pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -17,7 +17,6 @@ class SecretBackendArgs:
17
17
  binddn: pulumi.Input[str],
18
18
  bindpass: pulumi.Input[str],
19
19
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
20
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
21
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
23
22
  certificate: Optional[pulumi.Input[str]] = None,
@@ -25,21 +24,16 @@ class SecretBackendArgs:
25
24
  client_tls_key: Optional[pulumi.Input[str]] = None,
26
25
  connection_timeout: Optional[pulumi.Input[int]] = None,
27
26
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
28
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
29
27
  description: Optional[pulumi.Input[str]] = None,
30
28
  disable_remount: Optional[pulumi.Input[bool]] = None,
31
29
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
32
- identity_token_key: Optional[pulumi.Input[str]] = None,
33
30
  insecure_tls: Optional[pulumi.Input[bool]] = None,
34
- listing_visibility: Optional[pulumi.Input[str]] = None,
35
31
  local: Optional[pulumi.Input[bool]] = None,
36
32
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
37
33
  namespace: Optional[pulumi.Input[str]] = None,
38
34
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
39
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
35
  password_policy: Optional[pulumi.Input[str]] = None,
41
36
  path: Optional[pulumi.Input[str]] = None,
42
- plugin_version: Optional[pulumi.Input[str]] = None,
43
37
  request_timeout: Optional[pulumi.Input[int]] = None,
44
38
  schema: Optional[pulumi.Input[str]] = None,
45
39
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -54,7 +48,6 @@ class SecretBackendArgs:
54
48
  :param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
55
49
  :param pulumi.Input[str] bindpass: Password to use along with binddn when performing user search.
56
50
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
57
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
58
51
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
59
52
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
60
53
  :param pulumi.Input[str] certificate: CA certificate to use when verifying LDAP server certificate, must be
@@ -64,14 +57,11 @@ class SecretBackendArgs:
64
57
  :param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
65
58
  the next URL in the configuration.
66
59
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
67
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
68
60
  :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
69
61
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
70
62
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
71
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
72
63
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
73
64
  Defaults to `false`.
74
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
75
65
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
76
66
  replication.Tolerance duration to use when checking the last rotation time.
77
67
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
@@ -80,11 +70,9 @@ class SecretBackendArgs:
80
70
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
81
71
  *Available only for Vault Enterprise*.
82
72
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
83
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
84
73
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
85
74
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
86
75
  not begin or end with a `/`. Defaults to `ldap`.
87
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
88
76
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
89
77
  before returning back an error.
90
78
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
@@ -102,8 +90,6 @@ class SecretBackendArgs:
102
90
  pulumi.set(__self__, "bindpass", bindpass)
103
91
  if allowed_managed_keys is not None:
104
92
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
105
- if allowed_response_headers is not None:
106
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
107
93
  if audit_non_hmac_request_keys is not None:
108
94
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
109
95
  if audit_non_hmac_response_keys is not None:
@@ -118,20 +104,14 @@ class SecretBackendArgs:
118
104
  pulumi.set(__self__, "connection_timeout", connection_timeout)
119
105
  if default_lease_ttl_seconds is not None:
120
106
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
121
- if delegated_auth_accessors is not None:
122
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
123
107
  if description is not None:
124
108
  pulumi.set(__self__, "description", description)
125
109
  if disable_remount is not None:
126
110
  pulumi.set(__self__, "disable_remount", disable_remount)
127
111
  if external_entropy_access is not None:
128
112
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
129
- if identity_token_key is not None:
130
- pulumi.set(__self__, "identity_token_key", identity_token_key)
131
113
  if insecure_tls is not None:
132
114
  pulumi.set(__self__, "insecure_tls", insecure_tls)
133
- if listing_visibility is not None:
134
- pulumi.set(__self__, "listing_visibility", listing_visibility)
135
115
  if local is not None:
136
116
  pulumi.set(__self__, "local", local)
137
117
  if max_lease_ttl_seconds is not None:
@@ -140,14 +120,10 @@ class SecretBackendArgs:
140
120
  pulumi.set(__self__, "namespace", namespace)
141
121
  if options is not None:
142
122
  pulumi.set(__self__, "options", options)
143
- if passthrough_request_headers is not None:
144
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
145
123
  if password_policy is not None:
146
124
  pulumi.set(__self__, "password_policy", password_policy)
147
125
  if path is not None:
148
126
  pulumi.set(__self__, "path", path)
149
- if plugin_version is not None:
150
- pulumi.set(__self__, "plugin_version", plugin_version)
151
127
  if request_timeout is not None:
152
128
  pulumi.set(__self__, "request_timeout", request_timeout)
153
129
  if schema is not None:
@@ -203,18 +179,6 @@ class SecretBackendArgs:
203
179
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
204
180
  pulumi.set(self, "allowed_managed_keys", value)
205
181
 
206
- @property
207
- @pulumi.getter(name="allowedResponseHeaders")
208
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
209
- """
210
- List of headers to allow and pass from the request to the plugin
211
- """
212
- return pulumi.get(self, "allowed_response_headers")
213
-
214
- @allowed_response_headers.setter
215
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
216
- pulumi.set(self, "allowed_response_headers", value)
217
-
218
182
  @property
219
183
  @pulumi.getter(name="auditNonHmacRequestKeys")
220
184
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -301,18 +265,6 @@ class SecretBackendArgs:
301
265
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
302
266
  pulumi.set(self, "default_lease_ttl_seconds", value)
303
267
 
304
- @property
305
- @pulumi.getter(name="delegatedAuthAccessors")
306
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
307
- """
308
- List of headers to allow and pass from the request to the plugin
309
- """
310
- return pulumi.get(self, "delegated_auth_accessors")
311
-
312
- @delegated_auth_accessors.setter
313
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
314
- pulumi.set(self, "delegated_auth_accessors", value)
315
-
316
268
  @property
317
269
  @pulumi.getter
318
270
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -349,18 +301,6 @@ class SecretBackendArgs:
349
301
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
350
302
  pulumi.set(self, "external_entropy_access", value)
351
303
 
352
- @property
353
- @pulumi.getter(name="identityTokenKey")
354
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
355
- """
356
- The key to use for signing plugin workload identity tokens
357
- """
358
- return pulumi.get(self, "identity_token_key")
359
-
360
- @identity_token_key.setter
361
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
362
- pulumi.set(self, "identity_token_key", value)
363
-
364
304
  @property
365
305
  @pulumi.getter(name="insecureTls")
366
306
  def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
@@ -374,18 +314,6 @@ class SecretBackendArgs:
374
314
  def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
375
315
  pulumi.set(self, "insecure_tls", value)
376
316
 
377
- @property
378
- @pulumi.getter(name="listingVisibility")
379
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
380
- """
381
- Specifies whether to show this mount in the UI-specific listing endpoint
382
- """
383
- return pulumi.get(self, "listing_visibility")
384
-
385
- @listing_visibility.setter
386
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
387
- pulumi.set(self, "listing_visibility", value)
388
-
389
317
  @property
390
318
  @pulumi.getter
391
319
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -438,18 +366,6 @@ class SecretBackendArgs:
438
366
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
439
367
  pulumi.set(self, "options", value)
440
368
 
441
- @property
442
- @pulumi.getter(name="passthroughRequestHeaders")
443
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
444
- """
445
- List of headers to allow and pass from the request to the plugin
446
- """
447
- return pulumi.get(self, "passthrough_request_headers")
448
-
449
- @passthrough_request_headers.setter
450
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
451
- pulumi.set(self, "passthrough_request_headers", value)
452
-
453
369
  @property
454
370
  @pulumi.getter(name="passwordPolicy")
455
371
  def password_policy(self) -> Optional[pulumi.Input[str]]:
@@ -475,18 +391,6 @@ class SecretBackendArgs:
475
391
  def path(self, value: Optional[pulumi.Input[str]]):
476
392
  pulumi.set(self, "path", value)
477
393
 
478
- @property
479
- @pulumi.getter(name="pluginVersion")
480
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
481
- """
482
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
483
- """
484
- return pulumi.get(self, "plugin_version")
485
-
486
- @plugin_version.setter
487
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
488
- pulumi.set(self, "plugin_version", value)
489
-
490
394
  @property
491
395
  @pulumi.getter(name="requestTimeout")
492
396
  def request_timeout(self) -> Optional[pulumi.Input[int]]:
@@ -604,7 +508,6 @@ class _SecretBackendState:
604
508
  def __init__(__self__, *,
605
509
  accessor: Optional[pulumi.Input[str]] = None,
606
510
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
607
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
608
511
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
609
512
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
610
513
  binddn: Optional[pulumi.Input[str]] = None,
@@ -614,21 +517,16 @@ class _SecretBackendState:
614
517
  client_tls_key: Optional[pulumi.Input[str]] = None,
615
518
  connection_timeout: Optional[pulumi.Input[int]] = None,
616
519
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
617
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
618
520
  description: Optional[pulumi.Input[str]] = None,
619
521
  disable_remount: Optional[pulumi.Input[bool]] = None,
620
522
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
621
- identity_token_key: Optional[pulumi.Input[str]] = None,
622
523
  insecure_tls: Optional[pulumi.Input[bool]] = None,
623
- listing_visibility: Optional[pulumi.Input[str]] = None,
624
524
  local: Optional[pulumi.Input[bool]] = None,
625
525
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
626
526
  namespace: Optional[pulumi.Input[str]] = None,
627
527
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
628
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
629
528
  password_policy: Optional[pulumi.Input[str]] = None,
630
529
  path: Optional[pulumi.Input[str]] = None,
631
- plugin_version: Optional[pulumi.Input[str]] = None,
632
530
  request_timeout: Optional[pulumi.Input[int]] = None,
633
531
  schema: Optional[pulumi.Input[str]] = None,
634
532
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -642,7 +540,6 @@ class _SecretBackendState:
642
540
  Input properties used for looking up and filtering SecretBackend resources.
643
541
  :param pulumi.Input[str] accessor: Accessor of the mount
644
542
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
645
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
646
543
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
647
544
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
648
545
  :param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
@@ -654,14 +551,11 @@ class _SecretBackendState:
654
551
  :param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
655
552
  the next URL in the configuration.
656
553
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
657
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
658
554
  :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
659
555
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
660
556
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
661
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
662
557
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
663
558
  Defaults to `false`.
664
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
665
559
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
666
560
  replication.Tolerance duration to use when checking the last rotation time.
667
561
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
@@ -670,11 +564,9 @@ class _SecretBackendState:
670
564
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
671
565
  *Available only for Vault Enterprise*.
672
566
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
673
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
674
567
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
675
568
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
676
569
  not begin or end with a `/`. Defaults to `ldap`.
677
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
678
570
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
679
571
  before returning back an error.
680
572
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
@@ -692,8 +584,6 @@ class _SecretBackendState:
692
584
  pulumi.set(__self__, "accessor", accessor)
693
585
  if allowed_managed_keys is not None:
694
586
  pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
695
- if allowed_response_headers is not None:
696
- pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
697
587
  if audit_non_hmac_request_keys is not None:
698
588
  pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
699
589
  if audit_non_hmac_response_keys is not None:
@@ -712,20 +602,14 @@ class _SecretBackendState:
712
602
  pulumi.set(__self__, "connection_timeout", connection_timeout)
713
603
  if default_lease_ttl_seconds is not None:
714
604
  pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
715
- if delegated_auth_accessors is not None:
716
- pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
717
605
  if description is not None:
718
606
  pulumi.set(__self__, "description", description)
719
607
  if disable_remount is not None:
720
608
  pulumi.set(__self__, "disable_remount", disable_remount)
721
609
  if external_entropy_access is not None:
722
610
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
723
- if identity_token_key is not None:
724
- pulumi.set(__self__, "identity_token_key", identity_token_key)
725
611
  if insecure_tls is not None:
726
612
  pulumi.set(__self__, "insecure_tls", insecure_tls)
727
- if listing_visibility is not None:
728
- pulumi.set(__self__, "listing_visibility", listing_visibility)
729
613
  if local is not None:
730
614
  pulumi.set(__self__, "local", local)
731
615
  if max_lease_ttl_seconds is not None:
@@ -734,14 +618,10 @@ class _SecretBackendState:
734
618
  pulumi.set(__self__, "namespace", namespace)
735
619
  if options is not None:
736
620
  pulumi.set(__self__, "options", options)
737
- if passthrough_request_headers is not None:
738
- pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
739
621
  if password_policy is not None:
740
622
  pulumi.set(__self__, "password_policy", password_policy)
741
623
  if path is not None:
742
624
  pulumi.set(__self__, "path", path)
743
- if plugin_version is not None:
744
- pulumi.set(__self__, "plugin_version", plugin_version)
745
625
  if request_timeout is not None:
746
626
  pulumi.set(__self__, "request_timeout", request_timeout)
747
627
  if schema is not None:
@@ -785,18 +665,6 @@ class _SecretBackendState:
785
665
  def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
786
666
  pulumi.set(self, "allowed_managed_keys", value)
787
667
 
788
- @property
789
- @pulumi.getter(name="allowedResponseHeaders")
790
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
791
- """
792
- List of headers to allow and pass from the request to the plugin
793
- """
794
- return pulumi.get(self, "allowed_response_headers")
795
-
796
- @allowed_response_headers.setter
797
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
798
- pulumi.set(self, "allowed_response_headers", value)
799
-
800
668
  @property
801
669
  @pulumi.getter(name="auditNonHmacRequestKeys")
802
670
  def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -907,18 +775,6 @@ class _SecretBackendState:
907
775
  def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
908
776
  pulumi.set(self, "default_lease_ttl_seconds", value)
909
777
 
910
- @property
911
- @pulumi.getter(name="delegatedAuthAccessors")
912
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
913
- """
914
- List of headers to allow and pass from the request to the plugin
915
- """
916
- return pulumi.get(self, "delegated_auth_accessors")
917
-
918
- @delegated_auth_accessors.setter
919
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
920
- pulumi.set(self, "delegated_auth_accessors", value)
921
-
922
778
  @property
923
779
  @pulumi.getter
924
780
  def description(self) -> Optional[pulumi.Input[str]]:
@@ -955,18 +811,6 @@ class _SecretBackendState:
955
811
  def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
956
812
  pulumi.set(self, "external_entropy_access", value)
957
813
 
958
- @property
959
- @pulumi.getter(name="identityTokenKey")
960
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
961
- """
962
- The key to use for signing plugin workload identity tokens
963
- """
964
- return pulumi.get(self, "identity_token_key")
965
-
966
- @identity_token_key.setter
967
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
968
- pulumi.set(self, "identity_token_key", value)
969
-
970
814
  @property
971
815
  @pulumi.getter(name="insecureTls")
972
816
  def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
@@ -980,18 +824,6 @@ class _SecretBackendState:
980
824
  def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
981
825
  pulumi.set(self, "insecure_tls", value)
982
826
 
983
- @property
984
- @pulumi.getter(name="listingVisibility")
985
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
986
- """
987
- Specifies whether to show this mount in the UI-specific listing endpoint
988
- """
989
- return pulumi.get(self, "listing_visibility")
990
-
991
- @listing_visibility.setter
992
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
993
- pulumi.set(self, "listing_visibility", value)
994
-
995
827
  @property
996
828
  @pulumi.getter
997
829
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -1044,18 +876,6 @@ class _SecretBackendState:
1044
876
  def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1045
877
  pulumi.set(self, "options", value)
1046
878
 
1047
- @property
1048
- @pulumi.getter(name="passthroughRequestHeaders")
1049
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1050
- """
1051
- List of headers to allow and pass from the request to the plugin
1052
- """
1053
- return pulumi.get(self, "passthrough_request_headers")
1054
-
1055
- @passthrough_request_headers.setter
1056
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1057
- pulumi.set(self, "passthrough_request_headers", value)
1058
-
1059
879
  @property
1060
880
  @pulumi.getter(name="passwordPolicy")
1061
881
  def password_policy(self) -> Optional[pulumi.Input[str]]:
@@ -1081,18 +901,6 @@ class _SecretBackendState:
1081
901
  def path(self, value: Optional[pulumi.Input[str]]):
1082
902
  pulumi.set(self, "path", value)
1083
903
 
1084
- @property
1085
- @pulumi.getter(name="pluginVersion")
1086
- def plugin_version(self) -> Optional[pulumi.Input[str]]:
1087
- """
1088
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1089
- """
1090
- return pulumi.get(self, "plugin_version")
1091
-
1092
- @plugin_version.setter
1093
- def plugin_version(self, value: Optional[pulumi.Input[str]]):
1094
- pulumi.set(self, "plugin_version", value)
1095
-
1096
904
  @property
1097
905
  @pulumi.getter(name="requestTimeout")
1098
906
  def request_timeout(self) -> Optional[pulumi.Input[int]]:
@@ -1211,7 +1019,6 @@ class SecretBackend(pulumi.CustomResource):
1211
1019
  resource_name: str,
1212
1020
  opts: Optional[pulumi.ResourceOptions] = None,
1213
1021
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1214
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1215
1022
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1216
1023
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1217
1024
  binddn: Optional[pulumi.Input[str]] = None,
@@ -1221,21 +1028,16 @@ class SecretBackend(pulumi.CustomResource):
1221
1028
  client_tls_key: Optional[pulumi.Input[str]] = None,
1222
1029
  connection_timeout: Optional[pulumi.Input[int]] = None,
1223
1030
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1224
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1225
1031
  description: Optional[pulumi.Input[str]] = None,
1226
1032
  disable_remount: Optional[pulumi.Input[bool]] = None,
1227
1033
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1228
- identity_token_key: Optional[pulumi.Input[str]] = None,
1229
1034
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1230
- listing_visibility: Optional[pulumi.Input[str]] = None,
1231
1035
  local: Optional[pulumi.Input[bool]] = None,
1232
1036
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1233
1037
  namespace: Optional[pulumi.Input[str]] = None,
1234
1038
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1235
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1236
1039
  password_policy: Optional[pulumi.Input[str]] = None,
1237
1040
  path: Optional[pulumi.Input[str]] = None,
1238
- plugin_version: Optional[pulumi.Input[str]] = None,
1239
1041
  request_timeout: Optional[pulumi.Input[int]] = None,
1240
1042
  schema: Optional[pulumi.Input[str]] = None,
1241
1043
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -1249,18 +1051,20 @@ class SecretBackend(pulumi.CustomResource):
1249
1051
  """
1250
1052
  ## Example Usage
1251
1053
 
1054
+ <!--Start PulumiCodeChooser -->
1252
1055
  ```python
1253
1056
  import pulumi
1254
1057
  import pulumi_vault as vault
1255
1058
 
1256
1059
  config = vault.ldap.SecretBackend("config",
1257
- path="my-custom-ldap",
1258
1060
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1259
1061
  bindpass="SuperSecretPassw0rd",
1260
- url="ldaps://localhost",
1261
1062
  insecure_tls=True,
1063
+ path="my-custom-ldap",
1064
+ url="ldaps://localhost",
1262
1065
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1263
1066
  ```
1067
+ <!--End PulumiCodeChooser -->
1264
1068
 
1265
1069
  ## Import
1266
1070
 
@@ -1273,7 +1077,6 @@ class SecretBackend(pulumi.CustomResource):
1273
1077
  :param str resource_name: The name of the resource.
1274
1078
  :param pulumi.ResourceOptions opts: Options for the resource.
1275
1079
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1276
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1277
1080
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1278
1081
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1279
1082
  :param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
@@ -1285,14 +1088,11 @@ class SecretBackend(pulumi.CustomResource):
1285
1088
  :param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1286
1089
  the next URL in the configuration.
1287
1090
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1288
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1289
1091
  :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
1290
1092
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1291
1093
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1292
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1293
1094
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1294
1095
  Defaults to `false`.
1295
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1296
1096
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1297
1097
  replication.Tolerance duration to use when checking the last rotation time.
1298
1098
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
@@ -1301,11 +1101,9 @@ class SecretBackend(pulumi.CustomResource):
1301
1101
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1302
1102
  *Available only for Vault Enterprise*.
1303
1103
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1304
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1305
1104
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1306
1105
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
1307
1106
  not begin or end with a `/`. Defaults to `ldap`.
1308
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1309
1107
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1310
1108
  before returning back an error.
1311
1109
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
@@ -1328,18 +1126,20 @@ class SecretBackend(pulumi.CustomResource):
1328
1126
  """
1329
1127
  ## Example Usage
1330
1128
 
1129
+ <!--Start PulumiCodeChooser -->
1331
1130
  ```python
1332
1131
  import pulumi
1333
1132
  import pulumi_vault as vault
1334
1133
 
1335
1134
  config = vault.ldap.SecretBackend("config",
1336
- path="my-custom-ldap",
1337
1135
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1338
1136
  bindpass="SuperSecretPassw0rd",
1339
- url="ldaps://localhost",
1340
1137
  insecure_tls=True,
1138
+ path="my-custom-ldap",
1139
+ url="ldaps://localhost",
1341
1140
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1342
1141
  ```
1142
+ <!--End PulumiCodeChooser -->
1343
1143
 
1344
1144
  ## Import
1345
1145
 
@@ -1365,7 +1165,6 @@ class SecretBackend(pulumi.CustomResource):
1365
1165
  resource_name: str,
1366
1166
  opts: Optional[pulumi.ResourceOptions] = None,
1367
1167
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1368
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1369
1168
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1370
1169
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1371
1170
  binddn: Optional[pulumi.Input[str]] = None,
@@ -1375,21 +1174,16 @@ class SecretBackend(pulumi.CustomResource):
1375
1174
  client_tls_key: Optional[pulumi.Input[str]] = None,
1376
1175
  connection_timeout: Optional[pulumi.Input[int]] = None,
1377
1176
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1378
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1379
1177
  description: Optional[pulumi.Input[str]] = None,
1380
1178
  disable_remount: Optional[pulumi.Input[bool]] = None,
1381
1179
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1382
- identity_token_key: Optional[pulumi.Input[str]] = None,
1383
1180
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1384
- listing_visibility: Optional[pulumi.Input[str]] = None,
1385
1181
  local: Optional[pulumi.Input[bool]] = None,
1386
1182
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1387
1183
  namespace: Optional[pulumi.Input[str]] = None,
1388
1184
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1389
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1390
1185
  password_policy: Optional[pulumi.Input[str]] = None,
1391
1186
  path: Optional[pulumi.Input[str]] = None,
1392
- plugin_version: Optional[pulumi.Input[str]] = None,
1393
1187
  request_timeout: Optional[pulumi.Input[int]] = None,
1394
1188
  schema: Optional[pulumi.Input[str]] = None,
1395
1189
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -1409,7 +1203,6 @@ class SecretBackend(pulumi.CustomResource):
1409
1203
  __props__ = SecretBackendArgs.__new__(SecretBackendArgs)
1410
1204
 
1411
1205
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1412
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1413
1206
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1414
1207
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1415
1208
  if binddn is None and not opts.urn:
@@ -1423,21 +1216,16 @@ class SecretBackend(pulumi.CustomResource):
1423
1216
  __props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
1424
1217
  __props__.__dict__["connection_timeout"] = connection_timeout
1425
1218
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1426
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1427
1219
  __props__.__dict__["description"] = description
1428
1220
  __props__.__dict__["disable_remount"] = disable_remount
1429
1221
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1430
- __props__.__dict__["identity_token_key"] = identity_token_key
1431
1222
  __props__.__dict__["insecure_tls"] = insecure_tls
1432
- __props__.__dict__["listing_visibility"] = listing_visibility
1433
1223
  __props__.__dict__["local"] = local
1434
1224
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1435
1225
  __props__.__dict__["namespace"] = namespace
1436
1226
  __props__.__dict__["options"] = options
1437
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1438
1227
  __props__.__dict__["password_policy"] = password_policy
1439
1228
  __props__.__dict__["path"] = path
1440
- __props__.__dict__["plugin_version"] = plugin_version
1441
1229
  __props__.__dict__["request_timeout"] = request_timeout
1442
1230
  __props__.__dict__["schema"] = schema
1443
1231
  __props__.__dict__["seal_wrap"] = seal_wrap
@@ -1462,7 +1250,6 @@ class SecretBackend(pulumi.CustomResource):
1462
1250
  opts: Optional[pulumi.ResourceOptions] = None,
1463
1251
  accessor: Optional[pulumi.Input[str]] = None,
1464
1252
  allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1465
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1466
1253
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1467
1254
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1468
1255
  binddn: Optional[pulumi.Input[str]] = None,
@@ -1472,21 +1259,16 @@ class SecretBackend(pulumi.CustomResource):
1472
1259
  client_tls_key: Optional[pulumi.Input[str]] = None,
1473
1260
  connection_timeout: Optional[pulumi.Input[int]] = None,
1474
1261
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1475
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1476
1262
  description: Optional[pulumi.Input[str]] = None,
1477
1263
  disable_remount: Optional[pulumi.Input[bool]] = None,
1478
1264
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1479
- identity_token_key: Optional[pulumi.Input[str]] = None,
1480
1265
  insecure_tls: Optional[pulumi.Input[bool]] = None,
1481
- listing_visibility: Optional[pulumi.Input[str]] = None,
1482
1266
  local: Optional[pulumi.Input[bool]] = None,
1483
1267
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1484
1268
  namespace: Optional[pulumi.Input[str]] = None,
1485
1269
  options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1486
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1487
1270
  password_policy: Optional[pulumi.Input[str]] = None,
1488
1271
  path: Optional[pulumi.Input[str]] = None,
1489
- plugin_version: Optional[pulumi.Input[str]] = None,
1490
1272
  request_timeout: Optional[pulumi.Input[int]] = None,
1491
1273
  schema: Optional[pulumi.Input[str]] = None,
1492
1274
  seal_wrap: Optional[pulumi.Input[bool]] = None,
@@ -1505,7 +1287,6 @@ class SecretBackend(pulumi.CustomResource):
1505
1287
  :param pulumi.ResourceOptions opts: Options for the resource.
1506
1288
  :param pulumi.Input[str] accessor: Accessor of the mount
1507
1289
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1508
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1509
1290
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1510
1291
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1511
1292
  :param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
@@ -1517,14 +1298,11 @@ class SecretBackend(pulumi.CustomResource):
1517
1298
  :param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1518
1299
  the next URL in the configuration.
1519
1300
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1520
- :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1521
1301
  :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
1522
1302
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1523
1303
  :param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1524
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1525
1304
  :param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1526
1305
  Defaults to `false`.
1527
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1528
1306
  :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1529
1307
  replication.Tolerance duration to use when checking the last rotation time.
1530
1308
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
@@ -1533,11 +1311,9 @@ class SecretBackend(pulumi.CustomResource):
1533
1311
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1534
1312
  *Available only for Vault Enterprise*.
1535
1313
  :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1536
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1537
1314
  :param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
1538
1315
  :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
1539
1316
  not begin or end with a `/`. Defaults to `ldap`.
1540
- :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1541
1317
  :param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1542
1318
  before returning back an error.
1543
1319
  :param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
@@ -1557,7 +1333,6 @@ class SecretBackend(pulumi.CustomResource):
1557
1333
 
1558
1334
  __props__.__dict__["accessor"] = accessor
1559
1335
  __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1560
- __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1561
1336
  __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1562
1337
  __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1563
1338
  __props__.__dict__["binddn"] = binddn
@@ -1567,21 +1342,16 @@ class SecretBackend(pulumi.CustomResource):
1567
1342
  __props__.__dict__["client_tls_key"] = client_tls_key
1568
1343
  __props__.__dict__["connection_timeout"] = connection_timeout
1569
1344
  __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1570
- __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1571
1345
  __props__.__dict__["description"] = description
1572
1346
  __props__.__dict__["disable_remount"] = disable_remount
1573
1347
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1574
- __props__.__dict__["identity_token_key"] = identity_token_key
1575
1348
  __props__.__dict__["insecure_tls"] = insecure_tls
1576
- __props__.__dict__["listing_visibility"] = listing_visibility
1577
1349
  __props__.__dict__["local"] = local
1578
1350
  __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1579
1351
  __props__.__dict__["namespace"] = namespace
1580
1352
  __props__.__dict__["options"] = options
1581
- __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1582
1353
  __props__.__dict__["password_policy"] = password_policy
1583
1354
  __props__.__dict__["path"] = path
1584
- __props__.__dict__["plugin_version"] = plugin_version
1585
1355
  __props__.__dict__["request_timeout"] = request_timeout
1586
1356
  __props__.__dict__["schema"] = schema
1587
1357
  __props__.__dict__["seal_wrap"] = seal_wrap
@@ -1609,14 +1379,6 @@ class SecretBackend(pulumi.CustomResource):
1609
1379
  """
1610
1380
  return pulumi.get(self, "allowed_managed_keys")
1611
1381
 
1612
- @property
1613
- @pulumi.getter(name="allowedResponseHeaders")
1614
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1615
- """
1616
- List of headers to allow and pass from the request to the plugin
1617
- """
1618
- return pulumi.get(self, "allowed_response_headers")
1619
-
1620
1382
  @property
1621
1383
  @pulumi.getter(name="auditNonHmacRequestKeys")
1622
1384
  def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
@@ -1691,14 +1453,6 @@ class SecretBackend(pulumi.CustomResource):
1691
1453
  """
1692
1454
  return pulumi.get(self, "default_lease_ttl_seconds")
1693
1455
 
1694
- @property
1695
- @pulumi.getter(name="delegatedAuthAccessors")
1696
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
1697
- """
1698
- List of headers to allow and pass from the request to the plugin
1699
- """
1700
- return pulumi.get(self, "delegated_auth_accessors")
1701
-
1702
1456
  @property
1703
1457
  @pulumi.getter
1704
1458
  def description(self) -> pulumi.Output[Optional[str]]:
@@ -1723,14 +1477,6 @@ class SecretBackend(pulumi.CustomResource):
1723
1477
  """
1724
1478
  return pulumi.get(self, "external_entropy_access")
1725
1479
 
1726
- @property
1727
- @pulumi.getter(name="identityTokenKey")
1728
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
1729
- """
1730
- The key to use for signing plugin workload identity tokens
1731
- """
1732
- return pulumi.get(self, "identity_token_key")
1733
-
1734
1480
  @property
1735
1481
  @pulumi.getter(name="insecureTls")
1736
1482
  def insecure_tls(self) -> pulumi.Output[Optional[bool]]:
@@ -1740,14 +1486,6 @@ class SecretBackend(pulumi.CustomResource):
1740
1486
  """
1741
1487
  return pulumi.get(self, "insecure_tls")
1742
1488
 
1743
- @property
1744
- @pulumi.getter(name="listingVisibility")
1745
- def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1746
- """
1747
- Specifies whether to show this mount in the UI-specific listing endpoint
1748
- """
1749
- return pulumi.get(self, "listing_visibility")
1750
-
1751
1489
  @property
1752
1490
  @pulumi.getter
1753
1491
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1784,14 +1522,6 @@ class SecretBackend(pulumi.CustomResource):
1784
1522
  """
1785
1523
  return pulumi.get(self, "options")
1786
1524
 
1787
- @property
1788
- @pulumi.getter(name="passthroughRequestHeaders")
1789
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
1790
- """
1791
- List of headers to allow and pass from the request to the plugin
1792
- """
1793
- return pulumi.get(self, "passthrough_request_headers")
1794
-
1795
1525
  @property
1796
1526
  @pulumi.getter(name="passwordPolicy")
1797
1527
  def password_policy(self) -> pulumi.Output[Optional[str]]:
@@ -1809,14 +1539,6 @@ class SecretBackend(pulumi.CustomResource):
1809
1539
  """
1810
1540
  return pulumi.get(self, "path")
1811
1541
 
1812
- @property
1813
- @pulumi.getter(name="pluginVersion")
1814
- def plugin_version(self) -> pulumi.Output[Optional[str]]:
1815
- """
1816
- Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1817
- """
1818
- return pulumi.get(self, "plugin_version")
1819
-
1820
1542
  @property
1821
1543
  @pulumi.getter(name="requestTimeout")
1822
1544
  def request_timeout(self) -> pulumi.Output[int]: