :param pulumi.Input[builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
526
- :param pulumi.Input[builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
527
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted.
528
- :param pulumi.Input[builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
529
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
530
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
531
- :param pulumi.Input[builtins.str] default_user: Specifies the default username for which a credential will be generated.
532
- :param pulumi.Input[builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
533
- :param pulumi.Input[builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
534
- :param pulumi.Input[builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
535
- :param pulumi.Input[builtins.str] max_ttl: Specifies the maximum Time To Live value.
536
- :param pulumi.Input[builtins.str] name: Specifies the name of the role to create.
537
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
524
+ :param pulumi.Input[_builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
525
+ :param pulumi.Input[_builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
526
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted.
527
+ :param pulumi.Input[_builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
528
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
529
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
530
+ :param pulumi.Input[_builtins.str] default_user: Specifies the default username for which a credential will be generated.
531
+ :param pulumi.Input[_builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
532
+ :param pulumi.Input[_builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
533
+ :param pulumi.Input[_builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
534
+ :param pulumi.Input[_builtins.str] max_ttl: Specifies the maximum Time To Live value.
535
+ :param pulumi.Input[_builtins.str] name: Specifies the name of the role to create.
536
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
538
537
  The value should not contain leading or trailing forward slashes.
539
538
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
540
539
  *Available only for Vault Enterprise*.
541
- :param pulumi.Input[builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
542
- :param pulumi.Input[builtins.str] ttl: Specifies the Time To Live value.
540
+ :param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
541
+ :param pulumi.Input[_builtins.str] ttl: Specifies the Time To Live value.
543
542
  """
544
543
  if algorithm_signer is not None:
545
544
  pulumi.set(__self__, "algorithm_signer", algorithm_signer)
@@ -596,33 +595,33 @@ class _SecretBackendRoleState:
596
595
  if ttl is not None:
597
596
  pulumi.set(__self__, "ttl", ttl)
598
597
 
599
- @property
598
+ @_builtins.property
600
599
  @pulumi.getter(name="algorithmSigner")
601
- def algorithm_signer(self) -> Optional[pulumi.Input[builtins.str]]:
600
+ def algorithm_signer(self) -> Optional[pulumi.Input[_builtins.str]]:
602
601
  """
603
602
  When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
604
603
  """
605
604
  return pulumi.get(self, "algorithm_signer")
606
605
 
607
606
  @algorithm_signer.setter
608
- def algorithm_signer(self, value: Optional[pulumi.Input[builtins.str]]):
607
+ def algorithm_signer(self, value: Optional[pulumi.Input[_builtins.str]]):
609
608
  pulumi.set(self, "algorithm_signer", value)
610
609
 
611
- @property
610
+ @_builtins.property
612
611
  @pulumi.getter(name="allowBareDomains")
613
- def allow_bare_domains(self) -> Optional[pulumi.Input[builtins.bool]]:
612
+ def allow_bare_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
614
613
  """
615
614
  Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
616
615
  """
617
616
  return pulumi.get(self, "allow_bare_domains")
618
617
 
619
618
  @allow_bare_domains.setter
620
- def allow_bare_domains(self, value: Optional[pulumi.Input[builtins.bool]]):
619
+ def allow_bare_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
621
620
  pulumi.set(self, "allow_bare_domains", value)
622
621
 
623
- @property
622
+ @_builtins.property
624
623
  @pulumi.getter(name="allowEmptyPrincipals")
625
- def allow_empty_principals(self) -> Optional[pulumi.Input[builtins.bool]]:
624
+ def allow_empty_principals(self) -> Optional[pulumi.Input[_builtins.bool]]:
626
625
  """
627
626
  Allow signing certificates with no
628
627
  valid principals (e.g. any valid principal). For backwards compatibility
@@ -631,84 +630,84 @@ class _SecretBackendRoleState:
631
630
  return pulumi.get(self, "allow_empty_principals")
632
631
 
633
632
  @allow_empty_principals.setter
634
- def allow_empty_principals(self, value: Optional[pulumi.Input[builtins.bool]]):
633
+ def allow_empty_principals(self, value: Optional[pulumi.Input[_builtins.bool]]):
635
634
  pulumi.set(self, "allow_empty_principals", value)
636
635
 
637
- @property
636
+ @_builtins.property
638
637
  @pulumi.getter(name="allowHostCertificates")
639
- def allow_host_certificates(self) -> Optional[pulumi.Input[builtins.bool]]:
638
+ def allow_host_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
640
639
  """
641
640
  Specifies if certificates are allowed to be signed for use as a 'host'.
642
641
  """
643
642
  return pulumi.get(self, "allow_host_certificates")
644
643
 
645
644
  @allow_host_certificates.setter
646
- def allow_host_certificates(self, value: Optional[pulumi.Input[builtins.bool]]):
645
+ def allow_host_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
647
646
  pulumi.set(self, "allow_host_certificates", value)
648
647
 
649
- @property
648
+ @_builtins.property
650
649
  @pulumi.getter(name="allowSubdomains")
651
- def allow_subdomains(self) -> Optional[pulumi.Input[builtins.bool]]:
650
+ def allow_subdomains(self) -> Optional[pulumi.Input[_builtins.bool]]:
652
651
  """
653
652
  Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
654
653
  """
655
654
  return pulumi.get(self, "allow_subdomains")
656
655
 
657
656
  @allow_subdomains.setter
658
- def allow_subdomains(self, value: Optional[pulumi.Input[builtins.bool]]):
657
+ def allow_subdomains(self, value: Optional[pulumi.Input[_builtins.bool]]):
659
658
  pulumi.set(self, "allow_subdomains", value)
660
659
 
661
- @property
660
+ @_builtins.property
662
661
  @pulumi.getter(name="allowUserCertificates")
663
- def allow_user_certificates(self) -> Optional[pulumi.Input[builtins.bool]]:
662
+ def allow_user_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
664
663
  """
665
664
  Specifies if certificates are allowed to be signed for use as a 'user'.
666
665
  """
667
666
  return pulumi.get(self, "allow_user_certificates")
668
667
 
669
668
  @allow_user_certificates.setter
670
- def allow_user_certificates(self, value: Optional[pulumi.Input[builtins.bool]]):
669
+ def allow_user_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
671
670
  pulumi.set(self, "allow_user_certificates", value)
672
671
 
673
- @property
672
+ @_builtins.property
674
673
  @pulumi.getter(name="allowUserKeyIds")
675
- def allow_user_key_ids(self) -> Optional[pulumi.Input[builtins.bool]]:
674
+ def allow_user_key_ids(self) -> Optional[pulumi.Input[_builtins.bool]]:
676
675
  """
677
676
  Specifies if users can override the key ID for a signed certificate with the `key_id` field.
678
677
  """
679
678
  return pulumi.get(self, "allow_user_key_ids")
680
679
 
681
680
  @allow_user_key_ids.setter
682
- def allow_user_key_ids(self, value: Optional[pulumi.Input[builtins.bool]]):
681
+ def allow_user_key_ids(self, value: Optional[pulumi.Input[_builtins.bool]]):
683
682
  pulumi.set(self, "allow_user_key_ids", value)
684
683
 
685
- @property
684
+ @_builtins.property
686
685
  @pulumi.getter(name="allowedCriticalOptions")
687
- def allowed_critical_options(self) -> Optional[pulumi.Input[builtins.str]]:
686
+ def allowed_critical_options(self) -> Optional[pulumi.Input[_builtins.str]]:
688
687
  """
689
688
  Specifies a comma-separated list of critical options that certificates can have when signed.
690
689
  """
691
690
  return pulumi.get(self, "allowed_critical_options")
692
691
 
693
692
  @allowed_critical_options.setter
694
- def allowed_critical_options(self, value: Optional[pulumi.Input[builtins.str]]):
693
+ def allowed_critical_options(self, value: Optional[pulumi.Input[_builtins.str]]):
695
694
  pulumi.set(self, "allowed_critical_options", value)
696
695
 
697
- @property
696
+ @_builtins.property
698
697
  @pulumi.getter(name="allowedDomains")
699
- def allowed_domains(self) -> Optional[pulumi.Input[builtins.str]]:
698
+ def allowed_domains(self) -> Optional[pulumi.Input[_builtins.str]]:
700
699
  """
701
700
  The list of domains for which a client can request a host certificate.
702
701
  """
703
702
  return pulumi.get(self, "allowed_domains")
704
703
 
705
704
  @allowed_domains.setter
706
- def allowed_domains(self, value: Optional[pulumi.Input[builtins.str]]):
705
+ def allowed_domains(self, value: Optional[pulumi.Input[_builtins.str]]):
707
706
  pulumi.set(self, "allowed_domains", value)
708
707
 
709
- @property
708
+ @_builtins.property
710
709
  @pulumi.getter(name="allowedDomainsTemplate")
711
- def allowed_domains_template(self) -> Optional[pulumi.Input[builtins.bool]]:
710
+ def allowed_domains_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
712
711
  """
713
712
  Specifies if `allowed_domains` can be declared using
714
713
  identity template policies. Non-templated domains are also permitted.
@@ -716,22 +715,22 @@ class _SecretBackendRoleState:
716
715
  return pulumi.get(self, "allowed_domains_template")
717
716
 
718
717
  @allowed_domains_template.setter
719
- def allowed_domains_template(self, value: Optional[pulumi.Input[builtins.bool]]):
718
+ def allowed_domains_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
720
719
  pulumi.set(self, "allowed_domains_template", value)
721
720
 
722
- @property
721
+ @_builtins.property
723
722
  @pulumi.getter(name="allowedExtensions")
724
- def allowed_extensions(self) -> Optional[pulumi.Input[builtins.str]]:
723
+ def allowed_extensions(self) -> Optional[pulumi.Input[_builtins.str]]:
725
724
  """
726
725
  Specifies a comma-separated list of extensions that certificates can have when signed.
727
726
  """
728
727
  return pulumi.get(self, "allowed_extensions")
729
728
 
730
729
  @allowed_extensions.setter
731
- def allowed_extensions(self, value: Optional[pulumi.Input[builtins.str]]):
730
+ def allowed_extensions(self, value: Optional[pulumi.Input[_builtins.str]]):
732
731
  pulumi.set(self, "allowed_extensions", value)
733
732
 
734
- @property
733
+ @_builtins.property
735
734
  @pulumi.getter(name="allowedUserKeyConfigs")
736
735
  def allowed_user_key_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]:
737
736
  """
@@ -745,153 +744,153 @@ class _SecretBackendRoleState:
745
744
  def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
746
745
  pulumi.set(self, "allowed_user_key_configs", value)
747
746
 
748
- @property
747
+ @_builtins.property
749
748
  @pulumi.getter(name="allowedUsers")
750
- def allowed_users(self) -> Optional[pulumi.Input[builtins.str]]:
749
+ def allowed_users(self) -> Optional[pulumi.Input[_builtins.str]]:
751
750
  """
752
751
  Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
753
752
  """
754
753
  return pulumi.get(self, "allowed_users")
755
754
 
756
755
  @allowed_users.setter
757
- def allowed_users(self, value: Optional[pulumi.Input[builtins.str]]):
756
+ def allowed_users(self, value: Optional[pulumi.Input[_builtins.str]]):
758
757
  pulumi.set(self, "allowed_users", value)
759
758
 
760
- @property
759
+ @_builtins.property
761
760
  @pulumi.getter(name="allowedUsersTemplate")
762
- def allowed_users_template(self) -> Optional[pulumi.Input[builtins.bool]]:
761
+ def allowed_users_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
763
762
  """
764
763
  Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
765
764
  """
766
765
  return pulumi.get(self, "allowed_users_template")
767
766
 
768
767
  @allowed_users_template.setter
769
- def allowed_users_template(self, value: Optional[pulumi.Input[builtins.bool]]):
768
+ def allowed_users_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
770
769
  pulumi.set(self, "allowed_users_template", value)
771
770
 
772
- @property
771
+ @_builtins.property
773
772
  @pulumi.getter
774
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
773
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
775
774
  """
776
775
  The path where the SSH secret backend is mounted.
777
776
  """
778
777
  return pulumi.get(self, "backend")
779
778
 
780
779
  @backend.setter
781
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
780
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
782
781
  pulumi.set(self, "backend", value)
783
782
 
784
- @property
783
+ @_builtins.property
785
784
  @pulumi.getter(name="cidrList")
786
- def cidr_list(self) -> Optional[pulumi.Input[builtins.str]]:
785
+ def cidr_list(self) -> Optional[pulumi.Input[_builtins.str]]:
787
786
  """
788
787
  The comma-separated string of CIDR blocks for which this role is applicable.
789
788
  """
790
789
  return pulumi.get(self, "cidr_list")
791
790
 
792
791
  @cidr_list.setter
793
- def cidr_list(self, value: Optional[pulumi.Input[builtins.str]]):
792
+ def cidr_list(self, value: Optional[pulumi.Input[_builtins.str]]):
794
793
  pulumi.set(self, "cidr_list", value)
795
794
 
796
- @property
795
+ @_builtins.property
797
796
  @pulumi.getter(name="defaultCriticalOptions")
798
- def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
797
+ def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
799
798
  """
800
799
  Specifies a map of critical options that certificates have when signed.
801
800
  """
802
801
  return pulumi.get(self, "default_critical_options")
803
802
 
804
803
  @default_critical_options.setter
805
- def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
804
+ def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
806
805
  pulumi.set(self, "default_critical_options", value)
807
806
 
808
- @property
807
+ @_builtins.property
809
808
  @pulumi.getter(name="defaultExtensions")
810
- def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
809
+ def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
811
810
  """
812
811
  Specifies a map of extensions that certificates have when signed.
813
812
  """
814
813
  return pulumi.get(self, "default_extensions")
815
814
 
816
815
  @default_extensions.setter
817
- def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
816
+ def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
818
817
  pulumi.set(self, "default_extensions", value)
819
818
 
820
- @property
819
+ @_builtins.property
821
820
  @pulumi.getter(name="defaultUser")
822
- def default_user(self) -> Optional[pulumi.Input[builtins.str]]:
821
+ def default_user(self) -> Optional[pulumi.Input[_builtins.str]]:
823
822
  """
824
823
  Specifies the default username for which a credential will be generated.
825
824
  """
826
825
  return pulumi.get(self, "default_user")
827
826
 
828
827
  @default_user.setter
829
- def default_user(self, value: Optional[pulumi.Input[builtins.str]]):
828
+ def default_user(self, value: Optional[pulumi.Input[_builtins.str]]):
830
829
  pulumi.set(self, "default_user", value)
831
830
 
832
- @property
831
+ @_builtins.property
833
832
  @pulumi.getter(name="defaultUserTemplate")
834
- def default_user_template(self) -> Optional[pulumi.Input[builtins.bool]]:
833
+ def default_user_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
835
834
  """
836
835
  If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
837
836
  """
838
837
  return pulumi.get(self, "default_user_template")
839
838
 
840
839
  @default_user_template.setter
841
- def default_user_template(self, value: Optional[pulumi.Input[builtins.bool]]):
840
+ def default_user_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
842
841
  pulumi.set(self, "default_user_template", value)
843
842
 
844
- @property
843
+ @_builtins.property
845
844
  @pulumi.getter(name="keyIdFormat")
846
- def key_id_format(self) -> Optional[pulumi.Input[builtins.str]]:
845
+ def key_id_format(self) -> Optional[pulumi.Input[_builtins.str]]:
847
846
  """
848
847
  Specifies a custom format for the key id of a signed certificate.
849
848
  """
850
849
  return pulumi.get(self, "key_id_format")
851
850
 
852
851
  @key_id_format.setter
853
- def key_id_format(self, value: Optional[pulumi.Input[builtins.str]]):
852
+ def key_id_format(self, value: Optional[pulumi.Input[_builtins.str]]):
854
853
  pulumi.set(self, "key_id_format", value)
855
854
 
856
- @property
855
+ @_builtins.property
857
856
  @pulumi.getter(name="keyType")
858
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
857
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
859
858
  """
860
859
  Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
861
860
  """
862
861
  return pulumi.get(self, "key_type")
863
862
 
864
863
  @key_type.setter
865
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
864
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
866
865
  pulumi.set(self, "key_type", value)
867
866
 
868
- @property
867
+ @_builtins.property
869
868
  @pulumi.getter(name="maxTtl")
870
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
869
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
871
870
  """
872
871
  Specifies the maximum Time To Live value.
873
872
  """
874
873
  return pulumi.get(self, "max_ttl")
875
874
 
876
875
  @max_ttl.setter
877
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
876
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
878
877
  pulumi.set(self, "max_ttl", value)
879
878
 
880
- @property
879
+ @_builtins.property
881
880
  @pulumi.getter
882
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
881
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
883
882
  """
884
883
  Specifies the name of the role to create.
885
884
  """
886
885
  return pulumi.get(self, "name")
887
886
 
888
887
  @name.setter
889
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
888
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
890
889
  pulumi.set(self, "name", value)
891
890
 
892
- @property
891
+ @_builtins.property
893
892
  @pulumi.getter
894
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
893
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
895
894
  """
896
895
  The namespace to provision the resource in.
897
896
  The value should not contain leading or trailing forward slashes.
@@ -901,31 +900,31 @@ class _SecretBackendRoleState:
901
900
  return pulumi.get(self, "namespace")
902
901
 
903
902
  @namespace.setter
904
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
903
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
905
904
  pulumi.set(self, "namespace", value)
906
905
 
907
- @property
906
+ @_builtins.property
908
907
  @pulumi.getter(name="notBeforeDuration")
909
- def not_before_duration(self) -> Optional[pulumi.Input[builtins.str]]:
908
+ def not_before_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
910
909
  """
911
910
  Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
912
911
  """
913
912
  return pulumi.get(self, "not_before_duration")
914
913
 
915
914
  @not_before_duration.setter
916
- def not_before_duration(self, value: Optional[pulumi.Input[builtins.str]]):
915
+ def not_before_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
917
916
  pulumi.set(self, "not_before_duration", value)
918
917
 
919
- @property
918
+ @_builtins.property
920
919
  @pulumi.getter
921
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
920
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
922
921
  """
923
922
  Specifies the Time To Live value.
924
923
  """
925
924
  return pulumi.get(self, "ttl")
926
925
 
927
926
  @ttl.setter
928
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
927
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
929
928
  pulumi.set(self, "ttl", value)
930
929
 
931
930
 
@@ -935,33 +934,33 @@ class SecretBackendRole(pulumi.CustomResource):
935
934
  def __init__(__self__,
936
935
  resource_name: str,
937
936
  opts: Optional[pulumi.ResourceOptions] = None,
938
- algorithm_signer: Optional[pulumi.Input[builtins.str]] = None,
939
- allow_bare_domains: Optional[pulumi.Input[builtins.bool]] = None,
940
- allow_empty_principals: Optional[pulumi.Input[builtins.bool]] = None,
941
- allow_host_certificates: Optional[pulumi.Input[builtins.bool]] = None,
942
- allow_subdomains: Optional[pulumi.Input[builtins.bool]] = None,
943
- allow_user_certificates: Optional[pulumi.Input[builtins.bool]] = None,
944
- allow_user_key_ids: Optional[pulumi.Input[builtins.bool]] = None,
945
- allowed_critical_options: Optional[pulumi.Input[builtins.str]] = None,
946
- allowed_domains: Optional[pulumi.Input[builtins.str]] = None,
947
- allowed_domains_template: Optional[pulumi.Input[builtins.bool]] = None,
948
- allowed_extensions: Optional[pulumi.Input[builtins.str]] = None,
937
+ algorithm_signer: Optional[pulumi.Input[_builtins.str]] = None,
938
+ allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
939
+ allow_empty_principals: Optional[pulumi.Input[_builtins.bool]] = None,
940
+ allow_host_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
941
+ allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
942
+ allow_user_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
943
+ allow_user_key_ids: Optional[pulumi.Input[_builtins.bool]] = None,
944
+ allowed_critical_options: Optional[pulumi.Input[_builtins.str]] = None,
945
+ allowed_domains: Optional[pulumi.Input[_builtins.str]] = None,
946
+ allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
947
+ allowed_extensions: Optional[pulumi.Input[_builtins.str]] = None,
949
948
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
950
- allowed_users: Optional[pulumi.Input[builtins.str]] = None,
951
- allowed_users_template: Optional[pulumi.Input[builtins.bool]] = None,
952
- backend: Optional[pulumi.Input[builtins.str]] = None,
953
- cidr_list: Optional[pulumi.Input[builtins.str]] = None,
954
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
955
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
956
- default_user: Optional[pulumi.Input[builtins.str]] = None,
957
- default_user_template: Optional[pulumi.Input[builtins.bool]] = None,
958
- key_id_format: Optional[pulumi.Input[builtins.str]] = None,
959
- key_type: Optional[pulumi.Input[builtins.str]] = None,
960
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
961
- name: Optional[pulumi.Input[builtins.str]] = None,
962
- namespace: Optional[pulumi.Input[builtins.str]] = None,
963
- not_before_duration: Optional[pulumi.Input[builtins.str]] = None,
964
- ttl: Optional[pulumi.Input[builtins.str]] = None,
949
+ allowed_users: Optional[pulumi.Input[_builtins.str]] = None,
950
+ allowed_users_template: Optional[pulumi.Input[_builtins.bool]] = None,
951
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
952
+ cidr_list: Optional[pulumi.Input[_builtins.str]] = None,
953
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
954
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
955
+ default_user: Optional[pulumi.Input[_builtins.str]] = None,
956
+ default_user_template: Optional[pulumi.Input[_builtins.bool]] = None,
957
+ key_id_format: Optional[pulumi.Input[_builtins.str]] = None,
958
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
959
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
960
+ name: Optional[pulumi.Input[_builtins.str]] = None,
961
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
962
+ not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
963
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
965
964
  __props__=None):
966
965
  """
967
966
  Provides a resource to manage roles in an SSH secret backend
@@ -998,41 +997,41 @@ class SecretBackendRole(pulumi.CustomResource):
998
997
 
999
998
  :param str resource_name: The name of the resource.
1000
999
  :param pulumi.ResourceOptions opts: Options for the resource.
1001
- :param pulumi.Input[builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1002
- :param pulumi.Input[builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1003
- :param pulumi.Input[builtins.bool] allow_empty_principals: Allow signing certificates with no
1000
+ :param pulumi.Input[_builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1001
+ :param pulumi.Input[_builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1002
+ :param pulumi.Input[_builtins.bool] allow_empty_principals: Allow signing certificates with no
1004
1003
  valid principals (e.g. any valid principal). For backwards compatibility
1005
1004
  only. The default of false is highly recommended.
1006
- :param pulumi.Input[builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1007
- :param pulumi.Input[builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1008
- :param pulumi.Input[builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
1009
- :param pulumi.Input[builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
1010
- :param pulumi.Input[builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
1011
- :param pulumi.Input[builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
1012
- :param pulumi.Input[builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
1005
+ :param pulumi.Input[_builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1006
+ :param pulumi.Input[_builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1007
+ :param pulumi.Input[_builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
1008
+ :param pulumi.Input[_builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
1009
+ :param pulumi.Input[_builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
1010
+ :param pulumi.Input[_builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
1011
+ :param pulumi.Input[_builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
1013
1012
  identity template policies. Non-templated domains are also permitted.
1014
- :param pulumi.Input[builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
1013
+ :param pulumi.Input[_builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
1015
1014
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1016
1015
  user key configuration, like key type and their lengths. Can be specified multiple times.
1017
1016
  *See Configuration-Options for more info*
1018
- :param pulumi.Input[builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1019
- :param pulumi.Input[builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1020
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted.
1021
- :param pulumi.Input[builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1022
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1023
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1024
- :param pulumi.Input[builtins.str] default_user: Specifies the default username for which a credential will be generated.
1025
- :param pulumi.Input[builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1026
- :param pulumi.Input[builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
1027
- :param pulumi.Input[builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
1028
- :param pulumi.Input[builtins.str] max_ttl: Specifies the maximum Time To Live value.
1029
- :param pulumi.Input[builtins.str] name: Specifies the name of the role to create.
1030
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1017
+ :param pulumi.Input[_builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1018
+ :param pulumi.Input[_builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1019
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted.
1020
+ :param pulumi.Input[_builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1021
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1022
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1023
+ :param pulumi.Input[_builtins.str] default_user: Specifies the default username for which a credential will be generated.
1024
+ :param pulumi.Input[_builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1025
+ :param pulumi.Input[_builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
1026
+ :param pulumi.Input[_builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
1027
+ :param pulumi.Input[_builtins.str] max_ttl: Specifies the maximum Time To Live value.
1028
+ :param pulumi.Input[_builtins.str] name: Specifies the name of the role to create.
1029
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1031
1030
  The value should not contain leading or trailing forward slashes.
1032
1031
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1033
1032
  *Available only for Vault Enterprise*.
1034
- :param pulumi.Input[builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1035
- :param pulumi.Input[builtins.str] ttl: Specifies the Time To Live value.
1033
+ :param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1034
+ :param pulumi.Input[_builtins.str] ttl: Specifies the Time To Live value.
1036
1035
  """
1037
1036
  ...
1038
1037
  @overload
@@ -1088,33 +1087,33 @@ class SecretBackendRole(pulumi.CustomResource):
1088
1087
  def _internal_init(__self__,
1089
1088
  resource_name: str,
1090
1089
  opts: Optional[pulumi.ResourceOptions] = None,
1091
- algorithm_signer: Optional[pulumi.Input[builtins.str]] = None,
1092
- allow_bare_domains: Optional[pulumi.Input[builtins.bool]] = None,
1093
- allow_empty_principals: Optional[pulumi.Input[builtins.bool]] = None,
1094
- allow_host_certificates: Optional[pulumi.Input[builtins.bool]] = None,
1095
- allow_subdomains: Optional[pulumi.Input[builtins.bool]] = None,
1096
- allow_user_certificates: Optional[pulumi.Input[builtins.bool]] = None,
1097
- allow_user_key_ids: Optional[pulumi.Input[builtins.bool]] = None,
1098
- allowed_critical_options: Optional[pulumi.Input[builtins.str]] = None,
1099
- allowed_domains: Optional[pulumi.Input[builtins.str]] = None,
1100
- allowed_domains_template: Optional[pulumi.Input[builtins.bool]] = None,
1101
- allowed_extensions: Optional[pulumi.Input[builtins.str]] = None,
1090
+ algorithm_signer: Optional[pulumi.Input[_builtins.str]] = None,
1091
+ allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
1092
+ allow_empty_principals: Optional[pulumi.Input[_builtins.bool]] = None,
1093
+ allow_host_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
1094
+ allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
1095
+ allow_user_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
1096
+ allow_user_key_ids: Optional[pulumi.Input[_builtins.bool]] = None,
1097
+ allowed_critical_options: Optional[pulumi.Input[_builtins.str]] = None,
1098
+ allowed_domains: Optional[pulumi.Input[_builtins.str]] = None,
1099
+ allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
1100
+ allowed_extensions: Optional[pulumi.Input[_builtins.str]] = None,
1102
1101
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
1103
- allowed_users: Optional[pulumi.Input[builtins.str]] = None,
1104
- allowed_users_template: Optional[pulumi.Input[builtins.bool]] = None,
1105
- backend: Optional[pulumi.Input[builtins.str]] = None,
1106
- cidr_list: Optional[pulumi.Input[builtins.str]] = None,
1107
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1108
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1109
- default_user: Optional[pulumi.Input[builtins.str]] = None,
1110
- default_user_template: Optional[pulumi.Input[builtins.bool]] = None,
1111
- key_id_format: Optional[pulumi.Input[builtins.str]] = None,
1112
- key_type: Optional[pulumi.Input[builtins.str]] = None,
1113
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
1114
- name: Optional[pulumi.Input[builtins.str]] = None,
1115
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1116
- not_before_duration: Optional[pulumi.Input[builtins.str]] = None,
1117
- ttl: Optional[pulumi.Input[builtins.str]] = None,
1102
+ allowed_users: Optional[pulumi.Input[_builtins.str]] = None,
1103
+ allowed_users_template: Optional[pulumi.Input[_builtins.bool]] = None,
1104
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1105
+ cidr_list: Optional[pulumi.Input[_builtins.str]] = None,
1106
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1107
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1108
+ default_user: Optional[pulumi.Input[_builtins.str]] = None,
1109
+ default_user_template: Optional[pulumi.Input[_builtins.bool]] = None,
1110
+ key_id_format: Optional[pulumi.Input[_builtins.str]] = None,
1111
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
1112
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
1113
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1114
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1115
+ not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
1116
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
1118
1117
  __props__=None):
1119
1118
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1120
1119
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1165,33 +1164,33 @@ class SecretBackendRole(pulumi.CustomResource):
1165
1164
  def get(resource_name: str,
1166
1165
  id: pulumi.Input[str],
1167
1166
  opts: Optional[pulumi.ResourceOptions] = None,
1168
- algorithm_signer: Optional[pulumi.Input[builtins.str]] = None,
1169
- allow_bare_domains: Optional[pulumi.Input[builtins.bool]] = None,
1170
- allow_empty_principals: Optional[pulumi.Input[builtins.bool]] = None,
1171
- allow_host_certificates: Optional[pulumi.Input[builtins.bool]] = None,
1172
- allow_subdomains: Optional[pulumi.Input[builtins.bool]] = None,
1173
- allow_user_certificates: Optional[pulumi.Input[builtins.bool]] = None,
1174
- allow_user_key_ids: Optional[pulumi.Input[builtins.bool]] = None,
1175
- allowed_critical_options: Optional[pulumi.Input[builtins.str]] = None,
1176
- allowed_domains: Optional[pulumi.Input[builtins.str]] = None,
1177
- allowed_domains_template: Optional[pulumi.Input[builtins.bool]] = None,
1178
- allowed_extensions: Optional[pulumi.Input[builtins.str]] = None,
1167
+ algorithm_signer: Optional[pulumi.Input[_builtins.str]] = None,
1168
+ allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
1169
+ allow_empty_principals: Optional[pulumi.Input[_builtins.bool]] = None,
1170
+ allow_host_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
1171
+ allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
1172
+ allow_user_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
1173
+ allow_user_key_ids: Optional[pulumi.Input[_builtins.bool]] = None,
1174
+ allowed_critical_options: Optional[pulumi.Input[_builtins.str]] = None,
1175
+ allowed_domains: Optional[pulumi.Input[_builtins.str]] = None,
1176
+ allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
1177
+ allowed_extensions: Optional[pulumi.Input[_builtins.str]] = None,
1179
1178
  allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
1180
- allowed_users: Optional[pulumi.Input[builtins.str]] = None,
1181
- allowed_users_template: Optional[pulumi.Input[builtins.bool]] = None,
1182
- backend: Optional[pulumi.Input[builtins.str]] = None,
1183
- cidr_list: Optional[pulumi.Input[builtins.str]] = None,
1184
- default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1185
- default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1186
- default_user: Optional[pulumi.Input[builtins.str]] = None,
1187
- default_user_template: Optional[pulumi.Input[builtins.bool]] = None,
1188
- key_id_format: Optional[pulumi.Input[builtins.str]] = None,
1189
- key_type: Optional[pulumi.Input[builtins.str]] = None,
1190
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
1191
- name: Optional[pulumi.Input[builtins.str]] = None,
1192
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1193
- not_before_duration: Optional[pulumi.Input[builtins.str]] = None,
1194
- ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendRole':
1179
+ allowed_users: Optional[pulumi.Input[_builtins.str]] = None,
1180
+ allowed_users_template: Optional[pulumi.Input[_builtins.bool]] = None,
1181
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1182
+ cidr_list: Optional[pulumi.Input[_builtins.str]] = None,
1183
+ default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1184
+ default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1185
+ default_user: Optional[pulumi.Input[_builtins.str]] = None,
1186
+ default_user_template: Optional[pulumi.Input[_builtins.bool]] = None,
1187
+ key_id_format: Optional[pulumi.Input[_builtins.str]] = None,
1188
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
1189
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
1190
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1191
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1192
+ not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
1193
+ ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendRole':
1195
1194
  """
1196
1195
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
1197
1196
  properties used to qualify the lookup.
@@ -1199,41 +1198,41 @@ class SecretBackendRole(pulumi.CustomResource):
1199
1198
  :param str resource_name: The unique name of the resulting resource.
1200
1199
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1201
1200
  :param pulumi.ResourceOptions opts: Options for the resource.
1202
- :param pulumi.Input[builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1203
- :param pulumi.Input[builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1204
- :param pulumi.Input[builtins.bool] allow_empty_principals: Allow signing certificates with no
1201
+ :param pulumi.Input[_builtins.str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1202
+ :param pulumi.Input[_builtins.bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1203
+ :param pulumi.Input[_builtins.bool] allow_empty_principals: Allow signing certificates with no
1205
1204
  valid principals (e.g. any valid principal). For backwards compatibility
1206
1205
  only. The default of false is highly recommended.
1207
- :param pulumi.Input[builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1208
- :param pulumi.Input[builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1209
- :param pulumi.Input[builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
1210
- :param pulumi.Input[builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
1211
- :param pulumi.Input[builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
1212
- :param pulumi.Input[builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
1213
- :param pulumi.Input[builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
1206
+ :param pulumi.Input[_builtins.bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
1207
+ :param pulumi.Input[_builtins.bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1208
+ :param pulumi.Input[_builtins.bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
1209
+ :param pulumi.Input[_builtins.bool] allow_user_key_ids: Specifies if users can override the key ID for a signed certificate with the `key_id` field.
1210
+ :param pulumi.Input[_builtins.str] allowed_critical_options: Specifies a comma-separated list of critical options that certificates can have when signed.
1211
+ :param pulumi.Input[_builtins.str] allowed_domains: The list of domains for which a client can request a host certificate.
1212
+ :param pulumi.Input[_builtins.bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
1214
1213
  identity template policies. Non-templated domains are also permitted.
1215
- :param pulumi.Input[builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
1214
+ :param pulumi.Input[_builtins.str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
1216
1215
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
1217
1216
  user key configuration, like key type and their lengths. Can be specified multiple times.
1218
1217
  *See Configuration-Options for more info*
1219
- :param pulumi.Input[builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1220
- :param pulumi.Input[builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1221
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted.
1222
- :param pulumi.Input[builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1223
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1224
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1225
- :param pulumi.Input[builtins.str] default_user: Specifies the default username for which a credential will be generated.
1226
- :param pulumi.Input[builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1227
- :param pulumi.Input[builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
1228
- :param pulumi.Input[builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
1229
- :param pulumi.Input[builtins.str] max_ttl: Specifies the maximum Time To Live value.
1230
- :param pulumi.Input[builtins.str] name: Specifies the name of the role to create.
1231
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1218
+ :param pulumi.Input[_builtins.str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1219
+ :param pulumi.Input[_builtins.bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1220
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted.
1221
+ :param pulumi.Input[_builtins.str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
1222
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
1223
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
1224
+ :param pulumi.Input[_builtins.str] default_user: Specifies the default username for which a credential will be generated.
1225
+ :param pulumi.Input[_builtins.bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1226
+ :param pulumi.Input[_builtins.str] key_id_format: Specifies a custom format for the key id of a signed certificate.
1227
+ :param pulumi.Input[_builtins.str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
1228
+ :param pulumi.Input[_builtins.str] max_ttl: Specifies the maximum Time To Live value.
1229
+ :param pulumi.Input[_builtins.str] name: Specifies the name of the role to create.
1230
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1232
1231
  The value should not contain leading or trailing forward slashes.
1233
1232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1234
1233
  *Available only for Vault Enterprise*.
1235
- :param pulumi.Input[builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1236
- :param pulumi.Input[builtins.str] ttl: Specifies the Time To Live value.
1234
+ :param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1235
+ :param pulumi.Input[_builtins.str] ttl: Specifies the Time To Live value.
1237
1236
  """
1238
1237
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1239
1238
 
@@ -1268,25 +1267,25 @@ class SecretBackendRole(pulumi.CustomResource):
1268
1267
  __props__.__dict__["ttl"] = ttl
1269
1268
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
1270
1269
 
1271
- @property
1270
+ @_builtins.property
1272
1271
  @pulumi.getter(name="algorithmSigner")
1273
- def algorithm_signer(self) -> pulumi.Output[builtins.str]:
1272
+ def algorithm_signer(self) -> pulumi.Output[_builtins.str]:
1274
1273
  """
1275
1274
  When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
1276
1275
  """
1277
1276
  return pulumi.get(self, "algorithm_signer")
1278
1277
 
1279
- @property
1278
+ @_builtins.property
1280
1279
  @pulumi.getter(name="allowBareDomains")
1281
- def allow_bare_domains(self) -> pulumi.Output[Optional[builtins.bool]]:
1280
+ def allow_bare_domains(self) -> pulumi.Output[Optional[_builtins.bool]]:
1282
1281
  """
1283
1282
  Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
1284
1283
  """
1285
1284
  return pulumi.get(self, "allow_bare_domains")
1286
1285
 
1287
- @property
1286
+ @_builtins.property
1288
1287
  @pulumi.getter(name="allowEmptyPrincipals")
1289
- def allow_empty_principals(self) -> pulumi.Output[Optional[builtins.bool]]:
1288
+ def allow_empty_principals(self) -> pulumi.Output[Optional[_builtins.bool]]:
1290
1289
  """
1291
1290
  Allow signing certificates with no
1292
1291
  valid principals (e.g. any valid principal). For backwards compatibility
@@ -1294,72 +1293,72 @@ class SecretBackendRole(pulumi.CustomResource):
1294
1293
  """
1295
1294
  return pulumi.get(self, "allow_empty_principals")
1296
1295
 
1297
- @property
1296
+ @_builtins.property
1298
1297
  @pulumi.getter(name="allowHostCertificates")
1299
- def allow_host_certificates(self) -> pulumi.Output[Optional[builtins.bool]]:
1298
+ def allow_host_certificates(self) -> pulumi.Output[Optional[_builtins.bool]]:
1300
1299
  """
1301
1300
  Specifies if certificates are allowed to be signed for use as a 'host'.
1302
1301
  """
1303
1302
  return pulumi.get(self, "allow_host_certificates")
1304
1303
 
1305
- @property
1304
+ @_builtins.property
1306
1305
  @pulumi.getter(name="allowSubdomains")
1307
- def allow_subdomains(self) -> pulumi.Output[Optional[builtins.bool]]:
1306
+ def allow_subdomains(self) -> pulumi.Output[Optional[_builtins.bool]]:
1308
1307
  """
1309
1308
  Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
1310
1309
  """
1311
1310
  return pulumi.get(self, "allow_subdomains")
1312
1311
 
1313
- @property
1312
+ @_builtins.property
1314
1313
  @pulumi.getter(name="allowUserCertificates")
1315
- def allow_user_certificates(self) -> pulumi.Output[Optional[builtins.bool]]:
1314
+ def allow_user_certificates(self) -> pulumi.Output[Optional[_builtins.bool]]:
1316
1315
  """
1317
1316
  Specifies if certificates are allowed to be signed for use as a 'user'.
1318
1317
  """
1319
1318
  return pulumi.get(self, "allow_user_certificates")
1320
1319
 
1321
- @property
1320
+ @_builtins.property
1322
1321
  @pulumi.getter(name="allowUserKeyIds")
1323
- def allow_user_key_ids(self) -> pulumi.Output[Optional[builtins.bool]]:
1322
+ def allow_user_key_ids(self) -> pulumi.Output[Optional[_builtins.bool]]:
1324
1323
  """
1325
1324
  Specifies if users can override the key ID for a signed certificate with the `key_id` field.
1326
1325
  """
1327
1326
  return pulumi.get(self, "allow_user_key_ids")
1328
1327
 
1329
- @property
1328
+ @_builtins.property
1330
1329
  @pulumi.getter(name="allowedCriticalOptions")
1331
- def allowed_critical_options(self) -> pulumi.Output[Optional[builtins.str]]:
1330
+ def allowed_critical_options(self) -> pulumi.Output[Optional[_builtins.str]]:
1332
1331
  """
1333
1332
  Specifies a comma-separated list of critical options that certificates can have when signed.
1334
1333
  """
1335
1334
  return pulumi.get(self, "allowed_critical_options")
1336
1335
 
1337
- @property
1336
+ @_builtins.property
1338
1337
  @pulumi.getter(name="allowedDomains")
1339
- def allowed_domains(self) -> pulumi.Output[Optional[builtins.str]]:
1338
+ def allowed_domains(self) -> pulumi.Output[Optional[_builtins.str]]:
1340
1339
  """
1341
1340
  The list of domains for which a client can request a host certificate.
1342
1341
  """
1343
1342
  return pulumi.get(self, "allowed_domains")
1344
1343
 
1345
- @property
1344
+ @_builtins.property
1346
1345
  @pulumi.getter(name="allowedDomainsTemplate")
1347
- def allowed_domains_template(self) -> pulumi.Output[builtins.bool]:
1346
+ def allowed_domains_template(self) -> pulumi.Output[_builtins.bool]:
1348
1347
  """
1349
1348
  Specifies if `allowed_domains` can be declared using
1350
1349
  identity template policies. Non-templated domains are also permitted.
1351
1350
  """
1352
1351
  return pulumi.get(self, "allowed_domains_template")
1353
1352
 
1354
- @property
1353
+ @_builtins.property
1355
1354
  @pulumi.getter(name="allowedExtensions")
1356
- def allowed_extensions(self) -> pulumi.Output[Optional[builtins.str]]:
1355
+ def allowed_extensions(self) -> pulumi.Output[Optional[_builtins.str]]:
1357
1356
  """
1358
1357
  Specifies a comma-separated list of extensions that certificates can have when signed.
1359
1358
  """
1360
1359
  return pulumi.get(self, "allowed_extensions")
1361
1360
 
1362
- @property
1361
+ @_builtins.property
1363
1362
  @pulumi.getter(name="allowedUserKeyConfigs")
1364
1363
  def allowed_user_key_configs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleAllowedUserKeyConfig']]]:
1365
1364
  """
@@ -1369,105 +1368,105 @@ class SecretBackendRole(pulumi.CustomResource):
1369
1368
  """
1370
1369
  return pulumi.get(self, "allowed_user_key_configs")
1371
1370
 
1372
- @property
1371
+ @_builtins.property
1373
1372
  @pulumi.getter(name="allowedUsers")
1374
- def allowed_users(self) -> pulumi.Output[Optional[builtins.str]]:
1373
+ def allowed_users(self) -> pulumi.Output[Optional[_builtins.str]]:
1375
1374
  """
1376
1375
  Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
1377
1376
  """
1378
1377
  return pulumi.get(self, "allowed_users")
1379
1378
 
1380
- @property
1379
+ @_builtins.property
1381
1380
  @pulumi.getter(name="allowedUsersTemplate")
1382
- def allowed_users_template(self) -> pulumi.Output[Optional[builtins.bool]]:
1381
+ def allowed_users_template(self) -> pulumi.Output[Optional[_builtins.bool]]:
1383
1382
  """
1384
1383
  Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
1385
1384
  """
1386
1385
  return pulumi.get(self, "allowed_users_template")
1387
1386
 
1388
- @property
1387
+ @_builtins.property
1389
1388
  @pulumi.getter
1390
- def backend(self) -> pulumi.Output[builtins.str]:
1389
+ def backend(self) -> pulumi.Output[_builtins.str]:
1391
1390
  """
1392
1391
  The path where the SSH secret backend is mounted.
1393
1392
  """
1394
1393
  return pulumi.get(self, "backend")
1395
1394
 
1396
- @property
1395
+ @_builtins.property
1397
1396
  @pulumi.getter(name="cidrList")
1398
- def cidr_list(self) -> pulumi.Output[Optional[builtins.str]]:
1397
+ def cidr_list(self) -> pulumi.Output[Optional[_builtins.str]]:
1399
1398
  """
1400
1399
  The comma-separated string of CIDR blocks for which this role is applicable.
1401
1400
  """
1402
1401
  return pulumi.get(self, "cidr_list")
1403
1402
 
1404
- @property
1403
+ @_builtins.property
1405
1404
  @pulumi.getter(name="defaultCriticalOptions")
1406
- def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1405
+ def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1407
1406
  """
1408
1407
  Specifies a map of critical options that certificates have when signed.
1409
1408
  """
1410
1409
  return pulumi.get(self, "default_critical_options")
1411
1410
 
1412
- @property
1411
+ @_builtins.property
1413
1412
  @pulumi.getter(name="defaultExtensions")
1414
- def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1413
+ def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1415
1414
  """
1416
1415
  Specifies a map of extensions that certificates have when signed.
1417
1416
  """
1418
1417
  return pulumi.get(self, "default_extensions")
1419
1418
 
1420
- @property
1419
+ @_builtins.property
1421
1420
  @pulumi.getter(name="defaultUser")
1422
- def default_user(self) -> pulumi.Output[Optional[builtins.str]]:
1421
+ def default_user(self) -> pulumi.Output[Optional[_builtins.str]]:
1423
1422
  """
1424
1423
  Specifies the default username for which a credential will be generated.
1425
1424
  """
1426
1425
  return pulumi.get(self, "default_user")
1427
1426
 
1428
- @property
1427
+ @_builtins.property
1429
1428
  @pulumi.getter(name="defaultUserTemplate")
1430
- def default_user_template(self) -> pulumi.Output[Optional[builtins.bool]]:
1429
+ def default_user_template(self) -> pulumi.Output[Optional[_builtins.bool]]:
1431
1430
  """
1432
1431
  If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
1433
1432
  """
1434
1433
  return pulumi.get(self, "default_user_template")
1435
1434
 
1436
- @property
1435
+ @_builtins.property
1437
1436
  @pulumi.getter(name="keyIdFormat")
1438
- def key_id_format(self) -> pulumi.Output[Optional[builtins.str]]:
1437
+ def key_id_format(self) -> pulumi.Output[Optional[_builtins.str]]:
1439
1438
  """
1440
1439
  Specifies a custom format for the key id of a signed certificate.
1441
1440
  """
1442
1441
  return pulumi.get(self, "key_id_format")
1443
1442
 
1444
- @property
1443
+ @_builtins.property
1445
1444
  @pulumi.getter(name="keyType")
1446
- def key_type(self) -> pulumi.Output[builtins.str]:
1445
+ def key_type(self) -> pulumi.Output[_builtins.str]:
1447
1446
  """
1448
1447
  Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
1449
1448
  """
1450
1449
  return pulumi.get(self, "key_type")
1451
1450
 
1452
- @property
1451
+ @_builtins.property
1453
1452
  @pulumi.getter(name="maxTtl")
1454
- def max_ttl(self) -> pulumi.Output[builtins.str]:
1453
+ def max_ttl(self) -> pulumi.Output[_builtins.str]:
1455
1454
  """
1456
1455
  Specifies the maximum Time To Live value.
1457
1456
  """
1458
1457
  return pulumi.get(self, "max_ttl")
1459
1458
 
1460
- @property
1459
+ @_builtins.property
1461
1460
  @pulumi.getter
1462
- def name(self) -> pulumi.Output[builtins.str]:
1461
+ def name(self) -> pulumi.Output[_builtins.str]:
1463
1462
  """
1464
1463
  Specifies the name of the role to create.
1465
1464
  """
1466
1465
  return pulumi.get(self, "name")
1467
1466
 
1468
- @property
1467
+ @_builtins.property
1469
1468
  @pulumi.getter
1470
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1469
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1471
1470
  """
1472
1471
  The namespace to provision the resource in.
1473
1472
  The value should not contain leading or trailing forward slashes.
@@ -1476,17 +1475,17 @@ class SecretBackendRole(pulumi.CustomResource):
1476
1475
  """
1477
1476
  return pulumi.get(self, "namespace")
1478
1477
 
1479
- @property
1478
+ @_builtins.property
1480
1479
  @pulumi.getter(name="notBeforeDuration")
1481
- def not_before_duration(self) -> pulumi.Output[builtins.str]:
1480
+ def not_before_duration(self) -> pulumi.Output[_builtins.str]:
1482
1481
  """
1483
1482
  Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
1484
1483
  """
1485
1484
  return pulumi.get(self, "not_before_duration")
1486
1485
 
1487
- @property
1486
+ @_builtins.property
1488
1487
  @pulumi.getter
1489
- def ttl(self) -> pulumi.Output[builtins.str]:
1488
+ def ttl(self) -> pulumi.Output[_builtins.str]:
1490
1489
  """
1491
1490
  Specifies the Time To Live value.
1492
1491
  """