pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,99 +20,99 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
19
20
  @pulumi.input_type
20
21
  class AuthBackendArgs:
21
22
  def __init__(__self__, *,
22
- url: pulumi.Input[str],
23
- binddn: Optional[pulumi.Input[str]] = None,
24
- bindpass: Optional[pulumi.Input[str]] = None,
25
- case_sensitive_names: Optional[pulumi.Input[bool]] = None,
26
- certificate: Optional[pulumi.Input[str]] = None,
27
- client_tls_cert: Optional[pulumi.Input[str]] = None,
28
- client_tls_key: Optional[pulumi.Input[str]] = None,
29
- connection_timeout: Optional[pulumi.Input[int]] = None,
30
- deny_null_bind: Optional[pulumi.Input[bool]] = None,
31
- description: Optional[pulumi.Input[str]] = None,
32
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
33
- disable_remount: Optional[pulumi.Input[bool]] = None,
34
- discoverdn: Optional[pulumi.Input[bool]] = None,
35
- groupattr: Optional[pulumi.Input[str]] = None,
36
- groupdn: Optional[pulumi.Input[str]] = None,
37
- groupfilter: Optional[pulumi.Input[str]] = None,
38
- insecure_tls: Optional[pulumi.Input[bool]] = None,
39
- local: Optional[pulumi.Input[bool]] = None,
40
- max_page_size: Optional[pulumi.Input[int]] = None,
41
- namespace: Optional[pulumi.Input[str]] = None,
42
- path: Optional[pulumi.Input[str]] = None,
43
- rotation_period: Optional[pulumi.Input[int]] = None,
44
- rotation_schedule: Optional[pulumi.Input[str]] = None,
45
- rotation_window: Optional[pulumi.Input[int]] = None,
46
- starttls: Optional[pulumi.Input[bool]] = None,
47
- tls_max_version: Optional[pulumi.Input[str]] = None,
48
- tls_min_version: Optional[pulumi.Input[str]] = None,
49
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
50
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
51
- token_max_ttl: Optional[pulumi.Input[int]] = None,
52
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
53
- token_num_uses: Optional[pulumi.Input[int]] = None,
54
- token_period: Optional[pulumi.Input[int]] = None,
55
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
56
- token_ttl: Optional[pulumi.Input[int]] = None,
57
- token_type: Optional[pulumi.Input[str]] = None,
58
- upndomain: Optional[pulumi.Input[str]] = None,
59
- use_token_groups: Optional[pulumi.Input[bool]] = None,
60
- userattr: Optional[pulumi.Input[str]] = None,
61
- userdn: Optional[pulumi.Input[str]] = None,
62
- userfilter: Optional[pulumi.Input[str]] = None,
63
- username_as_alias: Optional[pulumi.Input[bool]] = None):
23
+ url: pulumi.Input[builtins.str],
24
+ binddn: Optional[pulumi.Input[builtins.str]] = None,
25
+ bindpass: Optional[pulumi.Input[builtins.str]] = None,
26
+ case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
27
+ certificate: Optional[pulumi.Input[builtins.str]] = None,
28
+ client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
29
+ client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
30
+ connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
31
+ deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
32
+ description: Optional[pulumi.Input[builtins.str]] = None,
33
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
34
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
35
+ discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
36
+ groupattr: Optional[pulumi.Input[builtins.str]] = None,
37
+ groupdn: Optional[pulumi.Input[builtins.str]] = None,
38
+ groupfilter: Optional[pulumi.Input[builtins.str]] = None,
39
+ insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
40
+ local: Optional[pulumi.Input[builtins.bool]] = None,
41
+ max_page_size: Optional[pulumi.Input[builtins.int]] = None,
42
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
43
+ path: Optional[pulumi.Input[builtins.str]] = None,
44
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
45
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
46
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
47
+ starttls: Optional[pulumi.Input[builtins.bool]] = None,
48
+ tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
49
+ tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
50
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
51
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
52
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
53
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
54
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
55
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
56
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
57
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
58
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
59
+ upndomain: Optional[pulumi.Input[builtins.str]] = None,
60
+ use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
61
+ userattr: Optional[pulumi.Input[builtins.str]] = None,
62
+ userdn: Optional[pulumi.Input[builtins.str]] = None,
63
+ userfilter: Optional[pulumi.Input[builtins.str]] = None,
64
+ username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
64
65
  """
65
66
  The set of arguments for constructing a AuthBackend resource.
66
- :param pulumi.Input[str] url: The URL of the LDAP server
67
- :param pulumi.Input[str] binddn: DN of object to bind when performing user search
68
- :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
69
- :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
70
- :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
71
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
72
- :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
73
- :param pulumi.Input[str] description: Description for the LDAP auth backend mount
74
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
75
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
67
+ :param pulumi.Input[builtins.str] url: The URL of the LDAP server
68
+ :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
69
+ :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
70
+ :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
71
+ :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
72
+ :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
73
+ :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
74
+ :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
75
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
76
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
76
77
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
77
- :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
78
- :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
79
- :param pulumi.Input[str] groupdn: Base DN under which to perform group search
80
- :param pulumi.Input[str] groupfilter: Go template used to construct group membership query
81
- :param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
82
- :param pulumi.Input[bool] local: Specifies if the auth method is local only.
83
- :param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
78
+ :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
79
+ :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
80
+ :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
81
+ :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
82
+ :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
83
+ :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
84
+ :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
84
85
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
85
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
86
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
86
87
  The value should not contain leading or trailing forward slashes.
87
88
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
88
89
  *Available only for Vault Enterprise*.
89
- :param pulumi.Input[str] path: Path to mount the LDAP auth backend under
90
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
90
+ :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
91
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
91
92
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
92
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
93
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
93
94
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
94
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
95
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
95
96
  a rotation when a scheduled token rotation occurs. The default rotation window is
96
97
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
97
- :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
98
- :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
99
- :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
100
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
101
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
102
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
103
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
104
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
105
- :param pulumi.Input[int] token_period: Generated Token's Period
106
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
107
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
108
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
109
- :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
110
- :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
111
- :param pulumi.Input[str] userattr: Attribute on user object matching username passed in
112
- :param pulumi.Input[str] userdn: Base DN under which to perform user search
113
- :param pulumi.Input[str] userfilter: LDAP user search filter
114
- :param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
98
+ :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
99
+ :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
100
+ :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
101
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
102
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
103
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
104
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
105
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
106
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
107
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
108
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
109
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
110
+ :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
111
+ :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
112
+ :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
113
+ :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
114
+ :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
115
+ :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
115
116
  """
116
117
  pulumi.set(__self__, "url", url)
117
118
  if binddn is not None:
@@ -199,133 +200,133 @@ class AuthBackendArgs:
199
200
 
200
201
  @property
201
202
  @pulumi.getter
202
- def url(self) -> pulumi.Input[str]:
203
+ def url(self) -> pulumi.Input[builtins.str]:
203
204
  """
204
205
  The URL of the LDAP server
205
206
  """
206
207
  return pulumi.get(self, "url")
207
208
 
208
209
  @url.setter
209
- def url(self, value: pulumi.Input[str]):
210
+ def url(self, value: pulumi.Input[builtins.str]):
210
211
  pulumi.set(self, "url", value)
211
212
 
212
213
  @property
213
214
  @pulumi.getter
214
- def binddn(self) -> Optional[pulumi.Input[str]]:
215
+ def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
215
216
  """
216
217
  DN of object to bind when performing user search
217
218
  """
218
219
  return pulumi.get(self, "binddn")
219
220
 
220
221
  @binddn.setter
221
- def binddn(self, value: Optional[pulumi.Input[str]]):
222
+ def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
222
223
  pulumi.set(self, "binddn", value)
223
224
 
224
225
  @property
225
226
  @pulumi.getter
226
- def bindpass(self) -> Optional[pulumi.Input[str]]:
227
+ def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
227
228
  """
228
229
  Password to use with `binddn` when performing user search
229
230
  """
230
231
  return pulumi.get(self, "bindpass")
231
232
 
232
233
  @bindpass.setter
233
- def bindpass(self, value: Optional[pulumi.Input[str]]):
234
+ def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
234
235
  pulumi.set(self, "bindpass", value)
235
236
 
236
237
  @property
237
238
  @pulumi.getter(name="caseSensitiveNames")
238
- def case_sensitive_names(self) -> Optional[pulumi.Input[bool]]:
239
+ def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
239
240
  """
240
241
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
241
242
  """
242
243
  return pulumi.get(self, "case_sensitive_names")
243
244
 
244
245
  @case_sensitive_names.setter
245
- def case_sensitive_names(self, value: Optional[pulumi.Input[bool]]):
246
+ def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
246
247
  pulumi.set(self, "case_sensitive_names", value)
247
248
 
248
249
  @property
249
250
  @pulumi.getter
250
- def certificate(self) -> Optional[pulumi.Input[str]]:
251
+ def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
251
252
  """
252
253
  Trusted CA to validate TLS certificate
253
254
  """
254
255
  return pulumi.get(self, "certificate")
255
256
 
256
257
  @certificate.setter
257
- def certificate(self, value: Optional[pulumi.Input[str]]):
258
+ def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
258
259
  pulumi.set(self, "certificate", value)
259
260
 
260
261
  @property
261
262
  @pulumi.getter(name="clientTlsCert")
262
- def client_tls_cert(self) -> Optional[pulumi.Input[str]]:
263
+ def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
263
264
  return pulumi.get(self, "client_tls_cert")
264
265
 
265
266
  @client_tls_cert.setter
266
- def client_tls_cert(self, value: Optional[pulumi.Input[str]]):
267
+ def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
267
268
  pulumi.set(self, "client_tls_cert", value)
268
269
 
269
270
  @property
270
271
  @pulumi.getter(name="clientTlsKey")
271
- def client_tls_key(self) -> Optional[pulumi.Input[str]]:
272
+ def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
272
273
  return pulumi.get(self, "client_tls_key")
273
274
 
274
275
  @client_tls_key.setter
275
- def client_tls_key(self, value: Optional[pulumi.Input[str]]):
276
+ def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
276
277
  pulumi.set(self, "client_tls_key", value)
277
278
 
278
279
  @property
279
280
  @pulumi.getter(name="connectionTimeout")
280
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
281
+ def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
281
282
  """
282
283
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
283
284
  """
284
285
  return pulumi.get(self, "connection_timeout")
285
286
 
286
287
  @connection_timeout.setter
287
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
288
+ def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
288
289
  pulumi.set(self, "connection_timeout", value)
289
290
 
290
291
  @property
291
292
  @pulumi.getter(name="denyNullBind")
292
- def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
293
+ def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
293
294
  """
294
295
  Prevents users from bypassing authentication when providing an empty password.
295
296
  """
296
297
  return pulumi.get(self, "deny_null_bind")
297
298
 
298
299
  @deny_null_bind.setter
299
- def deny_null_bind(self, value: Optional[pulumi.Input[bool]]):
300
+ def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
300
301
  pulumi.set(self, "deny_null_bind", value)
301
302
 
302
303
  @property
303
304
  @pulumi.getter
304
- def description(self) -> Optional[pulumi.Input[str]]:
305
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
305
306
  """
306
307
  Description for the LDAP auth backend mount
307
308
  """
308
309
  return pulumi.get(self, "description")
309
310
 
310
311
  @description.setter
311
- def description(self, value: Optional[pulumi.Input[str]]):
312
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
312
313
  pulumi.set(self, "description", value)
313
314
 
314
315
  @property
315
316
  @pulumi.getter(name="disableAutomatedRotation")
316
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
317
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
317
318
  """
318
319
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
319
320
  """
320
321
  return pulumi.get(self, "disable_automated_rotation")
321
322
 
322
323
  @disable_automated_rotation.setter
323
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
324
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
324
325
  pulumi.set(self, "disable_automated_rotation", value)
325
326
 
326
327
  @property
327
328
  @pulumi.getter(name="disableRemount")
328
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
329
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
329
330
  """
330
331
  If set, opts out of mount migration on path updates.
331
332
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -333,84 +334,84 @@ class AuthBackendArgs:
333
334
  return pulumi.get(self, "disable_remount")
334
335
 
335
336
  @disable_remount.setter
336
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
337
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
337
338
  pulumi.set(self, "disable_remount", value)
338
339
 
339
340
  @property
340
341
  @pulumi.getter
341
- def discoverdn(self) -> Optional[pulumi.Input[bool]]:
342
+ def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
342
343
  """
343
344
  Use anonymous bind to discover the bind DN of a user.
344
345
  """
345
346
  return pulumi.get(self, "discoverdn")
346
347
 
347
348
  @discoverdn.setter
348
- def discoverdn(self, value: Optional[pulumi.Input[bool]]):
349
+ def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
349
350
  pulumi.set(self, "discoverdn", value)
350
351
 
351
352
  @property
352
353
  @pulumi.getter
353
- def groupattr(self) -> Optional[pulumi.Input[str]]:
354
+ def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
354
355
  """
355
356
  LDAP attribute to follow on objects returned by groupfilter
356
357
  """
357
358
  return pulumi.get(self, "groupattr")
358
359
 
359
360
  @groupattr.setter
360
- def groupattr(self, value: Optional[pulumi.Input[str]]):
361
+ def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
361
362
  pulumi.set(self, "groupattr", value)
362
363
 
363
364
  @property
364
365
  @pulumi.getter
365
- def groupdn(self) -> Optional[pulumi.Input[str]]:
366
+ def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
366
367
  """
367
368
  Base DN under which to perform group search
368
369
  """
369
370
  return pulumi.get(self, "groupdn")
370
371
 
371
372
  @groupdn.setter
372
- def groupdn(self, value: Optional[pulumi.Input[str]]):
373
+ def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
373
374
  pulumi.set(self, "groupdn", value)
374
375
 
375
376
  @property
376
377
  @pulumi.getter
377
- def groupfilter(self) -> Optional[pulumi.Input[str]]:
378
+ def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
378
379
  """
379
380
  Go template used to construct group membership query
380
381
  """
381
382
  return pulumi.get(self, "groupfilter")
382
383
 
383
384
  @groupfilter.setter
384
- def groupfilter(self, value: Optional[pulumi.Input[str]]):
385
+ def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
385
386
  pulumi.set(self, "groupfilter", value)
386
387
 
387
388
  @property
388
389
  @pulumi.getter(name="insecureTls")
389
- def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
390
+ def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
390
391
  """
391
392
  Control whether or TLS certificates must be validated
392
393
  """
393
394
  return pulumi.get(self, "insecure_tls")
394
395
 
395
396
  @insecure_tls.setter
396
- def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
397
+ def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
397
398
  pulumi.set(self, "insecure_tls", value)
398
399
 
399
400
  @property
400
401
  @pulumi.getter
401
- def local(self) -> Optional[pulumi.Input[bool]]:
402
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
402
403
  """
403
404
  Specifies if the auth method is local only.
404
405
  """
405
406
  return pulumi.get(self, "local")
406
407
 
407
408
  @local.setter
408
- def local(self, value: Optional[pulumi.Input[bool]]):
409
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
409
410
  pulumi.set(self, "local", value)
410
411
 
411
412
  @property
412
413
  @pulumi.getter(name="maxPageSize")
413
- def max_page_size(self) -> Optional[pulumi.Input[int]]:
414
+ def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
414
415
  """
415
416
  Sets the max page size for LDAP lookups, by default it's set to -1.
416
417
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
@@ -418,12 +419,12 @@ class AuthBackendArgs:
418
419
  return pulumi.get(self, "max_page_size")
419
420
 
420
421
  @max_page_size.setter
421
- def max_page_size(self, value: Optional[pulumi.Input[int]]):
422
+ def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
422
423
  pulumi.set(self, "max_page_size", value)
423
424
 
424
425
  @property
425
426
  @pulumi.getter
426
- def namespace(self) -> Optional[pulumi.Input[str]]:
427
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
427
428
  """
428
429
  The namespace to provision the resource in.
429
430
  The value should not contain leading or trailing forward slashes.
@@ -433,24 +434,24 @@ class AuthBackendArgs:
433
434
  return pulumi.get(self, "namespace")
434
435
 
435
436
  @namespace.setter
436
- def namespace(self, value: Optional[pulumi.Input[str]]):
437
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
437
438
  pulumi.set(self, "namespace", value)
438
439
 
439
440
  @property
440
441
  @pulumi.getter
441
- def path(self) -> Optional[pulumi.Input[str]]:
442
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
442
443
  """
443
444
  Path to mount the LDAP auth backend under
444
445
  """
445
446
  return pulumi.get(self, "path")
446
447
 
447
448
  @path.setter
448
- def path(self, value: Optional[pulumi.Input[str]]):
449
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
449
450
  pulumi.set(self, "path", value)
450
451
 
451
452
  @property
452
453
  @pulumi.getter(name="rotationPeriod")
453
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
454
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
454
455
  """
455
456
  The amount of time in seconds Vault should wait before rotating the root credential.
456
457
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -458,12 +459,12 @@ class AuthBackendArgs:
458
459
  return pulumi.get(self, "rotation_period")
459
460
 
460
461
  @rotation_period.setter
461
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
462
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
462
463
  pulumi.set(self, "rotation_period", value)
463
464
 
464
465
  @property
465
466
  @pulumi.getter(name="rotationSchedule")
466
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
467
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
467
468
  """
468
469
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
469
470
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -471,12 +472,12 @@ class AuthBackendArgs:
471
472
  return pulumi.get(self, "rotation_schedule")
472
473
 
473
474
  @rotation_schedule.setter
474
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
475
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
475
476
  pulumi.set(self, "rotation_schedule", value)
476
477
 
477
478
  @property
478
479
  @pulumi.getter(name="rotationWindow")
479
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
480
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
480
481
  """
481
482
  The maximum amount of time in seconds allowed to complete
482
483
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -485,324 +486,324 @@ class AuthBackendArgs:
485
486
  return pulumi.get(self, "rotation_window")
486
487
 
487
488
  @rotation_window.setter
488
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
489
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
489
490
  pulumi.set(self, "rotation_window", value)
490
491
 
491
492
  @property
492
493
  @pulumi.getter
493
- def starttls(self) -> Optional[pulumi.Input[bool]]:
494
+ def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
494
495
  """
495
496
  Control use of TLS when conecting to LDAP
496
497
  """
497
498
  return pulumi.get(self, "starttls")
498
499
 
499
500
  @starttls.setter
500
- def starttls(self, value: Optional[pulumi.Input[bool]]):
501
+ def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
501
502
  pulumi.set(self, "starttls", value)
502
503
 
503
504
  @property
504
505
  @pulumi.getter(name="tlsMaxVersion")
505
- def tls_max_version(self) -> Optional[pulumi.Input[str]]:
506
+ def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
506
507
  """
507
508
  Maximum acceptable version of TLS
508
509
  """
509
510
  return pulumi.get(self, "tls_max_version")
510
511
 
511
512
  @tls_max_version.setter
512
- def tls_max_version(self, value: Optional[pulumi.Input[str]]):
513
+ def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
513
514
  pulumi.set(self, "tls_max_version", value)
514
515
 
515
516
  @property
516
517
  @pulumi.getter(name="tlsMinVersion")
517
- def tls_min_version(self) -> Optional[pulumi.Input[str]]:
518
+ def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
518
519
  """
519
520
  Minimum acceptable version of TLS
520
521
  """
521
522
  return pulumi.get(self, "tls_min_version")
522
523
 
523
524
  @tls_min_version.setter
524
- def tls_min_version(self, value: Optional[pulumi.Input[str]]):
525
+ def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
525
526
  pulumi.set(self, "tls_min_version", value)
526
527
 
527
528
  @property
528
529
  @pulumi.getter(name="tokenBoundCidrs")
529
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
530
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
530
531
  """
531
532
  Specifies the blocks of IP addresses which are allowed to use the generated token
532
533
  """
533
534
  return pulumi.get(self, "token_bound_cidrs")
534
535
 
535
536
  @token_bound_cidrs.setter
536
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
537
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
537
538
  pulumi.set(self, "token_bound_cidrs", value)
538
539
 
539
540
  @property
540
541
  @pulumi.getter(name="tokenExplicitMaxTtl")
541
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
542
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
542
543
  """
543
544
  Generated Token's Explicit Maximum TTL in seconds
544
545
  """
545
546
  return pulumi.get(self, "token_explicit_max_ttl")
546
547
 
547
548
  @token_explicit_max_ttl.setter
548
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
549
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
549
550
  pulumi.set(self, "token_explicit_max_ttl", value)
550
551
 
551
552
  @property
552
553
  @pulumi.getter(name="tokenMaxTtl")
553
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
554
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
554
555
  """
555
556
  The maximum lifetime of the generated token
556
557
  """
557
558
  return pulumi.get(self, "token_max_ttl")
558
559
 
559
560
  @token_max_ttl.setter
560
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
561
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
561
562
  pulumi.set(self, "token_max_ttl", value)
562
563
 
563
564
  @property
564
565
  @pulumi.getter(name="tokenNoDefaultPolicy")
565
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
566
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
566
567
  """
567
568
  If true, the 'default' policy will not automatically be added to generated tokens
568
569
  """
569
570
  return pulumi.get(self, "token_no_default_policy")
570
571
 
571
572
  @token_no_default_policy.setter
572
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
573
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
573
574
  pulumi.set(self, "token_no_default_policy", value)
574
575
 
575
576
  @property
576
577
  @pulumi.getter(name="tokenNumUses")
577
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
578
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
578
579
  """
579
580
  The maximum number of times a token may be used, a value of zero means unlimited
580
581
  """
581
582
  return pulumi.get(self, "token_num_uses")
582
583
 
583
584
  @token_num_uses.setter
584
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
585
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
585
586
  pulumi.set(self, "token_num_uses", value)
586
587
 
587
588
  @property
588
589
  @pulumi.getter(name="tokenPeriod")
589
- def token_period(self) -> Optional[pulumi.Input[int]]:
590
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
590
591
  """
591
592
  Generated Token's Period
592
593
  """
593
594
  return pulumi.get(self, "token_period")
594
595
 
595
596
  @token_period.setter
596
- def token_period(self, value: Optional[pulumi.Input[int]]):
597
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
597
598
  pulumi.set(self, "token_period", value)
598
599
 
599
600
  @property
600
601
  @pulumi.getter(name="tokenPolicies")
601
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
602
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
602
603
  """
603
604
  Generated Token's Policies
604
605
  """
605
606
  return pulumi.get(self, "token_policies")
606
607
 
607
608
  @token_policies.setter
608
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
609
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
609
610
  pulumi.set(self, "token_policies", value)
610
611
 
611
612
  @property
612
613
  @pulumi.getter(name="tokenTtl")
613
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
614
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
614
615
  """
615
616
  The initial ttl of the token to generate in seconds
616
617
  """
617
618
  return pulumi.get(self, "token_ttl")
618
619
 
619
620
  @token_ttl.setter
620
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
621
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
621
622
  pulumi.set(self, "token_ttl", value)
622
623
 
623
624
  @property
624
625
  @pulumi.getter(name="tokenType")
625
- def token_type(self) -> Optional[pulumi.Input[str]]:
626
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
626
627
  """
627
628
  The type of token to generate, service or batch
628
629
  """
629
630
  return pulumi.get(self, "token_type")
630
631
 
631
632
  @token_type.setter
632
- def token_type(self, value: Optional[pulumi.Input[str]]):
633
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
633
634
  pulumi.set(self, "token_type", value)
634
635
 
635
636
  @property
636
637
  @pulumi.getter
637
- def upndomain(self) -> Optional[pulumi.Input[str]]:
638
+ def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
638
639
  """
639
640
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
640
641
  """
641
642
  return pulumi.get(self, "upndomain")
642
643
 
643
644
  @upndomain.setter
644
- def upndomain(self, value: Optional[pulumi.Input[str]]):
645
+ def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
645
646
  pulumi.set(self, "upndomain", value)
646
647
 
647
648
  @property
648
649
  @pulumi.getter(name="useTokenGroups")
649
- def use_token_groups(self) -> Optional[pulumi.Input[bool]]:
650
+ def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
650
651
  """
651
652
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
652
653
  """
653
654
  return pulumi.get(self, "use_token_groups")
654
655
 
655
656
  @use_token_groups.setter
656
- def use_token_groups(self, value: Optional[pulumi.Input[bool]]):
657
+ def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
657
658
  pulumi.set(self, "use_token_groups", value)
658
659
 
659
660
  @property
660
661
  @pulumi.getter
661
- def userattr(self) -> Optional[pulumi.Input[str]]:
662
+ def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
662
663
  """
663
664
  Attribute on user object matching username passed in
664
665
  """
665
666
  return pulumi.get(self, "userattr")
666
667
 
667
668
  @userattr.setter
668
- def userattr(self, value: Optional[pulumi.Input[str]]):
669
+ def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
669
670
  pulumi.set(self, "userattr", value)
670
671
 
671
672
  @property
672
673
  @pulumi.getter
673
- def userdn(self) -> Optional[pulumi.Input[str]]:
674
+ def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
674
675
  """
675
676
  Base DN under which to perform user search
676
677
  """
677
678
  return pulumi.get(self, "userdn")
678
679
 
679
680
  @userdn.setter
680
- def userdn(self, value: Optional[pulumi.Input[str]]):
681
+ def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
681
682
  pulumi.set(self, "userdn", value)
682
683
 
683
684
  @property
684
685
  @pulumi.getter
685
- def userfilter(self) -> Optional[pulumi.Input[str]]:
686
+ def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
686
687
  """
687
688
  LDAP user search filter
688
689
  """
689
690
  return pulumi.get(self, "userfilter")
690
691
 
691
692
  @userfilter.setter
692
- def userfilter(self, value: Optional[pulumi.Input[str]]):
693
+ def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
693
694
  pulumi.set(self, "userfilter", value)
694
695
 
695
696
  @property
696
697
  @pulumi.getter(name="usernameAsAlias")
697
- def username_as_alias(self) -> Optional[pulumi.Input[bool]]:
698
+ def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
698
699
  """
699
700
  Force the auth method to use the username passed by the user as the alias name.
700
701
  """
701
702
  return pulumi.get(self, "username_as_alias")
702
703
 
703
704
  @username_as_alias.setter
704
- def username_as_alias(self, value: Optional[pulumi.Input[bool]]):
705
+ def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
705
706
  pulumi.set(self, "username_as_alias", value)
706
707
 
707
708
 
708
709
  @pulumi.input_type
709
710
  class _AuthBackendState:
710
711
  def __init__(__self__, *,
711
- accessor: Optional[pulumi.Input[str]] = None,
712
- binddn: Optional[pulumi.Input[str]] = None,
713
- bindpass: Optional[pulumi.Input[str]] = None,
714
- case_sensitive_names: Optional[pulumi.Input[bool]] = None,
715
- certificate: Optional[pulumi.Input[str]] = None,
716
- client_tls_cert: Optional[pulumi.Input[str]] = None,
717
- client_tls_key: Optional[pulumi.Input[str]] = None,
718
- connection_timeout: Optional[pulumi.Input[int]] = None,
719
- deny_null_bind: Optional[pulumi.Input[bool]] = None,
720
- description: Optional[pulumi.Input[str]] = None,
721
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
722
- disable_remount: Optional[pulumi.Input[bool]] = None,
723
- discoverdn: Optional[pulumi.Input[bool]] = None,
724
- groupattr: Optional[pulumi.Input[str]] = None,
725
- groupdn: Optional[pulumi.Input[str]] = None,
726
- groupfilter: Optional[pulumi.Input[str]] = None,
727
- insecure_tls: Optional[pulumi.Input[bool]] = None,
728
- local: Optional[pulumi.Input[bool]] = None,
729
- max_page_size: Optional[pulumi.Input[int]] = None,
730
- namespace: Optional[pulumi.Input[str]] = None,
731
- path: Optional[pulumi.Input[str]] = None,
732
- rotation_period: Optional[pulumi.Input[int]] = None,
733
- rotation_schedule: Optional[pulumi.Input[str]] = None,
734
- rotation_window: Optional[pulumi.Input[int]] = None,
735
- starttls: Optional[pulumi.Input[bool]] = None,
736
- tls_max_version: Optional[pulumi.Input[str]] = None,
737
- tls_min_version: Optional[pulumi.Input[str]] = None,
738
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
739
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
740
- token_max_ttl: Optional[pulumi.Input[int]] = None,
741
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
742
- token_num_uses: Optional[pulumi.Input[int]] = None,
743
- token_period: Optional[pulumi.Input[int]] = None,
744
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
745
- token_ttl: Optional[pulumi.Input[int]] = None,
746
- token_type: Optional[pulumi.Input[str]] = None,
747
- upndomain: Optional[pulumi.Input[str]] = None,
748
- url: Optional[pulumi.Input[str]] = None,
749
- use_token_groups: Optional[pulumi.Input[bool]] = None,
750
- userattr: Optional[pulumi.Input[str]] = None,
751
- userdn: Optional[pulumi.Input[str]] = None,
752
- userfilter: Optional[pulumi.Input[str]] = None,
753
- username_as_alias: Optional[pulumi.Input[bool]] = None):
712
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
713
+ binddn: Optional[pulumi.Input[builtins.str]] = None,
714
+ bindpass: Optional[pulumi.Input[builtins.str]] = None,
715
+ case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
716
+ certificate: Optional[pulumi.Input[builtins.str]] = None,
717
+ client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
718
+ client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
719
+ connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
720
+ deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
721
+ description: Optional[pulumi.Input[builtins.str]] = None,
722
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
723
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
724
+ discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
725
+ groupattr: Optional[pulumi.Input[builtins.str]] = None,
726
+ groupdn: Optional[pulumi.Input[builtins.str]] = None,
727
+ groupfilter: Optional[pulumi.Input[builtins.str]] = None,
728
+ insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
729
+ local: Optional[pulumi.Input[builtins.bool]] = None,
730
+ max_page_size: Optional[pulumi.Input[builtins.int]] = None,
731
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
732
+ path: Optional[pulumi.Input[builtins.str]] = None,
733
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
734
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
735
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
736
+ starttls: Optional[pulumi.Input[builtins.bool]] = None,
737
+ tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
738
+ tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
739
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
740
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
741
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
742
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
743
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
744
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
745
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
746
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
747
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
748
+ upndomain: Optional[pulumi.Input[builtins.str]] = None,
749
+ url: Optional[pulumi.Input[builtins.str]] = None,
750
+ use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
751
+ userattr: Optional[pulumi.Input[builtins.str]] = None,
752
+ userdn: Optional[pulumi.Input[builtins.str]] = None,
753
+ userfilter: Optional[pulumi.Input[builtins.str]] = None,
754
+ username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
754
755
  """
755
756
  Input properties used for looking up and filtering AuthBackend resources.
756
- :param pulumi.Input[str] accessor: The accessor for this auth mount.
757
- :param pulumi.Input[str] binddn: DN of object to bind when performing user search
758
- :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
759
- :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
760
- :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
761
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
762
- :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
763
- :param pulumi.Input[str] description: Description for the LDAP auth backend mount
764
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
765
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
757
+ :param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
758
+ :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
759
+ :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
760
+ :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
761
+ :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
762
+ :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
763
+ :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
764
+ :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
765
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
766
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
766
767
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
767
- :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
768
- :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
769
- :param pulumi.Input[str] groupdn: Base DN under which to perform group search
770
- :param pulumi.Input[str] groupfilter: Go template used to construct group membership query
771
- :param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
772
- :param pulumi.Input[bool] local: Specifies if the auth method is local only.
773
- :param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
768
+ :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
769
+ :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
770
+ :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
771
+ :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
772
+ :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
773
+ :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
774
+ :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
774
775
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
775
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
776
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
776
777
  The value should not contain leading or trailing forward slashes.
777
778
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
778
779
  *Available only for Vault Enterprise*.
779
- :param pulumi.Input[str] path: Path to mount the LDAP auth backend under
780
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
780
+ :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
781
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
781
782
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
782
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
783
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
783
784
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
784
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
785
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
785
786
  a rotation when a scheduled token rotation occurs. The default rotation window is
786
787
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
787
- :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
788
- :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
789
- :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
790
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
791
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
792
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
793
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
794
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
795
- :param pulumi.Input[int] token_period: Generated Token's Period
796
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
797
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
798
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
799
- :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
800
- :param pulumi.Input[str] url: The URL of the LDAP server
801
- :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
802
- :param pulumi.Input[str] userattr: Attribute on user object matching username passed in
803
- :param pulumi.Input[str] userdn: Base DN under which to perform user search
804
- :param pulumi.Input[str] userfilter: LDAP user search filter
805
- :param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
788
+ :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
789
+ :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
790
+ :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
791
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
792
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
793
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
794
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
795
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
796
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
797
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
798
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
799
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
800
+ :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
801
+ :param pulumi.Input[builtins.str] url: The URL of the LDAP server
802
+ :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
803
+ :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
804
+ :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
805
+ :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
806
+ :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
806
807
  """
807
808
  if accessor is not None:
808
809
  pulumi.set(__self__, "accessor", accessor)
@@ -893,133 +894,133 @@ class _AuthBackendState:
893
894
 
894
895
  @property
895
896
  @pulumi.getter
896
- def accessor(self) -> Optional[pulumi.Input[str]]:
897
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
897
898
  """
898
899
  The accessor for this auth mount.
899
900
  """
900
901
  return pulumi.get(self, "accessor")
901
902
 
902
903
  @accessor.setter
903
- def accessor(self, value: Optional[pulumi.Input[str]]):
904
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
904
905
  pulumi.set(self, "accessor", value)
905
906
 
906
907
  @property
907
908
  @pulumi.getter
908
- def binddn(self) -> Optional[pulumi.Input[str]]:
909
+ def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
909
910
  """
910
911
  DN of object to bind when performing user search
911
912
  """
912
913
  return pulumi.get(self, "binddn")
913
914
 
914
915
  @binddn.setter
915
- def binddn(self, value: Optional[pulumi.Input[str]]):
916
+ def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
916
917
  pulumi.set(self, "binddn", value)
917
918
 
918
919
  @property
919
920
  @pulumi.getter
920
- def bindpass(self) -> Optional[pulumi.Input[str]]:
921
+ def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
921
922
  """
922
923
  Password to use with `binddn` when performing user search
923
924
  """
924
925
  return pulumi.get(self, "bindpass")
925
926
 
926
927
  @bindpass.setter
927
- def bindpass(self, value: Optional[pulumi.Input[str]]):
928
+ def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
928
929
  pulumi.set(self, "bindpass", value)
929
930
 
930
931
  @property
931
932
  @pulumi.getter(name="caseSensitiveNames")
932
- def case_sensitive_names(self) -> Optional[pulumi.Input[bool]]:
933
+ def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
933
934
  """
934
935
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
935
936
  """
936
937
  return pulumi.get(self, "case_sensitive_names")
937
938
 
938
939
  @case_sensitive_names.setter
939
- def case_sensitive_names(self, value: Optional[pulumi.Input[bool]]):
940
+ def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
940
941
  pulumi.set(self, "case_sensitive_names", value)
941
942
 
942
943
  @property
943
944
  @pulumi.getter
944
- def certificate(self) -> Optional[pulumi.Input[str]]:
945
+ def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
945
946
  """
946
947
  Trusted CA to validate TLS certificate
947
948
  """
948
949
  return pulumi.get(self, "certificate")
949
950
 
950
951
  @certificate.setter
951
- def certificate(self, value: Optional[pulumi.Input[str]]):
952
+ def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
952
953
  pulumi.set(self, "certificate", value)
953
954
 
954
955
  @property
955
956
  @pulumi.getter(name="clientTlsCert")
956
- def client_tls_cert(self) -> Optional[pulumi.Input[str]]:
957
+ def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
957
958
  return pulumi.get(self, "client_tls_cert")
958
959
 
959
960
  @client_tls_cert.setter
960
- def client_tls_cert(self, value: Optional[pulumi.Input[str]]):
961
+ def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
961
962
  pulumi.set(self, "client_tls_cert", value)
962
963
 
963
964
  @property
964
965
  @pulumi.getter(name="clientTlsKey")
965
- def client_tls_key(self) -> Optional[pulumi.Input[str]]:
966
+ def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
966
967
  return pulumi.get(self, "client_tls_key")
967
968
 
968
969
  @client_tls_key.setter
969
- def client_tls_key(self, value: Optional[pulumi.Input[str]]):
970
+ def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
970
971
  pulumi.set(self, "client_tls_key", value)
971
972
 
972
973
  @property
973
974
  @pulumi.getter(name="connectionTimeout")
974
- def connection_timeout(self) -> Optional[pulumi.Input[int]]:
975
+ def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
975
976
  """
976
977
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
977
978
  """
978
979
  return pulumi.get(self, "connection_timeout")
979
980
 
980
981
  @connection_timeout.setter
981
- def connection_timeout(self, value: Optional[pulumi.Input[int]]):
982
+ def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
982
983
  pulumi.set(self, "connection_timeout", value)
983
984
 
984
985
  @property
985
986
  @pulumi.getter(name="denyNullBind")
986
- def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
987
+ def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
987
988
  """
988
989
  Prevents users from bypassing authentication when providing an empty password.
989
990
  """
990
991
  return pulumi.get(self, "deny_null_bind")
991
992
 
992
993
  @deny_null_bind.setter
993
- def deny_null_bind(self, value: Optional[pulumi.Input[bool]]):
994
+ def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
994
995
  pulumi.set(self, "deny_null_bind", value)
995
996
 
996
997
  @property
997
998
  @pulumi.getter
998
- def description(self) -> Optional[pulumi.Input[str]]:
999
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
999
1000
  """
1000
1001
  Description for the LDAP auth backend mount
1001
1002
  """
1002
1003
  return pulumi.get(self, "description")
1003
1004
 
1004
1005
  @description.setter
1005
- def description(self, value: Optional[pulumi.Input[str]]):
1006
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
1006
1007
  pulumi.set(self, "description", value)
1007
1008
 
1008
1009
  @property
1009
1010
  @pulumi.getter(name="disableAutomatedRotation")
1010
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
1011
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1011
1012
  """
1012
1013
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1013
1014
  """
1014
1015
  return pulumi.get(self, "disable_automated_rotation")
1015
1016
 
1016
1017
  @disable_automated_rotation.setter
1017
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
1018
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1018
1019
  pulumi.set(self, "disable_automated_rotation", value)
1019
1020
 
1020
1021
  @property
1021
1022
  @pulumi.getter(name="disableRemount")
1022
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
1023
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
1023
1024
  """
1024
1025
  If set, opts out of mount migration on path updates.
1025
1026
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -1027,84 +1028,84 @@ class _AuthBackendState:
1027
1028
  return pulumi.get(self, "disable_remount")
1028
1029
 
1029
1030
  @disable_remount.setter
1030
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
1031
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
1031
1032
  pulumi.set(self, "disable_remount", value)
1032
1033
 
1033
1034
  @property
1034
1035
  @pulumi.getter
1035
- def discoverdn(self) -> Optional[pulumi.Input[bool]]:
1036
+ def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
1036
1037
  """
1037
1038
  Use anonymous bind to discover the bind DN of a user.
1038
1039
  """
1039
1040
  return pulumi.get(self, "discoverdn")
1040
1041
 
1041
1042
  @discoverdn.setter
1042
- def discoverdn(self, value: Optional[pulumi.Input[bool]]):
1043
+ def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
1043
1044
  pulumi.set(self, "discoverdn", value)
1044
1045
 
1045
1046
  @property
1046
1047
  @pulumi.getter
1047
- def groupattr(self) -> Optional[pulumi.Input[str]]:
1048
+ def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
1048
1049
  """
1049
1050
  LDAP attribute to follow on objects returned by groupfilter
1050
1051
  """
1051
1052
  return pulumi.get(self, "groupattr")
1052
1053
 
1053
1054
  @groupattr.setter
1054
- def groupattr(self, value: Optional[pulumi.Input[str]]):
1055
+ def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
1055
1056
  pulumi.set(self, "groupattr", value)
1056
1057
 
1057
1058
  @property
1058
1059
  @pulumi.getter
1059
- def groupdn(self) -> Optional[pulumi.Input[str]]:
1060
+ def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
1060
1061
  """
1061
1062
  Base DN under which to perform group search
1062
1063
  """
1063
1064
  return pulumi.get(self, "groupdn")
1064
1065
 
1065
1066
  @groupdn.setter
1066
- def groupdn(self, value: Optional[pulumi.Input[str]]):
1067
+ def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
1067
1068
  pulumi.set(self, "groupdn", value)
1068
1069
 
1069
1070
  @property
1070
1071
  @pulumi.getter
1071
- def groupfilter(self) -> Optional[pulumi.Input[str]]:
1072
+ def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
1072
1073
  """
1073
1074
  Go template used to construct group membership query
1074
1075
  """
1075
1076
  return pulumi.get(self, "groupfilter")
1076
1077
 
1077
1078
  @groupfilter.setter
1078
- def groupfilter(self, value: Optional[pulumi.Input[str]]):
1079
+ def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
1079
1080
  pulumi.set(self, "groupfilter", value)
1080
1081
 
1081
1082
  @property
1082
1083
  @pulumi.getter(name="insecureTls")
1083
- def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
1084
+ def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
1084
1085
  """
1085
1086
  Control whether or TLS certificates must be validated
1086
1087
  """
1087
1088
  return pulumi.get(self, "insecure_tls")
1088
1089
 
1089
1090
  @insecure_tls.setter
1090
- def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
1091
+ def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
1091
1092
  pulumi.set(self, "insecure_tls", value)
1092
1093
 
1093
1094
  @property
1094
1095
  @pulumi.getter
1095
- def local(self) -> Optional[pulumi.Input[bool]]:
1096
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1096
1097
  """
1097
1098
  Specifies if the auth method is local only.
1098
1099
  """
1099
1100
  return pulumi.get(self, "local")
1100
1101
 
1101
1102
  @local.setter
1102
- def local(self, value: Optional[pulumi.Input[bool]]):
1103
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1103
1104
  pulumi.set(self, "local", value)
1104
1105
 
1105
1106
  @property
1106
1107
  @pulumi.getter(name="maxPageSize")
1107
- def max_page_size(self) -> Optional[pulumi.Input[int]]:
1108
+ def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
1108
1109
  """
1109
1110
  Sets the max page size for LDAP lookups, by default it's set to -1.
1110
1111
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
@@ -1112,12 +1113,12 @@ class _AuthBackendState:
1112
1113
  return pulumi.get(self, "max_page_size")
1113
1114
 
1114
1115
  @max_page_size.setter
1115
- def max_page_size(self, value: Optional[pulumi.Input[int]]):
1116
+ def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
1116
1117
  pulumi.set(self, "max_page_size", value)
1117
1118
 
1118
1119
  @property
1119
1120
  @pulumi.getter
1120
- def namespace(self) -> Optional[pulumi.Input[str]]:
1121
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1121
1122
  """
1122
1123
  The namespace to provision the resource in.
1123
1124
  The value should not contain leading or trailing forward slashes.
@@ -1127,24 +1128,24 @@ class _AuthBackendState:
1127
1128
  return pulumi.get(self, "namespace")
1128
1129
 
1129
1130
  @namespace.setter
1130
- def namespace(self, value: Optional[pulumi.Input[str]]):
1131
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1131
1132
  pulumi.set(self, "namespace", value)
1132
1133
 
1133
1134
  @property
1134
1135
  @pulumi.getter
1135
- def path(self) -> Optional[pulumi.Input[str]]:
1136
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
1136
1137
  """
1137
1138
  Path to mount the LDAP auth backend under
1138
1139
  """
1139
1140
  return pulumi.get(self, "path")
1140
1141
 
1141
1142
  @path.setter
1142
- def path(self, value: Optional[pulumi.Input[str]]):
1143
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
1143
1144
  pulumi.set(self, "path", value)
1144
1145
 
1145
1146
  @property
1146
1147
  @pulumi.getter(name="rotationPeriod")
1147
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
1148
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
1148
1149
  """
1149
1150
  The amount of time in seconds Vault should wait before rotating the root credential.
1150
1151
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1152,12 +1153,12 @@ class _AuthBackendState:
1152
1153
  return pulumi.get(self, "rotation_period")
1153
1154
 
1154
1155
  @rotation_period.setter
1155
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
1156
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
1156
1157
  pulumi.set(self, "rotation_period", value)
1157
1158
 
1158
1159
  @property
1159
1160
  @pulumi.getter(name="rotationSchedule")
1160
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
1161
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
1161
1162
  """
1162
1163
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1163
1164
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -1165,12 +1166,12 @@ class _AuthBackendState:
1165
1166
  return pulumi.get(self, "rotation_schedule")
1166
1167
 
1167
1168
  @rotation_schedule.setter
1168
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
1169
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
1169
1170
  pulumi.set(self, "rotation_schedule", value)
1170
1171
 
1171
1172
  @property
1172
1173
  @pulumi.getter(name="rotationWindow")
1173
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
1174
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1174
1175
  """
1175
1176
  The maximum amount of time in seconds allowed to complete
1176
1177
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1179,235 +1180,235 @@ class _AuthBackendState:
1179
1180
  return pulumi.get(self, "rotation_window")
1180
1181
 
1181
1182
  @rotation_window.setter
1182
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
1183
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1183
1184
  pulumi.set(self, "rotation_window", value)
1184
1185
 
1185
1186
  @property
1186
1187
  @pulumi.getter
1187
- def starttls(self) -> Optional[pulumi.Input[bool]]:
1188
+ def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
1188
1189
  """
1189
1190
  Control use of TLS when conecting to LDAP
1190
1191
  """
1191
1192
  return pulumi.get(self, "starttls")
1192
1193
 
1193
1194
  @starttls.setter
1194
- def starttls(self, value: Optional[pulumi.Input[bool]]):
1195
+ def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
1195
1196
  pulumi.set(self, "starttls", value)
1196
1197
 
1197
1198
  @property
1198
1199
  @pulumi.getter(name="tlsMaxVersion")
1199
- def tls_max_version(self) -> Optional[pulumi.Input[str]]:
1200
+ def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
1200
1201
  """
1201
1202
  Maximum acceptable version of TLS
1202
1203
  """
1203
1204
  return pulumi.get(self, "tls_max_version")
1204
1205
 
1205
1206
  @tls_max_version.setter
1206
- def tls_max_version(self, value: Optional[pulumi.Input[str]]):
1207
+ def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
1207
1208
  pulumi.set(self, "tls_max_version", value)
1208
1209
 
1209
1210
  @property
1210
1211
  @pulumi.getter(name="tlsMinVersion")
1211
- def tls_min_version(self) -> Optional[pulumi.Input[str]]:
1212
+ def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
1212
1213
  """
1213
1214
  Minimum acceptable version of TLS
1214
1215
  """
1215
1216
  return pulumi.get(self, "tls_min_version")
1216
1217
 
1217
1218
  @tls_min_version.setter
1218
- def tls_min_version(self, value: Optional[pulumi.Input[str]]):
1219
+ def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
1219
1220
  pulumi.set(self, "tls_min_version", value)
1220
1221
 
1221
1222
  @property
1222
1223
  @pulumi.getter(name="tokenBoundCidrs")
1223
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1224
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1224
1225
  """
1225
1226
  Specifies the blocks of IP addresses which are allowed to use the generated token
1226
1227
  """
1227
1228
  return pulumi.get(self, "token_bound_cidrs")
1228
1229
 
1229
1230
  @token_bound_cidrs.setter
1230
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1231
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1231
1232
  pulumi.set(self, "token_bound_cidrs", value)
1232
1233
 
1233
1234
  @property
1234
1235
  @pulumi.getter(name="tokenExplicitMaxTtl")
1235
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1236
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1236
1237
  """
1237
1238
  Generated Token's Explicit Maximum TTL in seconds
1238
1239
  """
1239
1240
  return pulumi.get(self, "token_explicit_max_ttl")
1240
1241
 
1241
1242
  @token_explicit_max_ttl.setter
1242
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
1243
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1243
1244
  pulumi.set(self, "token_explicit_max_ttl", value)
1244
1245
 
1245
1246
  @property
1246
1247
  @pulumi.getter(name="tokenMaxTtl")
1247
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1248
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1248
1249
  """
1249
1250
  The maximum lifetime of the generated token
1250
1251
  """
1251
1252
  return pulumi.get(self, "token_max_ttl")
1252
1253
 
1253
1254
  @token_max_ttl.setter
1254
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
1255
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1255
1256
  pulumi.set(self, "token_max_ttl", value)
1256
1257
 
1257
1258
  @property
1258
1259
  @pulumi.getter(name="tokenNoDefaultPolicy")
1259
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1260
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
1260
1261
  """
1261
1262
  If true, the 'default' policy will not automatically be added to generated tokens
1262
1263
  """
1263
1264
  return pulumi.get(self, "token_no_default_policy")
1264
1265
 
1265
1266
  @token_no_default_policy.setter
1266
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
1267
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
1267
1268
  pulumi.set(self, "token_no_default_policy", value)
1268
1269
 
1269
1270
  @property
1270
1271
  @pulumi.getter(name="tokenNumUses")
1271
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1272
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
1272
1273
  """
1273
1274
  The maximum number of times a token may be used, a value of zero means unlimited
1274
1275
  """
1275
1276
  return pulumi.get(self, "token_num_uses")
1276
1277
 
1277
1278
  @token_num_uses.setter
1278
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
1279
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
1279
1280
  pulumi.set(self, "token_num_uses", value)
1280
1281
 
1281
1282
  @property
1282
1283
  @pulumi.getter(name="tokenPeriod")
1283
- def token_period(self) -> Optional[pulumi.Input[int]]:
1284
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
1284
1285
  """
1285
1286
  Generated Token's Period
1286
1287
  """
1287
1288
  return pulumi.get(self, "token_period")
1288
1289
 
1289
1290
  @token_period.setter
1290
- def token_period(self, value: Optional[pulumi.Input[int]]):
1291
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
1291
1292
  pulumi.set(self, "token_period", value)
1292
1293
 
1293
1294
  @property
1294
1295
  @pulumi.getter(name="tokenPolicies")
1295
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1296
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1296
1297
  """
1297
1298
  Generated Token's Policies
1298
1299
  """
1299
1300
  return pulumi.get(self, "token_policies")
1300
1301
 
1301
1302
  @token_policies.setter
1302
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1303
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1303
1304
  pulumi.set(self, "token_policies", value)
1304
1305
 
1305
1306
  @property
1306
1307
  @pulumi.getter(name="tokenTtl")
1307
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
1308
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1308
1309
  """
1309
1310
  The initial ttl of the token to generate in seconds
1310
1311
  """
1311
1312
  return pulumi.get(self, "token_ttl")
1312
1313
 
1313
1314
  @token_ttl.setter
1314
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
1315
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1315
1316
  pulumi.set(self, "token_ttl", value)
1316
1317
 
1317
1318
  @property
1318
1319
  @pulumi.getter(name="tokenType")
1319
- def token_type(self) -> Optional[pulumi.Input[str]]:
1320
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
1320
1321
  """
1321
1322
  The type of token to generate, service or batch
1322
1323
  """
1323
1324
  return pulumi.get(self, "token_type")
1324
1325
 
1325
1326
  @token_type.setter
1326
- def token_type(self, value: Optional[pulumi.Input[str]]):
1327
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
1327
1328
  pulumi.set(self, "token_type", value)
1328
1329
 
1329
1330
  @property
1330
1331
  @pulumi.getter
1331
- def upndomain(self) -> Optional[pulumi.Input[str]]:
1332
+ def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
1332
1333
  """
1333
1334
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1334
1335
  """
1335
1336
  return pulumi.get(self, "upndomain")
1336
1337
 
1337
1338
  @upndomain.setter
1338
- def upndomain(self, value: Optional[pulumi.Input[str]]):
1339
+ def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
1339
1340
  pulumi.set(self, "upndomain", value)
1340
1341
 
1341
1342
  @property
1342
1343
  @pulumi.getter
1343
- def url(self) -> Optional[pulumi.Input[str]]:
1344
+ def url(self) -> Optional[pulumi.Input[builtins.str]]:
1344
1345
  """
1345
1346
  The URL of the LDAP server
1346
1347
  """
1347
1348
  return pulumi.get(self, "url")
1348
1349
 
1349
1350
  @url.setter
1350
- def url(self, value: Optional[pulumi.Input[str]]):
1351
+ def url(self, value: Optional[pulumi.Input[builtins.str]]):
1351
1352
  pulumi.set(self, "url", value)
1352
1353
 
1353
1354
  @property
1354
1355
  @pulumi.getter(name="useTokenGroups")
1355
- def use_token_groups(self) -> Optional[pulumi.Input[bool]]:
1356
+ def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
1356
1357
  """
1357
1358
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1358
1359
  """
1359
1360
  return pulumi.get(self, "use_token_groups")
1360
1361
 
1361
1362
  @use_token_groups.setter
1362
- def use_token_groups(self, value: Optional[pulumi.Input[bool]]):
1363
+ def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
1363
1364
  pulumi.set(self, "use_token_groups", value)
1364
1365
 
1365
1366
  @property
1366
1367
  @pulumi.getter
1367
- def userattr(self) -> Optional[pulumi.Input[str]]:
1368
+ def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
1368
1369
  """
1369
1370
  Attribute on user object matching username passed in
1370
1371
  """
1371
1372
  return pulumi.get(self, "userattr")
1372
1373
 
1373
1374
  @userattr.setter
1374
- def userattr(self, value: Optional[pulumi.Input[str]]):
1375
+ def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
1375
1376
  pulumi.set(self, "userattr", value)
1376
1377
 
1377
1378
  @property
1378
1379
  @pulumi.getter
1379
- def userdn(self) -> Optional[pulumi.Input[str]]:
1380
+ def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
1380
1381
  """
1381
1382
  Base DN under which to perform user search
1382
1383
  """
1383
1384
  return pulumi.get(self, "userdn")
1384
1385
 
1385
1386
  @userdn.setter
1386
- def userdn(self, value: Optional[pulumi.Input[str]]):
1387
+ def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
1387
1388
  pulumi.set(self, "userdn", value)
1388
1389
 
1389
1390
  @property
1390
1391
  @pulumi.getter
1391
- def userfilter(self) -> Optional[pulumi.Input[str]]:
1392
+ def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
1392
1393
  """
1393
1394
  LDAP user search filter
1394
1395
  """
1395
1396
  return pulumi.get(self, "userfilter")
1396
1397
 
1397
1398
  @userfilter.setter
1398
- def userfilter(self, value: Optional[pulumi.Input[str]]):
1399
+ def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
1399
1400
  pulumi.set(self, "userfilter", value)
1400
1401
 
1401
1402
  @property
1402
1403
  @pulumi.getter(name="usernameAsAlias")
1403
- def username_as_alias(self) -> Optional[pulumi.Input[bool]]:
1404
+ def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
1404
1405
  """
1405
1406
  Force the auth method to use the username passed by the user as the alias name.
1406
1407
  """
1407
1408
  return pulumi.get(self, "username_as_alias")
1408
1409
 
1409
1410
  @username_as_alias.setter
1410
- def username_as_alias(self, value: Optional[pulumi.Input[bool]]):
1411
+ def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
1411
1412
  pulumi.set(self, "username_as_alias", value)
1412
1413
 
1413
1414
 
@@ -1416,48 +1417,48 @@ class AuthBackend(pulumi.CustomResource):
1416
1417
  def __init__(__self__,
1417
1418
  resource_name: str,
1418
1419
  opts: Optional[pulumi.ResourceOptions] = None,
1419
- binddn: Optional[pulumi.Input[str]] = None,
1420
- bindpass: Optional[pulumi.Input[str]] = None,
1421
- case_sensitive_names: Optional[pulumi.Input[bool]] = None,
1422
- certificate: Optional[pulumi.Input[str]] = None,
1423
- client_tls_cert: Optional[pulumi.Input[str]] = None,
1424
- client_tls_key: Optional[pulumi.Input[str]] = None,
1425
- connection_timeout: Optional[pulumi.Input[int]] = None,
1426
- deny_null_bind: Optional[pulumi.Input[bool]] = None,
1427
- description: Optional[pulumi.Input[str]] = None,
1428
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1429
- disable_remount: Optional[pulumi.Input[bool]] = None,
1430
- discoverdn: Optional[pulumi.Input[bool]] = None,
1431
- groupattr: Optional[pulumi.Input[str]] = None,
1432
- groupdn: Optional[pulumi.Input[str]] = None,
1433
- groupfilter: Optional[pulumi.Input[str]] = None,
1434
- insecure_tls: Optional[pulumi.Input[bool]] = None,
1435
- local: Optional[pulumi.Input[bool]] = None,
1436
- max_page_size: Optional[pulumi.Input[int]] = None,
1437
- namespace: Optional[pulumi.Input[str]] = None,
1438
- path: Optional[pulumi.Input[str]] = None,
1439
- rotation_period: Optional[pulumi.Input[int]] = None,
1440
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1441
- rotation_window: Optional[pulumi.Input[int]] = None,
1442
- starttls: Optional[pulumi.Input[bool]] = None,
1443
- tls_max_version: Optional[pulumi.Input[str]] = None,
1444
- tls_min_version: Optional[pulumi.Input[str]] = None,
1445
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1446
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
1447
- token_max_ttl: Optional[pulumi.Input[int]] = None,
1448
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
1449
- token_num_uses: Optional[pulumi.Input[int]] = None,
1450
- token_period: Optional[pulumi.Input[int]] = None,
1451
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1452
- token_ttl: Optional[pulumi.Input[int]] = None,
1453
- token_type: Optional[pulumi.Input[str]] = None,
1454
- upndomain: Optional[pulumi.Input[str]] = None,
1455
- url: Optional[pulumi.Input[str]] = None,
1456
- use_token_groups: Optional[pulumi.Input[bool]] = None,
1457
- userattr: Optional[pulumi.Input[str]] = None,
1458
- userdn: Optional[pulumi.Input[str]] = None,
1459
- userfilter: Optional[pulumi.Input[str]] = None,
1460
- username_as_alias: Optional[pulumi.Input[bool]] = None,
1420
+ binddn: Optional[pulumi.Input[builtins.str]] = None,
1421
+ bindpass: Optional[pulumi.Input[builtins.str]] = None,
1422
+ case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1423
+ certificate: Optional[pulumi.Input[builtins.str]] = None,
1424
+ client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1425
+ client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1426
+ connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1427
+ deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1428
+ description: Optional[pulumi.Input[builtins.str]] = None,
1429
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1430
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1431
+ discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1432
+ groupattr: Optional[pulumi.Input[builtins.str]] = None,
1433
+ groupdn: Optional[pulumi.Input[builtins.str]] = None,
1434
+ groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1435
+ insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1436
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1437
+ max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1438
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1439
+ path: Optional[pulumi.Input[builtins.str]] = None,
1440
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1441
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1442
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1443
+ starttls: Optional[pulumi.Input[builtins.bool]] = None,
1444
+ tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1445
+ tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1446
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1447
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1448
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1449
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1450
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1451
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
1452
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1453
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1454
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
1455
+ upndomain: Optional[pulumi.Input[builtins.str]] = None,
1456
+ url: Optional[pulumi.Input[builtins.str]] = None,
1457
+ use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1458
+ userattr: Optional[pulumi.Input[builtins.str]] = None,
1459
+ userdn: Optional[pulumi.Input[builtins.str]] = None,
1460
+ userfilter: Optional[pulumi.Input[builtins.str]] = None,
1461
+ username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
1461
1462
  __props__=None):
1462
1463
  """
1463
1464
  Provides a resource for managing an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -1491,55 +1492,55 @@ class AuthBackend(pulumi.CustomResource):
1491
1492
 
1492
1493
  :param str resource_name: The name of the resource.
1493
1494
  :param pulumi.ResourceOptions opts: Options for the resource.
1494
- :param pulumi.Input[str] binddn: DN of object to bind when performing user search
1495
- :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1496
- :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1497
- :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1498
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1499
- :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1500
- :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1501
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1502
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1495
+ :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
1496
+ :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
1497
+ :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1498
+ :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
1499
+ :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1500
+ :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1501
+ :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
1502
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1503
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1503
1504
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1504
- :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1505
- :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1506
- :param pulumi.Input[str] groupdn: Base DN under which to perform group search
1507
- :param pulumi.Input[str] groupfilter: Go template used to construct group membership query
1508
- :param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
1509
- :param pulumi.Input[bool] local: Specifies if the auth method is local only.
1510
- :param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1505
+ :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1506
+ :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1507
+ :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
1508
+ :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
1509
+ :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1510
+ :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1511
+ :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1511
1512
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
1512
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1513
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1513
1514
  The value should not contain leading or trailing forward slashes.
1514
1515
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1515
1516
  *Available only for Vault Enterprise*.
1516
- :param pulumi.Input[str] path: Path to mount the LDAP auth backend under
1517
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1517
+ :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
1518
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1518
1519
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1519
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1520
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1520
1521
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1521
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
1522
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1522
1523
  a rotation when a scheduled token rotation occurs. The default rotation window is
1523
1524
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1524
- :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1525
- :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1526
- :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1527
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1528
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1529
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1530
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1531
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1532
- :param pulumi.Input[int] token_period: Generated Token's Period
1533
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1534
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1535
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1536
- :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1537
- :param pulumi.Input[str] url: The URL of the LDAP server
1538
- :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1539
- :param pulumi.Input[str] userattr: Attribute on user object matching username passed in
1540
- :param pulumi.Input[str] userdn: Base DN under which to perform user search
1541
- :param pulumi.Input[str] userfilter: LDAP user search filter
1542
- :param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1525
+ :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
1526
+ :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
1527
+ :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
1528
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1529
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1530
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1531
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1532
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1533
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1534
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1535
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1536
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1537
+ :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1538
+ :param pulumi.Input[builtins.str] url: The URL of the LDAP server
1539
+ :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1540
+ :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
1541
+ :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
1542
+ :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
1543
+ :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1543
1544
  """
1544
1545
  ...
1545
1546
  @overload
@@ -1592,48 +1593,48 @@ class AuthBackend(pulumi.CustomResource):
1592
1593
  def _internal_init(__self__,
1593
1594
  resource_name: str,
1594
1595
  opts: Optional[pulumi.ResourceOptions] = None,
1595
- binddn: Optional[pulumi.Input[str]] = None,
1596
- bindpass: Optional[pulumi.Input[str]] = None,
1597
- case_sensitive_names: Optional[pulumi.Input[bool]] = None,
1598
- certificate: Optional[pulumi.Input[str]] = None,
1599
- client_tls_cert: Optional[pulumi.Input[str]] = None,
1600
- client_tls_key: Optional[pulumi.Input[str]] = None,
1601
- connection_timeout: Optional[pulumi.Input[int]] = None,
1602
- deny_null_bind: Optional[pulumi.Input[bool]] = None,
1603
- description: Optional[pulumi.Input[str]] = None,
1604
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1605
- disable_remount: Optional[pulumi.Input[bool]] = None,
1606
- discoverdn: Optional[pulumi.Input[bool]] = None,
1607
- groupattr: Optional[pulumi.Input[str]] = None,
1608
- groupdn: Optional[pulumi.Input[str]] = None,
1609
- groupfilter: Optional[pulumi.Input[str]] = None,
1610
- insecure_tls: Optional[pulumi.Input[bool]] = None,
1611
- local: Optional[pulumi.Input[bool]] = None,
1612
- max_page_size: Optional[pulumi.Input[int]] = None,
1613
- namespace: Optional[pulumi.Input[str]] = None,
1614
- path: Optional[pulumi.Input[str]] = None,
1615
- rotation_period: Optional[pulumi.Input[int]] = None,
1616
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1617
- rotation_window: Optional[pulumi.Input[int]] = None,
1618
- starttls: Optional[pulumi.Input[bool]] = None,
1619
- tls_max_version: Optional[pulumi.Input[str]] = None,
1620
- tls_min_version: Optional[pulumi.Input[str]] = None,
1621
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1622
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
1623
- token_max_ttl: Optional[pulumi.Input[int]] = None,
1624
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
1625
- token_num_uses: Optional[pulumi.Input[int]] = None,
1626
- token_period: Optional[pulumi.Input[int]] = None,
1627
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1628
- token_ttl: Optional[pulumi.Input[int]] = None,
1629
- token_type: Optional[pulumi.Input[str]] = None,
1630
- upndomain: Optional[pulumi.Input[str]] = None,
1631
- url: Optional[pulumi.Input[str]] = None,
1632
- use_token_groups: Optional[pulumi.Input[bool]] = None,
1633
- userattr: Optional[pulumi.Input[str]] = None,
1634
- userdn: Optional[pulumi.Input[str]] = None,
1635
- userfilter: Optional[pulumi.Input[str]] = None,
1636
- username_as_alias: Optional[pulumi.Input[bool]] = None,
1596
+ binddn: Optional[pulumi.Input[builtins.str]] = None,
1597
+ bindpass: Optional[pulumi.Input[builtins.str]] = None,
1598
+ case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1599
+ certificate: Optional[pulumi.Input[builtins.str]] = None,
1600
+ client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1601
+ client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1602
+ connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1603
+ deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1604
+ description: Optional[pulumi.Input[builtins.str]] = None,
1605
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1606
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1607
+ discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1608
+ groupattr: Optional[pulumi.Input[builtins.str]] = None,
1609
+ groupdn: Optional[pulumi.Input[builtins.str]] = None,
1610
+ groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1611
+ insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1612
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1613
+ max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1614
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1615
+ path: Optional[pulumi.Input[builtins.str]] = None,
1616
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1617
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1618
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1619
+ starttls: Optional[pulumi.Input[builtins.bool]] = None,
1620
+ tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1621
+ tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1622
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1623
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1624
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1625
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1626
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1627
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
1628
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1629
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1630
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
1631
+ upndomain: Optional[pulumi.Input[builtins.str]] = None,
1632
+ url: Optional[pulumi.Input[builtins.str]] = None,
1633
+ use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1634
+ userattr: Optional[pulumi.Input[builtins.str]] = None,
1635
+ userdn: Optional[pulumi.Input[builtins.str]] = None,
1636
+ userfilter: Optional[pulumi.Input[builtins.str]] = None,
1637
+ username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
1637
1638
  __props__=None):
1638
1639
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1639
1640
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1700,49 +1701,49 @@ class AuthBackend(pulumi.CustomResource):
1700
1701
  def get(resource_name: str,
1701
1702
  id: pulumi.Input[str],
1702
1703
  opts: Optional[pulumi.ResourceOptions] = None,
1703
- accessor: Optional[pulumi.Input[str]] = None,
1704
- binddn: Optional[pulumi.Input[str]] = None,
1705
- bindpass: Optional[pulumi.Input[str]] = None,
1706
- case_sensitive_names: Optional[pulumi.Input[bool]] = None,
1707
- certificate: Optional[pulumi.Input[str]] = None,
1708
- client_tls_cert: Optional[pulumi.Input[str]] = None,
1709
- client_tls_key: Optional[pulumi.Input[str]] = None,
1710
- connection_timeout: Optional[pulumi.Input[int]] = None,
1711
- deny_null_bind: Optional[pulumi.Input[bool]] = None,
1712
- description: Optional[pulumi.Input[str]] = None,
1713
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
1714
- disable_remount: Optional[pulumi.Input[bool]] = None,
1715
- discoverdn: Optional[pulumi.Input[bool]] = None,
1716
- groupattr: Optional[pulumi.Input[str]] = None,
1717
- groupdn: Optional[pulumi.Input[str]] = None,
1718
- groupfilter: Optional[pulumi.Input[str]] = None,
1719
- insecure_tls: Optional[pulumi.Input[bool]] = None,
1720
- local: Optional[pulumi.Input[bool]] = None,
1721
- max_page_size: Optional[pulumi.Input[int]] = None,
1722
- namespace: Optional[pulumi.Input[str]] = None,
1723
- path: Optional[pulumi.Input[str]] = None,
1724
- rotation_period: Optional[pulumi.Input[int]] = None,
1725
- rotation_schedule: Optional[pulumi.Input[str]] = None,
1726
- rotation_window: Optional[pulumi.Input[int]] = None,
1727
- starttls: Optional[pulumi.Input[bool]] = None,
1728
- tls_max_version: Optional[pulumi.Input[str]] = None,
1729
- tls_min_version: Optional[pulumi.Input[str]] = None,
1730
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1731
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
1732
- token_max_ttl: Optional[pulumi.Input[int]] = None,
1733
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
1734
- token_num_uses: Optional[pulumi.Input[int]] = None,
1735
- token_period: Optional[pulumi.Input[int]] = None,
1736
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1737
- token_ttl: Optional[pulumi.Input[int]] = None,
1738
- token_type: Optional[pulumi.Input[str]] = None,
1739
- upndomain: Optional[pulumi.Input[str]] = None,
1740
- url: Optional[pulumi.Input[str]] = None,
1741
- use_token_groups: Optional[pulumi.Input[bool]] = None,
1742
- userattr: Optional[pulumi.Input[str]] = None,
1743
- userdn: Optional[pulumi.Input[str]] = None,
1744
- userfilter: Optional[pulumi.Input[str]] = None,
1745
- username_as_alias: Optional[pulumi.Input[bool]] = None) -> 'AuthBackend':
1704
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
1705
+ binddn: Optional[pulumi.Input[builtins.str]] = None,
1706
+ bindpass: Optional[pulumi.Input[builtins.str]] = None,
1707
+ case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1708
+ certificate: Optional[pulumi.Input[builtins.str]] = None,
1709
+ client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1710
+ client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1711
+ connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1712
+ deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1713
+ description: Optional[pulumi.Input[builtins.str]] = None,
1714
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1715
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1716
+ discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1717
+ groupattr: Optional[pulumi.Input[builtins.str]] = None,
1718
+ groupdn: Optional[pulumi.Input[builtins.str]] = None,
1719
+ groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1720
+ insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1721
+ local: Optional[pulumi.Input[builtins.bool]] = None,
1722
+ max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1723
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1724
+ path: Optional[pulumi.Input[builtins.str]] = None,
1725
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1726
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1727
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1728
+ starttls: Optional[pulumi.Input[builtins.bool]] = None,
1729
+ tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1730
+ tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1731
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1732
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1733
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1734
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1735
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1736
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
1737
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1738
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1739
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
1740
+ upndomain: Optional[pulumi.Input[builtins.str]] = None,
1741
+ url: Optional[pulumi.Input[builtins.str]] = None,
1742
+ use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1743
+ userattr: Optional[pulumi.Input[builtins.str]] = None,
1744
+ userdn: Optional[pulumi.Input[builtins.str]] = None,
1745
+ userfilter: Optional[pulumi.Input[builtins.str]] = None,
1746
+ username_as_alias: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
1746
1747
  """
1747
1748
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
1748
1749
  properties used to qualify the lookup.
@@ -1750,56 +1751,56 @@ class AuthBackend(pulumi.CustomResource):
1750
1751
  :param str resource_name: The unique name of the resulting resource.
1751
1752
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1752
1753
  :param pulumi.ResourceOptions opts: Options for the resource.
1753
- :param pulumi.Input[str] accessor: The accessor for this auth mount.
1754
- :param pulumi.Input[str] binddn: DN of object to bind when performing user search
1755
- :param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
1756
- :param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1757
- :param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
1758
- :param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1759
- :param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1760
- :param pulumi.Input[str] description: Description for the LDAP auth backend mount
1761
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1762
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
1754
+ :param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
1755
+ :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
1756
+ :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
1757
+ :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1758
+ :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
1759
+ :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1760
+ :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1761
+ :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
1762
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1763
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1763
1764
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1764
- :param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1765
- :param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1766
- :param pulumi.Input[str] groupdn: Base DN under which to perform group search
1767
- :param pulumi.Input[str] groupfilter: Go template used to construct group membership query
1768
- :param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
1769
- :param pulumi.Input[bool] local: Specifies if the auth method is local only.
1770
- :param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1765
+ :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1766
+ :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1767
+ :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
1768
+ :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
1769
+ :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1770
+ :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1771
+ :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1771
1772
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
1772
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1773
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1773
1774
  The value should not contain leading or trailing forward slashes.
1774
1775
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1775
1776
  *Available only for Vault Enterprise*.
1776
- :param pulumi.Input[str] path: Path to mount the LDAP auth backend under
1777
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1777
+ :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
1778
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1778
1779
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1779
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1780
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1780
1781
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1781
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
1782
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1782
1783
  a rotation when a scheduled token rotation occurs. The default rotation window is
1783
1784
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1784
- :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1785
- :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1786
- :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1787
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1788
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1789
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1790
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1791
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1792
- :param pulumi.Input[int] token_period: Generated Token's Period
1793
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1794
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1795
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1796
- :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1797
- :param pulumi.Input[str] url: The URL of the LDAP server
1798
- :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1799
- :param pulumi.Input[str] userattr: Attribute on user object matching username passed in
1800
- :param pulumi.Input[str] userdn: Base DN under which to perform user search
1801
- :param pulumi.Input[str] userfilter: LDAP user search filter
1802
- :param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1785
+ :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
1786
+ :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
1787
+ :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
1788
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1789
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1790
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1791
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1792
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1793
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1794
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1795
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1796
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1797
+ :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1798
+ :param pulumi.Input[builtins.str] url: The URL of the LDAP server
1799
+ :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1800
+ :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
1801
+ :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
1802
+ :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
1803
+ :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1803
1804
  """
1804
1805
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1805
1806
 
@@ -1852,7 +1853,7 @@ class AuthBackend(pulumi.CustomResource):
1852
1853
 
1853
1854
  @property
1854
1855
  @pulumi.getter
1855
- def accessor(self) -> pulumi.Output[str]:
1856
+ def accessor(self) -> pulumi.Output[builtins.str]:
1856
1857
  """
1857
1858
  The accessor for this auth mount.
1858
1859
  """
@@ -1860,7 +1861,7 @@ class AuthBackend(pulumi.CustomResource):
1860
1861
 
1861
1862
  @property
1862
1863
  @pulumi.getter
1863
- def binddn(self) -> pulumi.Output[str]:
1864
+ def binddn(self) -> pulumi.Output[builtins.str]:
1864
1865
  """
1865
1866
  DN of object to bind when performing user search
1866
1867
  """
@@ -1868,7 +1869,7 @@ class AuthBackend(pulumi.CustomResource):
1868
1869
 
1869
1870
  @property
1870
1871
  @pulumi.getter
1871
- def bindpass(self) -> pulumi.Output[str]:
1872
+ def bindpass(self) -> pulumi.Output[builtins.str]:
1872
1873
  """
1873
1874
  Password to use with `binddn` when performing user search
1874
1875
  """
@@ -1876,7 +1877,7 @@ class AuthBackend(pulumi.CustomResource):
1876
1877
 
1877
1878
  @property
1878
1879
  @pulumi.getter(name="caseSensitiveNames")
1879
- def case_sensitive_names(self) -> pulumi.Output[bool]:
1880
+ def case_sensitive_names(self) -> pulumi.Output[builtins.bool]:
1880
1881
  """
1881
1882
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1882
1883
  """
@@ -1884,7 +1885,7 @@ class AuthBackend(pulumi.CustomResource):
1884
1885
 
1885
1886
  @property
1886
1887
  @pulumi.getter
1887
- def certificate(self) -> pulumi.Output[str]:
1888
+ def certificate(self) -> pulumi.Output[builtins.str]:
1888
1889
  """
1889
1890
  Trusted CA to validate TLS certificate
1890
1891
  """
@@ -1892,17 +1893,17 @@ class AuthBackend(pulumi.CustomResource):
1892
1893
 
1893
1894
  @property
1894
1895
  @pulumi.getter(name="clientTlsCert")
1895
- def client_tls_cert(self) -> pulumi.Output[str]:
1896
+ def client_tls_cert(self) -> pulumi.Output[builtins.str]:
1896
1897
  return pulumi.get(self, "client_tls_cert")
1897
1898
 
1898
1899
  @property
1899
1900
  @pulumi.getter(name="clientTlsKey")
1900
- def client_tls_key(self) -> pulumi.Output[str]:
1901
+ def client_tls_key(self) -> pulumi.Output[builtins.str]:
1901
1902
  return pulumi.get(self, "client_tls_key")
1902
1903
 
1903
1904
  @property
1904
1905
  @pulumi.getter(name="connectionTimeout")
1905
- def connection_timeout(self) -> pulumi.Output[int]:
1906
+ def connection_timeout(self) -> pulumi.Output[builtins.int]:
1906
1907
  """
1907
1908
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1908
1909
  """
@@ -1910,7 +1911,7 @@ class AuthBackend(pulumi.CustomResource):
1910
1911
 
1911
1912
  @property
1912
1913
  @pulumi.getter(name="denyNullBind")
1913
- def deny_null_bind(self) -> pulumi.Output[bool]:
1914
+ def deny_null_bind(self) -> pulumi.Output[builtins.bool]:
1914
1915
  """
1915
1916
  Prevents users from bypassing authentication when providing an empty password.
1916
1917
  """
@@ -1918,7 +1919,7 @@ class AuthBackend(pulumi.CustomResource):
1918
1919
 
1919
1920
  @property
1920
1921
  @pulumi.getter
1921
- def description(self) -> pulumi.Output[str]:
1922
+ def description(self) -> pulumi.Output[builtins.str]:
1922
1923
  """
1923
1924
  Description for the LDAP auth backend mount
1924
1925
  """
@@ -1926,7 +1927,7 @@ class AuthBackend(pulumi.CustomResource):
1926
1927
 
1927
1928
  @property
1928
1929
  @pulumi.getter(name="disableAutomatedRotation")
1929
- def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
1930
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1930
1931
  """
1931
1932
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1932
1933
  """
@@ -1934,7 +1935,7 @@ class AuthBackend(pulumi.CustomResource):
1934
1935
 
1935
1936
  @property
1936
1937
  @pulumi.getter(name="disableRemount")
1937
- def disable_remount(self) -> pulumi.Output[Optional[bool]]:
1938
+ def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1938
1939
  """
1939
1940
  If set, opts out of mount migration on path updates.
1940
1941
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -1943,7 +1944,7 @@ class AuthBackend(pulumi.CustomResource):
1943
1944
 
1944
1945
  @property
1945
1946
  @pulumi.getter
1946
- def discoverdn(self) -> pulumi.Output[bool]:
1947
+ def discoverdn(self) -> pulumi.Output[builtins.bool]:
1947
1948
  """
1948
1949
  Use anonymous bind to discover the bind DN of a user.
1949
1950
  """
@@ -1951,7 +1952,7 @@ class AuthBackend(pulumi.CustomResource):
1951
1952
 
1952
1953
  @property
1953
1954
  @pulumi.getter
1954
- def groupattr(self) -> pulumi.Output[str]:
1955
+ def groupattr(self) -> pulumi.Output[builtins.str]:
1955
1956
  """
1956
1957
  LDAP attribute to follow on objects returned by groupfilter
1957
1958
  """
@@ -1959,7 +1960,7 @@ class AuthBackend(pulumi.CustomResource):
1959
1960
 
1960
1961
  @property
1961
1962
  @pulumi.getter
1962
- def groupdn(self) -> pulumi.Output[str]:
1963
+ def groupdn(self) -> pulumi.Output[builtins.str]:
1963
1964
  """
1964
1965
  Base DN under which to perform group search
1965
1966
  """
@@ -1967,7 +1968,7 @@ class AuthBackend(pulumi.CustomResource):
1967
1968
 
1968
1969
  @property
1969
1970
  @pulumi.getter
1970
- def groupfilter(self) -> pulumi.Output[str]:
1971
+ def groupfilter(self) -> pulumi.Output[builtins.str]:
1971
1972
  """
1972
1973
  Go template used to construct group membership query
1973
1974
  """
@@ -1975,7 +1976,7 @@ class AuthBackend(pulumi.CustomResource):
1975
1976
 
1976
1977
  @property
1977
1978
  @pulumi.getter(name="insecureTls")
1978
- def insecure_tls(self) -> pulumi.Output[bool]:
1979
+ def insecure_tls(self) -> pulumi.Output[builtins.bool]:
1979
1980
  """
1980
1981
  Control whether or TLS certificates must be validated
1981
1982
  """
@@ -1983,7 +1984,7 @@ class AuthBackend(pulumi.CustomResource):
1983
1984
 
1984
1985
  @property
1985
1986
  @pulumi.getter
1986
- def local(self) -> pulumi.Output[Optional[bool]]:
1987
+ def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1987
1988
  """
1988
1989
  Specifies if the auth method is local only.
1989
1990
  """
@@ -1991,7 +1992,7 @@ class AuthBackend(pulumi.CustomResource):
1991
1992
 
1992
1993
  @property
1993
1994
  @pulumi.getter(name="maxPageSize")
1994
- def max_page_size(self) -> pulumi.Output[Optional[int]]:
1995
+ def max_page_size(self) -> pulumi.Output[Optional[builtins.int]]:
1995
1996
  """
1996
1997
  Sets the max page size for LDAP lookups, by default it's set to -1.
1997
1998
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
@@ -2000,7 +2001,7 @@ class AuthBackend(pulumi.CustomResource):
2000
2001
 
2001
2002
  @property
2002
2003
  @pulumi.getter
2003
- def namespace(self) -> pulumi.Output[Optional[str]]:
2004
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
2004
2005
  """
2005
2006
  The namespace to provision the resource in.
2006
2007
  The value should not contain leading or trailing forward slashes.
@@ -2011,7 +2012,7 @@ class AuthBackend(pulumi.CustomResource):
2011
2012
 
2012
2013
  @property
2013
2014
  @pulumi.getter
2014
- def path(self) -> pulumi.Output[Optional[str]]:
2015
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
2015
2016
  """
2016
2017
  Path to mount the LDAP auth backend under
2017
2018
  """
@@ -2019,7 +2020,7 @@ class AuthBackend(pulumi.CustomResource):
2019
2020
 
2020
2021
  @property
2021
2022
  @pulumi.getter(name="rotationPeriod")
2022
- def rotation_period(self) -> pulumi.Output[Optional[int]]:
2023
+ def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
2023
2024
  """
2024
2025
  The amount of time in seconds Vault should wait before rotating the root credential.
2025
2026
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -2028,7 +2029,7 @@ class AuthBackend(pulumi.CustomResource):
2028
2029
 
2029
2030
  @property
2030
2031
  @pulumi.getter(name="rotationSchedule")
2031
- def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
2032
+ def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
2032
2033
  """
2033
2034
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
2034
2035
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -2037,7 +2038,7 @@ class AuthBackend(pulumi.CustomResource):
2037
2038
 
2038
2039
  @property
2039
2040
  @pulumi.getter(name="rotationWindow")
2040
- def rotation_window(self) -> pulumi.Output[Optional[int]]:
2041
+ def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
2041
2042
  """
2042
2043
  The maximum amount of time in seconds allowed to complete
2043
2044
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -2047,7 +2048,7 @@ class AuthBackend(pulumi.CustomResource):
2047
2048
 
2048
2049
  @property
2049
2050
  @pulumi.getter
2050
- def starttls(self) -> pulumi.Output[bool]:
2051
+ def starttls(self) -> pulumi.Output[builtins.bool]:
2051
2052
  """
2052
2053
  Control use of TLS when conecting to LDAP
2053
2054
  """
@@ -2055,7 +2056,7 @@ class AuthBackend(pulumi.CustomResource):
2055
2056
 
2056
2057
  @property
2057
2058
  @pulumi.getter(name="tlsMaxVersion")
2058
- def tls_max_version(self) -> pulumi.Output[str]:
2059
+ def tls_max_version(self) -> pulumi.Output[builtins.str]:
2059
2060
  """
2060
2061
  Maximum acceptable version of TLS
2061
2062
  """
@@ -2063,7 +2064,7 @@ class AuthBackend(pulumi.CustomResource):
2063
2064
 
2064
2065
  @property
2065
2066
  @pulumi.getter(name="tlsMinVersion")
2066
- def tls_min_version(self) -> pulumi.Output[str]:
2067
+ def tls_min_version(self) -> pulumi.Output[builtins.str]:
2067
2068
  """
2068
2069
  Minimum acceptable version of TLS
2069
2070
  """
@@ -2071,7 +2072,7 @@ class AuthBackend(pulumi.CustomResource):
2071
2072
 
2072
2073
  @property
2073
2074
  @pulumi.getter(name="tokenBoundCidrs")
2074
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
2075
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2075
2076
  """
2076
2077
  Specifies the blocks of IP addresses which are allowed to use the generated token
2077
2078
  """
@@ -2079,7 +2080,7 @@ class AuthBackend(pulumi.CustomResource):
2079
2080
 
2080
2081
  @property
2081
2082
  @pulumi.getter(name="tokenExplicitMaxTtl")
2082
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
2083
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2083
2084
  """
2084
2085
  Generated Token's Explicit Maximum TTL in seconds
2085
2086
  """
@@ -2087,7 +2088,7 @@ class AuthBackend(pulumi.CustomResource):
2087
2088
 
2088
2089
  @property
2089
2090
  @pulumi.getter(name="tokenMaxTtl")
2090
- def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
2091
+ def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2091
2092
  """
2092
2093
  The maximum lifetime of the generated token
2093
2094
  """
@@ -2095,7 +2096,7 @@ class AuthBackend(pulumi.CustomResource):
2095
2096
 
2096
2097
  @property
2097
2098
  @pulumi.getter(name="tokenNoDefaultPolicy")
2098
- def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
2099
+ def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
2099
2100
  """
2100
2101
  If true, the 'default' policy will not automatically be added to generated tokens
2101
2102
  """
@@ -2103,7 +2104,7 @@ class AuthBackend(pulumi.CustomResource):
2103
2104
 
2104
2105
  @property
2105
2106
  @pulumi.getter(name="tokenNumUses")
2106
- def token_num_uses(self) -> pulumi.Output[Optional[int]]:
2107
+ def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
2107
2108
  """
2108
2109
  The maximum number of times a token may be used, a value of zero means unlimited
2109
2110
  """
@@ -2111,7 +2112,7 @@ class AuthBackend(pulumi.CustomResource):
2111
2112
 
2112
2113
  @property
2113
2114
  @pulumi.getter(name="tokenPeriod")
2114
- def token_period(self) -> pulumi.Output[Optional[int]]:
2115
+ def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
2115
2116
  """
2116
2117
  Generated Token's Period
2117
2118
  """
@@ -2119,7 +2120,7 @@ class AuthBackend(pulumi.CustomResource):
2119
2120
 
2120
2121
  @property
2121
2122
  @pulumi.getter(name="tokenPolicies")
2122
- def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
2123
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2123
2124
  """
2124
2125
  Generated Token's Policies
2125
2126
  """
@@ -2127,7 +2128,7 @@ class AuthBackend(pulumi.CustomResource):
2127
2128
 
2128
2129
  @property
2129
2130
  @pulumi.getter(name="tokenTtl")
2130
- def token_ttl(self) -> pulumi.Output[Optional[int]]:
2131
+ def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2131
2132
  """
2132
2133
  The initial ttl of the token to generate in seconds
2133
2134
  """
@@ -2135,7 +2136,7 @@ class AuthBackend(pulumi.CustomResource):
2135
2136
 
2136
2137
  @property
2137
2138
  @pulumi.getter(name="tokenType")
2138
- def token_type(self) -> pulumi.Output[Optional[str]]:
2139
+ def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
2139
2140
  """
2140
2141
  The type of token to generate, service or batch
2141
2142
  """
@@ -2143,7 +2144,7 @@ class AuthBackend(pulumi.CustomResource):
2143
2144
 
2144
2145
  @property
2145
2146
  @pulumi.getter
2146
- def upndomain(self) -> pulumi.Output[str]:
2147
+ def upndomain(self) -> pulumi.Output[builtins.str]:
2147
2148
  """
2148
2149
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
2149
2150
  """
@@ -2151,7 +2152,7 @@ class AuthBackend(pulumi.CustomResource):
2151
2152
 
2152
2153
  @property
2153
2154
  @pulumi.getter
2154
- def url(self) -> pulumi.Output[str]:
2155
+ def url(self) -> pulumi.Output[builtins.str]:
2155
2156
  """
2156
2157
  The URL of the LDAP server
2157
2158
  """
@@ -2159,7 +2160,7 @@ class AuthBackend(pulumi.CustomResource):
2159
2160
 
2160
2161
  @property
2161
2162
  @pulumi.getter(name="useTokenGroups")
2162
- def use_token_groups(self) -> pulumi.Output[bool]:
2163
+ def use_token_groups(self) -> pulumi.Output[builtins.bool]:
2163
2164
  """
2164
2165
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
2165
2166
  """
@@ -2167,7 +2168,7 @@ class AuthBackend(pulumi.CustomResource):
2167
2168
 
2168
2169
  @property
2169
2170
  @pulumi.getter
2170
- def userattr(self) -> pulumi.Output[str]:
2171
+ def userattr(self) -> pulumi.Output[builtins.str]:
2171
2172
  """
2172
2173
  Attribute on user object matching username passed in
2173
2174
  """
@@ -2175,7 +2176,7 @@ class AuthBackend(pulumi.CustomResource):
2175
2176
 
2176
2177
  @property
2177
2178
  @pulumi.getter
2178
- def userdn(self) -> pulumi.Output[str]:
2179
+ def userdn(self) -> pulumi.Output[builtins.str]:
2179
2180
  """
2180
2181
  Base DN under which to perform user search
2181
2182
  """
@@ -2183,7 +2184,7 @@ class AuthBackend(pulumi.CustomResource):
2183
2184
 
2184
2185
  @property
2185
2186
  @pulumi.getter
2186
- def userfilter(self) -> pulumi.Output[str]:
2187
+ def userfilter(self) -> pulumi.Output[builtins.str]:
2187
2188
  """
2188
2189
  LDAP user search filter
2189
2190
  """
@@ -2191,7 +2192,7 @@ class AuthBackend(pulumi.CustomResource):
2191
2192
 
2192
2193
  @property
2193
2194
  @pulumi.getter(name="usernameAsAlias")
2194
- def username_as_alias(self) -> pulumi.Output[bool]:
2195
+ def username_as_alias(self) -> pulumi.Output[builtins.bool]:
2195
2196
  """
2196
2197
  Force the auth method to use the username passed by the user as the alias name.
2197
2198
  """