pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,94 +19,94 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- role_name: pulumi.Input[builtins.str],
24
- user_claim: pulumi.Input[builtins.str],
25
- allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- backend: Optional[pulumi.Input[builtins.str]] = None,
27
- bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
29
- bound_claims_type: Optional[pulumi.Input[builtins.str]] = None,
30
- bound_subject: Optional[pulumi.Input[builtins.str]] = None,
31
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
32
- clock_skew_leeway: Optional[pulumi.Input[builtins.int]] = None,
33
- disable_bound_claims_parsing: Optional[pulumi.Input[builtins.bool]] = None,
34
- expiration_leeway: Optional[pulumi.Input[builtins.int]] = None,
35
- groups_claim: Optional[pulumi.Input[builtins.str]] = None,
36
- max_age: Optional[pulumi.Input[builtins.int]] = None,
37
- namespace: Optional[pulumi.Input[builtins.str]] = None,
38
- not_before_leeway: Optional[pulumi.Input[builtins.int]] = None,
39
- oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
40
- role_type: Optional[pulumi.Input[builtins.str]] = None,
41
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
43
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
44
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
45
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
46
- token_period: Optional[pulumi.Input[builtins.int]] = None,
47
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
48
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
49
- token_type: Optional[pulumi.Input[builtins.str]] = None,
50
- user_claim_json_pointer: Optional[pulumi.Input[builtins.bool]] = None,
51
- verbose_oidc_logging: Optional[pulumi.Input[builtins.bool]] = None):
22
+ role_name: pulumi.Input[_builtins.str],
23
+ user_claim: pulumi.Input[_builtins.str],
24
+ allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
26
+ bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
28
+ bound_claims_type: Optional[pulumi.Input[_builtins.str]] = None,
29
+ bound_subject: Optional[pulumi.Input[_builtins.str]] = None,
30
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
31
+ clock_skew_leeway: Optional[pulumi.Input[_builtins.int]] = None,
32
+ disable_bound_claims_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ expiration_leeway: Optional[pulumi.Input[_builtins.int]] = None,
34
+ groups_claim: Optional[pulumi.Input[_builtins.str]] = None,
35
+ max_age: Optional[pulumi.Input[_builtins.int]] = None,
36
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
37
+ not_before_leeway: Optional[pulumi.Input[_builtins.int]] = None,
38
+ oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
39
+ role_type: Optional[pulumi.Input[_builtins.str]] = None,
40
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
41
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
42
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
43
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
45
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
46
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
48
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
49
+ user_claim_json_pointer: Optional[pulumi.Input[_builtins.bool]] = None,
50
+ verbose_oidc_logging: Optional[pulumi.Input[_builtins.bool]] = None):
52
51
  """
53
52
  The set of arguments for constructing a AuthBackendRole resource.
54
- :param pulumi.Input[builtins.str] role_name: The name of the role.
55
- :param pulumi.Input[builtins.str] user_claim: The claim to use to uniquely identify
53
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
54
+ :param pulumi.Input[_builtins.str] user_claim: The claim to use to uniquely identify
56
55
  the user; this will be used as the name for the Identity entity alias created
57
56
  due to a successful login.
58
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
59
58
  Required for OIDC roles
60
- :param pulumi.Input[builtins.str] backend: The unique name of the auth backend to configure.
59
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
61
60
  Defaults to `jwt`.
62
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
63
62
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
64
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_claims: If set, a map of claims to values to match against.
63
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_claims: If set, a map of claims to values to match against.
65
64
  A claim's value must be a string, which may contain one value or multiple
66
65
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
67
- :param pulumi.Input[builtins.str] bound_claims_type: How to interpret values in the claims/values
66
+ :param pulumi.Input[_builtins.str] bound_claims_type: How to interpret values in the claims/values
68
67
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
69
68
  match). Requires Vault 1.4.0 or above.
70
- :param pulumi.Input[builtins.str] bound_subject: If set, requires that the `sub` claim matches
69
+ :param pulumi.Input[_builtins.str] bound_subject: If set, requires that the `sub` claim matches
71
70
  this value.
72
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
71
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
73
72
  to specified metadata fields (values).
74
- :param pulumi.Input[builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
73
+ :param pulumi.Input[_builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
75
74
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
76
75
  Only applicable with "jwt" roles.
77
- :param pulumi.Input[builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
78
- :param pulumi.Input[builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
76
+ :param pulumi.Input[_builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
77
+ :param pulumi.Input[_builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
79
78
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
80
79
  Only applicable with "jwt" roles.
81
- :param pulumi.Input[builtins.str] groups_claim: The claim to use to uniquely identify
80
+ :param pulumi.Input[_builtins.str] groups_claim: The claim to use to uniquely identify
82
81
  the set of groups to which the user belongs; this will be used as the names
83
82
  for the Identity group aliases created due to a successful login. The claim
84
83
  value must be a list of strings.
85
- :param pulumi.Input[builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
84
+ :param pulumi.Input[_builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
86
85
  the user was actively authenticated with the OIDC provider.
87
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
86
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
88
87
  The value should not contain leading or trailing forward slashes.
89
88
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
90
89
  *Available only for Vault Enterprise*.
91
- :param pulumi.Input[builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
90
+ :param pulumi.Input[_builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
92
91
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
93
92
  Only applicable with "jwt" roles.
94
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
93
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
95
94
  The standard scope "openid" is automatically included and need not be specified.
96
- :param pulumi.Input[builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
97
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
98
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
99
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
100
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
101
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
102
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
103
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
104
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
105
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
106
- :param pulumi.Input[builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
95
+ :param pulumi.Input[_builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
96
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
97
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
98
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
99
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
100
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
101
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
102
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
103
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
104
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
105
+ :param pulumi.Input[_builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
107
106
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
108
107
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
109
108
  Requires Vault 1.11+.
110
- :param pulumi.Input[builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
109
+ :param pulumi.Input[_builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
111
110
  logging is active. Not recommended in production since sensitive information may be present
112
111
  in OIDC responses.
113
112
  """
@@ -168,21 +167,21 @@ class AuthBackendRoleArgs:
168
167
  if verbose_oidc_logging is not None:
169
168
  pulumi.set(__self__, "verbose_oidc_logging", verbose_oidc_logging)
170
169
 
171
- @property
170
+ @_builtins.property
172
171
  @pulumi.getter(name="roleName")
173
- def role_name(self) -> pulumi.Input[builtins.str]:
172
+ def role_name(self) -> pulumi.Input[_builtins.str]:
174
173
  """
175
174
  The name of the role.
176
175
  """
177
176
  return pulumi.get(self, "role_name")
178
177
 
179
178
  @role_name.setter
180
- def role_name(self, value: pulumi.Input[builtins.str]):
179
+ def role_name(self, value: pulumi.Input[_builtins.str]):
181
180
  pulumi.set(self, "role_name", value)
182
181
 
183
- @property
182
+ @_builtins.property
184
183
  @pulumi.getter(name="userClaim")
185
- def user_claim(self) -> pulumi.Input[builtins.str]:
184
+ def user_claim(self) -> pulumi.Input[_builtins.str]:
186
185
  """
187
186
  The claim to use to uniquely identify
188
187
  the user; this will be used as the name for the Identity entity alias created
@@ -191,12 +190,12 @@ class AuthBackendRoleArgs:
191
190
  return pulumi.get(self, "user_claim")
192
191
 
193
192
  @user_claim.setter
194
- def user_claim(self, value: pulumi.Input[builtins.str]):
193
+ def user_claim(self, value: pulumi.Input[_builtins.str]):
195
194
  pulumi.set(self, "user_claim", value)
196
195
 
197
- @property
196
+ @_builtins.property
198
197
  @pulumi.getter(name="allowedRedirectUris")
199
- def allowed_redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
198
+ def allowed_redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
200
199
  """
201
200
  The list of allowed values for redirect_uri during OIDC logins.
202
201
  Required for OIDC roles
@@ -204,12 +203,12 @@ class AuthBackendRoleArgs:
204
203
  return pulumi.get(self, "allowed_redirect_uris")
205
204
 
206
205
  @allowed_redirect_uris.setter
207
- def allowed_redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
206
+ def allowed_redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
208
207
  pulumi.set(self, "allowed_redirect_uris", value)
209
208
 
210
- @property
209
+ @_builtins.property
211
210
  @pulumi.getter
212
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
211
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
213
212
  """
214
213
  The unique name of the auth backend to configure.
215
214
  Defaults to `jwt`.
@@ -217,12 +216,12 @@ class AuthBackendRoleArgs:
217
216
  return pulumi.get(self, "backend")
218
217
 
219
218
  @backend.setter
220
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
219
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
221
220
  pulumi.set(self, "backend", value)
222
221
 
223
- @property
222
+ @_builtins.property
224
223
  @pulumi.getter(name="boundAudiences")
225
- def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
224
+ def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
226
225
  """
227
226
  (Required for roles of type `jwt`, optional for roles of
228
227
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
@@ -230,12 +229,12 @@ class AuthBackendRoleArgs:
230
229
  return pulumi.get(self, "bound_audiences")
231
230
 
232
231
  @bound_audiences.setter
233
- def bound_audiences(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
232
+ def bound_audiences(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
234
233
  pulumi.set(self, "bound_audiences", value)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter(name="boundClaims")
238
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
237
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
239
238
  """
240
239
  If set, a map of claims to values to match against.
241
240
  A claim's value must be a string, which may contain one value or multiple
@@ -244,12 +243,12 @@ class AuthBackendRoleArgs:
244
243
  return pulumi.get(self, "bound_claims")
245
244
 
246
245
  @bound_claims.setter
247
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
246
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
248
247
  pulumi.set(self, "bound_claims", value)
249
248
 
250
- @property
249
+ @_builtins.property
251
250
  @pulumi.getter(name="boundClaimsType")
252
- def bound_claims_type(self) -> Optional[pulumi.Input[builtins.str]]:
251
+ def bound_claims_type(self) -> Optional[pulumi.Input[_builtins.str]]:
253
252
  """
254
253
  How to interpret values in the claims/values
255
254
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
@@ -258,12 +257,12 @@ class AuthBackendRoleArgs:
258
257
  return pulumi.get(self, "bound_claims_type")
259
258
 
260
259
  @bound_claims_type.setter
261
- def bound_claims_type(self, value: Optional[pulumi.Input[builtins.str]]):
260
+ def bound_claims_type(self, value: Optional[pulumi.Input[_builtins.str]]):
262
261
  pulumi.set(self, "bound_claims_type", value)
263
262
 
264
- @property
263
+ @_builtins.property
265
264
  @pulumi.getter(name="boundSubject")
266
- def bound_subject(self) -> Optional[pulumi.Input[builtins.str]]:
265
+ def bound_subject(self) -> Optional[pulumi.Input[_builtins.str]]:
267
266
  """
268
267
  If set, requires that the `sub` claim matches
269
268
  this value.
@@ -271,12 +270,12 @@ class AuthBackendRoleArgs:
271
270
  return pulumi.get(self, "bound_subject")
272
271
 
273
272
  @bound_subject.setter
274
- def bound_subject(self, value: Optional[pulumi.Input[builtins.str]]):
273
+ def bound_subject(self, value: Optional[pulumi.Input[_builtins.str]]):
275
274
  pulumi.set(self, "bound_subject", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter(name="claimMappings")
279
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
278
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
280
279
  """
281
280
  If set, a map of claims (keys) to be copied
282
281
  to specified metadata fields (values).
@@ -284,12 +283,12 @@ class AuthBackendRoleArgs:
284
283
  return pulumi.get(self, "claim_mappings")
285
284
 
286
285
  @claim_mappings.setter
287
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
286
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
288
287
  pulumi.set(self, "claim_mappings", value)
289
288
 
290
- @property
289
+ @_builtins.property
291
290
  @pulumi.getter(name="clockSkewLeeway")
292
- def clock_skew_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
291
+ def clock_skew_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
293
292
  """
294
293
  The amount of leeway to add to all claims to account for clock skew, in
295
294
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -298,24 +297,24 @@ class AuthBackendRoleArgs:
298
297
  return pulumi.get(self, "clock_skew_leeway")
299
298
 
300
299
  @clock_skew_leeway.setter
301
- def clock_skew_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
300
+ def clock_skew_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
302
301
  pulumi.set(self, "clock_skew_leeway", value)
303
302
 
304
- @property
303
+ @_builtins.property
305
304
  @pulumi.getter(name="disableBoundClaimsParsing")
306
- def disable_bound_claims_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
305
+ def disable_bound_claims_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
307
306
  """
308
307
  Disable bound claim value parsing. Useful when values contain commas.
309
308
  """
310
309
  return pulumi.get(self, "disable_bound_claims_parsing")
311
310
 
312
311
  @disable_bound_claims_parsing.setter
313
- def disable_bound_claims_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
312
+ def disable_bound_claims_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
314
313
  pulumi.set(self, "disable_bound_claims_parsing", value)
315
314
 
316
- @property
315
+ @_builtins.property
317
316
  @pulumi.getter(name="expirationLeeway")
318
- def expiration_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
317
+ def expiration_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
319
318
  """
320
319
  The amount of leeway to add to expiration (`exp`) claims to account for
321
320
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -324,12 +323,12 @@ class AuthBackendRoleArgs:
324
323
  return pulumi.get(self, "expiration_leeway")
325
324
 
326
325
  @expiration_leeway.setter
327
- def expiration_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
326
+ def expiration_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
328
327
  pulumi.set(self, "expiration_leeway", value)
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter(name="groupsClaim")
332
- def groups_claim(self) -> Optional[pulumi.Input[builtins.str]]:
331
+ def groups_claim(self) -> Optional[pulumi.Input[_builtins.str]]:
333
332
  """
334
333
  The claim to use to uniquely identify
335
334
  the set of groups to which the user belongs; this will be used as the names
@@ -339,12 +338,12 @@ class AuthBackendRoleArgs:
339
338
  return pulumi.get(self, "groups_claim")
340
339
 
341
340
  @groups_claim.setter
342
- def groups_claim(self, value: Optional[pulumi.Input[builtins.str]]):
341
+ def groups_claim(self, value: Optional[pulumi.Input[_builtins.str]]):
343
342
  pulumi.set(self, "groups_claim", value)
344
343
 
345
- @property
344
+ @_builtins.property
346
345
  @pulumi.getter(name="maxAge")
347
- def max_age(self) -> Optional[pulumi.Input[builtins.int]]:
346
+ def max_age(self) -> Optional[pulumi.Input[_builtins.int]]:
348
347
  """
349
348
  Specifies the allowable elapsed time in seconds since the last time
350
349
  the user was actively authenticated with the OIDC provider.
@@ -352,12 +351,12 @@ class AuthBackendRoleArgs:
352
351
  return pulumi.get(self, "max_age")
353
352
 
354
353
  @max_age.setter
355
- def max_age(self, value: Optional[pulumi.Input[builtins.int]]):
354
+ def max_age(self, value: Optional[pulumi.Input[_builtins.int]]):
356
355
  pulumi.set(self, "max_age", value)
357
356
 
358
- @property
357
+ @_builtins.property
359
358
  @pulumi.getter
360
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
359
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
361
360
  """
362
361
  The namespace to provision the resource in.
363
362
  The value should not contain leading or trailing forward slashes.
@@ -367,12 +366,12 @@ class AuthBackendRoleArgs:
367
366
  return pulumi.get(self, "namespace")
368
367
 
369
368
  @namespace.setter
370
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
369
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
371
370
  pulumi.set(self, "namespace", value)
372
371
 
373
- @property
372
+ @_builtins.property
374
373
  @pulumi.getter(name="notBeforeLeeway")
375
- def not_before_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
374
+ def not_before_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
376
375
  """
377
376
  The amount of leeway to add to not before (`nbf`) claims to account for
378
377
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -381,12 +380,12 @@ class AuthBackendRoleArgs:
381
380
  return pulumi.get(self, "not_before_leeway")
382
381
 
383
382
  @not_before_leeway.setter
384
- def not_before_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
383
+ def not_before_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
385
384
  pulumi.set(self, "not_before_leeway", value)
386
385
 
387
- @property
386
+ @_builtins.property
388
387
  @pulumi.getter(name="oidcScopes")
389
- def oidc_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
388
+ def oidc_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
390
389
  """
391
390
  If set, a list of OIDC scopes to be used with an OIDC role.
392
391
  The standard scope "openid" is automatically included and need not be specified.
@@ -394,132 +393,132 @@ class AuthBackendRoleArgs:
394
393
  return pulumi.get(self, "oidc_scopes")
395
394
 
396
395
  @oidc_scopes.setter
397
- def oidc_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
396
+ def oidc_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
398
397
  pulumi.set(self, "oidc_scopes", value)
399
398
 
400
- @property
399
+ @_builtins.property
401
400
  @pulumi.getter(name="roleType")
402
- def role_type(self) -> Optional[pulumi.Input[builtins.str]]:
401
+ def role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
403
402
  """
404
403
  Type of role, either "oidc" (default) or "jwt".
405
404
  """
406
405
  return pulumi.get(self, "role_type")
407
406
 
408
407
  @role_type.setter
409
- def role_type(self, value: Optional[pulumi.Input[builtins.str]]):
408
+ def role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
410
409
  pulumi.set(self, "role_type", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter(name="tokenBoundCidrs")
414
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
413
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
415
414
  """
416
415
  Specifies the blocks of IP addresses which are allowed to use the generated token
417
416
  """
418
417
  return pulumi.get(self, "token_bound_cidrs")
419
418
 
420
419
  @token_bound_cidrs.setter
421
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
420
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
422
421
  pulumi.set(self, "token_bound_cidrs", value)
423
422
 
424
- @property
423
+ @_builtins.property
425
424
  @pulumi.getter(name="tokenExplicitMaxTtl")
426
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
425
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
427
426
  """
428
427
  Generated Token's Explicit Maximum TTL in seconds
429
428
  """
430
429
  return pulumi.get(self, "token_explicit_max_ttl")
431
430
 
432
431
  @token_explicit_max_ttl.setter
433
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
432
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
434
433
  pulumi.set(self, "token_explicit_max_ttl", value)
435
434
 
436
- @property
435
+ @_builtins.property
437
436
  @pulumi.getter(name="tokenMaxTtl")
438
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
437
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
439
438
  """
440
439
  The maximum lifetime of the generated token
441
440
  """
442
441
  return pulumi.get(self, "token_max_ttl")
443
442
 
444
443
  @token_max_ttl.setter
445
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
444
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
446
445
  pulumi.set(self, "token_max_ttl", value)
447
446
 
448
- @property
447
+ @_builtins.property
449
448
  @pulumi.getter(name="tokenNoDefaultPolicy")
450
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
449
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
451
450
  """
452
451
  If true, the 'default' policy will not automatically be added to generated tokens
453
452
  """
454
453
  return pulumi.get(self, "token_no_default_policy")
455
454
 
456
455
  @token_no_default_policy.setter
457
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
456
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
458
457
  pulumi.set(self, "token_no_default_policy", value)
459
458
 
460
- @property
459
+ @_builtins.property
461
460
  @pulumi.getter(name="tokenNumUses")
462
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
461
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
463
462
  """
464
463
  The maximum number of times a token may be used, a value of zero means unlimited
465
464
  """
466
465
  return pulumi.get(self, "token_num_uses")
467
466
 
468
467
  @token_num_uses.setter
469
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
468
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
470
469
  pulumi.set(self, "token_num_uses", value)
471
470
 
472
- @property
471
+ @_builtins.property
473
472
  @pulumi.getter(name="tokenPeriod")
474
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
473
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
475
474
  """
476
475
  Generated Token's Period
477
476
  """
478
477
  return pulumi.get(self, "token_period")
479
478
 
480
479
  @token_period.setter
481
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
480
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
482
481
  pulumi.set(self, "token_period", value)
483
482
 
484
- @property
483
+ @_builtins.property
485
484
  @pulumi.getter(name="tokenPolicies")
486
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
485
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
487
486
  """
488
487
  Generated Token's Policies
489
488
  """
490
489
  return pulumi.get(self, "token_policies")
491
490
 
492
491
  @token_policies.setter
493
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
492
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
494
493
  pulumi.set(self, "token_policies", value)
495
494
 
496
- @property
495
+ @_builtins.property
497
496
  @pulumi.getter(name="tokenTtl")
498
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
497
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
499
498
  """
500
499
  The initial ttl of the token to generate in seconds
501
500
  """
502
501
  return pulumi.get(self, "token_ttl")
503
502
 
504
503
  @token_ttl.setter
505
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
504
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
505
  pulumi.set(self, "token_ttl", value)
507
506
 
508
- @property
507
+ @_builtins.property
509
508
  @pulumi.getter(name="tokenType")
510
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
509
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
511
510
  """
512
511
  The type of token to generate, service or batch
513
512
  """
514
513
  return pulumi.get(self, "token_type")
515
514
 
516
515
  @token_type.setter
517
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
516
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
518
517
  pulumi.set(self, "token_type", value)
519
518
 
520
- @property
519
+ @_builtins.property
521
520
  @pulumi.getter(name="userClaimJsonPointer")
522
- def user_claim_json_pointer(self) -> Optional[pulumi.Input[builtins.bool]]:
521
+ def user_claim_json_pointer(self) -> Optional[pulumi.Input[_builtins.bool]]:
523
522
  """
524
523
  Specifies if the `user_claim` value uses
525
524
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
@@ -529,12 +528,12 @@ class AuthBackendRoleArgs:
529
528
  return pulumi.get(self, "user_claim_json_pointer")
530
529
 
531
530
  @user_claim_json_pointer.setter
532
- def user_claim_json_pointer(self, value: Optional[pulumi.Input[builtins.bool]]):
531
+ def user_claim_json_pointer(self, value: Optional[pulumi.Input[_builtins.bool]]):
533
532
  pulumi.set(self, "user_claim_json_pointer", value)
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter(name="verboseOidcLogging")
537
- def verbose_oidc_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
536
+ def verbose_oidc_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
538
537
  """
539
538
  Log received OIDC tokens and claims when debug-level
540
539
  logging is active. Not recommended in production since sensitive information may be present
@@ -543,101 +542,101 @@ class AuthBackendRoleArgs:
543
542
  return pulumi.get(self, "verbose_oidc_logging")
544
543
 
545
544
  @verbose_oidc_logging.setter
546
- def verbose_oidc_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
545
+ def verbose_oidc_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
547
546
  pulumi.set(self, "verbose_oidc_logging", value)
548
547
 
549
548
 
550
549
  @pulumi.input_type
551
550
  class _AuthBackendRoleState:
552
551
  def __init__(__self__, *,
553
- allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
554
- backend: Optional[pulumi.Input[builtins.str]] = None,
555
- bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
556
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
557
- bound_claims_type: Optional[pulumi.Input[builtins.str]] = None,
558
- bound_subject: Optional[pulumi.Input[builtins.str]] = None,
559
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
560
- clock_skew_leeway: Optional[pulumi.Input[builtins.int]] = None,
561
- disable_bound_claims_parsing: Optional[pulumi.Input[builtins.bool]] = None,
562
- expiration_leeway: Optional[pulumi.Input[builtins.int]] = None,
563
- groups_claim: Optional[pulumi.Input[builtins.str]] = None,
564
- max_age: Optional[pulumi.Input[builtins.int]] = None,
565
- namespace: Optional[pulumi.Input[builtins.str]] = None,
566
- not_before_leeway: Optional[pulumi.Input[builtins.int]] = None,
567
- oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
568
- role_name: Optional[pulumi.Input[builtins.str]] = None,
569
- role_type: Optional[pulumi.Input[builtins.str]] = None,
570
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
571
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
572
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
573
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
574
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
575
- token_period: Optional[pulumi.Input[builtins.int]] = None,
576
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
577
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
578
- token_type: Optional[pulumi.Input[builtins.str]] = None,
579
- user_claim: Optional[pulumi.Input[builtins.str]] = None,
580
- user_claim_json_pointer: Optional[pulumi.Input[builtins.bool]] = None,
581
- verbose_oidc_logging: Optional[pulumi.Input[builtins.bool]] = None):
552
+ allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
553
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
554
+ bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
555
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
556
+ bound_claims_type: Optional[pulumi.Input[_builtins.str]] = None,
557
+ bound_subject: Optional[pulumi.Input[_builtins.str]] = None,
558
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
559
+ clock_skew_leeway: Optional[pulumi.Input[_builtins.int]] = None,
560
+ disable_bound_claims_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
561
+ expiration_leeway: Optional[pulumi.Input[_builtins.int]] = None,
562
+ groups_claim: Optional[pulumi.Input[_builtins.str]] = None,
563
+ max_age: Optional[pulumi.Input[_builtins.int]] = None,
564
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
565
+ not_before_leeway: Optional[pulumi.Input[_builtins.int]] = None,
566
+ oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
567
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
568
+ role_type: Optional[pulumi.Input[_builtins.str]] = None,
569
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
571
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
572
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
573
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
574
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
575
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
576
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
577
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
578
+ user_claim: Optional[pulumi.Input[_builtins.str]] = None,
579
+ user_claim_json_pointer: Optional[pulumi.Input[_builtins.bool]] = None,
580
+ verbose_oidc_logging: Optional[pulumi.Input[_builtins.bool]] = None):
582
581
  """
583
582
  Input properties used for looking up and filtering AuthBackendRole resources.
584
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
583
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
585
584
  Required for OIDC roles
586
- :param pulumi.Input[builtins.str] backend: The unique name of the auth backend to configure.
585
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
587
586
  Defaults to `jwt`.
588
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
587
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
589
588
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
590
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_claims: If set, a map of claims to values to match against.
589
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_claims: If set, a map of claims to values to match against.
591
590
  A claim's value must be a string, which may contain one value or multiple
592
591
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
593
- :param pulumi.Input[builtins.str] bound_claims_type: How to interpret values in the claims/values
592
+ :param pulumi.Input[_builtins.str] bound_claims_type: How to interpret values in the claims/values
594
593
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
595
594
  match). Requires Vault 1.4.0 or above.
596
- :param pulumi.Input[builtins.str] bound_subject: If set, requires that the `sub` claim matches
595
+ :param pulumi.Input[_builtins.str] bound_subject: If set, requires that the `sub` claim matches
597
596
  this value.
598
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
597
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
599
598
  to specified metadata fields (values).
600
- :param pulumi.Input[builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
599
+ :param pulumi.Input[_builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
601
600
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
602
601
  Only applicable with "jwt" roles.
603
- :param pulumi.Input[builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
604
- :param pulumi.Input[builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
602
+ :param pulumi.Input[_builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
603
+ :param pulumi.Input[_builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
605
604
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
606
605
  Only applicable with "jwt" roles.
607
- :param pulumi.Input[builtins.str] groups_claim: The claim to use to uniquely identify
606
+ :param pulumi.Input[_builtins.str] groups_claim: The claim to use to uniquely identify
608
607
  the set of groups to which the user belongs; this will be used as the names
609
608
  for the Identity group aliases created due to a successful login. The claim
610
609
  value must be a list of strings.
611
- :param pulumi.Input[builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
610
+ :param pulumi.Input[_builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
612
611
  the user was actively authenticated with the OIDC provider.
613
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
612
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
614
613
  The value should not contain leading or trailing forward slashes.
615
614
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
616
615
  *Available only for Vault Enterprise*.
617
- :param pulumi.Input[builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
616
+ :param pulumi.Input[_builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
618
617
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
619
618
  Only applicable with "jwt" roles.
620
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
619
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
621
620
  The standard scope "openid" is automatically included and need not be specified.
622
- :param pulumi.Input[builtins.str] role_name: The name of the role.
623
- :param pulumi.Input[builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
624
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
625
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
626
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
627
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
628
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
629
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
630
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
631
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
632
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
633
- :param pulumi.Input[builtins.str] user_claim: The claim to use to uniquely identify
621
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
622
+ :param pulumi.Input[_builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
623
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
624
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
625
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
626
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
627
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
628
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
629
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
630
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
631
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
632
+ :param pulumi.Input[_builtins.str] user_claim: The claim to use to uniquely identify
634
633
  the user; this will be used as the name for the Identity entity alias created
635
634
  due to a successful login.
636
- :param pulumi.Input[builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
635
+ :param pulumi.Input[_builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
637
636
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
638
637
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
639
638
  Requires Vault 1.11+.
640
- :param pulumi.Input[builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
639
+ :param pulumi.Input[_builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
641
640
  logging is active. Not recommended in production since sensitive information may be present
642
641
  in OIDC responses.
643
642
  """
@@ -700,9 +699,9 @@ class _AuthBackendRoleState:
700
699
  if verbose_oidc_logging is not None:
701
700
  pulumi.set(__self__, "verbose_oidc_logging", verbose_oidc_logging)
702
701
 
703
- @property
702
+ @_builtins.property
704
703
  @pulumi.getter(name="allowedRedirectUris")
705
- def allowed_redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
704
+ def allowed_redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
706
705
  """
707
706
  The list of allowed values for redirect_uri during OIDC logins.
708
707
  Required for OIDC roles
@@ -710,12 +709,12 @@ class _AuthBackendRoleState:
710
709
  return pulumi.get(self, "allowed_redirect_uris")
711
710
 
712
711
  @allowed_redirect_uris.setter
713
- def allowed_redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
712
+ def allowed_redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
714
713
  pulumi.set(self, "allowed_redirect_uris", value)
715
714
 
716
- @property
715
+ @_builtins.property
717
716
  @pulumi.getter
718
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
717
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
719
718
  """
720
719
  The unique name of the auth backend to configure.
721
720
  Defaults to `jwt`.
@@ -723,12 +722,12 @@ class _AuthBackendRoleState:
723
722
  return pulumi.get(self, "backend")
724
723
 
725
724
  @backend.setter
726
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
725
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
727
726
  pulumi.set(self, "backend", value)
728
727
 
729
- @property
728
+ @_builtins.property
730
729
  @pulumi.getter(name="boundAudiences")
731
- def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
730
+ def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
732
731
  """
733
732
  (Required for roles of type `jwt`, optional for roles of
734
733
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
@@ -736,12 +735,12 @@ class _AuthBackendRoleState:
736
735
  return pulumi.get(self, "bound_audiences")
737
736
 
738
737
  @bound_audiences.setter
739
- def bound_audiences(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
738
+ def bound_audiences(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
740
739
  pulumi.set(self, "bound_audiences", value)
741
740
 
742
- @property
741
+ @_builtins.property
743
742
  @pulumi.getter(name="boundClaims")
744
- def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
743
+ def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
745
744
  """
746
745
  If set, a map of claims to values to match against.
747
746
  A claim's value must be a string, which may contain one value or multiple
@@ -750,12 +749,12 @@ class _AuthBackendRoleState:
750
749
  return pulumi.get(self, "bound_claims")
751
750
 
752
751
  @bound_claims.setter
753
- def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
752
+ def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
754
753
  pulumi.set(self, "bound_claims", value)
755
754
 
756
- @property
755
+ @_builtins.property
757
756
  @pulumi.getter(name="boundClaimsType")
758
- def bound_claims_type(self) -> Optional[pulumi.Input[builtins.str]]:
757
+ def bound_claims_type(self) -> Optional[pulumi.Input[_builtins.str]]:
759
758
  """
760
759
  How to interpret values in the claims/values
761
760
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
@@ -764,12 +763,12 @@ class _AuthBackendRoleState:
764
763
  return pulumi.get(self, "bound_claims_type")
765
764
 
766
765
  @bound_claims_type.setter
767
- def bound_claims_type(self, value: Optional[pulumi.Input[builtins.str]]):
766
+ def bound_claims_type(self, value: Optional[pulumi.Input[_builtins.str]]):
768
767
  pulumi.set(self, "bound_claims_type", value)
769
768
 
770
- @property
769
+ @_builtins.property
771
770
  @pulumi.getter(name="boundSubject")
772
- def bound_subject(self) -> Optional[pulumi.Input[builtins.str]]:
771
+ def bound_subject(self) -> Optional[pulumi.Input[_builtins.str]]:
773
772
  """
774
773
  If set, requires that the `sub` claim matches
775
774
  this value.
@@ -777,12 +776,12 @@ class _AuthBackendRoleState:
777
776
  return pulumi.get(self, "bound_subject")
778
777
 
779
778
  @bound_subject.setter
780
- def bound_subject(self, value: Optional[pulumi.Input[builtins.str]]):
779
+ def bound_subject(self, value: Optional[pulumi.Input[_builtins.str]]):
781
780
  pulumi.set(self, "bound_subject", value)
782
781
 
783
- @property
782
+ @_builtins.property
784
783
  @pulumi.getter(name="claimMappings")
785
- def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
784
+ def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
786
785
  """
787
786
  If set, a map of claims (keys) to be copied
788
787
  to specified metadata fields (values).
@@ -790,12 +789,12 @@ class _AuthBackendRoleState:
790
789
  return pulumi.get(self, "claim_mappings")
791
790
 
792
791
  @claim_mappings.setter
793
- def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
792
+ def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
794
793
  pulumi.set(self, "claim_mappings", value)
795
794
 
796
- @property
795
+ @_builtins.property
797
796
  @pulumi.getter(name="clockSkewLeeway")
798
- def clock_skew_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
797
+ def clock_skew_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
799
798
  """
800
799
  The amount of leeway to add to all claims to account for clock skew, in
801
800
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -804,24 +803,24 @@ class _AuthBackendRoleState:
804
803
  return pulumi.get(self, "clock_skew_leeway")
805
804
 
806
805
  @clock_skew_leeway.setter
807
- def clock_skew_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
806
+ def clock_skew_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
808
807
  pulumi.set(self, "clock_skew_leeway", value)
809
808
 
810
- @property
809
+ @_builtins.property
811
810
  @pulumi.getter(name="disableBoundClaimsParsing")
812
- def disable_bound_claims_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
811
+ def disable_bound_claims_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
813
812
  """
814
813
  Disable bound claim value parsing. Useful when values contain commas.
815
814
  """
816
815
  return pulumi.get(self, "disable_bound_claims_parsing")
817
816
 
818
817
  @disable_bound_claims_parsing.setter
819
- def disable_bound_claims_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
818
+ def disable_bound_claims_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
820
819
  pulumi.set(self, "disable_bound_claims_parsing", value)
821
820
 
822
- @property
821
+ @_builtins.property
823
822
  @pulumi.getter(name="expirationLeeway")
824
- def expiration_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
823
+ def expiration_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
825
824
  """
826
825
  The amount of leeway to add to expiration (`exp`) claims to account for
827
826
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -830,12 +829,12 @@ class _AuthBackendRoleState:
830
829
  return pulumi.get(self, "expiration_leeway")
831
830
 
832
831
  @expiration_leeway.setter
833
- def expiration_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
832
+ def expiration_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
834
833
  pulumi.set(self, "expiration_leeway", value)
835
834
 
836
- @property
835
+ @_builtins.property
837
836
  @pulumi.getter(name="groupsClaim")
838
- def groups_claim(self) -> Optional[pulumi.Input[builtins.str]]:
837
+ def groups_claim(self) -> Optional[pulumi.Input[_builtins.str]]:
839
838
  """
840
839
  The claim to use to uniquely identify
841
840
  the set of groups to which the user belongs; this will be used as the names
@@ -845,12 +844,12 @@ class _AuthBackendRoleState:
845
844
  return pulumi.get(self, "groups_claim")
846
845
 
847
846
  @groups_claim.setter
848
- def groups_claim(self, value: Optional[pulumi.Input[builtins.str]]):
847
+ def groups_claim(self, value: Optional[pulumi.Input[_builtins.str]]):
849
848
  pulumi.set(self, "groups_claim", value)
850
849
 
851
- @property
850
+ @_builtins.property
852
851
  @pulumi.getter(name="maxAge")
853
- def max_age(self) -> Optional[pulumi.Input[builtins.int]]:
852
+ def max_age(self) -> Optional[pulumi.Input[_builtins.int]]:
854
853
  """
855
854
  Specifies the allowable elapsed time in seconds since the last time
856
855
  the user was actively authenticated with the OIDC provider.
@@ -858,12 +857,12 @@ class _AuthBackendRoleState:
858
857
  return pulumi.get(self, "max_age")
859
858
 
860
859
  @max_age.setter
861
- def max_age(self, value: Optional[pulumi.Input[builtins.int]]):
860
+ def max_age(self, value: Optional[pulumi.Input[_builtins.int]]):
862
861
  pulumi.set(self, "max_age", value)
863
862
 
864
- @property
863
+ @_builtins.property
865
864
  @pulumi.getter
866
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
865
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
867
866
  """
868
867
  The namespace to provision the resource in.
869
868
  The value should not contain leading or trailing forward slashes.
@@ -873,12 +872,12 @@ class _AuthBackendRoleState:
873
872
  return pulumi.get(self, "namespace")
874
873
 
875
874
  @namespace.setter
876
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
875
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
877
876
  pulumi.set(self, "namespace", value)
878
877
 
879
- @property
878
+ @_builtins.property
880
879
  @pulumi.getter(name="notBeforeLeeway")
881
- def not_before_leeway(self) -> Optional[pulumi.Input[builtins.int]]:
880
+ def not_before_leeway(self) -> Optional[pulumi.Input[_builtins.int]]:
882
881
  """
883
882
  The amount of leeway to add to not before (`nbf`) claims to account for
884
883
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -887,12 +886,12 @@ class _AuthBackendRoleState:
887
886
  return pulumi.get(self, "not_before_leeway")
888
887
 
889
888
  @not_before_leeway.setter
890
- def not_before_leeway(self, value: Optional[pulumi.Input[builtins.int]]):
889
+ def not_before_leeway(self, value: Optional[pulumi.Input[_builtins.int]]):
891
890
  pulumi.set(self, "not_before_leeway", value)
892
891
 
893
- @property
892
+ @_builtins.property
894
893
  @pulumi.getter(name="oidcScopes")
895
- def oidc_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
894
+ def oidc_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
896
895
  """
897
896
  If set, a list of OIDC scopes to be used with an OIDC role.
898
897
  The standard scope "openid" is automatically included and need not be specified.
@@ -900,144 +899,144 @@ class _AuthBackendRoleState:
900
899
  return pulumi.get(self, "oidc_scopes")
901
900
 
902
901
  @oidc_scopes.setter
903
- def oidc_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
902
+ def oidc_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
904
903
  pulumi.set(self, "oidc_scopes", value)
905
904
 
906
- @property
905
+ @_builtins.property
907
906
  @pulumi.getter(name="roleName")
908
- def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
907
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
909
908
  """
910
909
  The name of the role.
911
910
  """
912
911
  return pulumi.get(self, "role_name")
913
912
 
914
913
  @role_name.setter
915
- def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
914
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
916
915
  pulumi.set(self, "role_name", value)
917
916
 
918
- @property
917
+ @_builtins.property
919
918
  @pulumi.getter(name="roleType")
920
- def role_type(self) -> Optional[pulumi.Input[builtins.str]]:
919
+ def role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
921
920
  """
922
921
  Type of role, either "oidc" (default) or "jwt".
923
922
  """
924
923
  return pulumi.get(self, "role_type")
925
924
 
926
925
  @role_type.setter
927
- def role_type(self, value: Optional[pulumi.Input[builtins.str]]):
926
+ def role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
928
927
  pulumi.set(self, "role_type", value)
929
928
 
930
- @property
929
+ @_builtins.property
931
930
  @pulumi.getter(name="tokenBoundCidrs")
932
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
931
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
933
932
  """
934
933
  Specifies the blocks of IP addresses which are allowed to use the generated token
935
934
  """
936
935
  return pulumi.get(self, "token_bound_cidrs")
937
936
 
938
937
  @token_bound_cidrs.setter
939
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
938
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
940
939
  pulumi.set(self, "token_bound_cidrs", value)
941
940
 
942
- @property
941
+ @_builtins.property
943
942
  @pulumi.getter(name="tokenExplicitMaxTtl")
944
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
943
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
945
944
  """
946
945
  Generated Token's Explicit Maximum TTL in seconds
947
946
  """
948
947
  return pulumi.get(self, "token_explicit_max_ttl")
949
948
 
950
949
  @token_explicit_max_ttl.setter
951
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
950
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
952
951
  pulumi.set(self, "token_explicit_max_ttl", value)
953
952
 
954
- @property
953
+ @_builtins.property
955
954
  @pulumi.getter(name="tokenMaxTtl")
956
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
955
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
957
956
  """
958
957
  The maximum lifetime of the generated token
959
958
  """
960
959
  return pulumi.get(self, "token_max_ttl")
961
960
 
962
961
  @token_max_ttl.setter
963
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
962
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
964
963
  pulumi.set(self, "token_max_ttl", value)
965
964
 
966
- @property
965
+ @_builtins.property
967
966
  @pulumi.getter(name="tokenNoDefaultPolicy")
968
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
967
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
969
968
  """
970
969
  If true, the 'default' policy will not automatically be added to generated tokens
971
970
  """
972
971
  return pulumi.get(self, "token_no_default_policy")
973
972
 
974
973
  @token_no_default_policy.setter
975
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
974
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
976
975
  pulumi.set(self, "token_no_default_policy", value)
977
976
 
978
- @property
977
+ @_builtins.property
979
978
  @pulumi.getter(name="tokenNumUses")
980
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
979
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
981
980
  """
982
981
  The maximum number of times a token may be used, a value of zero means unlimited
983
982
  """
984
983
  return pulumi.get(self, "token_num_uses")
985
984
 
986
985
  @token_num_uses.setter
987
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
986
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
988
987
  pulumi.set(self, "token_num_uses", value)
989
988
 
990
- @property
989
+ @_builtins.property
991
990
  @pulumi.getter(name="tokenPeriod")
992
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
991
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
993
992
  """
994
993
  Generated Token's Period
995
994
  """
996
995
  return pulumi.get(self, "token_period")
997
996
 
998
997
  @token_period.setter
999
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
998
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1000
999
  pulumi.set(self, "token_period", value)
1001
1000
 
1002
- @property
1001
+ @_builtins.property
1003
1002
  @pulumi.getter(name="tokenPolicies")
1004
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1003
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1005
1004
  """
1006
1005
  Generated Token's Policies
1007
1006
  """
1008
1007
  return pulumi.get(self, "token_policies")
1009
1008
 
1010
1009
  @token_policies.setter
1011
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1010
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1012
1011
  pulumi.set(self, "token_policies", value)
1013
1012
 
1014
- @property
1013
+ @_builtins.property
1015
1014
  @pulumi.getter(name="tokenTtl")
1016
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1015
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1017
1016
  """
1018
1017
  The initial ttl of the token to generate in seconds
1019
1018
  """
1020
1019
  return pulumi.get(self, "token_ttl")
1021
1020
 
1022
1021
  @token_ttl.setter
1023
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1022
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1024
1023
  pulumi.set(self, "token_ttl", value)
1025
1024
 
1026
- @property
1025
+ @_builtins.property
1027
1026
  @pulumi.getter(name="tokenType")
1028
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
1027
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
1029
1028
  """
1030
1029
  The type of token to generate, service or batch
1031
1030
  """
1032
1031
  return pulumi.get(self, "token_type")
1033
1032
 
1034
1033
  @token_type.setter
1035
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
1034
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
1036
1035
  pulumi.set(self, "token_type", value)
1037
1036
 
1038
- @property
1037
+ @_builtins.property
1039
1038
  @pulumi.getter(name="userClaim")
1040
- def user_claim(self) -> Optional[pulumi.Input[builtins.str]]:
1039
+ def user_claim(self) -> Optional[pulumi.Input[_builtins.str]]:
1041
1040
  """
1042
1041
  The claim to use to uniquely identify
1043
1042
  the user; this will be used as the name for the Identity entity alias created
@@ -1046,12 +1045,12 @@ class _AuthBackendRoleState:
1046
1045
  return pulumi.get(self, "user_claim")
1047
1046
 
1048
1047
  @user_claim.setter
1049
- def user_claim(self, value: Optional[pulumi.Input[builtins.str]]):
1048
+ def user_claim(self, value: Optional[pulumi.Input[_builtins.str]]):
1050
1049
  pulumi.set(self, "user_claim", value)
1051
1050
 
1052
- @property
1051
+ @_builtins.property
1053
1052
  @pulumi.getter(name="userClaimJsonPointer")
1054
- def user_claim_json_pointer(self) -> Optional[pulumi.Input[builtins.bool]]:
1053
+ def user_claim_json_pointer(self) -> Optional[pulumi.Input[_builtins.bool]]:
1055
1054
  """
1056
1055
  Specifies if the `user_claim` value uses
1057
1056
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
@@ -1061,12 +1060,12 @@ class _AuthBackendRoleState:
1061
1060
  return pulumi.get(self, "user_claim_json_pointer")
1062
1061
 
1063
1062
  @user_claim_json_pointer.setter
1064
- def user_claim_json_pointer(self, value: Optional[pulumi.Input[builtins.bool]]):
1063
+ def user_claim_json_pointer(self, value: Optional[pulumi.Input[_builtins.bool]]):
1065
1064
  pulumi.set(self, "user_claim_json_pointer", value)
1066
1065
 
1067
- @property
1066
+ @_builtins.property
1068
1067
  @pulumi.getter(name="verboseOidcLogging")
1069
- def verbose_oidc_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
1068
+ def verbose_oidc_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
1070
1069
  """
1071
1070
  Log received OIDC tokens and claims when debug-level
1072
1071
  logging is active. Not recommended in production since sensitive information may be present
@@ -1075,7 +1074,7 @@ class _AuthBackendRoleState:
1075
1074
  return pulumi.get(self, "verbose_oidc_logging")
1076
1075
 
1077
1076
  @verbose_oidc_logging.setter
1078
- def verbose_oidc_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
1077
+ def verbose_oidc_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
1079
1078
  pulumi.set(self, "verbose_oidc_logging", value)
1080
1079
 
1081
1080
 
@@ -1085,35 +1084,35 @@ class AuthBackendRole(pulumi.CustomResource):
1085
1084
  def __init__(__self__,
1086
1085
  resource_name: str,
1087
1086
  opts: Optional[pulumi.ResourceOptions] = None,
1088
- allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1089
- backend: Optional[pulumi.Input[builtins.str]] = None,
1090
- bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1091
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1092
- bound_claims_type: Optional[pulumi.Input[builtins.str]] = None,
1093
- bound_subject: Optional[pulumi.Input[builtins.str]] = None,
1094
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1095
- clock_skew_leeway: Optional[pulumi.Input[builtins.int]] = None,
1096
- disable_bound_claims_parsing: Optional[pulumi.Input[builtins.bool]] = None,
1097
- expiration_leeway: Optional[pulumi.Input[builtins.int]] = None,
1098
- groups_claim: Optional[pulumi.Input[builtins.str]] = None,
1099
- max_age: Optional[pulumi.Input[builtins.int]] = None,
1100
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1101
- not_before_leeway: Optional[pulumi.Input[builtins.int]] = None,
1102
- oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1103
- role_name: Optional[pulumi.Input[builtins.str]] = None,
1104
- role_type: Optional[pulumi.Input[builtins.str]] = None,
1105
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1106
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1107
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1108
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1109
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1110
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1111
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1112
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1113
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1114
- user_claim: Optional[pulumi.Input[builtins.str]] = None,
1115
- user_claim_json_pointer: Optional[pulumi.Input[builtins.bool]] = None,
1116
- verbose_oidc_logging: Optional[pulumi.Input[builtins.bool]] = None,
1087
+ allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1088
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1089
+ bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1090
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1091
+ bound_claims_type: Optional[pulumi.Input[_builtins.str]] = None,
1092
+ bound_subject: Optional[pulumi.Input[_builtins.str]] = None,
1093
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1094
+ clock_skew_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1095
+ disable_bound_claims_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
1096
+ expiration_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1097
+ groups_claim: Optional[pulumi.Input[_builtins.str]] = None,
1098
+ max_age: Optional[pulumi.Input[_builtins.int]] = None,
1099
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1100
+ not_before_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1101
+ oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1102
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
1103
+ role_type: Optional[pulumi.Input[_builtins.str]] = None,
1104
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1105
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1106
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1107
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1108
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1109
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1110
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1111
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1112
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1113
+ user_claim: Optional[pulumi.Input[_builtins.str]] = None,
1114
+ user_claim_json_pointer: Optional[pulumi.Input[_builtins.bool]] = None,
1115
+ verbose_oidc_logging: Optional[pulumi.Input[_builtins.bool]] = None,
1117
1116
  __props__=None):
1118
1117
  """
1119
1118
  Manages an JWT/OIDC auth backend role in a Vault server. See the [Vault
@@ -1177,63 +1176,63 @@ class AuthBackendRole(pulumi.CustomResource):
1177
1176
 
1178
1177
  :param str resource_name: The name of the resource.
1179
1178
  :param pulumi.ResourceOptions opts: Options for the resource.
1180
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
1179
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
1181
1180
  Required for OIDC roles
1182
- :param pulumi.Input[builtins.str] backend: The unique name of the auth backend to configure.
1181
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
1183
1182
  Defaults to `jwt`.
1184
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1183
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1185
1184
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1186
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_claims: If set, a map of claims to values to match against.
1185
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_claims: If set, a map of claims to values to match against.
1187
1186
  A claim's value must be a string, which may contain one value or multiple
1188
1187
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1189
- :param pulumi.Input[builtins.str] bound_claims_type: How to interpret values in the claims/values
1188
+ :param pulumi.Input[_builtins.str] bound_claims_type: How to interpret values in the claims/values
1190
1189
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
1191
1190
  match). Requires Vault 1.4.0 or above.
1192
- :param pulumi.Input[builtins.str] bound_subject: If set, requires that the `sub` claim matches
1191
+ :param pulumi.Input[_builtins.str] bound_subject: If set, requires that the `sub` claim matches
1193
1192
  this value.
1194
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
1193
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
1195
1194
  to specified metadata fields (values).
1196
- :param pulumi.Input[builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1195
+ :param pulumi.Input[_builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1197
1196
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1198
1197
  Only applicable with "jwt" roles.
1199
- :param pulumi.Input[builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1200
- :param pulumi.Input[builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1198
+ :param pulumi.Input[_builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1199
+ :param pulumi.Input[_builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1201
1200
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1202
1201
  Only applicable with "jwt" roles.
1203
- :param pulumi.Input[builtins.str] groups_claim: The claim to use to uniquely identify
1202
+ :param pulumi.Input[_builtins.str] groups_claim: The claim to use to uniquely identify
1204
1203
  the set of groups to which the user belongs; this will be used as the names
1205
1204
  for the Identity group aliases created due to a successful login. The claim
1206
1205
  value must be a list of strings.
1207
- :param pulumi.Input[builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
1206
+ :param pulumi.Input[_builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
1208
1207
  the user was actively authenticated with the OIDC provider.
1209
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1208
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1210
1209
  The value should not contain leading or trailing forward slashes.
1211
1210
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1212
1211
  *Available only for Vault Enterprise*.
1213
- :param pulumi.Input[builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1212
+ :param pulumi.Input[_builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1214
1213
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1215
1214
  Only applicable with "jwt" roles.
1216
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1215
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1217
1216
  The standard scope "openid" is automatically included and need not be specified.
1218
- :param pulumi.Input[builtins.str] role_name: The name of the role.
1219
- :param pulumi.Input[builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
1220
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1221
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1222
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1223
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1224
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1225
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1226
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1227
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1228
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1229
- :param pulumi.Input[builtins.str] user_claim: The claim to use to uniquely identify
1217
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
1218
+ :param pulumi.Input[_builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
1219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1220
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1221
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1222
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1223
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1224
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1225
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1226
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1227
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1228
+ :param pulumi.Input[_builtins.str] user_claim: The claim to use to uniquely identify
1230
1229
  the user; this will be used as the name for the Identity entity alias created
1231
1230
  due to a successful login.
1232
- :param pulumi.Input[builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
1231
+ :param pulumi.Input[_builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
1233
1232
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
1234
1233
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
1235
1234
  Requires Vault 1.11+.
1236
- :param pulumi.Input[builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
1235
+ :param pulumi.Input[_builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
1237
1236
  logging is active. Not recommended in production since sensitive information may be present
1238
1237
  in OIDC responses.
1239
1238
  """
@@ -1318,35 +1317,35 @@ class AuthBackendRole(pulumi.CustomResource):
1318
1317
  def _internal_init(__self__,
1319
1318
  resource_name: str,
1320
1319
  opts: Optional[pulumi.ResourceOptions] = None,
1321
- allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1322
- backend: Optional[pulumi.Input[builtins.str]] = None,
1323
- bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1324
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1325
- bound_claims_type: Optional[pulumi.Input[builtins.str]] = None,
1326
- bound_subject: Optional[pulumi.Input[builtins.str]] = None,
1327
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1328
- clock_skew_leeway: Optional[pulumi.Input[builtins.int]] = None,
1329
- disable_bound_claims_parsing: Optional[pulumi.Input[builtins.bool]] = None,
1330
- expiration_leeway: Optional[pulumi.Input[builtins.int]] = None,
1331
- groups_claim: Optional[pulumi.Input[builtins.str]] = None,
1332
- max_age: Optional[pulumi.Input[builtins.int]] = None,
1333
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1334
- not_before_leeway: Optional[pulumi.Input[builtins.int]] = None,
1335
- oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1336
- role_name: Optional[pulumi.Input[builtins.str]] = None,
1337
- role_type: Optional[pulumi.Input[builtins.str]] = None,
1338
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1339
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1340
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1341
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1342
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1343
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1344
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1345
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1346
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1347
- user_claim: Optional[pulumi.Input[builtins.str]] = None,
1348
- user_claim_json_pointer: Optional[pulumi.Input[builtins.bool]] = None,
1349
- verbose_oidc_logging: Optional[pulumi.Input[builtins.bool]] = None,
1320
+ allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1321
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1322
+ bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1323
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1324
+ bound_claims_type: Optional[pulumi.Input[_builtins.str]] = None,
1325
+ bound_subject: Optional[pulumi.Input[_builtins.str]] = None,
1326
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1327
+ clock_skew_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1328
+ disable_bound_claims_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
1329
+ expiration_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1330
+ groups_claim: Optional[pulumi.Input[_builtins.str]] = None,
1331
+ max_age: Optional[pulumi.Input[_builtins.int]] = None,
1332
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1333
+ not_before_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1334
+ oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1335
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
1336
+ role_type: Optional[pulumi.Input[_builtins.str]] = None,
1337
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1338
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1339
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1340
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1341
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1342
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1343
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1344
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1345
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1346
+ user_claim: Optional[pulumi.Input[_builtins.str]] = None,
1347
+ user_claim_json_pointer: Optional[pulumi.Input[_builtins.bool]] = None,
1348
+ verbose_oidc_logging: Optional[pulumi.Input[_builtins.bool]] = None,
1350
1349
  __props__=None):
1351
1350
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1352
1351
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1399,35 +1398,35 @@ class AuthBackendRole(pulumi.CustomResource):
1399
1398
  def get(resource_name: str,
1400
1399
  id: pulumi.Input[str],
1401
1400
  opts: Optional[pulumi.ResourceOptions] = None,
1402
- allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1403
- backend: Optional[pulumi.Input[builtins.str]] = None,
1404
- bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1405
- bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1406
- bound_claims_type: Optional[pulumi.Input[builtins.str]] = None,
1407
- bound_subject: Optional[pulumi.Input[builtins.str]] = None,
1408
- claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1409
- clock_skew_leeway: Optional[pulumi.Input[builtins.int]] = None,
1410
- disable_bound_claims_parsing: Optional[pulumi.Input[builtins.bool]] = None,
1411
- expiration_leeway: Optional[pulumi.Input[builtins.int]] = None,
1412
- groups_claim: Optional[pulumi.Input[builtins.str]] = None,
1413
- max_age: Optional[pulumi.Input[builtins.int]] = None,
1414
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1415
- not_before_leeway: Optional[pulumi.Input[builtins.int]] = None,
1416
- oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1417
- role_name: Optional[pulumi.Input[builtins.str]] = None,
1418
- role_type: Optional[pulumi.Input[builtins.str]] = None,
1419
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1420
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1421
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1422
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1423
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1424
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1425
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1426
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1427
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1428
- user_claim: Optional[pulumi.Input[builtins.str]] = None,
1429
- user_claim_json_pointer: Optional[pulumi.Input[builtins.bool]] = None,
1430
- verbose_oidc_logging: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackendRole':
1401
+ allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1402
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1403
+ bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1404
+ bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1405
+ bound_claims_type: Optional[pulumi.Input[_builtins.str]] = None,
1406
+ bound_subject: Optional[pulumi.Input[_builtins.str]] = None,
1407
+ claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1408
+ clock_skew_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1409
+ disable_bound_claims_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
1410
+ expiration_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1411
+ groups_claim: Optional[pulumi.Input[_builtins.str]] = None,
1412
+ max_age: Optional[pulumi.Input[_builtins.int]] = None,
1413
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1414
+ not_before_leeway: Optional[pulumi.Input[_builtins.int]] = None,
1415
+ oidc_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1416
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ role_type: Optional[pulumi.Input[_builtins.str]] = None,
1418
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1419
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1420
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1421
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1422
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1423
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1424
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1425
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1426
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1427
+ user_claim: Optional[pulumi.Input[_builtins.str]] = None,
1428
+ user_claim_json_pointer: Optional[pulumi.Input[_builtins.bool]] = None,
1429
+ verbose_oidc_logging: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackendRole':
1431
1430
  """
1432
1431
  Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
1433
1432
  properties used to qualify the lookup.
@@ -1435,63 +1434,63 @@ class AuthBackendRole(pulumi.CustomResource):
1435
1434
  :param str resource_name: The unique name of the resulting resource.
1436
1435
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1437
1436
  :param pulumi.ResourceOptions opts: Options for the resource.
1438
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
1437
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_redirect_uris: The list of allowed values for redirect_uri during OIDC logins.
1439
1438
  Required for OIDC roles
1440
- :param pulumi.Input[builtins.str] backend: The unique name of the auth backend to configure.
1439
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
1441
1440
  Defaults to `jwt`.
1442
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1441
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1443
1442
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1444
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_claims: If set, a map of claims to values to match against.
1443
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_claims: If set, a map of claims to values to match against.
1445
1444
  A claim's value must be a string, which may contain one value or multiple
1446
1445
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
1447
- :param pulumi.Input[builtins.str] bound_claims_type: How to interpret values in the claims/values
1446
+ :param pulumi.Input[_builtins.str] bound_claims_type: How to interpret values in the claims/values
1448
1447
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
1449
1448
  match). Requires Vault 1.4.0 or above.
1450
- :param pulumi.Input[builtins.str] bound_subject: If set, requires that the `sub` claim matches
1449
+ :param pulumi.Input[_builtins.str] bound_subject: If set, requires that the `sub` claim matches
1451
1450
  this value.
1452
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
1451
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] claim_mappings: If set, a map of claims (keys) to be copied
1453
1452
  to specified metadata fields (values).
1454
- :param pulumi.Input[builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1453
+ :param pulumi.Input[_builtins.int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
1455
1454
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1456
1455
  Only applicable with "jwt" roles.
1457
- :param pulumi.Input[builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1458
- :param pulumi.Input[builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1456
+ :param pulumi.Input[_builtins.bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1457
+ :param pulumi.Input[_builtins.int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1459
1458
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1460
1459
  Only applicable with "jwt" roles.
1461
- :param pulumi.Input[builtins.str] groups_claim: The claim to use to uniquely identify
1460
+ :param pulumi.Input[_builtins.str] groups_claim: The claim to use to uniquely identify
1462
1461
  the set of groups to which the user belongs; this will be used as the names
1463
1462
  for the Identity group aliases created due to a successful login. The claim
1464
1463
  value must be a list of strings.
1465
- :param pulumi.Input[builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
1464
+ :param pulumi.Input[_builtins.int] max_age: Specifies the allowable elapsed time in seconds since the last time
1466
1465
  the user was actively authenticated with the OIDC provider.
1467
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1466
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1468
1467
  The value should not contain leading or trailing forward slashes.
1469
1468
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1470
1469
  *Available only for Vault Enterprise*.
1471
- :param pulumi.Input[builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1470
+ :param pulumi.Input[_builtins.int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1472
1471
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1473
1472
  Only applicable with "jwt" roles.
1474
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1473
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1475
1474
  The standard scope "openid" is automatically included and need not be specified.
1476
- :param pulumi.Input[builtins.str] role_name: The name of the role.
1477
- :param pulumi.Input[builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
1478
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1479
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1480
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1481
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1482
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1483
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1484
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1485
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1486
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1487
- :param pulumi.Input[builtins.str] user_claim: The claim to use to uniquely identify
1475
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
1476
+ :param pulumi.Input[_builtins.str] role_type: Type of role, either "oidc" (default) or "jwt".
1477
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1478
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1479
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1480
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1481
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1482
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1483
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1484
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1485
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1486
+ :param pulumi.Input[_builtins.str] user_claim: The claim to use to uniquely identify
1488
1487
  the user; this will be used as the name for the Identity entity alias created
1489
1488
  due to a successful login.
1490
- :param pulumi.Input[builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
1489
+ :param pulumi.Input[_builtins.bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
1491
1490
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
1492
1491
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
1493
1492
  Requires Vault 1.11+.
1494
- :param pulumi.Input[builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
1493
+ :param pulumi.Input[_builtins.bool] verbose_oidc_logging: Log received OIDC tokens and claims when debug-level
1495
1494
  logging is active. Not recommended in production since sensitive information may be present
1496
1495
  in OIDC responses.
1497
1496
  """
@@ -1530,36 +1529,36 @@ class AuthBackendRole(pulumi.CustomResource):
1530
1529
  __props__.__dict__["verbose_oidc_logging"] = verbose_oidc_logging
1531
1530
  return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
1532
1531
 
1533
- @property
1532
+ @_builtins.property
1534
1533
  @pulumi.getter(name="allowedRedirectUris")
1535
- def allowed_redirect_uris(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1534
+ def allowed_redirect_uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1536
1535
  """
1537
1536
  The list of allowed values for redirect_uri during OIDC logins.
1538
1537
  Required for OIDC roles
1539
1538
  """
1540
1539
  return pulumi.get(self, "allowed_redirect_uris")
1541
1540
 
1542
- @property
1541
+ @_builtins.property
1543
1542
  @pulumi.getter
1544
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
1543
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1545
1544
  """
1546
1545
  The unique name of the auth backend to configure.
1547
1546
  Defaults to `jwt`.
1548
1547
  """
1549
1548
  return pulumi.get(self, "backend")
1550
1549
 
1551
- @property
1550
+ @_builtins.property
1552
1551
  @pulumi.getter(name="boundAudiences")
1553
- def bound_audiences(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1552
+ def bound_audiences(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1554
1553
  """
1555
1554
  (Required for roles of type `jwt`, optional for roles of
1556
1555
  type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1557
1556
  """
1558
1557
  return pulumi.get(self, "bound_audiences")
1559
1558
 
1560
- @property
1559
+ @_builtins.property
1561
1560
  @pulumi.getter(name="boundClaims")
1562
- def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1561
+ def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1563
1562
  """
1564
1563
  If set, a map of claims to values to match against.
1565
1564
  A claim's value must be a string, which may contain one value or multiple
@@ -1567,9 +1566,9 @@ class AuthBackendRole(pulumi.CustomResource):
1567
1566
  """
1568
1567
  return pulumi.get(self, "bound_claims")
1569
1568
 
1570
- @property
1569
+ @_builtins.property
1571
1570
  @pulumi.getter(name="boundClaimsType")
1572
- def bound_claims_type(self) -> pulumi.Output[builtins.str]:
1571
+ def bound_claims_type(self) -> pulumi.Output[_builtins.str]:
1573
1572
  """
1574
1573
  How to interpret values in the claims/values
1575
1574
  map (`bound_claims`): can be either `string` (exact match) or `glob` (wildcard
@@ -1577,27 +1576,27 @@ class AuthBackendRole(pulumi.CustomResource):
1577
1576
  """
1578
1577
  return pulumi.get(self, "bound_claims_type")
1579
1578
 
1580
- @property
1579
+ @_builtins.property
1581
1580
  @pulumi.getter(name="boundSubject")
1582
- def bound_subject(self) -> pulumi.Output[Optional[builtins.str]]:
1581
+ def bound_subject(self) -> pulumi.Output[Optional[_builtins.str]]:
1583
1582
  """
1584
1583
  If set, requires that the `sub` claim matches
1585
1584
  this value.
1586
1585
  """
1587
1586
  return pulumi.get(self, "bound_subject")
1588
1587
 
1589
- @property
1588
+ @_builtins.property
1590
1589
  @pulumi.getter(name="claimMappings")
1591
- def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1590
+ def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1592
1591
  """
1593
1592
  If set, a map of claims (keys) to be copied
1594
1593
  to specified metadata fields (values).
1595
1594
  """
1596
1595
  return pulumi.get(self, "claim_mappings")
1597
1596
 
1598
- @property
1597
+ @_builtins.property
1599
1598
  @pulumi.getter(name="clockSkewLeeway")
1600
- def clock_skew_leeway(self) -> pulumi.Output[Optional[builtins.int]]:
1599
+ def clock_skew_leeway(self) -> pulumi.Output[Optional[_builtins.int]]:
1601
1600
  """
1602
1601
  The amount of leeway to add to all claims to account for clock skew, in
1603
1602
  seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1605,17 +1604,17 @@ class AuthBackendRole(pulumi.CustomResource):
1605
1604
  """
1606
1605
  return pulumi.get(self, "clock_skew_leeway")
1607
1606
 
1608
- @property
1607
+ @_builtins.property
1609
1608
  @pulumi.getter(name="disableBoundClaimsParsing")
1610
- def disable_bound_claims_parsing(self) -> pulumi.Output[Optional[builtins.bool]]:
1609
+ def disable_bound_claims_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
1611
1610
  """
1612
1611
  Disable bound claim value parsing. Useful when values contain commas.
1613
1612
  """
1614
1613
  return pulumi.get(self, "disable_bound_claims_parsing")
1615
1614
 
1616
- @property
1615
+ @_builtins.property
1617
1616
  @pulumi.getter(name="expirationLeeway")
1618
- def expiration_leeway(self) -> pulumi.Output[Optional[builtins.int]]:
1617
+ def expiration_leeway(self) -> pulumi.Output[Optional[_builtins.int]]:
1619
1618
  """
1620
1619
  The amount of leeway to add to expiration (`exp`) claims to account for
1621
1620
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1623,9 +1622,9 @@ class AuthBackendRole(pulumi.CustomResource):
1623
1622
  """
1624
1623
  return pulumi.get(self, "expiration_leeway")
1625
1624
 
1626
- @property
1625
+ @_builtins.property
1627
1626
  @pulumi.getter(name="groupsClaim")
1628
- def groups_claim(self) -> pulumi.Output[Optional[builtins.str]]:
1627
+ def groups_claim(self) -> pulumi.Output[Optional[_builtins.str]]:
1629
1628
  """
1630
1629
  The claim to use to uniquely identify
1631
1630
  the set of groups to which the user belongs; this will be used as the names
@@ -1634,18 +1633,18 @@ class AuthBackendRole(pulumi.CustomResource):
1634
1633
  """
1635
1634
  return pulumi.get(self, "groups_claim")
1636
1635
 
1637
- @property
1636
+ @_builtins.property
1638
1637
  @pulumi.getter(name="maxAge")
1639
- def max_age(self) -> pulumi.Output[Optional[builtins.int]]:
1638
+ def max_age(self) -> pulumi.Output[Optional[_builtins.int]]:
1640
1639
  """
1641
1640
  Specifies the allowable elapsed time in seconds since the last time
1642
1641
  the user was actively authenticated with the OIDC provider.
1643
1642
  """
1644
1643
  return pulumi.get(self, "max_age")
1645
1644
 
1646
- @property
1645
+ @_builtins.property
1647
1646
  @pulumi.getter
1648
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1647
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1649
1648
  """
1650
1649
  The namespace to provision the resource in.
1651
1650
  The value should not contain leading or trailing forward slashes.
@@ -1654,9 +1653,9 @@ class AuthBackendRole(pulumi.CustomResource):
1654
1653
  """
1655
1654
  return pulumi.get(self, "namespace")
1656
1655
 
1657
- @property
1656
+ @_builtins.property
1658
1657
  @pulumi.getter(name="notBeforeLeeway")
1659
- def not_before_leeway(self) -> pulumi.Output[Optional[builtins.int]]:
1658
+ def not_before_leeway(self) -> pulumi.Output[Optional[_builtins.int]]:
1660
1659
  """
1661
1660
  The amount of leeway to add to not before (`nbf`) claims to account for
1662
1661
  clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
@@ -1664,106 +1663,106 @@ class AuthBackendRole(pulumi.CustomResource):
1664
1663
  """
1665
1664
  return pulumi.get(self, "not_before_leeway")
1666
1665
 
1667
- @property
1666
+ @_builtins.property
1668
1667
  @pulumi.getter(name="oidcScopes")
1669
- def oidc_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1668
+ def oidc_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1670
1669
  """
1671
1670
  If set, a list of OIDC scopes to be used with an OIDC role.
1672
1671
  The standard scope "openid" is automatically included and need not be specified.
1673
1672
  """
1674
1673
  return pulumi.get(self, "oidc_scopes")
1675
1674
 
1676
- @property
1675
+ @_builtins.property
1677
1676
  @pulumi.getter(name="roleName")
1678
- def role_name(self) -> pulumi.Output[builtins.str]:
1677
+ def role_name(self) -> pulumi.Output[_builtins.str]:
1679
1678
  """
1680
1679
  The name of the role.
1681
1680
  """
1682
1681
  return pulumi.get(self, "role_name")
1683
1682
 
1684
- @property
1683
+ @_builtins.property
1685
1684
  @pulumi.getter(name="roleType")
1686
- def role_type(self) -> pulumi.Output[builtins.str]:
1685
+ def role_type(self) -> pulumi.Output[_builtins.str]:
1687
1686
  """
1688
1687
  Type of role, either "oidc" (default) or "jwt".
1689
1688
  """
1690
1689
  return pulumi.get(self, "role_type")
1691
1690
 
1692
- @property
1691
+ @_builtins.property
1693
1692
  @pulumi.getter(name="tokenBoundCidrs")
1694
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1693
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1695
1694
  """
1696
1695
  Specifies the blocks of IP addresses which are allowed to use the generated token
1697
1696
  """
1698
1697
  return pulumi.get(self, "token_bound_cidrs")
1699
1698
 
1700
- @property
1699
+ @_builtins.property
1701
1700
  @pulumi.getter(name="tokenExplicitMaxTtl")
1702
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1701
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1703
1702
  """
1704
1703
  Generated Token's Explicit Maximum TTL in seconds
1705
1704
  """
1706
1705
  return pulumi.get(self, "token_explicit_max_ttl")
1707
1706
 
1708
- @property
1707
+ @_builtins.property
1709
1708
  @pulumi.getter(name="tokenMaxTtl")
1710
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1709
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1711
1710
  """
1712
1711
  The maximum lifetime of the generated token
1713
1712
  """
1714
1713
  return pulumi.get(self, "token_max_ttl")
1715
1714
 
1716
- @property
1715
+ @_builtins.property
1717
1716
  @pulumi.getter(name="tokenNoDefaultPolicy")
1718
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1717
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1719
1718
  """
1720
1719
  If true, the 'default' policy will not automatically be added to generated tokens
1721
1720
  """
1722
1721
  return pulumi.get(self, "token_no_default_policy")
1723
1722
 
1724
- @property
1723
+ @_builtins.property
1725
1724
  @pulumi.getter(name="tokenNumUses")
1726
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1725
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1727
1726
  """
1728
1727
  The maximum number of times a token may be used, a value of zero means unlimited
1729
1728
  """
1730
1729
  return pulumi.get(self, "token_num_uses")
1731
1730
 
1732
- @property
1731
+ @_builtins.property
1733
1732
  @pulumi.getter(name="tokenPeriod")
1734
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1733
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1735
1734
  """
1736
1735
  Generated Token's Period
1737
1736
  """
1738
1737
  return pulumi.get(self, "token_period")
1739
1738
 
1740
- @property
1739
+ @_builtins.property
1741
1740
  @pulumi.getter(name="tokenPolicies")
1742
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1741
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1743
1742
  """
1744
1743
  Generated Token's Policies
1745
1744
  """
1746
1745
  return pulumi.get(self, "token_policies")
1747
1746
 
1748
- @property
1747
+ @_builtins.property
1749
1748
  @pulumi.getter(name="tokenTtl")
1750
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1749
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1751
1750
  """
1752
1751
  The initial ttl of the token to generate in seconds
1753
1752
  """
1754
1753
  return pulumi.get(self, "token_ttl")
1755
1754
 
1756
- @property
1755
+ @_builtins.property
1757
1756
  @pulumi.getter(name="tokenType")
1758
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1757
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1759
1758
  """
1760
1759
  The type of token to generate, service or batch
1761
1760
  """
1762
1761
  return pulumi.get(self, "token_type")
1763
1762
 
1764
- @property
1763
+ @_builtins.property
1765
1764
  @pulumi.getter(name="userClaim")
1766
- def user_claim(self) -> pulumi.Output[builtins.str]:
1765
+ def user_claim(self) -> pulumi.Output[_builtins.str]:
1767
1766
  """
1768
1767
  The claim to use to uniquely identify
1769
1768
  the user; this will be used as the name for the Identity entity alias created
@@ -1771,9 +1770,9 @@ class AuthBackendRole(pulumi.CustomResource):
1771
1770
  """
1772
1771
  return pulumi.get(self, "user_claim")
1773
1772
 
1774
- @property
1773
+ @_builtins.property
1775
1774
  @pulumi.getter(name="userClaimJsonPointer")
1776
- def user_claim_json_pointer(self) -> pulumi.Output[Optional[builtins.bool]]:
1775
+ def user_claim_json_pointer(self) -> pulumi.Output[Optional[_builtins.bool]]:
1777
1776
  """
1778
1777
  Specifies if the `user_claim` value uses
1779
1778
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
@@ -1782,9 +1781,9 @@ class AuthBackendRole(pulumi.CustomResource):
1782
1781
  """
1783
1782
  return pulumi.get(self, "user_claim_json_pointer")
1784
1783
 
1785
- @property
1784
+ @_builtins.property
1786
1785
  @pulumi.getter(name="verboseOidcLogging")
1787
- def verbose_oidc_logging(self) -> pulumi.Output[Optional[builtins.bool]]:
1786
+ def verbose_oidc_logging(self) -> pulumi.Output[Optional[_builtins.bool]]:
1788
1787
  """
1789
1788
  Log received OIDC tokens and claims when debug-level
1790
1789
  logging is active. Not recommended in production since sensitive information may be present