pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,62 +21,62 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
22
21
  @pulumi.input_type
23
22
  class AuthBackendArgs:
24
23
  def __init__(__self__, *,
25
- organization: pulumi.Input[builtins.str],
26
- base_url: Optional[pulumi.Input[builtins.str]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- organization_id: Optional[pulumi.Input[builtins.int]] = None,
31
- path: Optional[pulumi.Input[builtins.str]] = None,
32
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
34
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
36
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
37
- token_period: Optional[pulumi.Input[builtins.int]] = None,
38
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
39
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
40
- token_type: Optional[pulumi.Input[builtins.str]] = None,
24
+ organization: pulumi.Input[_builtins.str],
25
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
26
+ description: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
30
+ path: Optional[pulumi.Input[_builtins.str]] = None,
31
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
41
40
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
42
41
  """
43
42
  The set of arguments for constructing a AuthBackend resource.
44
- :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
45
- :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
43
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
44
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
46
45
  are running GitHub Enterprise or an API-compatible authentication server.
47
- :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
46
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
48
47
  This overrides the current stored value, if any.
49
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
48
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
49
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
51
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
50
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
52
51
  The value should not contain leading or trailing forward slashes.
53
52
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
54
53
  *Available only for Vault Enterprise*.
55
- :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
54
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
56
55
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
57
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
56
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
58
57
  if not specified.
59
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
60
59
  addresses which can authenticate successfully, and ties the resulting token to these blocks
61
60
  as well.
62
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
61
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
63
62
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
64
63
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
65
64
  `token_max_ttl` would otherwise allow a renewal.
66
- :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
65
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
67
66
  Its current value will be referenced at renewal time.
68
- :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
67
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
69
68
  generated tokens; otherwise it will be added to the policies set in token_policies.
70
- :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
69
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
71
70
  of times a generated token may be used (within its lifetime); 0 means unlimited.
72
- :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
71
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
73
72
  token generated using this role should never expire. The token should be renewed within the
74
73
  duration specified by this value. At each renewal, the token's TTL will be set to the
75
74
  value of this field. Specified in seconds.
76
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
75
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
77
76
  on the auth method, this list may be supplemented by user/group/other values.
78
- :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
77
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
79
78
  Its current value will be referenced at renewal time.
80
- :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
79
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
81
80
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
82
81
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
83
82
 
@@ -117,21 +116,21 @@ class AuthBackendArgs:
117
116
  if tune is not None:
118
117
  pulumi.set(__self__, "tune", tune)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter
122
- def organization(self) -> pulumi.Input[builtins.str]:
121
+ def organization(self) -> pulumi.Input[_builtins.str]:
123
122
  """
124
123
  The organization configured users must be part of.
125
124
  """
126
125
  return pulumi.get(self, "organization")
127
126
 
128
127
  @organization.setter
129
- def organization(self, value: pulumi.Input[builtins.str]):
128
+ def organization(self, value: pulumi.Input[_builtins.str]):
130
129
  pulumi.set(self, "organization", value)
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="baseUrl")
134
- def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
133
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
135
134
  """
136
135
  The API endpoint to use. Useful if you
137
136
  are running GitHub Enterprise or an API-compatible authentication server.
@@ -139,12 +138,12 @@ class AuthBackendArgs:
139
138
  return pulumi.get(self, "base_url")
140
139
 
141
140
  @base_url.setter
142
- def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
141
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
143
142
  pulumi.set(self, "base_url", value)
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter
147
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
146
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
148
147
  """
149
148
  Specifies the description of the mount.
150
149
  This overrides the current stored value, if any.
@@ -152,12 +151,12 @@ class AuthBackendArgs:
152
151
  return pulumi.get(self, "description")
153
152
 
154
153
  @description.setter
155
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
154
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
156
155
  pulumi.set(self, "description", value)
157
156
 
158
- @property
157
+ @_builtins.property
159
158
  @pulumi.getter(name="disableRemount")
160
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
159
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
161
160
  """
162
161
  If set, opts out of mount migration on path updates.
163
162
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -165,12 +164,12 @@ class AuthBackendArgs:
165
164
  return pulumi.get(self, "disable_remount")
166
165
 
167
166
  @disable_remount.setter
168
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
167
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
169
168
  pulumi.set(self, "disable_remount", value)
170
169
 
171
- @property
170
+ @_builtins.property
172
171
  @pulumi.getter
173
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
172
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
174
173
  """
175
174
  The namespace to provision the resource in.
176
175
  The value should not contain leading or trailing forward slashes.
@@ -180,12 +179,12 @@ class AuthBackendArgs:
180
179
  return pulumi.get(self, "namespace")
181
180
 
182
181
  @namespace.setter
183
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
182
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
184
183
  pulumi.set(self, "namespace", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter(name="organizationId")
188
- def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
187
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
189
188
  """
190
189
  The ID of the organization users must be part of.
191
190
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -193,12 +192,12 @@ class AuthBackendArgs:
193
192
  return pulumi.get(self, "organization_id")
194
193
 
195
194
  @organization_id.setter
196
- def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
195
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
197
196
  pulumi.set(self, "organization_id", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
200
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
202
201
  """
203
202
  Path where the auth backend is mounted. Defaults to `auth/github`
204
203
  if not specified.
@@ -206,12 +205,12 @@ class AuthBackendArgs:
206
205
  return pulumi.get(self, "path")
207
206
 
208
207
  @path.setter
209
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
208
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
210
209
  pulumi.set(self, "path", value)
211
210
 
212
- @property
211
+ @_builtins.property
213
212
  @pulumi.getter(name="tokenBoundCidrs")
214
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
213
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
215
214
  """
216
215
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
217
216
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -220,12 +219,12 @@ class AuthBackendArgs:
220
219
  return pulumi.get(self, "token_bound_cidrs")
221
220
 
222
221
  @token_bound_cidrs.setter
223
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
222
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
224
223
  pulumi.set(self, "token_bound_cidrs", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="tokenExplicitMaxTtl")
228
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
227
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
229
228
  """
230
229
  (Optional) If set, will encode an
231
230
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -235,12 +234,12 @@ class AuthBackendArgs:
235
234
  return pulumi.get(self, "token_explicit_max_ttl")
236
235
 
237
236
  @token_explicit_max_ttl.setter
238
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
237
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
239
238
  pulumi.set(self, "token_explicit_max_ttl", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="tokenMaxTtl")
243
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
242
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
244
243
  """
245
244
  (Optional) The maximum lifetime for generated tokens in number of seconds.
246
245
  Its current value will be referenced at renewal time.
@@ -248,12 +247,12 @@ class AuthBackendArgs:
248
247
  return pulumi.get(self, "token_max_ttl")
249
248
 
250
249
  @token_max_ttl.setter
251
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
250
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
252
251
  pulumi.set(self, "token_max_ttl", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter(name="tokenNoDefaultPolicy")
256
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
255
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
257
256
  """
258
257
  (Optional) If set, the default policy will not be set on
259
258
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -261,12 +260,12 @@ class AuthBackendArgs:
261
260
  return pulumi.get(self, "token_no_default_policy")
262
261
 
263
262
  @token_no_default_policy.setter
264
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
263
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
265
264
  pulumi.set(self, "token_no_default_policy", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter(name="tokenNumUses")
269
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
268
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
270
269
  """
271
270
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
272
271
  of times a generated token may be used (within its lifetime); 0 means unlimited.
@@ -274,12 +273,12 @@ class AuthBackendArgs:
274
273
  return pulumi.get(self, "token_num_uses")
275
274
 
276
275
  @token_num_uses.setter
277
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
276
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
278
277
  pulumi.set(self, "token_num_uses", value)
279
278
 
280
- @property
279
+ @_builtins.property
281
280
  @pulumi.getter(name="tokenPeriod")
282
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
281
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
283
282
  """
284
283
  (Optional) If set, indicates that the
285
284
  token generated using this role should never expire. The token should be renewed within the
@@ -289,12 +288,12 @@ class AuthBackendArgs:
289
288
  return pulumi.get(self, "token_period")
290
289
 
291
290
  @token_period.setter
292
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
291
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
293
292
  pulumi.set(self, "token_period", value)
294
293
 
295
- @property
294
+ @_builtins.property
296
295
  @pulumi.getter(name="tokenPolicies")
297
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
296
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
298
297
  """
299
298
  (Optional) List of policies to encode onto generated tokens. Depending
300
299
  on the auth method, this list may be supplemented by user/group/other values.
@@ -302,12 +301,12 @@ class AuthBackendArgs:
302
301
  return pulumi.get(self, "token_policies")
303
302
 
304
303
  @token_policies.setter
305
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
304
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
306
305
  pulumi.set(self, "token_policies", value)
307
306
 
308
- @property
307
+ @_builtins.property
309
308
  @pulumi.getter(name="tokenTtl")
310
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
309
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
311
310
  """
312
311
  (Optional) The incremental lifetime for generated tokens in number of seconds.
313
312
  Its current value will be referenced at renewal time.
@@ -315,12 +314,12 @@ class AuthBackendArgs:
315
314
  return pulumi.get(self, "token_ttl")
316
315
 
317
316
  @token_ttl.setter
318
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
317
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
319
318
  pulumi.set(self, "token_ttl", value)
320
319
 
321
- @property
320
+ @_builtins.property
322
321
  @pulumi.getter(name="tokenType")
323
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
322
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
324
323
  """
325
324
  Specifies the type of tokens that should be returned by
326
325
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -328,10 +327,10 @@ class AuthBackendArgs:
328
327
  return pulumi.get(self, "token_type")
329
328
 
330
329
  @token_type.setter
331
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
330
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
332
331
  pulumi.set(self, "token_type", value)
333
332
 
334
- @property
333
+ @_builtins.property
335
334
  @pulumi.getter
336
335
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
337
336
  """
@@ -349,64 +348,64 @@ class AuthBackendArgs:
349
348
  @pulumi.input_type
350
349
  class _AuthBackendState:
351
350
  def __init__(__self__, *,
352
- accessor: Optional[pulumi.Input[builtins.str]] = None,
353
- base_url: Optional[pulumi.Input[builtins.str]] = None,
354
- description: Optional[pulumi.Input[builtins.str]] = None,
355
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
356
- namespace: Optional[pulumi.Input[builtins.str]] = None,
357
- organization: Optional[pulumi.Input[builtins.str]] = None,
358
- organization_id: Optional[pulumi.Input[builtins.int]] = None,
359
- path: Optional[pulumi.Input[builtins.str]] = None,
360
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
361
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
362
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
363
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
364
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
365
- token_period: Optional[pulumi.Input[builtins.int]] = None,
366
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
367
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
368
- token_type: Optional[pulumi.Input[builtins.str]] = None,
351
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
352
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
353
+ description: Optional[pulumi.Input[_builtins.str]] = None,
354
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
355
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
356
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
357
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
358
+ path: Optional[pulumi.Input[_builtins.str]] = None,
359
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
360
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
361
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
362
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
364
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
365
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
366
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
367
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
369
368
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
370
369
  """
371
370
  Input properties used for looking up and filtering AuthBackend resources.
372
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
373
- :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
371
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
372
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
374
373
  are running GitHub Enterprise or an API-compatible authentication server.
375
- :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
374
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
376
375
  This overrides the current stored value, if any.
377
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
376
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
378
377
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
379
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
378
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
380
379
  The value should not contain leading or trailing forward slashes.
381
380
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
382
381
  *Available only for Vault Enterprise*.
383
- :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
384
- :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
382
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
383
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
385
384
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
386
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
385
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
387
386
  if not specified.
388
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
387
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
389
388
  addresses which can authenticate successfully, and ties the resulting token to these blocks
390
389
  as well.
391
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
390
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
392
391
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
393
392
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
394
393
  `token_max_ttl` would otherwise allow a renewal.
395
- :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
394
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
396
395
  Its current value will be referenced at renewal time.
397
- :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
396
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
398
397
  generated tokens; otherwise it will be added to the policies set in token_policies.
399
- :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
398
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
400
399
  of times a generated token may be used (within its lifetime); 0 means unlimited.
401
- :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
400
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
402
401
  token generated using this role should never expire. The token should be renewed within the
403
402
  duration specified by this value. At each renewal, the token's TTL will be set to the
404
403
  value of this field. Specified in seconds.
405
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
404
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
406
405
  on the auth method, this list may be supplemented by user/group/other values.
407
- :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
406
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
408
407
  Its current value will be referenced at renewal time.
409
- :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
408
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
410
409
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
411
410
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
412
411
 
@@ -449,21 +448,21 @@ class _AuthBackendState:
449
448
  if tune is not None:
450
449
  pulumi.set(__self__, "tune", tune)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter
454
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
453
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
455
454
  """
456
455
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
457
456
  """
458
457
  return pulumi.get(self, "accessor")
459
458
 
460
459
  @accessor.setter
461
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
460
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
462
461
  pulumi.set(self, "accessor", value)
463
462
 
464
- @property
463
+ @_builtins.property
465
464
  @pulumi.getter(name="baseUrl")
466
- def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
465
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
467
466
  """
468
467
  The API endpoint to use. Useful if you
469
468
  are running GitHub Enterprise or an API-compatible authentication server.
@@ -471,12 +470,12 @@ class _AuthBackendState:
471
470
  return pulumi.get(self, "base_url")
472
471
 
473
472
  @base_url.setter
474
- def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
473
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
475
474
  pulumi.set(self, "base_url", value)
476
475
 
477
- @property
476
+ @_builtins.property
478
477
  @pulumi.getter
479
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
478
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
480
479
  """
481
480
  Specifies the description of the mount.
482
481
  This overrides the current stored value, if any.
@@ -484,12 +483,12 @@ class _AuthBackendState:
484
483
  return pulumi.get(self, "description")
485
484
 
486
485
  @description.setter
487
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
486
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
488
487
  pulumi.set(self, "description", value)
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter(name="disableRemount")
492
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
491
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
493
492
  """
494
493
  If set, opts out of mount migration on path updates.
495
494
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -497,12 +496,12 @@ class _AuthBackendState:
497
496
  return pulumi.get(self, "disable_remount")
498
497
 
499
498
  @disable_remount.setter
500
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
499
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
501
500
  pulumi.set(self, "disable_remount", value)
502
501
 
503
- @property
502
+ @_builtins.property
504
503
  @pulumi.getter
505
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
504
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
506
505
  """
507
506
  The namespace to provision the resource in.
508
507
  The value should not contain leading or trailing forward slashes.
@@ -512,24 +511,24 @@ class _AuthBackendState:
512
511
  return pulumi.get(self, "namespace")
513
512
 
514
513
  @namespace.setter
515
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
514
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
516
515
  pulumi.set(self, "namespace", value)
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter
520
- def organization(self) -> Optional[pulumi.Input[builtins.str]]:
519
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
521
520
  """
522
521
  The organization configured users must be part of.
523
522
  """
524
523
  return pulumi.get(self, "organization")
525
524
 
526
525
  @organization.setter
527
- def organization(self, value: Optional[pulumi.Input[builtins.str]]):
526
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
528
527
  pulumi.set(self, "organization", value)
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter(name="organizationId")
532
- def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
531
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
533
532
  """
534
533
  The ID of the organization users must be part of.
535
534
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -537,12 +536,12 @@ class _AuthBackendState:
537
536
  return pulumi.get(self, "organization_id")
538
537
 
539
538
  @organization_id.setter
540
- def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
539
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
541
540
  pulumi.set(self, "organization_id", value)
542
541
 
543
- @property
542
+ @_builtins.property
544
543
  @pulumi.getter
545
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
544
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
546
545
  """
547
546
  Path where the auth backend is mounted. Defaults to `auth/github`
548
547
  if not specified.
@@ -550,12 +549,12 @@ class _AuthBackendState:
550
549
  return pulumi.get(self, "path")
551
550
 
552
551
  @path.setter
553
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
552
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
554
553
  pulumi.set(self, "path", value)
555
554
 
556
- @property
555
+ @_builtins.property
557
556
  @pulumi.getter(name="tokenBoundCidrs")
558
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
557
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
559
558
  """
560
559
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
561
560
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -564,12 +563,12 @@ class _AuthBackendState:
564
563
  return pulumi.get(self, "token_bound_cidrs")
565
564
 
566
565
  @token_bound_cidrs.setter
567
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
566
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
568
567
  pulumi.set(self, "token_bound_cidrs", value)
569
568
 
570
- @property
569
+ @_builtins.property
571
570
  @pulumi.getter(name="tokenExplicitMaxTtl")
572
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
571
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
573
572
  """
574
573
  (Optional) If set, will encode an
575
574
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -579,12 +578,12 @@ class _AuthBackendState:
579
578
  return pulumi.get(self, "token_explicit_max_ttl")
580
579
 
581
580
  @token_explicit_max_ttl.setter
582
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
581
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
583
582
  pulumi.set(self, "token_explicit_max_ttl", value)
584
583
 
585
- @property
584
+ @_builtins.property
586
585
  @pulumi.getter(name="tokenMaxTtl")
587
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
586
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
588
587
  """
589
588
  (Optional) The maximum lifetime for generated tokens in number of seconds.
590
589
  Its current value will be referenced at renewal time.
@@ -592,12 +591,12 @@ class _AuthBackendState:
592
591
  return pulumi.get(self, "token_max_ttl")
593
592
 
594
593
  @token_max_ttl.setter
595
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
594
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
596
595
  pulumi.set(self, "token_max_ttl", value)
597
596
 
598
- @property
597
+ @_builtins.property
599
598
  @pulumi.getter(name="tokenNoDefaultPolicy")
600
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
599
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
601
600
  """
602
601
  (Optional) If set, the default policy will not be set on
603
602
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -605,12 +604,12 @@ class _AuthBackendState:
605
604
  return pulumi.get(self, "token_no_default_policy")
606
605
 
607
606
  @token_no_default_policy.setter
608
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
607
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
609
608
  pulumi.set(self, "token_no_default_policy", value)
610
609
 
611
- @property
610
+ @_builtins.property
612
611
  @pulumi.getter(name="tokenNumUses")
613
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
612
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
614
613
  """
615
614
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
616
615
  of times a generated token may be used (within its lifetime); 0 means unlimited.
@@ -618,12 +617,12 @@ class _AuthBackendState:
618
617
  return pulumi.get(self, "token_num_uses")
619
618
 
620
619
  @token_num_uses.setter
621
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
620
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
622
621
  pulumi.set(self, "token_num_uses", value)
623
622
 
624
- @property
623
+ @_builtins.property
625
624
  @pulumi.getter(name="tokenPeriod")
626
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
625
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
627
626
  """
628
627
  (Optional) If set, indicates that the
629
628
  token generated using this role should never expire. The token should be renewed within the
@@ -633,12 +632,12 @@ class _AuthBackendState:
633
632
  return pulumi.get(self, "token_period")
634
633
 
635
634
  @token_period.setter
636
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
635
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
637
636
  pulumi.set(self, "token_period", value)
638
637
 
639
- @property
638
+ @_builtins.property
640
639
  @pulumi.getter(name="tokenPolicies")
641
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
640
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
642
641
  """
643
642
  (Optional) List of policies to encode onto generated tokens. Depending
644
643
  on the auth method, this list may be supplemented by user/group/other values.
@@ -646,12 +645,12 @@ class _AuthBackendState:
646
645
  return pulumi.get(self, "token_policies")
647
646
 
648
647
  @token_policies.setter
649
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
648
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
650
649
  pulumi.set(self, "token_policies", value)
651
650
 
652
- @property
651
+ @_builtins.property
653
652
  @pulumi.getter(name="tokenTtl")
654
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
653
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
655
654
  """
656
655
  (Optional) The incremental lifetime for generated tokens in number of seconds.
657
656
  Its current value will be referenced at renewal time.
@@ -659,12 +658,12 @@ class _AuthBackendState:
659
658
  return pulumi.get(self, "token_ttl")
660
659
 
661
660
  @token_ttl.setter
662
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
661
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
663
662
  pulumi.set(self, "token_ttl", value)
664
663
 
665
- @property
664
+ @_builtins.property
666
665
  @pulumi.getter(name="tokenType")
667
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
666
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
668
667
  """
669
668
  Specifies the type of tokens that should be returned by
670
669
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -672,10 +671,10 @@ class _AuthBackendState:
672
671
  return pulumi.get(self, "token_type")
673
672
 
674
673
  @token_type.setter
675
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
674
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
676
675
  pulumi.set(self, "token_type", value)
677
676
 
678
- @property
677
+ @_builtins.property
679
678
  @pulumi.getter
680
679
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
681
680
  """
@@ -696,22 +695,22 @@ class AuthBackend(pulumi.CustomResource):
696
695
  def __init__(__self__,
697
696
  resource_name: str,
698
697
  opts: Optional[pulumi.ResourceOptions] = None,
699
- base_url: Optional[pulumi.Input[builtins.str]] = None,
700
- description: Optional[pulumi.Input[builtins.str]] = None,
701
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
702
- namespace: Optional[pulumi.Input[builtins.str]] = None,
703
- organization: Optional[pulumi.Input[builtins.str]] = None,
704
- organization_id: Optional[pulumi.Input[builtins.int]] = None,
705
- path: Optional[pulumi.Input[builtins.str]] = None,
706
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
707
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
708
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
709
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
710
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
711
- token_period: Optional[pulumi.Input[builtins.int]] = None,
712
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
713
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
714
- token_type: Optional[pulumi.Input[builtins.str]] = None,
698
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
699
+ description: Optional[pulumi.Input[_builtins.str]] = None,
700
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
701
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
702
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
703
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
704
+ path: Optional[pulumi.Input[_builtins.str]] = None,
705
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
706
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
707
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
708
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
709
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
710
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
711
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
712
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
713
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
715
714
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
716
715
  __props__=None):
717
716
  """
@@ -738,43 +737,43 @@ class AuthBackend(pulumi.CustomResource):
738
737
 
739
738
  :param str resource_name: The name of the resource.
740
739
  :param pulumi.ResourceOptions opts: Options for the resource.
741
- :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
740
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
742
741
  are running GitHub Enterprise or an API-compatible authentication server.
743
- :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
742
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
744
743
  This overrides the current stored value, if any.
745
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
744
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
746
745
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
747
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
746
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
748
747
  The value should not contain leading or trailing forward slashes.
749
748
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
750
749
  *Available only for Vault Enterprise*.
751
- :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
752
- :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
750
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
751
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
753
752
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
754
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
753
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
755
754
  if not specified.
756
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
755
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
757
756
  addresses which can authenticate successfully, and ties the resulting token to these blocks
758
757
  as well.
759
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
758
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
760
759
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
760
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
761
  `token_max_ttl` would otherwise allow a renewal.
763
- :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
762
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
764
763
  Its current value will be referenced at renewal time.
765
- :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
764
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
766
765
  generated tokens; otherwise it will be added to the policies set in token_policies.
767
- :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
766
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
768
767
  of times a generated token may be used (within its lifetime); 0 means unlimited.
769
- :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
768
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
770
769
  token generated using this role should never expire. The token should be renewed within the
771
770
  duration specified by this value. At each renewal, the token's TTL will be set to the
772
771
  value of this field. Specified in seconds.
773
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
772
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
774
773
  on the auth method, this list may be supplemented by user/group/other values.
775
- :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
774
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
776
775
  Its current value will be referenced at renewal time.
777
- :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
776
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
778
777
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
779
778
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
780
779
 
@@ -823,22 +822,22 @@ class AuthBackend(pulumi.CustomResource):
823
822
  def _internal_init(__self__,
824
823
  resource_name: str,
825
824
  opts: Optional[pulumi.ResourceOptions] = None,
826
- base_url: Optional[pulumi.Input[builtins.str]] = None,
827
- description: Optional[pulumi.Input[builtins.str]] = None,
828
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
829
- namespace: Optional[pulumi.Input[builtins.str]] = None,
830
- organization: Optional[pulumi.Input[builtins.str]] = None,
831
- organization_id: Optional[pulumi.Input[builtins.int]] = None,
832
- path: Optional[pulumi.Input[builtins.str]] = None,
833
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
834
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
835
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
836
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
837
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
838
- token_period: Optional[pulumi.Input[builtins.int]] = None,
839
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
840
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
841
- token_type: Optional[pulumi.Input[builtins.str]] = None,
825
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
826
+ description: Optional[pulumi.Input[_builtins.str]] = None,
827
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
828
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
829
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
830
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
831
+ path: Optional[pulumi.Input[_builtins.str]] = None,
832
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
833
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
834
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
835
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
836
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
837
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
838
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
839
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
840
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
842
841
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
843
842
  __props__=None):
844
843
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -879,23 +878,23 @@ class AuthBackend(pulumi.CustomResource):
879
878
  def get(resource_name: str,
880
879
  id: pulumi.Input[str],
881
880
  opts: Optional[pulumi.ResourceOptions] = None,
882
- accessor: Optional[pulumi.Input[builtins.str]] = None,
883
- base_url: Optional[pulumi.Input[builtins.str]] = None,
884
- description: Optional[pulumi.Input[builtins.str]] = None,
885
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
886
- namespace: Optional[pulumi.Input[builtins.str]] = None,
887
- organization: Optional[pulumi.Input[builtins.str]] = None,
888
- organization_id: Optional[pulumi.Input[builtins.int]] = None,
889
- path: Optional[pulumi.Input[builtins.str]] = None,
890
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
891
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
892
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
893
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
894
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
895
- token_period: Optional[pulumi.Input[builtins.int]] = None,
896
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
897
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
898
- token_type: Optional[pulumi.Input[builtins.str]] = None,
881
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
882
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
883
+ description: Optional[pulumi.Input[_builtins.str]] = None,
884
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
885
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
886
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
887
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
888
+ path: Optional[pulumi.Input[_builtins.str]] = None,
889
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
890
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
891
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
892
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
893
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
894
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
895
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
896
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
897
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
899
898
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
900
899
  """
901
900
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -904,44 +903,44 @@ class AuthBackend(pulumi.CustomResource):
904
903
  :param str resource_name: The unique name of the resulting resource.
905
904
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
906
905
  :param pulumi.ResourceOptions opts: Options for the resource.
907
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
908
- :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
906
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
907
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
909
908
  are running GitHub Enterprise or an API-compatible authentication server.
910
- :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
909
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
911
910
  This overrides the current stored value, if any.
912
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
911
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
913
912
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
914
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
913
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
915
914
  The value should not contain leading or trailing forward slashes.
916
915
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
917
916
  *Available only for Vault Enterprise*.
918
- :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
919
- :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
917
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
918
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
920
919
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
921
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
920
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
922
921
  if not specified.
923
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
922
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
924
923
  addresses which can authenticate successfully, and ties the resulting token to these blocks
925
924
  as well.
926
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
925
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
927
926
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
928
927
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
929
928
  `token_max_ttl` would otherwise allow a renewal.
930
- :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
929
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
931
930
  Its current value will be referenced at renewal time.
932
- :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
931
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
933
932
  generated tokens; otherwise it will be added to the policies set in token_policies.
934
- :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
933
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
935
934
  of times a generated token may be used (within its lifetime); 0 means unlimited.
936
- :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
935
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
937
936
  token generated using this role should never expire. The token should be renewed within the
938
937
  duration specified by this value. At each renewal, the token's TTL will be set to the
939
938
  value of this field. Specified in seconds.
940
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
939
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
941
940
  on the auth method, this list may be supplemented by user/group/other values.
942
- :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
941
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
943
942
  Its current value will be referenced at renewal time.
944
- :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
943
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
945
944
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
946
945
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
947
946
 
@@ -971,44 +970,44 @@ class AuthBackend(pulumi.CustomResource):
971
970
  __props__.__dict__["tune"] = tune
972
971
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
973
972
 
974
- @property
973
+ @_builtins.property
975
974
  @pulumi.getter
976
- def accessor(self) -> pulumi.Output[builtins.str]:
975
+ def accessor(self) -> pulumi.Output[_builtins.str]:
977
976
  """
978
977
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
979
978
  """
980
979
  return pulumi.get(self, "accessor")
981
980
 
982
- @property
981
+ @_builtins.property
983
982
  @pulumi.getter(name="baseUrl")
984
- def base_url(self) -> pulumi.Output[Optional[builtins.str]]:
983
+ def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
985
984
  """
986
985
  The API endpoint to use. Useful if you
987
986
  are running GitHub Enterprise or an API-compatible authentication server.
988
987
  """
989
988
  return pulumi.get(self, "base_url")
990
989
 
991
- @property
990
+ @_builtins.property
992
991
  @pulumi.getter
993
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
992
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
994
993
  """
995
994
  Specifies the description of the mount.
996
995
  This overrides the current stored value, if any.
997
996
  """
998
997
  return pulumi.get(self, "description")
999
998
 
1000
- @property
999
+ @_builtins.property
1001
1000
  @pulumi.getter(name="disableRemount")
1002
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1001
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1003
1002
  """
1004
1003
  If set, opts out of mount migration on path updates.
1005
1004
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1006
1005
  """
1007
1006
  return pulumi.get(self, "disable_remount")
1008
1007
 
1009
- @property
1008
+ @_builtins.property
1010
1009
  @pulumi.getter
1011
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1010
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1012
1011
  """
1013
1012
  The namespace to provision the resource in.
1014
1013
  The value should not contain leading or trailing forward slashes.
@@ -1017,35 +1016,35 @@ class AuthBackend(pulumi.CustomResource):
1017
1016
  """
1018
1017
  return pulumi.get(self, "namespace")
1019
1018
 
1020
- @property
1019
+ @_builtins.property
1021
1020
  @pulumi.getter
1022
- def organization(self) -> pulumi.Output[builtins.str]:
1021
+ def organization(self) -> pulumi.Output[_builtins.str]:
1023
1022
  """
1024
1023
  The organization configured users must be part of.
1025
1024
  """
1026
1025
  return pulumi.get(self, "organization")
1027
1026
 
1028
- @property
1027
+ @_builtins.property
1029
1028
  @pulumi.getter(name="organizationId")
1030
- def organization_id(self) -> pulumi.Output[builtins.int]:
1029
+ def organization_id(self) -> pulumi.Output[_builtins.int]:
1031
1030
  """
1032
1031
  The ID of the organization users must be part of.
1033
1032
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
1034
1033
  """
1035
1034
  return pulumi.get(self, "organization_id")
1036
1035
 
1037
- @property
1036
+ @_builtins.property
1038
1037
  @pulumi.getter
1039
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1038
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1040
1039
  """
1041
1040
  Path where the auth backend is mounted. Defaults to `auth/github`
1042
1041
  if not specified.
1043
1042
  """
1044
1043
  return pulumi.get(self, "path")
1045
1044
 
1046
- @property
1045
+ @_builtins.property
1047
1046
  @pulumi.getter(name="tokenBoundCidrs")
1048
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1047
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1049
1048
  """
1050
1049
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
1051
1050
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -1053,9 +1052,9 @@ class AuthBackend(pulumi.CustomResource):
1053
1052
  """
1054
1053
  return pulumi.get(self, "token_bound_cidrs")
1055
1054
 
1056
- @property
1055
+ @_builtins.property
1057
1056
  @pulumi.getter(name="tokenExplicitMaxTtl")
1058
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1057
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1059
1058
  """
1060
1059
  (Optional) If set, will encode an
1061
1060
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -1064,36 +1063,36 @@ class AuthBackend(pulumi.CustomResource):
1064
1063
  """
1065
1064
  return pulumi.get(self, "token_explicit_max_ttl")
1066
1065
 
1067
- @property
1066
+ @_builtins.property
1068
1067
  @pulumi.getter(name="tokenMaxTtl")
1069
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1068
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1070
1069
  """
1071
1070
  (Optional) The maximum lifetime for generated tokens in number of seconds.
1072
1071
  Its current value will be referenced at renewal time.
1073
1072
  """
1074
1073
  return pulumi.get(self, "token_max_ttl")
1075
1074
 
1076
- @property
1075
+ @_builtins.property
1077
1076
  @pulumi.getter(name="tokenNoDefaultPolicy")
1078
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1077
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1079
1078
  """
1080
1079
  (Optional) If set, the default policy will not be set on
1081
1080
  generated tokens; otherwise it will be added to the policies set in token_policies.
1082
1081
  """
1083
1082
  return pulumi.get(self, "token_no_default_policy")
1084
1083
 
1085
- @property
1084
+ @_builtins.property
1086
1085
  @pulumi.getter(name="tokenNumUses")
1087
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1086
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1088
1087
  """
1089
1088
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
1090
1089
  of times a generated token may be used (within its lifetime); 0 means unlimited.
1091
1090
  """
1092
1091
  return pulumi.get(self, "token_num_uses")
1093
1092
 
1094
- @property
1093
+ @_builtins.property
1095
1094
  @pulumi.getter(name="tokenPeriod")
1096
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1095
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1097
1096
  """
1098
1097
  (Optional) If set, indicates that the
1099
1098
  token generated using this role should never expire. The token should be renewed within the
@@ -1102,34 +1101,34 @@ class AuthBackend(pulumi.CustomResource):
1102
1101
  """
1103
1102
  return pulumi.get(self, "token_period")
1104
1103
 
1105
- @property
1104
+ @_builtins.property
1106
1105
  @pulumi.getter(name="tokenPolicies")
1107
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1106
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1108
1107
  """
1109
1108
  (Optional) List of policies to encode onto generated tokens. Depending
1110
1109
  on the auth method, this list may be supplemented by user/group/other values.
1111
1110
  """
1112
1111
  return pulumi.get(self, "token_policies")
1113
1112
 
1114
- @property
1113
+ @_builtins.property
1115
1114
  @pulumi.getter(name="tokenTtl")
1116
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1115
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1117
1116
  """
1118
1117
  (Optional) The incremental lifetime for generated tokens in number of seconds.
1119
1118
  Its current value will be referenced at renewal time.
1120
1119
  """
1121
1120
  return pulumi.get(self, "token_ttl")
1122
1121
 
1123
- @property
1122
+ @_builtins.property
1124
1123
  @pulumi.getter(name="tokenType")
1125
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1124
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1126
1125
  """
1127
1126
  Specifies the type of tokens that should be returned by
1128
1127
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
1129
1128
  """
1130
1129
  return pulumi.get(self, "token_type")
1131
1130
 
1132
- @property
1131
+ @_builtins.property
1133
1132
  @pulumi.getter
1134
1133
  def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1135
1134
  """