pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,29 +19,29 @@ __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoleTagArgs:
22
21
  def __init__(__self__, *,
23
- role: pulumi.Input[builtins.str],
24
- allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
25
- backend: Optional[pulumi.Input[builtins.str]] = None,
26
- disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
27
- instance_id: Optional[pulumi.Input[builtins.str]] = None,
28
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ role: pulumi.Input[_builtins.str],
23
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
27
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
31
30
  """
32
31
  The set of arguments for constructing a AuthBackendRoleTag resource.
33
- :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
32
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
34
33
  role tags from, with no leading or trailing `/`s.
35
- :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
36
- :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
34
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
35
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
37
36
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
38
- :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
39
- :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
40
- :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
41
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
38
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
39
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
42
41
  The value should not contain leading or trailing forward slashes.
43
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
43
  *Available only for Vault Enterprise*.
45
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
46
45
  """
47
46
  pulumi.set(__self__, "role", role)
48
47
  if allow_instance_migration is not None:
@@ -60,9 +59,9 @@ class AuthBackendRoleTagArgs:
60
59
  if policies is not None:
61
60
  pulumi.set(__self__, "policies", policies)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def role(self) -> pulumi.Input[builtins.str]:
64
+ def role(self) -> pulumi.Input[_builtins.str]:
66
65
  """
67
66
  The name of the AWS auth backend role to read
68
67
  role tags from, with no leading or trailing `/`s.
@@ -70,24 +69,24 @@ class AuthBackendRoleTagArgs:
70
69
  return pulumi.get(self, "role")
71
70
 
72
71
  @role.setter
73
- def role(self, value: pulumi.Input[builtins.str]):
72
+ def role(self, value: pulumi.Input[_builtins.str]):
74
73
  pulumi.set(self, "role", value)
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter(name="allowInstanceMigration")
78
- def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
77
+ def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
79
78
  """
80
79
  If set, allows migration of the underlying instances where the client resides. Use with caution.
81
80
  """
82
81
  return pulumi.get(self, "allow_instance_migration")
83
82
 
84
83
  @allow_instance_migration.setter
85
- def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
84
+ def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
86
85
  pulumi.set(self, "allow_instance_migration", value)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
89
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
91
90
  """
92
91
  The path to the AWS auth backend to
93
92
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
@@ -95,48 +94,48 @@ class AuthBackendRoleTagArgs:
95
94
  return pulumi.get(self, "backend")
96
95
 
97
96
  @backend.setter
98
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
97
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
99
98
  pulumi.set(self, "backend", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="disallowReauthentication")
103
- def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
102
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
104
103
  """
105
104
  If set, only allows a single token to be granted per instance ID.
106
105
  """
107
106
  return pulumi.get(self, "disallow_reauthentication")
108
107
 
109
108
  @disallow_reauthentication.setter
110
- def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
109
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
111
110
  pulumi.set(self, "disallow_reauthentication", value)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter(name="instanceId")
115
- def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
114
+ def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
116
115
  """
117
116
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
118
117
  """
119
118
  return pulumi.get(self, "instance_id")
120
119
 
121
120
  @instance_id.setter
122
- def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
121
+ def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
123
122
  pulumi.set(self, "instance_id", value)
124
123
 
125
- @property
124
+ @_builtins.property
126
125
  @pulumi.getter(name="maxTtl")
127
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
126
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
128
127
  """
129
128
  The maximum TTL of the tokens issued using this role.
130
129
  """
131
130
  return pulumi.get(self, "max_ttl")
132
131
 
133
132
  @max_ttl.setter
134
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
133
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
135
134
  pulumi.set(self, "max_ttl", value)
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter
139
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
138
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
140
139
  """
141
140
  The namespace to provision the resource in.
142
141
  The value should not contain leading or trailing forward slashes.
@@ -146,52 +145,52 @@ class AuthBackendRoleTagArgs:
146
145
  return pulumi.get(self, "namespace")
147
146
 
148
147
  @namespace.setter
149
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
148
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
150
149
  pulumi.set(self, "namespace", value)
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter
154
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
153
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
155
154
  """
156
155
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
157
156
  """
158
157
  return pulumi.get(self, "policies")
159
158
 
160
159
  @policies.setter
161
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
160
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
162
161
  pulumi.set(self, "policies", value)
163
162
 
164
163
 
165
164
  @pulumi.input_type
166
165
  class _AuthBackendRoleTagState:
167
166
  def __init__(__self__, *,
168
- allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
169
- backend: Optional[pulumi.Input[builtins.str]] = None,
170
- disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
171
- instance_id: Optional[pulumi.Input[builtins.str]] = None,
172
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
173
- namespace: Optional[pulumi.Input[builtins.str]] = None,
174
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
175
- role: Optional[pulumi.Input[builtins.str]] = None,
176
- tag_key: Optional[pulumi.Input[builtins.str]] = None,
177
- tag_value: Optional[pulumi.Input[builtins.str]] = None):
167
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
168
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
169
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
170
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
171
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
172
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
173
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
174
+ role: Optional[pulumi.Input[_builtins.str]] = None,
175
+ tag_key: Optional[pulumi.Input[_builtins.str]] = None,
176
+ tag_value: Optional[pulumi.Input[_builtins.str]] = None):
178
177
  """
179
178
  Input properties used for looking up and filtering AuthBackendRoleTag resources.
180
- :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
181
- :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
179
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
180
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
182
181
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
183
- :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
184
- :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
185
- :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
186
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
182
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
183
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
184
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
185
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
187
186
  The value should not contain leading or trailing forward slashes.
188
187
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
189
188
  *Available only for Vault Enterprise*.
190
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
191
- :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
189
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
190
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
192
191
  role tags from, with no leading or trailing `/`s.
193
- :param pulumi.Input[builtins.str] tag_key: The key of the role tag.
194
- :param pulumi.Input[builtins.str] tag_value: The value to set the role key.
192
+ :param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
193
+ :param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
195
194
  """
196
195
  if allow_instance_migration is not None:
197
196
  pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
@@ -214,21 +213,21 @@ class _AuthBackendRoleTagState:
214
213
  if tag_value is not None:
215
214
  pulumi.set(__self__, "tag_value", tag_value)
216
215
 
217
- @property
216
+ @_builtins.property
218
217
  @pulumi.getter(name="allowInstanceMigration")
219
- def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
218
+ def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
220
219
  """
221
220
  If set, allows migration of the underlying instances where the client resides. Use with caution.
222
221
  """
223
222
  return pulumi.get(self, "allow_instance_migration")
224
223
 
225
224
  @allow_instance_migration.setter
226
- def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
225
+ def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
227
226
  pulumi.set(self, "allow_instance_migration", value)
228
227
 
229
- @property
228
+ @_builtins.property
230
229
  @pulumi.getter
231
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
230
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
232
231
  """
233
232
  The path to the AWS auth backend to
234
233
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
@@ -236,48 +235,48 @@ class _AuthBackendRoleTagState:
236
235
  return pulumi.get(self, "backend")
237
236
 
238
237
  @backend.setter
239
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
238
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
240
239
  pulumi.set(self, "backend", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter(name="disallowReauthentication")
244
- def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
243
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
245
244
  """
246
245
  If set, only allows a single token to be granted per instance ID.
247
246
  """
248
247
  return pulumi.get(self, "disallow_reauthentication")
249
248
 
250
249
  @disallow_reauthentication.setter
251
- def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
250
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
252
251
  pulumi.set(self, "disallow_reauthentication", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter(name="instanceId")
256
- def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
255
+ def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
257
256
  """
258
257
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
259
258
  """
260
259
  return pulumi.get(self, "instance_id")
261
260
 
262
261
  @instance_id.setter
263
- def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
262
+ def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
264
263
  pulumi.set(self, "instance_id", value)
265
264
 
266
- @property
265
+ @_builtins.property
267
266
  @pulumi.getter(name="maxTtl")
268
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
267
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
269
268
  """
270
269
  The maximum TTL of the tokens issued using this role.
271
270
  """
272
271
  return pulumi.get(self, "max_ttl")
273
272
 
274
273
  @max_ttl.setter
275
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
274
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
276
275
  pulumi.set(self, "max_ttl", value)
277
276
 
278
- @property
277
+ @_builtins.property
279
278
  @pulumi.getter
280
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
279
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
281
280
  """
282
281
  The namespace to provision the resource in.
283
282
  The value should not contain leading or trailing forward slashes.
@@ -287,24 +286,24 @@ class _AuthBackendRoleTagState:
287
286
  return pulumi.get(self, "namespace")
288
287
 
289
288
  @namespace.setter
290
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
289
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
291
290
  pulumi.set(self, "namespace", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter
295
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
294
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
296
295
  """
297
296
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
298
297
  """
299
298
  return pulumi.get(self, "policies")
300
299
 
301
300
  @policies.setter
302
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
301
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
303
302
  pulumi.set(self, "policies", value)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter
307
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
306
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
308
307
  """
309
308
  The name of the AWS auth backend role to read
310
309
  role tags from, with no leading or trailing `/`s.
@@ -312,31 +311,31 @@ class _AuthBackendRoleTagState:
312
311
  return pulumi.get(self, "role")
313
312
 
314
313
  @role.setter
315
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
314
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
316
315
  pulumi.set(self, "role", value)
317
316
 
318
- @property
317
+ @_builtins.property
319
318
  @pulumi.getter(name="tagKey")
320
- def tag_key(self) -> Optional[pulumi.Input[builtins.str]]:
319
+ def tag_key(self) -> Optional[pulumi.Input[_builtins.str]]:
321
320
  """
322
321
  The key of the role tag.
323
322
  """
324
323
  return pulumi.get(self, "tag_key")
325
324
 
326
325
  @tag_key.setter
327
- def tag_key(self, value: Optional[pulumi.Input[builtins.str]]):
326
+ def tag_key(self, value: Optional[pulumi.Input[_builtins.str]]):
328
327
  pulumi.set(self, "tag_key", value)
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter(name="tagValue")
332
- def tag_value(self) -> Optional[pulumi.Input[builtins.str]]:
331
+ def tag_value(self) -> Optional[pulumi.Input[_builtins.str]]:
333
332
  """
334
333
  The value to set the role key.
335
334
  """
336
335
  return pulumi.get(self, "tag_value")
337
336
 
338
337
  @tag_value.setter
339
- def tag_value(self, value: Optional[pulumi.Input[builtins.str]]):
338
+ def tag_value(self, value: Optional[pulumi.Input[_builtins.str]]):
340
339
  pulumi.set(self, "tag_value", value)
341
340
 
342
341
 
@@ -346,32 +345,32 @@ class AuthBackendRoleTag(pulumi.CustomResource):
346
345
  def __init__(__self__,
347
346
  resource_name: str,
348
347
  opts: Optional[pulumi.ResourceOptions] = None,
349
- allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
350
- backend: Optional[pulumi.Input[builtins.str]] = None,
351
- disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
352
- instance_id: Optional[pulumi.Input[builtins.str]] = None,
353
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
354
- namespace: Optional[pulumi.Input[builtins.str]] = None,
355
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
356
- role: Optional[pulumi.Input[builtins.str]] = None,
348
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
349
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
350
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
351
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
352
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
353
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
354
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
355
+ role: Optional[pulumi.Input[_builtins.str]] = None,
357
356
  __props__=None):
358
357
  """
359
358
  Reads role tag information from an AWS auth backend in Vault.
360
359
 
361
360
  :param str resource_name: The name of the resource.
362
361
  :param pulumi.ResourceOptions opts: Options for the resource.
363
- :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
364
- :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
362
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
363
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
365
364
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
366
- :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
367
- :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
368
- :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
369
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
365
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
366
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
367
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
368
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
370
369
  The value should not contain leading or trailing forward slashes.
371
370
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
372
371
  *Available only for Vault Enterprise*.
373
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
374
- :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
372
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
373
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
375
374
  role tags from, with no leading or trailing `/`s.
376
375
  """
377
376
  ...
@@ -398,14 +397,14 @@ class AuthBackendRoleTag(pulumi.CustomResource):
398
397
  def _internal_init(__self__,
399
398
  resource_name: str,
400
399
  opts: Optional[pulumi.ResourceOptions] = None,
401
- allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
402
- backend: Optional[pulumi.Input[builtins.str]] = None,
403
- disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
404
- instance_id: Optional[pulumi.Input[builtins.str]] = None,
405
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
406
- namespace: Optional[pulumi.Input[builtins.str]] = None,
407
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
408
- role: Optional[pulumi.Input[builtins.str]] = None,
400
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
401
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
402
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
403
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
404
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
405
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
406
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
407
+ role: Optional[pulumi.Input[_builtins.str]] = None,
409
408
  __props__=None):
410
409
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
411
410
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -437,16 +436,16 @@ class AuthBackendRoleTag(pulumi.CustomResource):
437
436
  def get(resource_name: str,
438
437
  id: pulumi.Input[str],
439
438
  opts: Optional[pulumi.ResourceOptions] = None,
440
- allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
441
- backend: Optional[pulumi.Input[builtins.str]] = None,
442
- disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
443
- instance_id: Optional[pulumi.Input[builtins.str]] = None,
444
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
445
- namespace: Optional[pulumi.Input[builtins.str]] = None,
446
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
447
- role: Optional[pulumi.Input[builtins.str]] = None,
448
- tag_key: Optional[pulumi.Input[builtins.str]] = None,
449
- tag_value: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleTag':
439
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
440
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
441
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
442
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
443
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
444
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
445
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
446
+ role: Optional[pulumi.Input[_builtins.str]] = None,
447
+ tag_key: Optional[pulumi.Input[_builtins.str]] = None,
448
+ tag_value: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleTag':
450
449
  """
451
450
  Get an existing AuthBackendRoleTag resource's state with the given name, id, and optional extra
452
451
  properties used to qualify the lookup.
@@ -454,21 +453,21 @@ class AuthBackendRoleTag(pulumi.CustomResource):
454
453
  :param str resource_name: The unique name of the resulting resource.
455
454
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
456
455
  :param pulumi.ResourceOptions opts: Options for the resource.
457
- :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
458
- :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
456
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
457
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
459
458
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
460
- :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
461
- :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
462
- :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
463
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
459
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
460
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
461
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
462
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
464
463
  The value should not contain leading or trailing forward slashes.
465
464
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
466
465
  *Available only for Vault Enterprise*.
467
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
468
- :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
466
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
467
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
469
468
  role tags from, with no leading or trailing `/`s.
470
- :param pulumi.Input[builtins.str] tag_key: The key of the role tag.
471
- :param pulumi.Input[builtins.str] tag_value: The value to set the role key.
469
+ :param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
470
+ :param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
472
471
  """
473
472
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
474
473
 
@@ -486,50 +485,50 @@ class AuthBackendRoleTag(pulumi.CustomResource):
486
485
  __props__.__dict__["tag_value"] = tag_value
487
486
  return AuthBackendRoleTag(resource_name, opts=opts, __props__=__props__)
488
487
 
489
- @property
488
+ @_builtins.property
490
489
  @pulumi.getter(name="allowInstanceMigration")
491
- def allow_instance_migration(self) -> pulumi.Output[Optional[builtins.bool]]:
490
+ def allow_instance_migration(self) -> pulumi.Output[Optional[_builtins.bool]]:
492
491
  """
493
492
  If set, allows migration of the underlying instances where the client resides. Use with caution.
494
493
  """
495
494
  return pulumi.get(self, "allow_instance_migration")
496
495
 
497
- @property
496
+ @_builtins.property
498
497
  @pulumi.getter
499
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
498
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
500
499
  """
501
500
  The path to the AWS auth backend to
502
501
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
503
502
  """
504
503
  return pulumi.get(self, "backend")
505
504
 
506
- @property
505
+ @_builtins.property
507
506
  @pulumi.getter(name="disallowReauthentication")
508
- def disallow_reauthentication(self) -> pulumi.Output[Optional[builtins.bool]]:
507
+ def disallow_reauthentication(self) -> pulumi.Output[Optional[_builtins.bool]]:
509
508
  """
510
509
  If set, only allows a single token to be granted per instance ID.
511
510
  """
512
511
  return pulumi.get(self, "disallow_reauthentication")
513
512
 
514
- @property
513
+ @_builtins.property
515
514
  @pulumi.getter(name="instanceId")
516
- def instance_id(self) -> pulumi.Output[Optional[builtins.str]]:
515
+ def instance_id(self) -> pulumi.Output[Optional[_builtins.str]]:
517
516
  """
518
517
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
519
518
  """
520
519
  return pulumi.get(self, "instance_id")
521
520
 
522
- @property
521
+ @_builtins.property
523
522
  @pulumi.getter(name="maxTtl")
524
- def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
523
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
525
524
  """
526
525
  The maximum TTL of the tokens issued using this role.
527
526
  """
528
527
  return pulumi.get(self, "max_ttl")
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter
532
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
531
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
533
532
  """
534
533
  The namespace to provision the resource in.
535
534
  The value should not contain leading or trailing forward slashes.
@@ -538,34 +537,34 @@ class AuthBackendRoleTag(pulumi.CustomResource):
538
537
  """
539
538
  return pulumi.get(self, "namespace")
540
539
 
541
- @property
540
+ @_builtins.property
542
541
  @pulumi.getter
543
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
542
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
544
543
  """
545
544
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
546
545
  """
547
546
  return pulumi.get(self, "policies")
548
547
 
549
- @property
548
+ @_builtins.property
550
549
  @pulumi.getter
551
- def role(self) -> pulumi.Output[builtins.str]:
550
+ def role(self) -> pulumi.Output[_builtins.str]:
552
551
  """
553
552
  The name of the AWS auth backend role to read
554
553
  role tags from, with no leading or trailing `/`s.
555
554
  """
556
555
  return pulumi.get(self, "role")
557
556
 
558
- @property
557
+ @_builtins.property
559
558
  @pulumi.getter(name="tagKey")
560
- def tag_key(self) -> pulumi.Output[builtins.str]:
559
+ def tag_key(self) -> pulumi.Output[_builtins.str]:
561
560
  """
562
561
  The key of the role tag.
563
562
  """
564
563
  return pulumi.get(self, "tag_key")
565
564
 
566
- @property
565
+ @_builtins.property
567
566
  @pulumi.getter(name="tagValue")
568
- def tag_value(self) -> pulumi.Output[builtins.str]:
567
+ def tag_value(self) -> pulumi.Output[_builtins.str]:
569
568
  """
570
569
  The value to set the role key.
571
570
  """