pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,57 +21,59 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
22
21
  @pulumi.input_type
23
22
  class AuthBackendArgs:
24
23
  def __init__(__self__, *,
25
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
26
- default_role: Optional[pulumi.Input[builtins.str]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
30
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
31
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- local: Optional[pulumi.Input[builtins.bool]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
36
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
37
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
38
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
39
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
40
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
41
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
- path: Optional[pulumi.Input[builtins.str]] = None,
43
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
24
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
25
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
26
+ description: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
29
+ jwks_pairs: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]] = None,
30
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
31
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
35
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
37
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
38
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
39
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
40
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
41
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
42
+ path: Optional[pulumi.Input[_builtins.str]] = None,
43
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
44
44
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
45
- type: Optional[pulumi.Input[builtins.str]] = None):
45
+ type: Optional[pulumi.Input[_builtins.str]] = None):
46
46
  """
47
47
  The set of arguments for constructing a AuthBackend resource.
48
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
49
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
50
- :param pulumi.Input[builtins.str] description: The description of the auth backend
51
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
48
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
49
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
50
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
51
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
52
52
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
53
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
54
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
55
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
56
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
57
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
58
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
53
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
54
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]] jwks_pairs: List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
55
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
58
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
59
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
59
60
  The value should not contain leading or trailing forward slashes.
60
61
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
61
62
  *Available only for Vault Enterprise*.
62
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
63
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
63
64
 
64
65
  * tune - (Optional) Extra configuration block. Structure is documented below.
65
66
 
66
67
  The `tune` block is used to tune the auth backend:
67
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
68
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
69
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
70
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
71
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
72
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
73
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
74
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
75
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
68
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
69
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
70
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
71
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
72
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
73
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
74
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
75
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
76
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
76
77
  """
77
78
  if bound_issuer is not None:
78
79
  pulumi.set(__self__, "bound_issuer", bound_issuer)
@@ -84,6 +85,8 @@ class AuthBackendArgs:
84
85
  pulumi.set(__self__, "disable_remount", disable_remount)
85
86
  if jwks_ca_pem is not None:
86
87
  pulumi.set(__self__, "jwks_ca_pem", jwks_ca_pem)
88
+ if jwks_pairs is not None:
89
+ pulumi.set(__self__, "jwks_pairs", jwks_pairs)
87
90
  if jwks_url is not None:
88
91
  pulumi.set(__self__, "jwks_url", jwks_url)
89
92
  if jwt_supported_algs is not None:
@@ -117,45 +120,45 @@ class AuthBackendArgs:
117
120
  if type is not None:
118
121
  pulumi.set(__self__, "type", type)
119
122
 
120
- @property
123
+ @_builtins.property
121
124
  @pulumi.getter(name="boundIssuer")
122
- def bound_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
125
+ def bound_issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
123
126
  """
124
127
  The value against which to match the iss claim in a JWT
125
128
  """
126
129
  return pulumi.get(self, "bound_issuer")
127
130
 
128
131
  @bound_issuer.setter
129
- def bound_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
132
+ def bound_issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
130
133
  pulumi.set(self, "bound_issuer", value)
131
134
 
132
- @property
135
+ @_builtins.property
133
136
  @pulumi.getter(name="defaultRole")
134
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
137
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
135
138
  """
136
139
  The default role to use if none is provided during login
137
140
  """
138
141
  return pulumi.get(self, "default_role")
139
142
 
140
143
  @default_role.setter
141
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
144
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
142
145
  pulumi.set(self, "default_role", value)
143
146
 
144
- @property
147
+ @_builtins.property
145
148
  @pulumi.getter
146
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
149
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
147
150
  """
148
151
  The description of the auth backend
149
152
  """
150
153
  return pulumi.get(self, "description")
151
154
 
152
155
  @description.setter
153
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
156
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
154
157
  pulumi.set(self, "description", value)
155
158
 
156
- @property
159
+ @_builtins.property
157
160
  @pulumi.getter(name="disableRemount")
158
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
161
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
159
162
  """
160
163
  If set, opts out of mount migration on path updates.
161
164
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -163,72 +166,84 @@ class AuthBackendArgs:
163
166
  return pulumi.get(self, "disable_remount")
164
167
 
165
168
  @disable_remount.setter
166
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
169
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
167
170
  pulumi.set(self, "disable_remount", value)
168
171
 
169
- @property
172
+ @_builtins.property
170
173
  @pulumi.getter(name="jwksCaPem")
171
- def jwks_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
174
+ def jwks_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
172
175
  """
173
176
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
174
177
  """
175
178
  return pulumi.get(self, "jwks_ca_pem")
176
179
 
177
180
  @jwks_ca_pem.setter
178
- def jwks_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
181
+ def jwks_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
179
182
  pulumi.set(self, "jwks_ca_pem", value)
180
183
 
181
- @property
184
+ @_builtins.property
185
+ @pulumi.getter(name="jwksPairs")
186
+ def jwks_pairs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]]:
187
+ """
188
+ List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
189
+ """
190
+ return pulumi.get(self, "jwks_pairs")
191
+
192
+ @jwks_pairs.setter
193
+ def jwks_pairs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]]):
194
+ pulumi.set(self, "jwks_pairs", value)
195
+
196
+ @_builtins.property
182
197
  @pulumi.getter(name="jwksUrl")
183
- def jwks_url(self) -> Optional[pulumi.Input[builtins.str]]:
198
+ def jwks_url(self) -> Optional[pulumi.Input[_builtins.str]]:
184
199
  """
185
200
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
186
201
  """
187
202
  return pulumi.get(self, "jwks_url")
188
203
 
189
204
  @jwks_url.setter
190
- def jwks_url(self, value: Optional[pulumi.Input[builtins.str]]):
205
+ def jwks_url(self, value: Optional[pulumi.Input[_builtins.str]]):
191
206
  pulumi.set(self, "jwks_url", value)
192
207
 
193
- @property
208
+ @_builtins.property
194
209
  @pulumi.getter(name="jwtSupportedAlgs")
195
- def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
210
+ def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
211
  """
197
212
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
198
213
  """
199
214
  return pulumi.get(self, "jwt_supported_algs")
200
215
 
201
216
  @jwt_supported_algs.setter
202
- def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
217
+ def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
218
  pulumi.set(self, "jwt_supported_algs", value)
204
219
 
205
- @property
220
+ @_builtins.property
206
221
  @pulumi.getter(name="jwtValidationPubkeys")
207
- def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
222
+ def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
223
  """
209
224
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
210
225
  """
211
226
  return pulumi.get(self, "jwt_validation_pubkeys")
212
227
 
213
228
  @jwt_validation_pubkeys.setter
214
- def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
229
+ def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
230
  pulumi.set(self, "jwt_validation_pubkeys", value)
216
231
 
217
- @property
232
+ @_builtins.property
218
233
  @pulumi.getter
219
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
234
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
220
235
  """
221
236
  Specifies if the auth method is local only.
222
237
  """
223
238
  return pulumi.get(self, "local")
224
239
 
225
240
  @local.setter
226
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
241
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
227
242
  pulumi.set(self, "local", value)
228
243
 
229
- @property
244
+ @_builtins.property
230
245
  @pulumi.getter
231
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
246
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
232
247
  """
233
248
  The namespace to provision the resource in.
234
249
  The value should not contain leading or trailing forward slashes.
@@ -238,12 +253,12 @@ class AuthBackendArgs:
238
253
  return pulumi.get(self, "namespace")
239
254
 
240
255
  @namespace.setter
241
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
256
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
242
257
  pulumi.set(self, "namespace", value)
243
258
 
244
- @property
259
+ @_builtins.property
245
260
  @pulumi.getter(name="namespaceInState")
246
- def namespace_in_state(self) -> Optional[pulumi.Input[builtins.bool]]:
261
+ def namespace_in_state(self) -> Optional[pulumi.Input[_builtins.bool]]:
247
262
  """
248
263
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
249
264
 
@@ -254,106 +269,106 @@ class AuthBackendArgs:
254
269
  return pulumi.get(self, "namespace_in_state")
255
270
 
256
271
  @namespace_in_state.setter
257
- def namespace_in_state(self, value: Optional[pulumi.Input[builtins.bool]]):
272
+ def namespace_in_state(self, value: Optional[pulumi.Input[_builtins.bool]]):
258
273
  pulumi.set(self, "namespace_in_state", value)
259
274
 
260
- @property
275
+ @_builtins.property
261
276
  @pulumi.getter(name="oidcClientId")
262
- def oidc_client_id(self) -> Optional[pulumi.Input[builtins.str]]:
277
+ def oidc_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
263
278
  """
264
279
  Client ID used for OIDC backends
265
280
  """
266
281
  return pulumi.get(self, "oidc_client_id")
267
282
 
268
283
  @oidc_client_id.setter
269
- def oidc_client_id(self, value: Optional[pulumi.Input[builtins.str]]):
284
+ def oidc_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
270
285
  pulumi.set(self, "oidc_client_id", value)
271
286
 
272
- @property
287
+ @_builtins.property
273
288
  @pulumi.getter(name="oidcClientSecret")
274
- def oidc_client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
289
+ def oidc_client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
275
290
  """
276
291
  Client Secret used for OIDC backends
277
292
  """
278
293
  return pulumi.get(self, "oidc_client_secret")
279
294
 
280
295
  @oidc_client_secret.setter
281
- def oidc_client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
296
+ def oidc_client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
282
297
  pulumi.set(self, "oidc_client_secret", value)
283
298
 
284
- @property
299
+ @_builtins.property
285
300
  @pulumi.getter(name="oidcDiscoveryCaPem")
286
- def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
301
+ def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
287
302
  """
288
303
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
289
304
  """
290
305
  return pulumi.get(self, "oidc_discovery_ca_pem")
291
306
 
292
307
  @oidc_discovery_ca_pem.setter
293
- def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
308
+ def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
294
309
  pulumi.set(self, "oidc_discovery_ca_pem", value)
295
310
 
296
- @property
311
+ @_builtins.property
297
312
  @pulumi.getter(name="oidcDiscoveryUrl")
298
- def oidc_discovery_url(self) -> Optional[pulumi.Input[builtins.str]]:
313
+ def oidc_discovery_url(self) -> Optional[pulumi.Input[_builtins.str]]:
299
314
  """
300
315
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
301
316
  """
302
317
  return pulumi.get(self, "oidc_discovery_url")
303
318
 
304
319
  @oidc_discovery_url.setter
305
- def oidc_discovery_url(self, value: Optional[pulumi.Input[builtins.str]]):
320
+ def oidc_discovery_url(self, value: Optional[pulumi.Input[_builtins.str]]):
306
321
  pulumi.set(self, "oidc_discovery_url", value)
307
322
 
308
- @property
323
+ @_builtins.property
309
324
  @pulumi.getter(name="oidcResponseMode")
310
- def oidc_response_mode(self) -> Optional[pulumi.Input[builtins.str]]:
325
+ def oidc_response_mode(self) -> Optional[pulumi.Input[_builtins.str]]:
311
326
  """
312
327
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
313
328
  """
314
329
  return pulumi.get(self, "oidc_response_mode")
315
330
 
316
331
  @oidc_response_mode.setter
317
- def oidc_response_mode(self, value: Optional[pulumi.Input[builtins.str]]):
332
+ def oidc_response_mode(self, value: Optional[pulumi.Input[_builtins.str]]):
318
333
  pulumi.set(self, "oidc_response_mode", value)
319
334
 
320
- @property
335
+ @_builtins.property
321
336
  @pulumi.getter(name="oidcResponseTypes")
322
- def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
337
+ def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
323
338
  """
324
339
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
325
340
  """
326
341
  return pulumi.get(self, "oidc_response_types")
327
342
 
328
343
  @oidc_response_types.setter
329
- def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
344
+ def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
330
345
  pulumi.set(self, "oidc_response_types", value)
331
346
 
332
- @property
347
+ @_builtins.property
333
348
  @pulumi.getter
334
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
349
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
335
350
  """
336
351
  Path to mount the JWT/OIDC auth backend
337
352
  """
338
353
  return pulumi.get(self, "path")
339
354
 
340
355
  @path.setter
341
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
356
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
342
357
  pulumi.set(self, "path", value)
343
358
 
344
- @property
359
+ @_builtins.property
345
360
  @pulumi.getter(name="providerConfig")
346
- def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
361
+ def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
347
362
  """
348
363
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
349
364
  """
350
365
  return pulumi.get(self, "provider_config")
351
366
 
352
367
  @provider_config.setter
353
- def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
368
+ def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
354
369
  pulumi.set(self, "provider_config", value)
355
370
 
356
- @property
371
+ @_builtins.property
357
372
  @pulumi.getter
358
373
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
359
374
  return pulumi.get(self, "tune")
@@ -362,75 +377,77 @@ class AuthBackendArgs:
362
377
  def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
363
378
  pulumi.set(self, "tune", value)
364
379
 
365
- @property
380
+ @_builtins.property
366
381
  @pulumi.getter
367
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
382
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
368
383
  """
369
384
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
370
385
  """
371
386
  return pulumi.get(self, "type")
372
387
 
373
388
  @type.setter
374
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
389
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
375
390
  pulumi.set(self, "type", value)
376
391
 
377
392
 
378
393
  @pulumi.input_type
379
394
  class _AuthBackendState:
380
395
  def __init__(__self__, *,
381
- accessor: Optional[pulumi.Input[builtins.str]] = None,
382
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
383
- default_role: Optional[pulumi.Input[builtins.str]] = None,
384
- description: Optional[pulumi.Input[builtins.str]] = None,
385
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
386
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
387
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
388
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
389
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
390
- local: Optional[pulumi.Input[builtins.bool]] = None,
391
- namespace: Optional[pulumi.Input[builtins.str]] = None,
392
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
393
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
394
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
395
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
396
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
397
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
398
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
399
- path: Optional[pulumi.Input[builtins.str]] = None,
400
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
396
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
397
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
398
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
399
+ description: Optional[pulumi.Input[_builtins.str]] = None,
400
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
401
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
402
+ jwks_pairs: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]] = None,
403
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
404
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
405
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
406
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
407
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
408
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
409
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
410
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
411
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
412
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
413
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
414
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
415
+ path: Optional[pulumi.Input[_builtins.str]] = None,
416
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
401
417
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
402
- type: Optional[pulumi.Input[builtins.str]] = None):
418
+ type: Optional[pulumi.Input[_builtins.str]] = None):
403
419
  """
404
420
  Input properties used for looking up and filtering AuthBackend resources.
405
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth method
406
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
407
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
408
- :param pulumi.Input[builtins.str] description: The description of the auth backend
409
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
421
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth method
422
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
423
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
424
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
425
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
410
426
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
411
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
412
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
413
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
414
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
415
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
416
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
427
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
428
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]] jwks_pairs: List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
429
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
430
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
431
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
432
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
433
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
417
434
  The value should not contain leading or trailing forward slashes.
418
435
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
419
436
  *Available only for Vault Enterprise*.
420
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
437
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
421
438
 
422
439
  * tune - (Optional) Extra configuration block. Structure is documented below.
423
440
 
424
441
  The `tune` block is used to tune the auth backend:
425
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
426
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
427
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
428
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
429
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
430
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
431
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
432
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
433
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
442
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
443
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
444
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
445
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
446
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
447
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
448
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
449
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
450
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
434
451
  """
435
452
  if accessor is not None:
436
453
  pulumi.set(__self__, "accessor", accessor)
@@ -444,6 +461,8 @@ class _AuthBackendState:
444
461
  pulumi.set(__self__, "disable_remount", disable_remount)
445
462
  if jwks_ca_pem is not None:
446
463
  pulumi.set(__self__, "jwks_ca_pem", jwks_ca_pem)
464
+ if jwks_pairs is not None:
465
+ pulumi.set(__self__, "jwks_pairs", jwks_pairs)
447
466
  if jwks_url is not None:
448
467
  pulumi.set(__self__, "jwks_url", jwks_url)
449
468
  if jwt_supported_algs is not None:
@@ -477,57 +496,57 @@ class _AuthBackendState:
477
496
  if type is not None:
478
497
  pulumi.set(__self__, "type", type)
479
498
 
480
- @property
499
+ @_builtins.property
481
500
  @pulumi.getter
482
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
501
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
483
502
  """
484
503
  The accessor for this auth method
485
504
  """
486
505
  return pulumi.get(self, "accessor")
487
506
 
488
507
  @accessor.setter
489
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
508
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
490
509
  pulumi.set(self, "accessor", value)
491
510
 
492
- @property
511
+ @_builtins.property
493
512
  @pulumi.getter(name="boundIssuer")
494
- def bound_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
513
+ def bound_issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
495
514
  """
496
515
  The value against which to match the iss claim in a JWT
497
516
  """
498
517
  return pulumi.get(self, "bound_issuer")
499
518
 
500
519
  @bound_issuer.setter
501
- def bound_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
520
+ def bound_issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
502
521
  pulumi.set(self, "bound_issuer", value)
503
522
 
504
- @property
523
+ @_builtins.property
505
524
  @pulumi.getter(name="defaultRole")
506
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
525
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
507
526
  """
508
527
  The default role to use if none is provided during login
509
528
  """
510
529
  return pulumi.get(self, "default_role")
511
530
 
512
531
  @default_role.setter
513
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
532
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
514
533
  pulumi.set(self, "default_role", value)
515
534
 
516
- @property
535
+ @_builtins.property
517
536
  @pulumi.getter
518
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
537
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
519
538
  """
520
539
  The description of the auth backend
521
540
  """
522
541
  return pulumi.get(self, "description")
523
542
 
524
543
  @description.setter
525
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
544
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
526
545
  pulumi.set(self, "description", value)
527
546
 
528
- @property
547
+ @_builtins.property
529
548
  @pulumi.getter(name="disableRemount")
530
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
549
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
531
550
  """
532
551
  If set, opts out of mount migration on path updates.
533
552
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -535,72 +554,84 @@ class _AuthBackendState:
535
554
  return pulumi.get(self, "disable_remount")
536
555
 
537
556
  @disable_remount.setter
538
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
557
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
539
558
  pulumi.set(self, "disable_remount", value)
540
559
 
541
- @property
560
+ @_builtins.property
542
561
  @pulumi.getter(name="jwksCaPem")
543
- def jwks_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
562
+ def jwks_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
544
563
  """
545
564
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
546
565
  """
547
566
  return pulumi.get(self, "jwks_ca_pem")
548
567
 
549
568
  @jwks_ca_pem.setter
550
- def jwks_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
569
+ def jwks_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
551
570
  pulumi.set(self, "jwks_ca_pem", value)
552
571
 
553
- @property
572
+ @_builtins.property
573
+ @pulumi.getter(name="jwksPairs")
574
+ def jwks_pairs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]]:
575
+ """
576
+ List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
577
+ """
578
+ return pulumi.get(self, "jwks_pairs")
579
+
580
+ @jwks_pairs.setter
581
+ def jwks_pairs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]]):
582
+ pulumi.set(self, "jwks_pairs", value)
583
+
584
+ @_builtins.property
554
585
  @pulumi.getter(name="jwksUrl")
555
- def jwks_url(self) -> Optional[pulumi.Input[builtins.str]]:
586
+ def jwks_url(self) -> Optional[pulumi.Input[_builtins.str]]:
556
587
  """
557
588
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
558
589
  """
559
590
  return pulumi.get(self, "jwks_url")
560
591
 
561
592
  @jwks_url.setter
562
- def jwks_url(self, value: Optional[pulumi.Input[builtins.str]]):
593
+ def jwks_url(self, value: Optional[pulumi.Input[_builtins.str]]):
563
594
  pulumi.set(self, "jwks_url", value)
564
595
 
565
- @property
596
+ @_builtins.property
566
597
  @pulumi.getter(name="jwtSupportedAlgs")
567
- def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
598
+ def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
568
599
  """
569
600
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
570
601
  """
571
602
  return pulumi.get(self, "jwt_supported_algs")
572
603
 
573
604
  @jwt_supported_algs.setter
574
- def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
605
+ def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
575
606
  pulumi.set(self, "jwt_supported_algs", value)
576
607
 
577
- @property
608
+ @_builtins.property
578
609
  @pulumi.getter(name="jwtValidationPubkeys")
579
- def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
610
+ def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
580
611
  """
581
612
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
582
613
  """
583
614
  return pulumi.get(self, "jwt_validation_pubkeys")
584
615
 
585
616
  @jwt_validation_pubkeys.setter
586
- def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
617
+ def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
587
618
  pulumi.set(self, "jwt_validation_pubkeys", value)
588
619
 
589
- @property
620
+ @_builtins.property
590
621
  @pulumi.getter
591
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
622
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
592
623
  """
593
624
  Specifies if the auth method is local only.
594
625
  """
595
626
  return pulumi.get(self, "local")
596
627
 
597
628
  @local.setter
598
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
629
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
599
630
  pulumi.set(self, "local", value)
600
631
 
601
- @property
632
+ @_builtins.property
602
633
  @pulumi.getter
603
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
634
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
604
635
  """
605
636
  The namespace to provision the resource in.
606
637
  The value should not contain leading or trailing forward slashes.
@@ -610,12 +641,12 @@ class _AuthBackendState:
610
641
  return pulumi.get(self, "namespace")
611
642
 
612
643
  @namespace.setter
613
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
644
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
614
645
  pulumi.set(self, "namespace", value)
615
646
 
616
- @property
647
+ @_builtins.property
617
648
  @pulumi.getter(name="namespaceInState")
618
- def namespace_in_state(self) -> Optional[pulumi.Input[builtins.bool]]:
649
+ def namespace_in_state(self) -> Optional[pulumi.Input[_builtins.bool]]:
619
650
  """
620
651
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
621
652
 
@@ -626,106 +657,106 @@ class _AuthBackendState:
626
657
  return pulumi.get(self, "namespace_in_state")
627
658
 
628
659
  @namespace_in_state.setter
629
- def namespace_in_state(self, value: Optional[pulumi.Input[builtins.bool]]):
660
+ def namespace_in_state(self, value: Optional[pulumi.Input[_builtins.bool]]):
630
661
  pulumi.set(self, "namespace_in_state", value)
631
662
 
632
- @property
663
+ @_builtins.property
633
664
  @pulumi.getter(name="oidcClientId")
634
- def oidc_client_id(self) -> Optional[pulumi.Input[builtins.str]]:
665
+ def oidc_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
635
666
  """
636
667
  Client ID used for OIDC backends
637
668
  """
638
669
  return pulumi.get(self, "oidc_client_id")
639
670
 
640
671
  @oidc_client_id.setter
641
- def oidc_client_id(self, value: Optional[pulumi.Input[builtins.str]]):
672
+ def oidc_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
642
673
  pulumi.set(self, "oidc_client_id", value)
643
674
 
644
- @property
675
+ @_builtins.property
645
676
  @pulumi.getter(name="oidcClientSecret")
646
- def oidc_client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
677
+ def oidc_client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
647
678
  """
648
679
  Client Secret used for OIDC backends
649
680
  """
650
681
  return pulumi.get(self, "oidc_client_secret")
651
682
 
652
683
  @oidc_client_secret.setter
653
- def oidc_client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
684
+ def oidc_client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
654
685
  pulumi.set(self, "oidc_client_secret", value)
655
686
 
656
- @property
687
+ @_builtins.property
657
688
  @pulumi.getter(name="oidcDiscoveryCaPem")
658
- def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
689
+ def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
659
690
  """
660
691
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
661
692
  """
662
693
  return pulumi.get(self, "oidc_discovery_ca_pem")
663
694
 
664
695
  @oidc_discovery_ca_pem.setter
665
- def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
696
+ def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
666
697
  pulumi.set(self, "oidc_discovery_ca_pem", value)
667
698
 
668
- @property
699
+ @_builtins.property
669
700
  @pulumi.getter(name="oidcDiscoveryUrl")
670
- def oidc_discovery_url(self) -> Optional[pulumi.Input[builtins.str]]:
701
+ def oidc_discovery_url(self) -> Optional[pulumi.Input[_builtins.str]]:
671
702
  """
672
703
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
673
704
  """
674
705
  return pulumi.get(self, "oidc_discovery_url")
675
706
 
676
707
  @oidc_discovery_url.setter
677
- def oidc_discovery_url(self, value: Optional[pulumi.Input[builtins.str]]):
708
+ def oidc_discovery_url(self, value: Optional[pulumi.Input[_builtins.str]]):
678
709
  pulumi.set(self, "oidc_discovery_url", value)
679
710
 
680
- @property
711
+ @_builtins.property
681
712
  @pulumi.getter(name="oidcResponseMode")
682
- def oidc_response_mode(self) -> Optional[pulumi.Input[builtins.str]]:
713
+ def oidc_response_mode(self) -> Optional[pulumi.Input[_builtins.str]]:
683
714
  """
684
715
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
685
716
  """
686
717
  return pulumi.get(self, "oidc_response_mode")
687
718
 
688
719
  @oidc_response_mode.setter
689
- def oidc_response_mode(self, value: Optional[pulumi.Input[builtins.str]]):
720
+ def oidc_response_mode(self, value: Optional[pulumi.Input[_builtins.str]]):
690
721
  pulumi.set(self, "oidc_response_mode", value)
691
722
 
692
- @property
723
+ @_builtins.property
693
724
  @pulumi.getter(name="oidcResponseTypes")
694
- def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
725
+ def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
695
726
  """
696
727
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
697
728
  """
698
729
  return pulumi.get(self, "oidc_response_types")
699
730
 
700
731
  @oidc_response_types.setter
701
- def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
732
+ def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
702
733
  pulumi.set(self, "oidc_response_types", value)
703
734
 
704
- @property
735
+ @_builtins.property
705
736
  @pulumi.getter
706
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
737
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
707
738
  """
708
739
  Path to mount the JWT/OIDC auth backend
709
740
  """
710
741
  return pulumi.get(self, "path")
711
742
 
712
743
  @path.setter
713
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
744
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
714
745
  pulumi.set(self, "path", value)
715
746
 
716
- @property
747
+ @_builtins.property
717
748
  @pulumi.getter(name="providerConfig")
718
- def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
749
+ def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
719
750
  """
720
751
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
721
752
  """
722
753
  return pulumi.get(self, "provider_config")
723
754
 
724
755
  @provider_config.setter
725
- def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
756
+ def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
726
757
  pulumi.set(self, "provider_config", value)
727
758
 
728
- @property
759
+ @_builtins.property
729
760
  @pulumi.getter
730
761
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
731
762
  return pulumi.get(self, "tune")
@@ -734,16 +765,16 @@ class _AuthBackendState:
734
765
  def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
735
766
  pulumi.set(self, "tune", value)
736
767
 
737
- @property
768
+ @_builtins.property
738
769
  @pulumi.getter
739
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
770
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
740
771
  """
741
772
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
742
773
  """
743
774
  return pulumi.get(self, "type")
744
775
 
745
776
  @type.setter
746
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
777
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
747
778
  pulumi.set(self, "type", value)
748
779
 
749
780
 
@@ -753,27 +784,28 @@ class AuthBackend(pulumi.CustomResource):
753
784
  def __init__(__self__,
754
785
  resource_name: str,
755
786
  opts: Optional[pulumi.ResourceOptions] = None,
756
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
757
- default_role: Optional[pulumi.Input[builtins.str]] = None,
758
- description: Optional[pulumi.Input[builtins.str]] = None,
759
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
760
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
761
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
762
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
763
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
764
- local: Optional[pulumi.Input[builtins.bool]] = None,
765
- namespace: Optional[pulumi.Input[builtins.str]] = None,
766
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
767
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
768
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
769
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
770
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
771
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
772
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
773
- path: Optional[pulumi.Input[builtins.str]] = None,
774
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
787
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
788
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
789
+ description: Optional[pulumi.Input[_builtins.str]] = None,
790
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
791
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
792
+ jwks_pairs: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]] = None,
793
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
794
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
795
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
796
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
797
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
798
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
799
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
800
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
801
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
802
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
803
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
804
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
805
+ path: Optional[pulumi.Input[_builtins.str]] = None,
806
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
775
807
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
776
- type: Optional[pulumi.Input[builtins.str]] = None,
808
+ type: Optional[pulumi.Input[_builtins.str]] = None,
777
809
  __props__=None):
778
810
  """
779
811
  Provides a resource for managing an
@@ -847,34 +879,35 @@ class AuthBackend(pulumi.CustomResource):
847
879
 
848
880
  :param str resource_name: The name of the resource.
849
881
  :param pulumi.ResourceOptions opts: Options for the resource.
850
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
851
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
852
- :param pulumi.Input[builtins.str] description: The description of the auth backend
853
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
882
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
883
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
884
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
885
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
854
886
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
855
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
856
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
857
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
858
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
859
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
860
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
887
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
888
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]] jwks_pairs: List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
889
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
890
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
891
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
892
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
893
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
861
894
  The value should not contain leading or trailing forward slashes.
862
895
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
863
896
  *Available only for Vault Enterprise*.
864
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
897
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
865
898
 
866
899
  * tune - (Optional) Extra configuration block. Structure is documented below.
867
900
 
868
901
  The `tune` block is used to tune the auth backend:
869
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
870
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
871
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
872
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
873
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
874
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
875
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
876
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
877
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
902
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
903
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
904
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
905
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
906
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
907
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
908
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
909
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
910
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
878
911
  """
879
912
  ...
880
913
  @overload
@@ -967,27 +1000,28 @@ class AuthBackend(pulumi.CustomResource):
967
1000
  def _internal_init(__self__,
968
1001
  resource_name: str,
969
1002
  opts: Optional[pulumi.ResourceOptions] = None,
970
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
971
- default_role: Optional[pulumi.Input[builtins.str]] = None,
972
- description: Optional[pulumi.Input[builtins.str]] = None,
973
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
974
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
975
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
976
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
977
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
978
- local: Optional[pulumi.Input[builtins.bool]] = None,
979
- namespace: Optional[pulumi.Input[builtins.str]] = None,
980
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
981
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
982
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
983
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
984
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
985
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
986
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
987
- path: Optional[pulumi.Input[builtins.str]] = None,
988
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1003
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
1004
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
1005
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1008
+ jwks_pairs: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]] = None,
1009
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
1010
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1011
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1012
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1013
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1014
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
1016
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1017
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
1019
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1021
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1022
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
989
1023
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
990
- type: Optional[pulumi.Input[builtins.str]] = None,
1024
+ type: Optional[pulumi.Input[_builtins.str]] = None,
991
1025
  __props__=None):
992
1026
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
993
1027
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1002,6 +1036,7 @@ class AuthBackend(pulumi.CustomResource):
1002
1036
  __props__.__dict__["description"] = description
1003
1037
  __props__.__dict__["disable_remount"] = disable_remount
1004
1038
  __props__.__dict__["jwks_ca_pem"] = jwks_ca_pem
1039
+ __props__.__dict__["jwks_pairs"] = jwks_pairs
1005
1040
  __props__.__dict__["jwks_url"] = jwks_url
1006
1041
  __props__.__dict__["jwt_supported_algs"] = jwt_supported_algs
1007
1042
  __props__.__dict__["jwt_validation_pubkeys"] = jwt_validation_pubkeys
@@ -1031,28 +1066,29 @@ class AuthBackend(pulumi.CustomResource):
1031
1066
  def get(resource_name: str,
1032
1067
  id: pulumi.Input[str],
1033
1068
  opts: Optional[pulumi.ResourceOptions] = None,
1034
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1035
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
1036
- default_role: Optional[pulumi.Input[builtins.str]] = None,
1037
- description: Optional[pulumi.Input[builtins.str]] = None,
1038
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1039
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
1040
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
1041
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1042
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1043
- local: Optional[pulumi.Input[builtins.bool]] = None,
1044
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1045
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
1046
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
1047
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
1048
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
1049
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
1050
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
1051
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1052
- path: Optional[pulumi.Input[builtins.str]] = None,
1053
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1069
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1070
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
1071
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
1072
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1073
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1074
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1075
+ jwks_pairs: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]]] = None,
1076
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
1077
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1078
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1079
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1080
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1081
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
1082
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
1083
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1084
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1085
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
1086
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
1087
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1088
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1089
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1054
1090
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
1055
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackend':
1091
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackend':
1056
1092
  """
1057
1093
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
1058
1094
  properties used to qualify the lookup.
@@ -1060,35 +1096,36 @@ class AuthBackend(pulumi.CustomResource):
1060
1096
  :param str resource_name: The unique name of the resulting resource.
1061
1097
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1062
1098
  :param pulumi.ResourceOptions opts: Options for the resource.
1063
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth method
1064
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
1065
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
1066
- :param pulumi.Input[builtins.str] description: The description of the auth backend
1067
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1099
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth method
1100
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
1101
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
1102
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
1103
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1068
1104
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1069
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1070
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1071
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1072
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1073
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1074
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1105
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1106
+ :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]] jwks_pairs: List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
1107
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1108
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1109
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1110
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
1111
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1075
1112
  The value should not contain leading or trailing forward slashes.
1076
1113
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1077
1114
  *Available only for Vault Enterprise*.
1078
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1115
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1079
1116
 
1080
1117
  * tune - (Optional) Extra configuration block. Structure is documented below.
1081
1118
 
1082
1119
  The `tune` block is used to tune the auth backend:
1083
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
1084
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
1085
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1086
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1087
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1088
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1089
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
1090
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1091
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1120
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
1121
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
1122
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1123
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1124
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1125
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1126
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
1127
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1128
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1092
1129
  """
1093
1130
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1094
1131
 
@@ -1100,6 +1137,7 @@ class AuthBackend(pulumi.CustomResource):
1100
1137
  __props__.__dict__["description"] = description
1101
1138
  __props__.__dict__["disable_remount"] = disable_remount
1102
1139
  __props__.__dict__["jwks_ca_pem"] = jwks_ca_pem
1140
+ __props__.__dict__["jwks_pairs"] = jwks_pairs
1103
1141
  __props__.__dict__["jwks_url"] = jwks_url
1104
1142
  __props__.__dict__["jwt_supported_algs"] = jwt_supported_algs
1105
1143
  __props__.__dict__["jwt_validation_pubkeys"] = jwt_validation_pubkeys
@@ -1118,90 +1156,98 @@ class AuthBackend(pulumi.CustomResource):
1118
1156
  __props__.__dict__["type"] = type
1119
1157
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
1120
1158
 
1121
- @property
1159
+ @_builtins.property
1122
1160
  @pulumi.getter
1123
- def accessor(self) -> pulumi.Output[builtins.str]:
1161
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1124
1162
  """
1125
1163
  The accessor for this auth method
1126
1164
  """
1127
1165
  return pulumi.get(self, "accessor")
1128
1166
 
1129
- @property
1167
+ @_builtins.property
1130
1168
  @pulumi.getter(name="boundIssuer")
1131
- def bound_issuer(self) -> pulumi.Output[Optional[builtins.str]]:
1169
+ def bound_issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
1132
1170
  """
1133
1171
  The value against which to match the iss claim in a JWT
1134
1172
  """
1135
1173
  return pulumi.get(self, "bound_issuer")
1136
1174
 
1137
- @property
1175
+ @_builtins.property
1138
1176
  @pulumi.getter(name="defaultRole")
1139
- def default_role(self) -> pulumi.Output[Optional[builtins.str]]:
1177
+ def default_role(self) -> pulumi.Output[Optional[_builtins.str]]:
1140
1178
  """
1141
1179
  The default role to use if none is provided during login
1142
1180
  """
1143
1181
  return pulumi.get(self, "default_role")
1144
1182
 
1145
- @property
1183
+ @_builtins.property
1146
1184
  @pulumi.getter
1147
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1185
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1148
1186
  """
1149
1187
  The description of the auth backend
1150
1188
  """
1151
1189
  return pulumi.get(self, "description")
1152
1190
 
1153
- @property
1191
+ @_builtins.property
1154
1192
  @pulumi.getter(name="disableRemount")
1155
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1193
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1156
1194
  """
1157
1195
  If set, opts out of mount migration on path updates.
1158
1196
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1159
1197
  """
1160
1198
  return pulumi.get(self, "disable_remount")
1161
1199
 
1162
- @property
1200
+ @_builtins.property
1163
1201
  @pulumi.getter(name="jwksCaPem")
1164
- def jwks_ca_pem(self) -> pulumi.Output[Optional[builtins.str]]:
1202
+ def jwks_ca_pem(self) -> pulumi.Output[Optional[_builtins.str]]:
1165
1203
  """
1166
1204
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1167
1205
  """
1168
1206
  return pulumi.get(self, "jwks_ca_pem")
1169
1207
 
1170
- @property
1208
+ @_builtins.property
1209
+ @pulumi.getter(name="jwksPairs")
1210
+ def jwks_pairs(self) -> pulumi.Output[Optional[Sequence[Mapping[str, _builtins.str]]]]:
1211
+ """
1212
+ List of JWKS URL and optional CA certificate pairs. Cannot be used with `jwks_url` or `jwks_ca_pem`. Requires Vault 1.16+.
1213
+ """
1214
+ return pulumi.get(self, "jwks_pairs")
1215
+
1216
+ @_builtins.property
1171
1217
  @pulumi.getter(name="jwksUrl")
1172
- def jwks_url(self) -> pulumi.Output[Optional[builtins.str]]:
1218
+ def jwks_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1173
1219
  """
1174
1220
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1175
1221
  """
1176
1222
  return pulumi.get(self, "jwks_url")
1177
1223
 
1178
- @property
1224
+ @_builtins.property
1179
1225
  @pulumi.getter(name="jwtSupportedAlgs")
1180
- def jwt_supported_algs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1226
+ def jwt_supported_algs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1181
1227
  """
1182
1228
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1183
1229
  """
1184
1230
  return pulumi.get(self, "jwt_supported_algs")
1185
1231
 
1186
- @property
1232
+ @_builtins.property
1187
1233
  @pulumi.getter(name="jwtValidationPubkeys")
1188
- def jwt_validation_pubkeys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1234
+ def jwt_validation_pubkeys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1189
1235
  """
1190
1236
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1191
1237
  """
1192
1238
  return pulumi.get(self, "jwt_validation_pubkeys")
1193
1239
 
1194
- @property
1240
+ @_builtins.property
1195
1241
  @pulumi.getter
1196
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1242
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1197
1243
  """
1198
1244
  Specifies if the auth method is local only.
1199
1245
  """
1200
1246
  return pulumi.get(self, "local")
1201
1247
 
1202
- @property
1248
+ @_builtins.property
1203
1249
  @pulumi.getter
1204
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1250
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1205
1251
  """
1206
1252
  The namespace to provision the resource in.
1207
1253
  The value should not contain leading or trailing forward slashes.
@@ -1210,9 +1256,9 @@ class AuthBackend(pulumi.CustomResource):
1210
1256
  """
1211
1257
  return pulumi.get(self, "namespace")
1212
1258
 
1213
- @property
1259
+ @_builtins.property
1214
1260
  @pulumi.getter(name="namespaceInState")
1215
- def namespace_in_state(self) -> pulumi.Output[Optional[builtins.bool]]:
1261
+ def namespace_in_state(self) -> pulumi.Output[Optional[_builtins.bool]]:
1216
1262
  """
1217
1263
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1218
1264
 
@@ -1222,78 +1268,78 @@ class AuthBackend(pulumi.CustomResource):
1222
1268
  """
1223
1269
  return pulumi.get(self, "namespace_in_state")
1224
1270
 
1225
- @property
1271
+ @_builtins.property
1226
1272
  @pulumi.getter(name="oidcClientId")
1227
- def oidc_client_id(self) -> pulumi.Output[Optional[builtins.str]]:
1273
+ def oidc_client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
1228
1274
  """
1229
1275
  Client ID used for OIDC backends
1230
1276
  """
1231
1277
  return pulumi.get(self, "oidc_client_id")
1232
1278
 
1233
- @property
1279
+ @_builtins.property
1234
1280
  @pulumi.getter(name="oidcClientSecret")
1235
- def oidc_client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
1281
+ def oidc_client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
1236
1282
  """
1237
1283
  Client Secret used for OIDC backends
1238
1284
  """
1239
1285
  return pulumi.get(self, "oidc_client_secret")
1240
1286
 
1241
- @property
1287
+ @_builtins.property
1242
1288
  @pulumi.getter(name="oidcDiscoveryCaPem")
1243
- def oidc_discovery_ca_pem(self) -> pulumi.Output[Optional[builtins.str]]:
1289
+ def oidc_discovery_ca_pem(self) -> pulumi.Output[Optional[_builtins.str]]:
1244
1290
  """
1245
1291
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1246
1292
  """
1247
1293
  return pulumi.get(self, "oidc_discovery_ca_pem")
1248
1294
 
1249
- @property
1295
+ @_builtins.property
1250
1296
  @pulumi.getter(name="oidcDiscoveryUrl")
1251
- def oidc_discovery_url(self) -> pulumi.Output[Optional[builtins.str]]:
1297
+ def oidc_discovery_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1252
1298
  """
1253
1299
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1254
1300
  """
1255
1301
  return pulumi.get(self, "oidc_discovery_url")
1256
1302
 
1257
- @property
1303
+ @_builtins.property
1258
1304
  @pulumi.getter(name="oidcResponseMode")
1259
- def oidc_response_mode(self) -> pulumi.Output[Optional[builtins.str]]:
1305
+ def oidc_response_mode(self) -> pulumi.Output[Optional[_builtins.str]]:
1260
1306
  """
1261
1307
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1262
1308
  """
1263
1309
  return pulumi.get(self, "oidc_response_mode")
1264
1310
 
1265
- @property
1311
+ @_builtins.property
1266
1312
  @pulumi.getter(name="oidcResponseTypes")
1267
- def oidc_response_types(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1313
+ def oidc_response_types(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1268
1314
  """
1269
1315
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1270
1316
  """
1271
1317
  return pulumi.get(self, "oidc_response_types")
1272
1318
 
1273
- @property
1319
+ @_builtins.property
1274
1320
  @pulumi.getter
1275
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1321
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1276
1322
  """
1277
1323
  Path to mount the JWT/OIDC auth backend
1278
1324
  """
1279
1325
  return pulumi.get(self, "path")
1280
1326
 
1281
- @property
1327
+ @_builtins.property
1282
1328
  @pulumi.getter(name="providerConfig")
1283
- def provider_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1329
+ def provider_config(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1284
1330
  """
1285
1331
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1286
1332
  """
1287
1333
  return pulumi.get(self, "provider_config")
1288
1334
 
1289
- @property
1335
+ @_builtins.property
1290
1336
  @pulumi.getter
1291
1337
  def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1292
1338
  return pulumi.get(self, "tune")
1293
1339
 
1294
- @property
1340
+ @_builtins.property
1295
1341
  @pulumi.getter
1296
- def type(self) -> pulumi.Output[Optional[builtins.str]]:
1342
+ def type(self) -> pulumi.Output[Optional[_builtins.str]]:
1297
1343
  """
1298
1344
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1299
1345
  """