pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,101 +19,102 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- binddn: pulumi.Input[builtins.str],
24
- bindpass: pulumi.Input[builtins.str],
25
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- certificate: Optional[pulumi.Input[builtins.str]] = None,
30
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
31
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
32
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
33
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
34
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
35
- description: Optional[pulumi.Input[builtins.str]] = None,
36
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
37
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
38
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
39
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
40
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
41
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
42
- local: Optional[pulumi.Input[builtins.bool]] = None,
43
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
44
- namespace: Optional[pulumi.Input[builtins.str]] = None,
45
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
46
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
47
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
48
- path: Optional[pulumi.Input[builtins.str]] = None,
49
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
50
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
51
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
52
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
53
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
54
- schema: Optional[pulumi.Input[builtins.str]] = None,
55
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
56
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
57
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
58
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
59
- url: Optional[pulumi.Input[builtins.str]] = None,
60
- userattr: Optional[pulumi.Input[builtins.str]] = None,
61
- userdn: Optional[pulumi.Input[builtins.str]] = None):
22
+ binddn: pulumi.Input[_builtins.str],
23
+ bindpass: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
32
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ description: Optional[pulumi.Input[_builtins.str]] = None,
35
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
39
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
40
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
41
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
42
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
44
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
46
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
48
+ path: Optional[pulumi.Input[_builtins.str]] = None,
49
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
50
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
51
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
52
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
53
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
54
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
55
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
56
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
57
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
58
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
59
+ url: Optional[pulumi.Input[_builtins.str]] = None,
60
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
61
+ userdn: Optional[pulumi.Input[_builtins.str]] = None):
62
62
  """
63
63
  The set of arguments for constructing a SecretBackend resource.
64
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
65
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
66
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
70
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
64
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
65
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
66
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
70
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
71
71
  x509 PEM encoded.
72
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
73
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
74
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
72
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
73
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
74
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
75
75
  the next URL in the configuration.
76
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
77
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
78
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
79
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
80
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
81
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
82
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
83
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
76
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
77
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
78
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
79
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
80
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
81
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
82
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
83
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
84
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
84
85
  Defaults to `false`.
85
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
86
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
87
- replication.Tolerance duration to use when checking the last rotation time.
88
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
89
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
86
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
87
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
88
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
89
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
90
90
  The value should not contain leading or trailing forward slashes.
91
91
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
92
92
  *Available only for Vault Enterprise*.
93
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
94
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
95
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
96
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
93
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
94
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
95
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
96
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
97
97
  not begin or end with a `/`. Defaults to `ldap`.
98
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
99
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
98
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
99
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
100
100
  before returning back an error.
101
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
101
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
102
102
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
103
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
103
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
104
104
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
105
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
105
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
106
106
  a rotation when a scheduled token rotation occurs. The default rotation window is
107
107
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
108
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
109
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
110
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
108
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
109
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
110
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
111
111
  Defaults to false. Requires Vault 1.16 or above.
112
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
113
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
114
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
112
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
113
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
114
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
115
115
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
116
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
117
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
116
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
117
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
118
118
  """
119
119
  pulumi.set(__self__, "binddn", binddn)
120
120
  pulumi.set(__self__, "bindpass", bindpass)
@@ -146,6 +146,8 @@ class SecretBackendArgs:
146
146
  pulumi.set(__self__, "disable_remount", disable_remount)
147
147
  if external_entropy_access is not None:
148
148
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
149
+ if force_no_cache is not None:
150
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
149
151
  if identity_token_key is not None:
150
152
  pulumi.set(__self__, "identity_token_key", identity_token_key)
151
153
  if insecure_tls is not None:
@@ -193,81 +195,81 @@ class SecretBackendArgs:
193
195
  if userdn is not None:
194
196
  pulumi.set(__self__, "userdn", userdn)
195
197
 
196
- @property
198
+ @_builtins.property
197
199
  @pulumi.getter
198
- def binddn(self) -> pulumi.Input[builtins.str]:
200
+ def binddn(self) -> pulumi.Input[_builtins.str]:
199
201
  """
200
202
  Distinguished name of object to bind when performing user and group search.
201
203
  """
202
204
  return pulumi.get(self, "binddn")
203
205
 
204
206
  @binddn.setter
205
- def binddn(self, value: pulumi.Input[builtins.str]):
207
+ def binddn(self, value: pulumi.Input[_builtins.str]):
206
208
  pulumi.set(self, "binddn", value)
207
209
 
208
- @property
210
+ @_builtins.property
209
211
  @pulumi.getter
210
- def bindpass(self) -> pulumi.Input[builtins.str]:
212
+ def bindpass(self) -> pulumi.Input[_builtins.str]:
211
213
  """
212
214
  Password to use along with binddn when performing user search.
213
215
  """
214
216
  return pulumi.get(self, "bindpass")
215
217
 
216
218
  @bindpass.setter
217
- def bindpass(self, value: pulumi.Input[builtins.str]):
219
+ def bindpass(self, value: pulumi.Input[_builtins.str]):
218
220
  pulumi.set(self, "bindpass", value)
219
221
 
220
- @property
222
+ @_builtins.property
221
223
  @pulumi.getter(name="allowedManagedKeys")
222
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
224
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
223
225
  """
224
226
  List of managed key registry entry names that the mount in question is allowed to access
225
227
  """
226
228
  return pulumi.get(self, "allowed_managed_keys")
227
229
 
228
230
  @allowed_managed_keys.setter
229
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
231
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
230
232
  pulumi.set(self, "allowed_managed_keys", value)
231
233
 
232
- @property
234
+ @_builtins.property
233
235
  @pulumi.getter(name="allowedResponseHeaders")
234
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
236
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
235
237
  """
236
238
  List of headers to allow and pass from the request to the plugin
237
239
  """
238
240
  return pulumi.get(self, "allowed_response_headers")
239
241
 
240
242
  @allowed_response_headers.setter
241
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
243
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
242
244
  pulumi.set(self, "allowed_response_headers", value)
243
245
 
244
- @property
246
+ @_builtins.property
245
247
  @pulumi.getter(name="auditNonHmacRequestKeys")
246
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
248
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
247
249
  """
248
250
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
249
251
  """
250
252
  return pulumi.get(self, "audit_non_hmac_request_keys")
251
253
 
252
254
  @audit_non_hmac_request_keys.setter
253
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
255
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
254
256
  pulumi.set(self, "audit_non_hmac_request_keys", value)
255
257
 
256
- @property
258
+ @_builtins.property
257
259
  @pulumi.getter(name="auditNonHmacResponseKeys")
258
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
260
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
259
261
  """
260
262
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
261
263
  """
262
264
  return pulumi.get(self, "audit_non_hmac_response_keys")
263
265
 
264
266
  @audit_non_hmac_response_keys.setter
265
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
267
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
266
268
  pulumi.set(self, "audit_non_hmac_response_keys", value)
267
269
 
268
- @property
270
+ @_builtins.property
269
271
  @pulumi.getter
270
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
272
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
271
273
  """
272
274
  CA certificate to use when verifying LDAP server certificate, must be
273
275
  x509 PEM encoded.
@@ -275,36 +277,36 @@ class SecretBackendArgs:
275
277
  return pulumi.get(self, "certificate")
276
278
 
277
279
  @certificate.setter
278
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
280
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
279
281
  pulumi.set(self, "certificate", value)
280
282
 
281
- @property
283
+ @_builtins.property
282
284
  @pulumi.getter(name="clientTlsCert")
283
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
285
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
284
286
  """
285
287
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
286
288
  """
287
289
  return pulumi.get(self, "client_tls_cert")
288
290
 
289
291
  @client_tls_cert.setter
290
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
292
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
291
293
  pulumi.set(self, "client_tls_cert", value)
292
294
 
293
- @property
295
+ @_builtins.property
294
296
  @pulumi.getter(name="clientTlsKey")
295
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
297
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
296
298
  """
297
299
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
298
300
  """
299
301
  return pulumi.get(self, "client_tls_key")
300
302
 
301
303
  @client_tls_key.setter
302
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
304
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
303
305
  pulumi.set(self, "client_tls_key", value)
304
306
 
305
- @property
307
+ @_builtins.property
306
308
  @pulumi.getter(name="connectionTimeout")
307
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
309
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
308
310
  """
309
311
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
310
312
  the next URL in the configuration.
@@ -312,96 +314,108 @@ class SecretBackendArgs:
312
314
  return pulumi.get(self, "connection_timeout")
313
315
 
314
316
  @connection_timeout.setter
315
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
317
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
316
318
  pulumi.set(self, "connection_timeout", value)
317
319
 
318
- @property
320
+ @_builtins.property
319
321
  @pulumi.getter(name="defaultLeaseTtlSeconds")
320
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
322
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
321
323
  """
322
- Default lease duration for secrets in seconds.
324
+ Default lease duration for tokens and secrets in seconds
323
325
  """
324
326
  return pulumi.get(self, "default_lease_ttl_seconds")
325
327
 
326
328
  @default_lease_ttl_seconds.setter
327
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
329
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
328
330
  pulumi.set(self, "default_lease_ttl_seconds", value)
329
331
 
330
- @property
332
+ @_builtins.property
331
333
  @pulumi.getter(name="delegatedAuthAccessors")
332
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
334
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
333
335
  """
334
336
  List of headers to allow and pass from the request to the plugin
335
337
  """
336
338
  return pulumi.get(self, "delegated_auth_accessors")
337
339
 
338
340
  @delegated_auth_accessors.setter
339
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
341
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
340
342
  pulumi.set(self, "delegated_auth_accessors", value)
341
343
 
342
- @property
344
+ @_builtins.property
343
345
  @pulumi.getter
344
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
346
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
345
347
  """
346
- Human-friendly description of the mount for the Active Directory backend.
348
+ Human-friendly description of the mount
347
349
  """
348
350
  return pulumi.get(self, "description")
349
351
 
350
352
  @description.setter
351
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
353
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
352
354
  pulumi.set(self, "description", value)
353
355
 
354
- @property
356
+ @_builtins.property
355
357
  @pulumi.getter(name="disableAutomatedRotation")
356
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
358
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
357
359
  """
358
360
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
359
361
  """
360
362
  return pulumi.get(self, "disable_automated_rotation")
361
363
 
362
364
  @disable_automated_rotation.setter
363
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
365
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
364
366
  pulumi.set(self, "disable_automated_rotation", value)
365
367
 
366
- @property
368
+ @_builtins.property
367
369
  @pulumi.getter(name="disableRemount")
368
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
370
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
369
371
  """
370
372
  If set, opts out of mount migration on path updates.
371
373
  """
372
374
  return pulumi.get(self, "disable_remount")
373
375
 
374
376
  @disable_remount.setter
375
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
377
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
376
378
  pulumi.set(self, "disable_remount", value)
377
379
 
378
- @property
380
+ @_builtins.property
379
381
  @pulumi.getter(name="externalEntropyAccess")
380
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
382
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
381
383
  """
382
384
  Enable the secrets engine to access Vault's external entropy source
383
385
  """
384
386
  return pulumi.get(self, "external_entropy_access")
385
387
 
386
388
  @external_entropy_access.setter
387
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
389
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
388
390
  pulumi.set(self, "external_entropy_access", value)
389
391
 
390
- @property
392
+ @_builtins.property
393
+ @pulumi.getter(name="forceNoCache")
394
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
395
+ """
396
+ If set to true, disables caching.
397
+ """
398
+ return pulumi.get(self, "force_no_cache")
399
+
400
+ @force_no_cache.setter
401
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
402
+ pulumi.set(self, "force_no_cache", value)
403
+
404
+ @_builtins.property
391
405
  @pulumi.getter(name="identityTokenKey")
392
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
406
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
393
407
  """
394
408
  The key to use for signing plugin workload identity tokens
395
409
  """
396
410
  return pulumi.get(self, "identity_token_key")
397
411
 
398
412
  @identity_token_key.setter
399
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
413
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
400
414
  pulumi.set(self, "identity_token_key", value)
401
415
 
402
- @property
416
+ @_builtins.property
403
417
  @pulumi.getter(name="insecureTls")
404
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
418
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
405
419
  """
406
420
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
407
421
  Defaults to `false`.
@@ -409,49 +423,48 @@ class SecretBackendArgs:
409
423
  return pulumi.get(self, "insecure_tls")
410
424
 
411
425
  @insecure_tls.setter
412
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
426
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
413
427
  pulumi.set(self, "insecure_tls", value)
414
428
 
415
- @property
429
+ @_builtins.property
416
430
  @pulumi.getter(name="listingVisibility")
417
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
431
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
418
432
  """
419
433
  Specifies whether to show this mount in the UI-specific listing endpoint
420
434
  """
421
435
  return pulumi.get(self, "listing_visibility")
422
436
 
423
437
  @listing_visibility.setter
424
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
438
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
425
439
  pulumi.set(self, "listing_visibility", value)
426
440
 
427
- @property
441
+ @_builtins.property
428
442
  @pulumi.getter
429
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
443
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
430
444
  """
431
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
432
- replication.Tolerance duration to use when checking the last rotation time.
445
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
433
446
  """
434
447
  return pulumi.get(self, "local")
435
448
 
436
449
  @local.setter
437
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
450
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
438
451
  pulumi.set(self, "local", value)
439
452
 
440
- @property
453
+ @_builtins.property
441
454
  @pulumi.getter(name="maxLeaseTtlSeconds")
442
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
455
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
443
456
  """
444
- Maximum possible lease duration for secrets in seconds.
457
+ Maximum possible lease duration for tokens and secrets in seconds
445
458
  """
446
459
  return pulumi.get(self, "max_lease_ttl_seconds")
447
460
 
448
461
  @max_lease_ttl_seconds.setter
449
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
462
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
450
463
  pulumi.set(self, "max_lease_ttl_seconds", value)
451
464
 
452
- @property
465
+ @_builtins.property
453
466
  @pulumi.getter
454
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
467
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
455
468
  """
456
469
  The namespace to provision the resource in.
457
470
  The value should not contain leading or trailing forward slashes.
@@ -461,48 +474,48 @@ class SecretBackendArgs:
461
474
  return pulumi.get(self, "namespace")
462
475
 
463
476
  @namespace.setter
464
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
477
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
465
478
  pulumi.set(self, "namespace", value)
466
479
 
467
- @property
480
+ @_builtins.property
468
481
  @pulumi.getter
469
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
482
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
470
483
  """
471
484
  Specifies mount type specific options that are passed to the backend
472
485
  """
473
486
  return pulumi.get(self, "options")
474
487
 
475
488
  @options.setter
476
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
489
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
477
490
  pulumi.set(self, "options", value)
478
491
 
479
- @property
492
+ @_builtins.property
480
493
  @pulumi.getter(name="passthroughRequestHeaders")
481
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
494
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
482
495
  """
483
496
  List of headers to allow and pass from the request to the plugin
484
497
  """
485
498
  return pulumi.get(self, "passthrough_request_headers")
486
499
 
487
500
  @passthrough_request_headers.setter
488
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
501
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
489
502
  pulumi.set(self, "passthrough_request_headers", value)
490
503
 
491
- @property
504
+ @_builtins.property
492
505
  @pulumi.getter(name="passwordPolicy")
493
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
506
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
494
507
  """
495
508
  Name of the password policy to use to generate passwords.
496
509
  """
497
510
  return pulumi.get(self, "password_policy")
498
511
 
499
512
  @password_policy.setter
500
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
513
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
501
514
  pulumi.set(self, "password_policy", value)
502
515
 
503
- @property
516
+ @_builtins.property
504
517
  @pulumi.getter
505
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
518
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
506
519
  """
507
520
  The unique path this backend should be mounted at. Must
508
521
  not begin or end with a `/`. Defaults to `ldap`.
@@ -510,24 +523,24 @@ class SecretBackendArgs:
510
523
  return pulumi.get(self, "path")
511
524
 
512
525
  @path.setter
513
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
526
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
514
527
  pulumi.set(self, "path", value)
515
528
 
516
- @property
529
+ @_builtins.property
517
530
  @pulumi.getter(name="pluginVersion")
518
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
531
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
519
532
  """
520
533
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
521
534
  """
522
535
  return pulumi.get(self, "plugin_version")
523
536
 
524
537
  @plugin_version.setter
525
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
538
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
526
539
  pulumi.set(self, "plugin_version", value)
527
540
 
528
- @property
541
+ @_builtins.property
529
542
  @pulumi.getter(name="requestTimeout")
530
- def request_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
543
+ def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
531
544
  """
532
545
  Timeout, in seconds, for the connection when making requests against the server
533
546
  before returning back an error.
@@ -535,12 +548,12 @@ class SecretBackendArgs:
535
548
  return pulumi.get(self, "request_timeout")
536
549
 
537
550
  @request_timeout.setter
538
- def request_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
551
+ def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
539
552
  pulumi.set(self, "request_timeout", value)
540
553
 
541
- @property
554
+ @_builtins.property
542
555
  @pulumi.getter(name="rotationPeriod")
543
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
556
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
544
557
  """
545
558
  The amount of time in seconds Vault should wait before rotating the root credential.
546
559
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -548,12 +561,12 @@ class SecretBackendArgs:
548
561
  return pulumi.get(self, "rotation_period")
549
562
 
550
563
  @rotation_period.setter
551
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
564
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
552
565
  pulumi.set(self, "rotation_period", value)
553
566
 
554
- @property
567
+ @_builtins.property
555
568
  @pulumi.getter(name="rotationSchedule")
556
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
569
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
557
570
  """
558
571
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
559
572
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -561,12 +574,12 @@ class SecretBackendArgs:
561
574
  return pulumi.get(self, "rotation_schedule")
562
575
 
563
576
  @rotation_schedule.setter
564
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
577
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
565
578
  pulumi.set(self, "rotation_schedule", value)
566
579
 
567
- @property
580
+ @_builtins.property
568
581
  @pulumi.getter(name="rotationWindow")
569
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
582
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
570
583
  """
571
584
  The maximum amount of time in seconds allowed to complete
572
585
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -575,36 +588,36 @@ class SecretBackendArgs:
575
588
  return pulumi.get(self, "rotation_window")
576
589
 
577
590
  @rotation_window.setter
578
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
591
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
579
592
  pulumi.set(self, "rotation_window", value)
580
593
 
581
- @property
594
+ @_builtins.property
582
595
  @pulumi.getter
583
- def schema(self) -> Optional[pulumi.Input[builtins.str]]:
596
+ def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
584
597
  """
585
598
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
586
599
  """
587
600
  return pulumi.get(self, "schema")
588
601
 
589
602
  @schema.setter
590
- def schema(self, value: Optional[pulumi.Input[builtins.str]]):
603
+ def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
591
604
  pulumi.set(self, "schema", value)
592
605
 
593
- @property
606
+ @_builtins.property
594
607
  @pulumi.getter(name="sealWrap")
595
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
608
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
596
609
  """
597
610
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
598
611
  """
599
612
  return pulumi.get(self, "seal_wrap")
600
613
 
601
614
  @seal_wrap.setter
602
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
615
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
603
616
  pulumi.set(self, "seal_wrap", value)
604
617
 
605
- @property
618
+ @_builtins.property
606
619
  @pulumi.getter(name="skipStaticRoleImportRotation")
607
- def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
620
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
608
621
  """
609
622
  If set to true, static roles will not be rotated during import.
610
623
  Defaults to false. Requires Vault 1.16 or above.
@@ -612,36 +625,36 @@ class SecretBackendArgs:
612
625
  return pulumi.get(self, "skip_static_role_import_rotation")
613
626
 
614
627
  @skip_static_role_import_rotation.setter
615
- def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
628
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
616
629
  pulumi.set(self, "skip_static_role_import_rotation", value)
617
630
 
618
- @property
631
+ @_builtins.property
619
632
  @pulumi.getter
620
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
633
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
621
634
  """
622
635
  Issue a StartTLS command after establishing unencrypted connection.
623
636
  """
624
637
  return pulumi.get(self, "starttls")
625
638
 
626
639
  @starttls.setter
627
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
640
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
628
641
  pulumi.set(self, "starttls", value)
629
642
 
630
- @property
643
+ @_builtins.property
631
644
  @pulumi.getter
632
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
645
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
633
646
  """
634
647
  Enables userPrincipalDomain login with [username]@UPNDomain.
635
648
  """
636
649
  return pulumi.get(self, "upndomain")
637
650
 
638
651
  @upndomain.setter
639
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
652
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
640
653
  pulumi.set(self, "upndomain", value)
641
654
 
642
- @property
655
+ @_builtins.property
643
656
  @pulumi.getter
644
- def url(self) -> Optional[pulumi.Input[builtins.str]]:
657
+ def url(self) -> Optional[pulumi.Input[_builtins.str]]:
645
658
  """
646
659
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
647
660
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
@@ -649,134 +662,135 @@ class SecretBackendArgs:
649
662
  return pulumi.get(self, "url")
650
663
 
651
664
  @url.setter
652
- def url(self, value: Optional[pulumi.Input[builtins.str]]):
665
+ def url(self, value: Optional[pulumi.Input[_builtins.str]]):
653
666
  pulumi.set(self, "url", value)
654
667
 
655
- @property
668
+ @_builtins.property
656
669
  @pulumi.getter
657
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
670
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
658
671
  """
659
672
  Attribute used when searching users. Defaults to `cn`.
660
673
  """
661
674
  return pulumi.get(self, "userattr")
662
675
 
663
676
  @userattr.setter
664
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
677
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
665
678
  pulumi.set(self, "userattr", value)
666
679
 
667
- @property
680
+ @_builtins.property
668
681
  @pulumi.getter
669
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
682
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
670
683
  """
671
684
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
672
685
  """
673
686
  return pulumi.get(self, "userdn")
674
687
 
675
688
  @userdn.setter
676
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
689
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
677
690
  pulumi.set(self, "userdn", value)
678
691
 
679
692
 
680
693
  @pulumi.input_type
681
694
  class _SecretBackendState:
682
695
  def __init__(__self__, *,
683
- accessor: Optional[pulumi.Input[builtins.str]] = None,
684
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
685
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
686
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
687
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
688
- binddn: Optional[pulumi.Input[builtins.str]] = None,
689
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
690
- certificate: Optional[pulumi.Input[builtins.str]] = None,
691
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
692
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
693
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
694
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
695
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
696
- description: Optional[pulumi.Input[builtins.str]] = None,
697
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
698
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
699
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
700
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
701
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
702
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
703
- local: Optional[pulumi.Input[builtins.bool]] = None,
704
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
705
- namespace: Optional[pulumi.Input[builtins.str]] = None,
706
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
707
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
708
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
709
- path: Optional[pulumi.Input[builtins.str]] = None,
710
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
711
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
712
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
713
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
714
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
715
- schema: Optional[pulumi.Input[builtins.str]] = None,
716
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
717
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
718
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
719
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
720
- url: Optional[pulumi.Input[builtins.str]] = None,
721
- userattr: Optional[pulumi.Input[builtins.str]] = None,
722
- userdn: Optional[pulumi.Input[builtins.str]] = None):
696
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
697
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
698
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
699
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
700
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
701
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
702
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
703
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
704
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
705
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
706
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
707
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
708
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
709
+ description: Optional[pulumi.Input[_builtins.str]] = None,
710
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
711
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
712
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
713
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
714
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
715
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
716
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
717
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
718
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
719
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
720
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
721
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
722
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
723
+ path: Optional[pulumi.Input[_builtins.str]] = None,
724
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
725
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
726
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
727
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
728
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
729
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
730
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
731
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
732
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
733
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
734
+ url: Optional[pulumi.Input[_builtins.str]] = None,
735
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
736
+ userdn: Optional[pulumi.Input[_builtins.str]] = None):
723
737
  """
724
738
  Input properties used for looking up and filtering SecretBackend resources.
725
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
726
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
727
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
728
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
729
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
730
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
731
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
732
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
739
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
740
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
741
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
742
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
743
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
744
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
745
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
746
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
733
747
  x509 PEM encoded.
734
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
735
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
736
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
748
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
749
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
750
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
737
751
  the next URL in the configuration.
738
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
739
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
740
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
741
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
742
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
743
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
744
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
745
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
752
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
753
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
754
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
755
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
756
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
757
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
758
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
759
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
760
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
746
761
  Defaults to `false`.
747
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
748
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
749
- replication.Tolerance duration to use when checking the last rotation time.
750
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
751
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
762
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
763
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
764
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
765
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
752
766
  The value should not contain leading or trailing forward slashes.
753
767
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
754
768
  *Available only for Vault Enterprise*.
755
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
756
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
757
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
758
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
769
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
770
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
771
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
772
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
759
773
  not begin or end with a `/`. Defaults to `ldap`.
760
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
761
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
774
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
775
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
762
776
  before returning back an error.
763
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
777
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
764
778
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
765
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
779
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
766
780
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
767
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
781
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
768
782
  a rotation when a scheduled token rotation occurs. The default rotation window is
769
783
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
770
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
771
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
772
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
784
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
785
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
786
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
773
787
  Defaults to false. Requires Vault 1.16 or above.
774
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
775
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
776
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
788
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
789
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
790
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
777
791
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
778
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
779
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
792
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
793
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
780
794
  """
781
795
  if accessor is not None:
782
796
  pulumi.set(__self__, "accessor", accessor)
@@ -812,6 +826,8 @@ class _SecretBackendState:
812
826
  pulumi.set(__self__, "disable_remount", disable_remount)
813
827
  if external_entropy_access is not None:
814
828
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
829
+ if force_no_cache is not None:
830
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
815
831
  if identity_token_key is not None:
816
832
  pulumi.set(__self__, "identity_token_key", identity_token_key)
817
833
  if insecure_tls is not None:
@@ -859,93 +875,93 @@ class _SecretBackendState:
859
875
  if userdn is not None:
860
876
  pulumi.set(__self__, "userdn", userdn)
861
877
 
862
- @property
878
+ @_builtins.property
863
879
  @pulumi.getter
864
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
880
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
865
881
  """
866
882
  Accessor of the mount
867
883
  """
868
884
  return pulumi.get(self, "accessor")
869
885
 
870
886
  @accessor.setter
871
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
887
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
872
888
  pulumi.set(self, "accessor", value)
873
889
 
874
- @property
890
+ @_builtins.property
875
891
  @pulumi.getter(name="allowedManagedKeys")
876
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
892
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
877
893
  """
878
894
  List of managed key registry entry names that the mount in question is allowed to access
879
895
  """
880
896
  return pulumi.get(self, "allowed_managed_keys")
881
897
 
882
898
  @allowed_managed_keys.setter
883
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
899
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
884
900
  pulumi.set(self, "allowed_managed_keys", value)
885
901
 
886
- @property
902
+ @_builtins.property
887
903
  @pulumi.getter(name="allowedResponseHeaders")
888
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
904
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
889
905
  """
890
906
  List of headers to allow and pass from the request to the plugin
891
907
  """
892
908
  return pulumi.get(self, "allowed_response_headers")
893
909
 
894
910
  @allowed_response_headers.setter
895
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
911
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
896
912
  pulumi.set(self, "allowed_response_headers", value)
897
913
 
898
- @property
914
+ @_builtins.property
899
915
  @pulumi.getter(name="auditNonHmacRequestKeys")
900
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
916
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
901
917
  """
902
918
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
903
919
  """
904
920
  return pulumi.get(self, "audit_non_hmac_request_keys")
905
921
 
906
922
  @audit_non_hmac_request_keys.setter
907
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
923
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
908
924
  pulumi.set(self, "audit_non_hmac_request_keys", value)
909
925
 
910
- @property
926
+ @_builtins.property
911
927
  @pulumi.getter(name="auditNonHmacResponseKeys")
912
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
928
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
913
929
  """
914
930
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
915
931
  """
916
932
  return pulumi.get(self, "audit_non_hmac_response_keys")
917
933
 
918
934
  @audit_non_hmac_response_keys.setter
919
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
935
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
920
936
  pulumi.set(self, "audit_non_hmac_response_keys", value)
921
937
 
922
- @property
938
+ @_builtins.property
923
939
  @pulumi.getter
924
- def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
940
+ def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
925
941
  """
926
942
  Distinguished name of object to bind when performing user and group search.
927
943
  """
928
944
  return pulumi.get(self, "binddn")
929
945
 
930
946
  @binddn.setter
931
- def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
947
+ def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
932
948
  pulumi.set(self, "binddn", value)
933
949
 
934
- @property
950
+ @_builtins.property
935
951
  @pulumi.getter
936
- def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
952
+ def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
937
953
  """
938
954
  Password to use along with binddn when performing user search.
939
955
  """
940
956
  return pulumi.get(self, "bindpass")
941
957
 
942
958
  @bindpass.setter
943
- def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
959
+ def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
944
960
  pulumi.set(self, "bindpass", value)
945
961
 
946
- @property
962
+ @_builtins.property
947
963
  @pulumi.getter
948
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
964
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
949
965
  """
950
966
  CA certificate to use when verifying LDAP server certificate, must be
951
967
  x509 PEM encoded.
@@ -953,36 +969,36 @@ class _SecretBackendState:
953
969
  return pulumi.get(self, "certificate")
954
970
 
955
971
  @certificate.setter
956
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
972
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
957
973
  pulumi.set(self, "certificate", value)
958
974
 
959
- @property
975
+ @_builtins.property
960
976
  @pulumi.getter(name="clientTlsCert")
961
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
977
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
962
978
  """
963
979
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
964
980
  """
965
981
  return pulumi.get(self, "client_tls_cert")
966
982
 
967
983
  @client_tls_cert.setter
968
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
984
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
969
985
  pulumi.set(self, "client_tls_cert", value)
970
986
 
971
- @property
987
+ @_builtins.property
972
988
  @pulumi.getter(name="clientTlsKey")
973
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
989
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
974
990
  """
975
991
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
976
992
  """
977
993
  return pulumi.get(self, "client_tls_key")
978
994
 
979
995
  @client_tls_key.setter
980
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
996
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
981
997
  pulumi.set(self, "client_tls_key", value)
982
998
 
983
- @property
999
+ @_builtins.property
984
1000
  @pulumi.getter(name="connectionTimeout")
985
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
1001
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
986
1002
  """
987
1003
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
988
1004
  the next URL in the configuration.
@@ -990,96 +1006,108 @@ class _SecretBackendState:
990
1006
  return pulumi.get(self, "connection_timeout")
991
1007
 
992
1008
  @connection_timeout.setter
993
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
1009
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
994
1010
  pulumi.set(self, "connection_timeout", value)
995
1011
 
996
- @property
1012
+ @_builtins.property
997
1013
  @pulumi.getter(name="defaultLeaseTtlSeconds")
998
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
1014
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
999
1015
  """
1000
- Default lease duration for secrets in seconds.
1016
+ Default lease duration for tokens and secrets in seconds
1001
1017
  """
1002
1018
  return pulumi.get(self, "default_lease_ttl_seconds")
1003
1019
 
1004
1020
  @default_lease_ttl_seconds.setter
1005
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1021
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1006
1022
  pulumi.set(self, "default_lease_ttl_seconds", value)
1007
1023
 
1008
- @property
1024
+ @_builtins.property
1009
1025
  @pulumi.getter(name="delegatedAuthAccessors")
1010
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1026
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1011
1027
  """
1012
1028
  List of headers to allow and pass from the request to the plugin
1013
1029
  """
1014
1030
  return pulumi.get(self, "delegated_auth_accessors")
1015
1031
 
1016
1032
  @delegated_auth_accessors.setter
1017
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1033
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1018
1034
  pulumi.set(self, "delegated_auth_accessors", value)
1019
1035
 
1020
- @property
1036
+ @_builtins.property
1021
1037
  @pulumi.getter
1022
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
1038
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
1023
1039
  """
1024
- Human-friendly description of the mount for the Active Directory backend.
1040
+ Human-friendly description of the mount
1025
1041
  """
1026
1042
  return pulumi.get(self, "description")
1027
1043
 
1028
1044
  @description.setter
1029
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
1045
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
1030
1046
  pulumi.set(self, "description", value)
1031
1047
 
1032
- @property
1048
+ @_builtins.property
1033
1049
  @pulumi.getter(name="disableAutomatedRotation")
1034
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1050
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1035
1051
  """
1036
1052
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1037
1053
  """
1038
1054
  return pulumi.get(self, "disable_automated_rotation")
1039
1055
 
1040
1056
  @disable_automated_rotation.setter
1041
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1057
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1042
1058
  pulumi.set(self, "disable_automated_rotation", value)
1043
1059
 
1044
- @property
1060
+ @_builtins.property
1045
1061
  @pulumi.getter(name="disableRemount")
1046
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
1062
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
1047
1063
  """
1048
1064
  If set, opts out of mount migration on path updates.
1049
1065
  """
1050
1066
  return pulumi.get(self, "disable_remount")
1051
1067
 
1052
1068
  @disable_remount.setter
1053
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
1069
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
1054
1070
  pulumi.set(self, "disable_remount", value)
1055
1071
 
1056
- @property
1072
+ @_builtins.property
1057
1073
  @pulumi.getter(name="externalEntropyAccess")
1058
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
1074
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
1059
1075
  """
1060
1076
  Enable the secrets engine to access Vault's external entropy source
1061
1077
  """
1062
1078
  return pulumi.get(self, "external_entropy_access")
1063
1079
 
1064
1080
  @external_entropy_access.setter
1065
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
1081
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
1066
1082
  pulumi.set(self, "external_entropy_access", value)
1067
1083
 
1068
- @property
1084
+ @_builtins.property
1085
+ @pulumi.getter(name="forceNoCache")
1086
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
1087
+ """
1088
+ If set to true, disables caching.
1089
+ """
1090
+ return pulumi.get(self, "force_no_cache")
1091
+
1092
+ @force_no_cache.setter
1093
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
1094
+ pulumi.set(self, "force_no_cache", value)
1095
+
1096
+ @_builtins.property
1069
1097
  @pulumi.getter(name="identityTokenKey")
1070
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
1098
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
1071
1099
  """
1072
1100
  The key to use for signing plugin workload identity tokens
1073
1101
  """
1074
1102
  return pulumi.get(self, "identity_token_key")
1075
1103
 
1076
1104
  @identity_token_key.setter
1077
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
1105
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
1078
1106
  pulumi.set(self, "identity_token_key", value)
1079
1107
 
1080
- @property
1108
+ @_builtins.property
1081
1109
  @pulumi.getter(name="insecureTls")
1082
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
1110
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1083
1111
  """
1084
1112
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
1085
1113
  Defaults to `false`.
@@ -1087,49 +1115,48 @@ class _SecretBackendState:
1087
1115
  return pulumi.get(self, "insecure_tls")
1088
1116
 
1089
1117
  @insecure_tls.setter
1090
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
1118
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1091
1119
  pulumi.set(self, "insecure_tls", value)
1092
1120
 
1093
- @property
1121
+ @_builtins.property
1094
1122
  @pulumi.getter(name="listingVisibility")
1095
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
1123
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
1096
1124
  """
1097
1125
  Specifies whether to show this mount in the UI-specific listing endpoint
1098
1126
  """
1099
1127
  return pulumi.get(self, "listing_visibility")
1100
1128
 
1101
1129
  @listing_visibility.setter
1102
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
1130
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
1103
1131
  pulumi.set(self, "listing_visibility", value)
1104
1132
 
1105
- @property
1133
+ @_builtins.property
1106
1134
  @pulumi.getter
1107
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1135
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1108
1136
  """
1109
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
1110
- replication.Tolerance duration to use when checking the last rotation time.
1137
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1111
1138
  """
1112
1139
  return pulumi.get(self, "local")
1113
1140
 
1114
1141
  @local.setter
1115
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1142
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
1116
1143
  pulumi.set(self, "local", value)
1117
1144
 
1118
- @property
1145
+ @_builtins.property
1119
1146
  @pulumi.getter(name="maxLeaseTtlSeconds")
1120
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
1147
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
1121
1148
  """
1122
- Maximum possible lease duration for secrets in seconds.
1149
+ Maximum possible lease duration for tokens and secrets in seconds
1123
1150
  """
1124
1151
  return pulumi.get(self, "max_lease_ttl_seconds")
1125
1152
 
1126
1153
  @max_lease_ttl_seconds.setter
1127
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1154
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1128
1155
  pulumi.set(self, "max_lease_ttl_seconds", value)
1129
1156
 
1130
- @property
1157
+ @_builtins.property
1131
1158
  @pulumi.getter
1132
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1159
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1133
1160
  """
1134
1161
  The namespace to provision the resource in.
1135
1162
  The value should not contain leading or trailing forward slashes.
@@ -1139,48 +1166,48 @@ class _SecretBackendState:
1139
1166
  return pulumi.get(self, "namespace")
1140
1167
 
1141
1168
  @namespace.setter
1142
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1169
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1143
1170
  pulumi.set(self, "namespace", value)
1144
1171
 
1145
- @property
1172
+ @_builtins.property
1146
1173
  @pulumi.getter
1147
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
1174
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1148
1175
  """
1149
1176
  Specifies mount type specific options that are passed to the backend
1150
1177
  """
1151
1178
  return pulumi.get(self, "options")
1152
1179
 
1153
1180
  @options.setter
1154
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
1181
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1155
1182
  pulumi.set(self, "options", value)
1156
1183
 
1157
- @property
1184
+ @_builtins.property
1158
1185
  @pulumi.getter(name="passthroughRequestHeaders")
1159
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1186
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1160
1187
  """
1161
1188
  List of headers to allow and pass from the request to the plugin
1162
1189
  """
1163
1190
  return pulumi.get(self, "passthrough_request_headers")
1164
1191
 
1165
1192
  @passthrough_request_headers.setter
1166
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1193
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1167
1194
  pulumi.set(self, "passthrough_request_headers", value)
1168
1195
 
1169
- @property
1196
+ @_builtins.property
1170
1197
  @pulumi.getter(name="passwordPolicy")
1171
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
1198
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
1172
1199
  """
1173
1200
  Name of the password policy to use to generate passwords.
1174
1201
  """
1175
1202
  return pulumi.get(self, "password_policy")
1176
1203
 
1177
1204
  @password_policy.setter
1178
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
1205
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
1179
1206
  pulumi.set(self, "password_policy", value)
1180
1207
 
1181
- @property
1208
+ @_builtins.property
1182
1209
  @pulumi.getter
1183
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
1210
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1184
1211
  """
1185
1212
  The unique path this backend should be mounted at. Must
1186
1213
  not begin or end with a `/`. Defaults to `ldap`.
@@ -1188,24 +1215,24 @@ class _SecretBackendState:
1188
1215
  return pulumi.get(self, "path")
1189
1216
 
1190
1217
  @path.setter
1191
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
1218
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1192
1219
  pulumi.set(self, "path", value)
1193
1220
 
1194
- @property
1221
+ @_builtins.property
1195
1222
  @pulumi.getter(name="pluginVersion")
1196
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
1223
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1197
1224
  """
1198
1225
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1199
1226
  """
1200
1227
  return pulumi.get(self, "plugin_version")
1201
1228
 
1202
1229
  @plugin_version.setter
1203
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
1230
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1204
1231
  pulumi.set(self, "plugin_version", value)
1205
1232
 
1206
- @property
1233
+ @_builtins.property
1207
1234
  @pulumi.getter(name="requestTimeout")
1208
- def request_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
1235
+ def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
1209
1236
  """
1210
1237
  Timeout, in seconds, for the connection when making requests against the server
1211
1238
  before returning back an error.
@@ -1213,12 +1240,12 @@ class _SecretBackendState:
1213
1240
  return pulumi.get(self, "request_timeout")
1214
1241
 
1215
1242
  @request_timeout.setter
1216
- def request_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
1243
+ def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
1217
1244
  pulumi.set(self, "request_timeout", value)
1218
1245
 
1219
- @property
1246
+ @_builtins.property
1220
1247
  @pulumi.getter(name="rotationPeriod")
1221
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
1248
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1222
1249
  """
1223
1250
  The amount of time in seconds Vault should wait before rotating the root credential.
1224
1251
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1226,12 +1253,12 @@ class _SecretBackendState:
1226
1253
  return pulumi.get(self, "rotation_period")
1227
1254
 
1228
1255
  @rotation_period.setter
1229
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
1256
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1230
1257
  pulumi.set(self, "rotation_period", value)
1231
1258
 
1232
- @property
1259
+ @_builtins.property
1233
1260
  @pulumi.getter(name="rotationSchedule")
1234
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
1261
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
1235
1262
  """
1236
1263
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1237
1264
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -1239,12 +1266,12 @@ class _SecretBackendState:
1239
1266
  return pulumi.get(self, "rotation_schedule")
1240
1267
 
1241
1268
  @rotation_schedule.setter
1242
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
1269
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
1243
1270
  pulumi.set(self, "rotation_schedule", value)
1244
1271
 
1245
- @property
1272
+ @_builtins.property
1246
1273
  @pulumi.getter(name="rotationWindow")
1247
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1274
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1248
1275
  """
1249
1276
  The maximum amount of time in seconds allowed to complete
1250
1277
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1253,36 +1280,36 @@ class _SecretBackendState:
1253
1280
  return pulumi.get(self, "rotation_window")
1254
1281
 
1255
1282
  @rotation_window.setter
1256
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1283
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1257
1284
  pulumi.set(self, "rotation_window", value)
1258
1285
 
1259
- @property
1286
+ @_builtins.property
1260
1287
  @pulumi.getter
1261
- def schema(self) -> Optional[pulumi.Input[builtins.str]]:
1288
+ def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
1262
1289
  """
1263
1290
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1264
1291
  """
1265
1292
  return pulumi.get(self, "schema")
1266
1293
 
1267
1294
  @schema.setter
1268
- def schema(self, value: Optional[pulumi.Input[builtins.str]]):
1295
+ def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
1269
1296
  pulumi.set(self, "schema", value)
1270
1297
 
1271
- @property
1298
+ @_builtins.property
1272
1299
  @pulumi.getter(name="sealWrap")
1273
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
1300
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1274
1301
  """
1275
1302
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1276
1303
  """
1277
1304
  return pulumi.get(self, "seal_wrap")
1278
1305
 
1279
1306
  @seal_wrap.setter
1280
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
1307
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1281
1308
  pulumi.set(self, "seal_wrap", value)
1282
1309
 
1283
- @property
1310
+ @_builtins.property
1284
1311
  @pulumi.getter(name="skipStaticRoleImportRotation")
1285
- def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1312
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1286
1313
  """
1287
1314
  If set to true, static roles will not be rotated during import.
1288
1315
  Defaults to false. Requires Vault 1.16 or above.
@@ -1290,36 +1317,36 @@ class _SecretBackendState:
1290
1317
  return pulumi.get(self, "skip_static_role_import_rotation")
1291
1318
 
1292
1319
  @skip_static_role_import_rotation.setter
1293
- def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1320
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1294
1321
  pulumi.set(self, "skip_static_role_import_rotation", value)
1295
1322
 
1296
- @property
1323
+ @_builtins.property
1297
1324
  @pulumi.getter
1298
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
1325
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1299
1326
  """
1300
1327
  Issue a StartTLS command after establishing unencrypted connection.
1301
1328
  """
1302
1329
  return pulumi.get(self, "starttls")
1303
1330
 
1304
1331
  @starttls.setter
1305
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
1332
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1306
1333
  pulumi.set(self, "starttls", value)
1307
1334
 
1308
- @property
1335
+ @_builtins.property
1309
1336
  @pulumi.getter
1310
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
1337
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
1311
1338
  """
1312
1339
  Enables userPrincipalDomain login with [username]@UPNDomain.
1313
1340
  """
1314
1341
  return pulumi.get(self, "upndomain")
1315
1342
 
1316
1343
  @upndomain.setter
1317
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
1344
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
1318
1345
  pulumi.set(self, "upndomain", value)
1319
1346
 
1320
- @property
1347
+ @_builtins.property
1321
1348
  @pulumi.getter
1322
- def url(self) -> Optional[pulumi.Input[builtins.str]]:
1349
+ def url(self) -> Optional[pulumi.Input[_builtins.str]]:
1323
1350
  """
1324
1351
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
1325
1352
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
@@ -1327,31 +1354,31 @@ class _SecretBackendState:
1327
1354
  return pulumi.get(self, "url")
1328
1355
 
1329
1356
  @url.setter
1330
- def url(self, value: Optional[pulumi.Input[builtins.str]]):
1357
+ def url(self, value: Optional[pulumi.Input[_builtins.str]]):
1331
1358
  pulumi.set(self, "url", value)
1332
1359
 
1333
- @property
1360
+ @_builtins.property
1334
1361
  @pulumi.getter
1335
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
1362
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
1336
1363
  """
1337
1364
  Attribute used when searching users. Defaults to `cn`.
1338
1365
  """
1339
1366
  return pulumi.get(self, "userattr")
1340
1367
 
1341
1368
  @userattr.setter
1342
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
1369
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
1343
1370
  pulumi.set(self, "userattr", value)
1344
1371
 
1345
- @property
1372
+ @_builtins.property
1346
1373
  @pulumi.getter
1347
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
1374
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
1348
1375
  """
1349
1376
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1350
1377
  """
1351
1378
  return pulumi.get(self, "userdn")
1352
1379
 
1353
1380
  @userdn.setter
1354
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
1381
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
1355
1382
  pulumi.set(self, "userdn", value)
1356
1383
 
1357
1384
 
@@ -1361,45 +1388,46 @@ class SecretBackend(pulumi.CustomResource):
1361
1388
  def __init__(__self__,
1362
1389
  resource_name: str,
1363
1390
  opts: Optional[pulumi.ResourceOptions] = None,
1364
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1365
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1366
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1367
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1368
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1369
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1370
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1371
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1372
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1373
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1374
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1375
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1376
- description: Optional[pulumi.Input[builtins.str]] = None,
1377
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1378
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1379
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1380
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1381
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1382
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1383
- local: Optional[pulumi.Input[builtins.bool]] = None,
1384
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1385
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1386
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1387
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1388
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1389
- path: Optional[pulumi.Input[builtins.str]] = None,
1390
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1391
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1392
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1393
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1394
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1395
- schema: Optional[pulumi.Input[builtins.str]] = None,
1396
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1397
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1398
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1399
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1400
- url: Optional[pulumi.Input[builtins.str]] = None,
1401
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1402
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1391
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1392
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1393
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1394
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1395
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1396
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1397
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1398
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1399
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1400
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1401
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1402
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1403
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1404
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1405
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1406
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1407
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1408
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1409
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1410
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1411
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1412
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1413
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1414
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1415
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1416
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1418
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1419
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1420
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1421
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1422
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1423
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1424
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1425
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1426
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1427
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1428
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1429
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1430
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1403
1431
  __props__=None):
1404
1432
  """
1405
1433
  ## Example Usage
@@ -1429,60 +1457,60 @@ class SecretBackend(pulumi.CustomResource):
1429
1457
 
1430
1458
  :param str resource_name: The name of the resource.
1431
1459
  :param pulumi.ResourceOptions opts: Options for the resource.
1432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1434
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1436
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1437
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
1438
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1460
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1461
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1462
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1463
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1464
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1465
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
1466
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1439
1467
  x509 PEM encoded.
1440
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1441
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1442
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1468
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1469
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1470
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1443
1471
  the next URL in the configuration.
1444
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1445
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1446
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1447
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1448
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1449
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1450
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1451
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1472
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1473
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1474
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1475
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1476
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1477
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1478
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1479
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1480
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1452
1481
  Defaults to `false`.
1453
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1454
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1455
- replication.Tolerance duration to use when checking the last rotation time.
1456
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1457
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1482
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1483
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1484
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1485
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1458
1486
  The value should not contain leading or trailing forward slashes.
1459
1487
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1460
1488
  *Available only for Vault Enterprise*.
1461
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1462
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1463
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
1464
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1489
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1490
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1491
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
1492
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1465
1493
  not begin or end with a `/`. Defaults to `ldap`.
1466
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1467
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1494
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1495
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1468
1496
  before returning back an error.
1469
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1497
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1470
1498
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1471
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1499
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1472
1500
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1473
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1501
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1474
1502
  a rotation when a scheduled token rotation occurs. The default rotation window is
1475
1503
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1476
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1477
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1478
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1504
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1505
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1506
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1479
1507
  Defaults to false. Requires Vault 1.16 or above.
1480
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1481
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1482
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1508
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1509
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1510
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1483
1511
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
1484
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1485
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1512
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1513
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1486
1514
  """
1487
1515
  ...
1488
1516
  @overload
@@ -1531,45 +1559,46 @@ class SecretBackend(pulumi.CustomResource):
1531
1559
  def _internal_init(__self__,
1532
1560
  resource_name: str,
1533
1561
  opts: Optional[pulumi.ResourceOptions] = None,
1534
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1535
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1536
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1537
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1538
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1539
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1540
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1541
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1542
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1543
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1544
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1545
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1546
- description: Optional[pulumi.Input[builtins.str]] = None,
1547
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1548
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1549
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1550
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1551
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1552
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1553
- local: Optional[pulumi.Input[builtins.bool]] = None,
1554
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1555
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1556
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1557
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1558
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1559
- path: Optional[pulumi.Input[builtins.str]] = None,
1560
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1561
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1562
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1563
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1564
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1565
- schema: Optional[pulumi.Input[builtins.str]] = None,
1566
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1567
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1568
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1569
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1570
- url: Optional[pulumi.Input[builtins.str]] = None,
1571
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1572
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1562
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1563
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1564
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1565
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1566
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1567
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1568
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1569
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1570
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1571
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1572
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1573
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1574
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1575
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1576
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1577
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1578
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1579
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1580
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1581
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1582
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1583
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1584
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1585
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1586
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1587
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1588
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1589
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1590
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1591
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1592
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1593
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1594
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1595
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1596
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1597
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1598
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1599
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1600
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1601
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1573
1602
  __props__=None):
1574
1603
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1575
1604
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1599,6 +1628,7 @@ class SecretBackend(pulumi.CustomResource):
1599
1628
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1600
1629
  __props__.__dict__["disable_remount"] = disable_remount
1601
1630
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1631
+ __props__.__dict__["force_no_cache"] = force_no_cache
1602
1632
  __props__.__dict__["identity_token_key"] = identity_token_key
1603
1633
  __props__.__dict__["insecure_tls"] = insecure_tls
1604
1634
  __props__.__dict__["listing_visibility"] = listing_visibility
@@ -1635,46 +1665,47 @@ class SecretBackend(pulumi.CustomResource):
1635
1665
  def get(resource_name: str,
1636
1666
  id: pulumi.Input[str],
1637
1667
  opts: Optional[pulumi.ResourceOptions] = None,
1638
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1639
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1640
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1641
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1642
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1643
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1644
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1645
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1646
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1647
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1648
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1649
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1650
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1651
- description: Optional[pulumi.Input[builtins.str]] = None,
1652
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1653
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1654
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1655
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1656
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1657
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1658
- local: Optional[pulumi.Input[builtins.bool]] = None,
1659
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1660
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1661
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1662
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1663
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1664
- path: Optional[pulumi.Input[builtins.str]] = None,
1665
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1666
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1667
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1668
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1669
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1670
- schema: Optional[pulumi.Input[builtins.str]] = None,
1671
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1672
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1673
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1674
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1675
- url: Optional[pulumi.Input[builtins.str]] = None,
1676
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1677
- userdn: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1668
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1669
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1670
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1671
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1672
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1673
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1674
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1675
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1676
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1677
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1678
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1679
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1680
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1681
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1682
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1683
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1684
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1685
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1686
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1687
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1688
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1689
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1690
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1691
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1692
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1693
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1694
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1695
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1696
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1697
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1698
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1699
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1700
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1701
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1702
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1703
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1704
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1705
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1706
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1707
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1708
+ userdn: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1678
1709
  """
1679
1710
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
1680
1711
  properties used to qualify the lookup.
@@ -1682,61 +1713,61 @@ class SecretBackend(pulumi.CustomResource):
1682
1713
  :param str resource_name: The unique name of the resulting resource.
1683
1714
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1684
1715
  :param pulumi.ResourceOptions opts: Options for the resource.
1685
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1686
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1687
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1688
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1689
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1690
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1691
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
1692
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1716
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1717
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1718
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1719
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1720
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1721
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1722
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
1723
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1693
1724
  x509 PEM encoded.
1694
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1695
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1696
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1725
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1726
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1727
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1697
1728
  the next URL in the configuration.
1698
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1699
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1700
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1701
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1702
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1703
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1704
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1705
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1729
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1730
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1731
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1732
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1733
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1734
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1735
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1736
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1737
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1706
1738
  Defaults to `false`.
1707
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1708
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1709
- replication.Tolerance duration to use when checking the last rotation time.
1710
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1711
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1739
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1740
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1741
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1742
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1712
1743
  The value should not contain leading or trailing forward slashes.
1713
1744
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1714
1745
  *Available only for Vault Enterprise*.
1715
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1716
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1717
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
1718
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1746
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1747
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1748
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
1749
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1719
1750
  not begin or end with a `/`. Defaults to `ldap`.
1720
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1721
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1751
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1752
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1722
1753
  before returning back an error.
1723
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1754
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1724
1755
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1725
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1756
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1726
1757
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1727
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1758
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1728
1759
  a rotation when a scheduled token rotation occurs. The default rotation window is
1729
1760
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1730
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1731
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1732
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1761
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1762
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1763
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1733
1764
  Defaults to false. Requires Vault 1.16 or above.
1734
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1735
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1736
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1765
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1766
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1767
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1737
1768
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
1738
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1739
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1769
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1770
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1740
1771
  """
1741
1772
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1742
1773
 
@@ -1759,6 +1790,7 @@ class SecretBackend(pulumi.CustomResource):
1759
1790
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1760
1791
  __props__.__dict__["disable_remount"] = disable_remount
1761
1792
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1793
+ __props__.__dict__["force_no_cache"] = force_no_cache
1762
1794
  __props__.__dict__["identity_token_key"] = identity_token_key
1763
1795
  __props__.__dict__["insecure_tls"] = insecure_tls
1764
1796
  __props__.__dict__["listing_visibility"] = listing_visibility
@@ -1784,189 +1816,196 @@ class SecretBackend(pulumi.CustomResource):
1784
1816
  __props__.__dict__["userdn"] = userdn
1785
1817
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
1786
1818
 
1787
- @property
1819
+ @_builtins.property
1788
1820
  @pulumi.getter
1789
- def accessor(self) -> pulumi.Output[builtins.str]:
1821
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1790
1822
  """
1791
1823
  Accessor of the mount
1792
1824
  """
1793
1825
  return pulumi.get(self, "accessor")
1794
1826
 
1795
- @property
1827
+ @_builtins.property
1796
1828
  @pulumi.getter(name="allowedManagedKeys")
1797
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1829
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1798
1830
  """
1799
1831
  List of managed key registry entry names that the mount in question is allowed to access
1800
1832
  """
1801
1833
  return pulumi.get(self, "allowed_managed_keys")
1802
1834
 
1803
- @property
1835
+ @_builtins.property
1804
1836
  @pulumi.getter(name="allowedResponseHeaders")
1805
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1837
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1806
1838
  """
1807
1839
  List of headers to allow and pass from the request to the plugin
1808
1840
  """
1809
1841
  return pulumi.get(self, "allowed_response_headers")
1810
1842
 
1811
- @property
1843
+ @_builtins.property
1812
1844
  @pulumi.getter(name="auditNonHmacRequestKeys")
1813
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1845
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1814
1846
  """
1815
1847
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1816
1848
  """
1817
1849
  return pulumi.get(self, "audit_non_hmac_request_keys")
1818
1850
 
1819
- @property
1851
+ @_builtins.property
1820
1852
  @pulumi.getter(name="auditNonHmacResponseKeys")
1821
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1853
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1822
1854
  """
1823
1855
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1824
1856
  """
1825
1857
  return pulumi.get(self, "audit_non_hmac_response_keys")
1826
1858
 
1827
- @property
1859
+ @_builtins.property
1828
1860
  @pulumi.getter
1829
- def binddn(self) -> pulumi.Output[builtins.str]:
1861
+ def binddn(self) -> pulumi.Output[_builtins.str]:
1830
1862
  """
1831
1863
  Distinguished name of object to bind when performing user and group search.
1832
1864
  """
1833
1865
  return pulumi.get(self, "binddn")
1834
1866
 
1835
- @property
1867
+ @_builtins.property
1836
1868
  @pulumi.getter
1837
- def bindpass(self) -> pulumi.Output[builtins.str]:
1869
+ def bindpass(self) -> pulumi.Output[_builtins.str]:
1838
1870
  """
1839
1871
  Password to use along with binddn when performing user search.
1840
1872
  """
1841
1873
  return pulumi.get(self, "bindpass")
1842
1874
 
1843
- @property
1875
+ @_builtins.property
1844
1876
  @pulumi.getter
1845
- def certificate(self) -> pulumi.Output[Optional[builtins.str]]:
1877
+ def certificate(self) -> pulumi.Output[Optional[_builtins.str]]:
1846
1878
  """
1847
1879
  CA certificate to use when verifying LDAP server certificate, must be
1848
1880
  x509 PEM encoded.
1849
1881
  """
1850
1882
  return pulumi.get(self, "certificate")
1851
1883
 
1852
- @property
1884
+ @_builtins.property
1853
1885
  @pulumi.getter(name="clientTlsCert")
1854
- def client_tls_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1886
+ def client_tls_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1855
1887
  """
1856
1888
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1857
1889
  """
1858
1890
  return pulumi.get(self, "client_tls_cert")
1859
1891
 
1860
- @property
1892
+ @_builtins.property
1861
1893
  @pulumi.getter(name="clientTlsKey")
1862
- def client_tls_key(self) -> pulumi.Output[Optional[builtins.str]]:
1894
+ def client_tls_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1863
1895
  """
1864
1896
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1865
1897
  """
1866
1898
  return pulumi.get(self, "client_tls_key")
1867
1899
 
1868
- @property
1900
+ @_builtins.property
1869
1901
  @pulumi.getter(name="connectionTimeout")
1870
- def connection_timeout(self) -> pulumi.Output[Optional[builtins.int]]:
1902
+ def connection_timeout(self) -> pulumi.Output[Optional[_builtins.int]]:
1871
1903
  """
1872
1904
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
1873
1905
  the next URL in the configuration.
1874
1906
  """
1875
1907
  return pulumi.get(self, "connection_timeout")
1876
1908
 
1877
- @property
1909
+ @_builtins.property
1878
1910
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1879
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1911
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1880
1912
  """
1881
- Default lease duration for secrets in seconds.
1913
+ Default lease duration for tokens and secrets in seconds
1882
1914
  """
1883
1915
  return pulumi.get(self, "default_lease_ttl_seconds")
1884
1916
 
1885
- @property
1917
+ @_builtins.property
1886
1918
  @pulumi.getter(name="delegatedAuthAccessors")
1887
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1919
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1888
1920
  """
1889
1921
  List of headers to allow and pass from the request to the plugin
1890
1922
  """
1891
1923
  return pulumi.get(self, "delegated_auth_accessors")
1892
1924
 
1893
- @property
1925
+ @_builtins.property
1894
1926
  @pulumi.getter
1895
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1927
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1896
1928
  """
1897
- Human-friendly description of the mount for the Active Directory backend.
1929
+ Human-friendly description of the mount
1898
1930
  """
1899
1931
  return pulumi.get(self, "description")
1900
1932
 
1901
- @property
1933
+ @_builtins.property
1902
1934
  @pulumi.getter(name="disableAutomatedRotation")
1903
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1935
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1904
1936
  """
1905
1937
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1906
1938
  """
1907
1939
  return pulumi.get(self, "disable_automated_rotation")
1908
1940
 
1909
- @property
1941
+ @_builtins.property
1910
1942
  @pulumi.getter(name="disableRemount")
1911
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1943
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1912
1944
  """
1913
1945
  If set, opts out of mount migration on path updates.
1914
1946
  """
1915
1947
  return pulumi.get(self, "disable_remount")
1916
1948
 
1917
- @property
1949
+ @_builtins.property
1918
1950
  @pulumi.getter(name="externalEntropyAccess")
1919
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1951
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1920
1952
  """
1921
1953
  Enable the secrets engine to access Vault's external entropy source
1922
1954
  """
1923
1955
  return pulumi.get(self, "external_entropy_access")
1924
1956
 
1925
- @property
1957
+ @_builtins.property
1958
+ @pulumi.getter(name="forceNoCache")
1959
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1960
+ """
1961
+ If set to true, disables caching.
1962
+ """
1963
+ return pulumi.get(self, "force_no_cache")
1964
+
1965
+ @_builtins.property
1926
1966
  @pulumi.getter(name="identityTokenKey")
1927
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1967
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1928
1968
  """
1929
1969
  The key to use for signing plugin workload identity tokens
1930
1970
  """
1931
1971
  return pulumi.get(self, "identity_token_key")
1932
1972
 
1933
- @property
1973
+ @_builtins.property
1934
1974
  @pulumi.getter(name="insecureTls")
1935
- def insecure_tls(self) -> pulumi.Output[Optional[builtins.bool]]:
1975
+ def insecure_tls(self) -> pulumi.Output[Optional[_builtins.bool]]:
1936
1976
  """
1937
1977
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
1938
1978
  Defaults to `false`.
1939
1979
  """
1940
1980
  return pulumi.get(self, "insecure_tls")
1941
1981
 
1942
- @property
1982
+ @_builtins.property
1943
1983
  @pulumi.getter(name="listingVisibility")
1944
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1984
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1945
1985
  """
1946
1986
  Specifies whether to show this mount in the UI-specific listing endpoint
1947
1987
  """
1948
1988
  return pulumi.get(self, "listing_visibility")
1949
1989
 
1950
- @property
1990
+ @_builtins.property
1951
1991
  @pulumi.getter
1952
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1992
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1953
1993
  """
1954
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
1955
- replication.Tolerance duration to use when checking the last rotation time.
1994
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1956
1995
  """
1957
1996
  return pulumi.get(self, "local")
1958
1997
 
1959
- @property
1998
+ @_builtins.property
1960
1999
  @pulumi.getter(name="maxLeaseTtlSeconds")
1961
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
2000
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1962
2001
  """
1963
- Maximum possible lease duration for secrets in seconds.
2002
+ Maximum possible lease duration for tokens and secrets in seconds
1964
2003
  """
1965
2004
  return pulumi.get(self, "max_lease_ttl_seconds")
1966
2005
 
1967
- @property
2006
+ @_builtins.property
1968
2007
  @pulumi.getter
1969
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
2008
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1970
2009
  """
1971
2010
  The namespace to provision the resource in.
1972
2011
  The value should not contain leading or trailing forward slashes.
@@ -1975,77 +2014,77 @@ class SecretBackend(pulumi.CustomResource):
1975
2014
  """
1976
2015
  return pulumi.get(self, "namespace")
1977
2016
 
1978
- @property
2017
+ @_builtins.property
1979
2018
  @pulumi.getter
1980
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
2019
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1981
2020
  """
1982
2021
  Specifies mount type specific options that are passed to the backend
1983
2022
  """
1984
2023
  return pulumi.get(self, "options")
1985
2024
 
1986
- @property
2025
+ @_builtins.property
1987
2026
  @pulumi.getter(name="passthroughRequestHeaders")
1988
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2027
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1989
2028
  """
1990
2029
  List of headers to allow and pass from the request to the plugin
1991
2030
  """
1992
2031
  return pulumi.get(self, "passthrough_request_headers")
1993
2032
 
1994
- @property
2033
+ @_builtins.property
1995
2034
  @pulumi.getter(name="passwordPolicy")
1996
- def password_policy(self) -> pulumi.Output[Optional[builtins.str]]:
2035
+ def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
1997
2036
  """
1998
2037
  Name of the password policy to use to generate passwords.
1999
2038
  """
2000
2039
  return pulumi.get(self, "password_policy")
2001
2040
 
2002
- @property
2041
+ @_builtins.property
2003
2042
  @pulumi.getter
2004
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
2043
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
2005
2044
  """
2006
2045
  The unique path this backend should be mounted at. Must
2007
2046
  not begin or end with a `/`. Defaults to `ldap`.
2008
2047
  """
2009
2048
  return pulumi.get(self, "path")
2010
2049
 
2011
- @property
2050
+ @_builtins.property
2012
2051
  @pulumi.getter(name="pluginVersion")
2013
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
2052
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
2014
2053
  """
2015
2054
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2016
2055
  """
2017
2056
  return pulumi.get(self, "plugin_version")
2018
2057
 
2019
- @property
2058
+ @_builtins.property
2020
2059
  @pulumi.getter(name="requestTimeout")
2021
- def request_timeout(self) -> pulumi.Output[builtins.int]:
2060
+ def request_timeout(self) -> pulumi.Output[_builtins.int]:
2022
2061
  """
2023
2062
  Timeout, in seconds, for the connection when making requests against the server
2024
2063
  before returning back an error.
2025
2064
  """
2026
2065
  return pulumi.get(self, "request_timeout")
2027
2066
 
2028
- @property
2067
+ @_builtins.property
2029
2068
  @pulumi.getter(name="rotationPeriod")
2030
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
2069
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
2031
2070
  """
2032
2071
  The amount of time in seconds Vault should wait before rotating the root credential.
2033
2072
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
2034
2073
  """
2035
2074
  return pulumi.get(self, "rotation_period")
2036
2075
 
2037
- @property
2076
+ @_builtins.property
2038
2077
  @pulumi.getter(name="rotationSchedule")
2039
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
2078
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
2040
2079
  """
2041
2080
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
2042
2081
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
2043
2082
  """
2044
2083
  return pulumi.get(self, "rotation_schedule")
2045
2084
 
2046
- @property
2085
+ @_builtins.property
2047
2086
  @pulumi.getter(name="rotationWindow")
2048
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
2087
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
2049
2088
  """
2050
2089
  The maximum amount of time in seconds allowed to complete
2051
2090
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -2053,67 +2092,67 @@ class SecretBackend(pulumi.CustomResource):
2053
2092
  """
2054
2093
  return pulumi.get(self, "rotation_window")
2055
2094
 
2056
- @property
2095
+ @_builtins.property
2057
2096
  @pulumi.getter
2058
- def schema(self) -> pulumi.Output[builtins.str]:
2097
+ def schema(self) -> pulumi.Output[_builtins.str]:
2059
2098
  """
2060
2099
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
2061
2100
  """
2062
2101
  return pulumi.get(self, "schema")
2063
2102
 
2064
- @property
2103
+ @_builtins.property
2065
2104
  @pulumi.getter(name="sealWrap")
2066
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
2105
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
2067
2106
  """
2068
2107
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
2069
2108
  """
2070
2109
  return pulumi.get(self, "seal_wrap")
2071
2110
 
2072
- @property
2111
+ @_builtins.property
2073
2112
  @pulumi.getter(name="skipStaticRoleImportRotation")
2074
- def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
2113
+ def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
2075
2114
  """
2076
2115
  If set to true, static roles will not be rotated during import.
2077
2116
  Defaults to false. Requires Vault 1.16 or above.
2078
2117
  """
2079
2118
  return pulumi.get(self, "skip_static_role_import_rotation")
2080
2119
 
2081
- @property
2120
+ @_builtins.property
2082
2121
  @pulumi.getter
2083
- def starttls(self) -> pulumi.Output[builtins.bool]:
2122
+ def starttls(self) -> pulumi.Output[_builtins.bool]:
2084
2123
  """
2085
2124
  Issue a StartTLS command after establishing unencrypted connection.
2086
2125
  """
2087
2126
  return pulumi.get(self, "starttls")
2088
2127
 
2089
- @property
2128
+ @_builtins.property
2090
2129
  @pulumi.getter
2091
- def upndomain(self) -> pulumi.Output[builtins.str]:
2130
+ def upndomain(self) -> pulumi.Output[_builtins.str]:
2092
2131
  """
2093
2132
  Enables userPrincipalDomain login with [username]@UPNDomain.
2094
2133
  """
2095
2134
  return pulumi.get(self, "upndomain")
2096
2135
 
2097
- @property
2136
+ @_builtins.property
2098
2137
  @pulumi.getter
2099
- def url(self) -> pulumi.Output[builtins.str]:
2138
+ def url(self) -> pulumi.Output[_builtins.str]:
2100
2139
  """
2101
2140
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
2102
2141
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
2103
2142
  """
2104
2143
  return pulumi.get(self, "url")
2105
2144
 
2106
- @property
2145
+ @_builtins.property
2107
2146
  @pulumi.getter
2108
- def userattr(self) -> pulumi.Output[builtins.str]:
2147
+ def userattr(self) -> pulumi.Output[_builtins.str]:
2109
2148
  """
2110
2149
  Attribute used when searching users. Defaults to `cn`.
2111
2150
  """
2112
2151
  return pulumi.get(self, "userattr")
2113
2152
 
2114
- @property
2153
+ @_builtins.property
2115
2154
  @pulumi.getter
2116
- def userdn(self) -> pulumi.Output[Optional[builtins.str]]:
2155
+ def userdn(self) -> pulumi.Output[Optional[_builtins.str]]:
2117
2156
  """
2118
2157
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
2119
2158
  """