pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,48 +19,48 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
24
- bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
25
- role_name: pulumi.Input[builtins.str],
26
- alias_name_source: Optional[pulumi.Input[builtins.str]] = None,
27
- audience: Optional[pulumi.Input[builtins.str]] = None,
28
- backend: Optional[pulumi.Input[builtins.str]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
33
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
34
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
35
- token_period: Optional[pulumi.Input[builtins.int]] = None,
36
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
37
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
38
- token_type: Optional[pulumi.Input[builtins.str]] = None):
22
+ bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ role_name: pulumi.Input[_builtins.str],
25
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
26
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
27
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
36
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
39
38
  """
40
39
  The set of arguments for constructing a AuthBackendRole resource.
41
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
42
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
43
- :param pulumi.Input[builtins.str] role_name: Name of the role.
44
- :param pulumi.Input[builtins.str] alias_name_source: Configures how identity aliases are generated.
40
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
41
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
42
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
43
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
45
44
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
46
- :param pulumi.Input[builtins.str] audience: Audience claim to verify in the JWT.
45
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
47
46
 
48
47
  > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
49
48
  before setting this to something other its default value. There are **important** security
50
49
  implications to be aware of.
51
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
52
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
50
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
51
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
53
52
  The value should not contain leading or trailing forward slashes.
54
53
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
55
54
  *Available only for Vault Enterprise*.
56
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
58
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
59
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
60
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
61
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
62
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
63
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
64
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
56
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
57
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
58
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
59
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
60
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
62
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
63
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
65
64
  """
66
65
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
67
66
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
@@ -93,45 +92,45 @@ class AuthBackendRoleArgs:
93
92
  if token_type is not None:
94
93
  pulumi.set(__self__, "token_type", token_type)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter(name="boundServiceAccountNames")
98
- def bound_service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
97
+ def bound_service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
99
98
  """
100
99
  List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
101
100
  """
102
101
  return pulumi.get(self, "bound_service_account_names")
103
102
 
104
103
  @bound_service_account_names.setter
105
- def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
104
+ def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
106
105
  pulumi.set(self, "bound_service_account_names", value)
107
106
 
108
- @property
107
+ @_builtins.property
109
108
  @pulumi.getter(name="boundServiceAccountNamespaces")
110
- def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
109
+ def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
111
110
  """
112
111
  List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
113
112
  """
114
113
  return pulumi.get(self, "bound_service_account_namespaces")
115
114
 
116
115
  @bound_service_account_namespaces.setter
117
- def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
116
+ def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
118
117
  pulumi.set(self, "bound_service_account_namespaces", value)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter(name="roleName")
122
- def role_name(self) -> pulumi.Input[builtins.str]:
121
+ def role_name(self) -> pulumi.Input[_builtins.str]:
123
122
  """
124
123
  Name of the role.
125
124
  """
126
125
  return pulumi.get(self, "role_name")
127
126
 
128
127
  @role_name.setter
129
- def role_name(self, value: pulumi.Input[builtins.str]):
128
+ def role_name(self, value: pulumi.Input[_builtins.str]):
130
129
  pulumi.set(self, "role_name", value)
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="aliasNameSource")
134
- def alias_name_source(self) -> Optional[pulumi.Input[builtins.str]]:
133
+ def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
135
134
  """
136
135
  Configures how identity aliases are generated.
137
136
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
@@ -139,12 +138,12 @@ class AuthBackendRoleArgs:
139
138
  return pulumi.get(self, "alias_name_source")
140
139
 
141
140
  @alias_name_source.setter
142
- def alias_name_source(self, value: Optional[pulumi.Input[builtins.str]]):
141
+ def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
143
142
  pulumi.set(self, "alias_name_source", value)
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter
147
- def audience(self) -> Optional[pulumi.Input[builtins.str]]:
146
+ def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
148
147
  """
149
148
  Audience claim to verify in the JWT.
150
149
 
@@ -155,24 +154,24 @@ class AuthBackendRoleArgs:
155
154
  return pulumi.get(self, "audience")
156
155
 
157
156
  @audience.setter
158
- def audience(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "audience", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  Unique name of the kubernetes backend to configure.
166
165
  """
167
166
  return pulumi.get(self, "backend")
168
167
 
169
168
  @backend.setter
170
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
169
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
171
170
  pulumi.set(self, "backend", value)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter
175
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
174
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
176
175
  """
177
176
  The namespace to provision the resource in.
178
177
  The value should not contain leading or trailing forward slashes.
@@ -182,163 +181,163 @@ class AuthBackendRoleArgs:
182
181
  return pulumi.get(self, "namespace")
183
182
 
184
183
  @namespace.setter
185
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
184
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
186
185
  pulumi.set(self, "namespace", value)
187
186
 
188
- @property
187
+ @_builtins.property
189
188
  @pulumi.getter(name="tokenBoundCidrs")
190
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
189
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
191
190
  """
192
191
  Specifies the blocks of IP addresses which are allowed to use the generated token
193
192
  """
194
193
  return pulumi.get(self, "token_bound_cidrs")
195
194
 
196
195
  @token_bound_cidrs.setter
197
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
196
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
198
197
  pulumi.set(self, "token_bound_cidrs", value)
199
198
 
200
- @property
199
+ @_builtins.property
201
200
  @pulumi.getter(name="tokenExplicitMaxTtl")
202
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
201
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
203
202
  """
204
203
  Generated Token's Explicit Maximum TTL in seconds
205
204
  """
206
205
  return pulumi.get(self, "token_explicit_max_ttl")
207
206
 
208
207
  @token_explicit_max_ttl.setter
209
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
208
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
210
209
  pulumi.set(self, "token_explicit_max_ttl", value)
211
210
 
212
- @property
211
+ @_builtins.property
213
212
  @pulumi.getter(name="tokenMaxTtl")
214
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
213
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
215
214
  """
216
215
  The maximum lifetime of the generated token
217
216
  """
218
217
  return pulumi.get(self, "token_max_ttl")
219
218
 
220
219
  @token_max_ttl.setter
221
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
220
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
222
221
  pulumi.set(self, "token_max_ttl", value)
223
222
 
224
- @property
223
+ @_builtins.property
225
224
  @pulumi.getter(name="tokenNoDefaultPolicy")
226
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
225
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
227
226
  """
228
227
  If true, the 'default' policy will not automatically be added to generated tokens
229
228
  """
230
229
  return pulumi.get(self, "token_no_default_policy")
231
230
 
232
231
  @token_no_default_policy.setter
233
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
232
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
234
233
  pulumi.set(self, "token_no_default_policy", value)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter(name="tokenNumUses")
238
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
237
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
239
238
  """
240
239
  The maximum number of times a token may be used, a value of zero means unlimited
241
240
  """
242
241
  return pulumi.get(self, "token_num_uses")
243
242
 
244
243
  @token_num_uses.setter
245
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
244
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
246
245
  pulumi.set(self, "token_num_uses", value)
247
246
 
248
- @property
247
+ @_builtins.property
249
248
  @pulumi.getter(name="tokenPeriod")
250
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
249
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
251
250
  """
252
251
  Generated Token's Period
253
252
  """
254
253
  return pulumi.get(self, "token_period")
255
254
 
256
255
  @token_period.setter
257
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
256
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
258
257
  pulumi.set(self, "token_period", value)
259
258
 
260
- @property
259
+ @_builtins.property
261
260
  @pulumi.getter(name="tokenPolicies")
262
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
261
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
263
262
  """
264
263
  Generated Token's Policies
265
264
  """
266
265
  return pulumi.get(self, "token_policies")
267
266
 
268
267
  @token_policies.setter
269
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
268
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
270
269
  pulumi.set(self, "token_policies", value)
271
270
 
272
- @property
271
+ @_builtins.property
273
272
  @pulumi.getter(name="tokenTtl")
274
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
273
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
275
274
  """
276
275
  The initial ttl of the token to generate in seconds
277
276
  """
278
277
  return pulumi.get(self, "token_ttl")
279
278
 
280
279
  @token_ttl.setter
281
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
280
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
282
281
  pulumi.set(self, "token_ttl", value)
283
282
 
284
- @property
283
+ @_builtins.property
285
284
  @pulumi.getter(name="tokenType")
286
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
285
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
287
286
  """
288
287
  The type of token to generate, service or batch
289
288
  """
290
289
  return pulumi.get(self, "token_type")
291
290
 
292
291
  @token_type.setter
293
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
292
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
294
293
  pulumi.set(self, "token_type", value)
295
294
 
296
295
 
297
296
  @pulumi.input_type
298
297
  class _AuthBackendRoleState:
299
298
  def __init__(__self__, *,
300
- alias_name_source: Optional[pulumi.Input[builtins.str]] = None,
301
- audience: Optional[pulumi.Input[builtins.str]] = None,
302
- backend: Optional[pulumi.Input[builtins.str]] = None,
303
- bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
304
- bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
305
- namespace: Optional[pulumi.Input[builtins.str]] = None,
306
- role_name: Optional[pulumi.Input[builtins.str]] = None,
307
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
308
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
309
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
310
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
311
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
312
- token_period: Optional[pulumi.Input[builtins.int]] = None,
313
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
314
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
315
- token_type: Optional[pulumi.Input[builtins.str]] = None):
299
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
300
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
301
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
302
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
303
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
304
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
305
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
306
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
307
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
308
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
309
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
310
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
311
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
312
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
313
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
314
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
316
315
  """
317
316
  Input properties used for looking up and filtering AuthBackendRole resources.
318
- :param pulumi.Input[builtins.str] alias_name_source: Configures how identity aliases are generated.
317
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
319
318
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
320
- :param pulumi.Input[builtins.str] audience: Audience claim to verify in the JWT.
319
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
321
320
 
322
321
  > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
323
322
  before setting this to something other its default value. There are **important** security
324
323
  implications to be aware of.
325
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
326
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
327
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
328
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
324
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
325
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
326
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
327
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
329
328
  The value should not contain leading or trailing forward slashes.
330
329
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
331
330
  *Available only for Vault Enterprise*.
332
- :param pulumi.Input[builtins.str] role_name: Name of the role.
333
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
334
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
335
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
336
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
337
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
338
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
339
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
340
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
341
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
331
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
332
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
333
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
334
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
335
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
336
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
337
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
338
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
339
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
340
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
342
341
  """
343
342
  if alias_name_source is not None:
344
343
  pulumi.set(__self__, "alias_name_source", alias_name_source)
@@ -373,9 +372,9 @@ class _AuthBackendRoleState:
373
372
  if token_type is not None:
374
373
  pulumi.set(__self__, "token_type", token_type)
375
374
 
376
- @property
375
+ @_builtins.property
377
376
  @pulumi.getter(name="aliasNameSource")
378
- def alias_name_source(self) -> Optional[pulumi.Input[builtins.str]]:
377
+ def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
379
378
  """
380
379
  Configures how identity aliases are generated.
381
380
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
@@ -383,12 +382,12 @@ class _AuthBackendRoleState:
383
382
  return pulumi.get(self, "alias_name_source")
384
383
 
385
384
  @alias_name_source.setter
386
- def alias_name_source(self, value: Optional[pulumi.Input[builtins.str]]):
385
+ def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
387
386
  pulumi.set(self, "alias_name_source", value)
388
387
 
389
- @property
388
+ @_builtins.property
390
389
  @pulumi.getter
391
- def audience(self) -> Optional[pulumi.Input[builtins.str]]:
390
+ def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
392
391
  """
393
392
  Audience claim to verify in the JWT.
394
393
 
@@ -399,48 +398,48 @@ class _AuthBackendRoleState:
399
398
  return pulumi.get(self, "audience")
400
399
 
401
400
  @audience.setter
402
- def audience(self, value: Optional[pulumi.Input[builtins.str]]):
401
+ def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
403
402
  pulumi.set(self, "audience", value)
404
403
 
405
- @property
404
+ @_builtins.property
406
405
  @pulumi.getter
407
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
406
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
408
407
  """
409
408
  Unique name of the kubernetes backend to configure.
410
409
  """
411
410
  return pulumi.get(self, "backend")
412
411
 
413
412
  @backend.setter
414
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
413
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
415
414
  pulumi.set(self, "backend", value)
416
415
 
417
- @property
416
+ @_builtins.property
418
417
  @pulumi.getter(name="boundServiceAccountNames")
419
- def bound_service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
418
+ def bound_service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
420
419
  """
421
420
  List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
422
421
  """
423
422
  return pulumi.get(self, "bound_service_account_names")
424
423
 
425
424
  @bound_service_account_names.setter
426
- def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
425
+ def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
427
426
  pulumi.set(self, "bound_service_account_names", value)
428
427
 
429
- @property
428
+ @_builtins.property
430
429
  @pulumi.getter(name="boundServiceAccountNamespaces")
431
- def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
430
+ def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
432
431
  """
433
432
  List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
434
433
  """
435
434
  return pulumi.get(self, "bound_service_account_namespaces")
436
435
 
437
436
  @bound_service_account_namespaces.setter
438
- def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
437
+ def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
439
438
  pulumi.set(self, "bound_service_account_namespaces", value)
440
439
 
441
- @property
440
+ @_builtins.property
442
441
  @pulumi.getter
443
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
442
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
444
443
  """
445
444
  The namespace to provision the resource in.
446
445
  The value should not contain leading or trailing forward slashes.
@@ -450,127 +449,127 @@ class _AuthBackendRoleState:
450
449
  return pulumi.get(self, "namespace")
451
450
 
452
451
  @namespace.setter
453
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
452
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
454
453
  pulumi.set(self, "namespace", value)
455
454
 
456
- @property
455
+ @_builtins.property
457
456
  @pulumi.getter(name="roleName")
458
- def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
457
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
459
458
  """
460
459
  Name of the role.
461
460
  """
462
461
  return pulumi.get(self, "role_name")
463
462
 
464
463
  @role_name.setter
465
- def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
464
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
466
465
  pulumi.set(self, "role_name", value)
467
466
 
468
- @property
467
+ @_builtins.property
469
468
  @pulumi.getter(name="tokenBoundCidrs")
470
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
469
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
471
470
  """
472
471
  Specifies the blocks of IP addresses which are allowed to use the generated token
473
472
  """
474
473
  return pulumi.get(self, "token_bound_cidrs")
475
474
 
476
475
  @token_bound_cidrs.setter
477
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
476
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
478
477
  pulumi.set(self, "token_bound_cidrs", value)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter(name="tokenExplicitMaxTtl")
482
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
481
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
483
482
  """
484
483
  Generated Token's Explicit Maximum TTL in seconds
485
484
  """
486
485
  return pulumi.get(self, "token_explicit_max_ttl")
487
486
 
488
487
  @token_explicit_max_ttl.setter
489
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
488
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
490
489
  pulumi.set(self, "token_explicit_max_ttl", value)
491
490
 
492
- @property
491
+ @_builtins.property
493
492
  @pulumi.getter(name="tokenMaxTtl")
494
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
493
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
495
494
  """
496
495
  The maximum lifetime of the generated token
497
496
  """
498
497
  return pulumi.get(self, "token_max_ttl")
499
498
 
500
499
  @token_max_ttl.setter
501
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
500
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
502
501
  pulumi.set(self, "token_max_ttl", value)
503
502
 
504
- @property
503
+ @_builtins.property
505
504
  @pulumi.getter(name="tokenNoDefaultPolicy")
506
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
505
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
507
506
  """
508
507
  If true, the 'default' policy will not automatically be added to generated tokens
509
508
  """
510
509
  return pulumi.get(self, "token_no_default_policy")
511
510
 
512
511
  @token_no_default_policy.setter
513
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
512
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
514
513
  pulumi.set(self, "token_no_default_policy", value)
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter(name="tokenNumUses")
518
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
517
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
519
518
  """
520
519
  The maximum number of times a token may be used, a value of zero means unlimited
521
520
  """
522
521
  return pulumi.get(self, "token_num_uses")
523
522
 
524
523
  @token_num_uses.setter
525
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
524
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
526
525
  pulumi.set(self, "token_num_uses", value)
527
526
 
528
- @property
527
+ @_builtins.property
529
528
  @pulumi.getter(name="tokenPeriod")
530
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
529
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
531
530
  """
532
531
  Generated Token's Period
533
532
  """
534
533
  return pulumi.get(self, "token_period")
535
534
 
536
535
  @token_period.setter
537
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
536
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
538
537
  pulumi.set(self, "token_period", value)
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter(name="tokenPolicies")
542
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
541
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
543
542
  """
544
543
  Generated Token's Policies
545
544
  """
546
545
  return pulumi.get(self, "token_policies")
547
546
 
548
547
  @token_policies.setter
549
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
548
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
550
549
  pulumi.set(self, "token_policies", value)
551
550
 
552
- @property
551
+ @_builtins.property
553
552
  @pulumi.getter(name="tokenTtl")
554
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
553
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
555
554
  """
556
555
  The initial ttl of the token to generate in seconds
557
556
  """
558
557
  return pulumi.get(self, "token_ttl")
559
558
 
560
559
  @token_ttl.setter
561
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
560
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
562
561
  pulumi.set(self, "token_ttl", value)
563
562
 
564
- @property
563
+ @_builtins.property
565
564
  @pulumi.getter(name="tokenType")
566
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
565
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
567
566
  """
568
567
  The type of token to generate, service or batch
569
568
  """
570
569
  return pulumi.get(self, "token_type")
571
570
 
572
571
  @token_type.setter
573
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
572
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
574
573
  pulumi.set(self, "token_type", value)
575
574
 
576
575
 
@@ -580,22 +579,22 @@ class AuthBackendRole(pulumi.CustomResource):
580
579
  def __init__(__self__,
581
580
  resource_name: str,
582
581
  opts: Optional[pulumi.ResourceOptions] = None,
583
- alias_name_source: Optional[pulumi.Input[builtins.str]] = None,
584
- audience: Optional[pulumi.Input[builtins.str]] = None,
585
- backend: Optional[pulumi.Input[builtins.str]] = None,
586
- bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
587
- bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
588
- namespace: Optional[pulumi.Input[builtins.str]] = None,
589
- role_name: Optional[pulumi.Input[builtins.str]] = None,
590
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
591
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
592
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
593
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
594
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
595
- token_period: Optional[pulumi.Input[builtins.int]] = None,
596
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
597
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
598
- token_type: Optional[pulumi.Input[builtins.str]] = None,
582
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
583
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
584
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
585
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
586
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
587
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
589
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
590
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
591
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
592
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
593
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
594
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
595
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
596
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
597
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
599
598
  __props__=None):
600
599
  """
601
600
  Manages an Kubernetes auth backend role in a Vault server. See the [Vault
@@ -633,30 +632,30 @@ class AuthBackendRole(pulumi.CustomResource):
633
632
 
634
633
  :param str resource_name: The name of the resource.
635
634
  :param pulumi.ResourceOptions opts: Options for the resource.
636
- :param pulumi.Input[builtins.str] alias_name_source: Configures how identity aliases are generated.
635
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
637
636
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
638
- :param pulumi.Input[builtins.str] audience: Audience claim to verify in the JWT.
637
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
639
638
 
640
639
  > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
641
640
  before setting this to something other its default value. There are **important** security
642
641
  implications to be aware of.
643
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
644
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
645
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
646
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
642
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
643
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
644
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
645
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
647
646
  The value should not contain leading or trailing forward slashes.
648
647
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
649
648
  *Available only for Vault Enterprise*.
650
- :param pulumi.Input[builtins.str] role_name: Name of the role.
651
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
652
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
653
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
654
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
655
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
656
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
657
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
658
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
659
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
649
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
650
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
651
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
652
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
653
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
654
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
655
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
656
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
657
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
658
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
660
659
  """
661
660
  ...
662
661
  @overload
@@ -713,22 +712,22 @@ class AuthBackendRole(pulumi.CustomResource):
713
712
  def _internal_init(__self__,
714
713
  resource_name: str,
715
714
  opts: Optional[pulumi.ResourceOptions] = None,
716
- alias_name_source: Optional[pulumi.Input[builtins.str]] = None,
717
- audience: Optional[pulumi.Input[builtins.str]] = None,
718
- backend: Optional[pulumi.Input[builtins.str]] = None,
719
- bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
720
- bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
721
- namespace: Optional[pulumi.Input[builtins.str]] = None,
722
- role_name: Optional[pulumi.Input[builtins.str]] = None,
723
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
724
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
725
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
726
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
727
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
728
- token_period: Optional[pulumi.Input[builtins.int]] = None,
729
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
730
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
731
- token_type: Optional[pulumi.Input[builtins.str]] = None,
715
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
716
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
717
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
718
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
719
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
720
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
721
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
722
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
723
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
724
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
725
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
726
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
727
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
728
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
729
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
730
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
732
731
  __props__=None):
733
732
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
734
733
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -770,22 +769,22 @@ class AuthBackendRole(pulumi.CustomResource):
770
769
  def get(resource_name: str,
771
770
  id: pulumi.Input[str],
772
771
  opts: Optional[pulumi.ResourceOptions] = None,
773
- alias_name_source: Optional[pulumi.Input[builtins.str]] = None,
774
- audience: Optional[pulumi.Input[builtins.str]] = None,
775
- backend: Optional[pulumi.Input[builtins.str]] = None,
776
- bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
777
- bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
778
- namespace: Optional[pulumi.Input[builtins.str]] = None,
779
- role_name: Optional[pulumi.Input[builtins.str]] = None,
780
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
781
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
782
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
783
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
784
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
785
- token_period: Optional[pulumi.Input[builtins.int]] = None,
786
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
787
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
788
- token_type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRole':
772
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
773
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
774
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
775
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
776
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
777
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
778
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
779
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
780
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
781
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
782
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
783
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
784
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
785
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
786
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
787
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
789
788
  """
790
789
  Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
791
790
  properties used to qualify the lookup.
@@ -793,30 +792,30 @@ class AuthBackendRole(pulumi.CustomResource):
793
792
  :param str resource_name: The unique name of the resulting resource.
794
793
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
795
794
  :param pulumi.ResourceOptions opts: Options for the resource.
796
- :param pulumi.Input[builtins.str] alias_name_source: Configures how identity aliases are generated.
795
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
797
796
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
798
- :param pulumi.Input[builtins.str] audience: Audience claim to verify in the JWT.
797
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
799
798
 
800
799
  > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
801
800
  before setting this to something other its default value. There are **important** security
802
801
  implications to be aware of.
803
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
804
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
805
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
806
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
802
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
803
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
804
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
805
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
807
806
  The value should not contain leading or trailing forward slashes.
808
807
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
809
808
  *Available only for Vault Enterprise*.
810
- :param pulumi.Input[builtins.str] role_name: Name of the role.
811
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
812
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
813
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
814
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
815
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
816
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
817
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
818
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
819
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
809
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
810
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
811
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
812
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
813
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
814
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
815
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
816
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
817
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
818
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
820
819
  """
821
820
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
822
821
 
@@ -840,18 +839,18 @@ class AuthBackendRole(pulumi.CustomResource):
840
839
  __props__.__dict__["token_type"] = token_type
841
840
  return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
842
841
 
843
- @property
842
+ @_builtins.property
844
843
  @pulumi.getter(name="aliasNameSource")
845
- def alias_name_source(self) -> pulumi.Output[builtins.str]:
844
+ def alias_name_source(self) -> pulumi.Output[_builtins.str]:
846
845
  """
847
846
  Configures how identity aliases are generated.
848
847
  Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
849
848
  """
850
849
  return pulumi.get(self, "alias_name_source")
851
850
 
852
- @property
851
+ @_builtins.property
853
852
  @pulumi.getter
854
- def audience(self) -> pulumi.Output[Optional[builtins.str]]:
853
+ def audience(self) -> pulumi.Output[Optional[_builtins.str]]:
855
854
  """
856
855
  Audience claim to verify in the JWT.
857
856
 
@@ -861,33 +860,33 @@ class AuthBackendRole(pulumi.CustomResource):
861
860
  """
862
861
  return pulumi.get(self, "audience")
863
862
 
864
- @property
863
+ @_builtins.property
865
864
  @pulumi.getter
866
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
865
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
867
866
  """
868
867
  Unique name of the kubernetes backend to configure.
869
868
  """
870
869
  return pulumi.get(self, "backend")
871
870
 
872
- @property
871
+ @_builtins.property
873
872
  @pulumi.getter(name="boundServiceAccountNames")
874
- def bound_service_account_names(self) -> pulumi.Output[Sequence[builtins.str]]:
873
+ def bound_service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
875
874
  """
876
875
  List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
877
876
  """
878
877
  return pulumi.get(self, "bound_service_account_names")
879
878
 
880
- @property
879
+ @_builtins.property
881
880
  @pulumi.getter(name="boundServiceAccountNamespaces")
882
- def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[builtins.str]]:
881
+ def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[_builtins.str]]:
883
882
  """
884
883
  List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
885
884
  """
886
885
  return pulumi.get(self, "bound_service_account_namespaces")
887
886
 
888
- @property
887
+ @_builtins.property
889
888
  @pulumi.getter
890
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
889
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
891
890
  """
892
891
  The namespace to provision the resource in.
893
892
  The value should not contain leading or trailing forward slashes.
@@ -896,81 +895,81 @@ class AuthBackendRole(pulumi.CustomResource):
896
895
  """
897
896
  return pulumi.get(self, "namespace")
898
897
 
899
- @property
898
+ @_builtins.property
900
899
  @pulumi.getter(name="roleName")
901
- def role_name(self) -> pulumi.Output[builtins.str]:
900
+ def role_name(self) -> pulumi.Output[_builtins.str]:
902
901
  """
903
902
  Name of the role.
904
903
  """
905
904
  return pulumi.get(self, "role_name")
906
905
 
907
- @property
906
+ @_builtins.property
908
907
  @pulumi.getter(name="tokenBoundCidrs")
909
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
908
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
910
909
  """
911
910
  Specifies the blocks of IP addresses which are allowed to use the generated token
912
911
  """
913
912
  return pulumi.get(self, "token_bound_cidrs")
914
913
 
915
- @property
914
+ @_builtins.property
916
915
  @pulumi.getter(name="tokenExplicitMaxTtl")
917
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
916
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
918
917
  """
919
918
  Generated Token's Explicit Maximum TTL in seconds
920
919
  """
921
920
  return pulumi.get(self, "token_explicit_max_ttl")
922
921
 
923
- @property
922
+ @_builtins.property
924
923
  @pulumi.getter(name="tokenMaxTtl")
925
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
924
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
926
925
  """
927
926
  The maximum lifetime of the generated token
928
927
  """
929
928
  return pulumi.get(self, "token_max_ttl")
930
929
 
931
- @property
930
+ @_builtins.property
932
931
  @pulumi.getter(name="tokenNoDefaultPolicy")
933
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
932
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
934
933
  """
935
934
  If true, the 'default' policy will not automatically be added to generated tokens
936
935
  """
937
936
  return pulumi.get(self, "token_no_default_policy")
938
937
 
939
- @property
938
+ @_builtins.property
940
939
  @pulumi.getter(name="tokenNumUses")
941
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
940
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
942
941
  """
943
942
  The maximum number of times a token may be used, a value of zero means unlimited
944
943
  """
945
944
  return pulumi.get(self, "token_num_uses")
946
945
 
947
- @property
946
+ @_builtins.property
948
947
  @pulumi.getter(name="tokenPeriod")
949
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
948
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
950
949
  """
951
950
  Generated Token's Period
952
951
  """
953
952
  return pulumi.get(self, "token_period")
954
953
 
955
- @property
954
+ @_builtins.property
956
955
  @pulumi.getter(name="tokenPolicies")
957
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
956
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
958
957
  """
959
958
  Generated Token's Policies
960
959
  """
961
960
  return pulumi.get(self, "token_policies")
962
961
 
963
- @property
962
+ @_builtins.property
964
963
  @pulumi.getter(name="tokenTtl")
965
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
964
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
966
965
  """
967
966
  The initial ttl of the token to generate in seconds
968
967
  """
969
968
  return pulumi.get(self, "token_ttl")
970
969
 
971
- @property
970
+ @_builtins.property
972
971
  @pulumi.getter(name="tokenType")
973
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
972
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
974
973
  """
975
974
  The type of token to generate, service or batch
976
975
  """