pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,57 +21,57 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
22
21
  @pulumi.input_type
23
22
  class AuthBackendArgs:
24
23
  def __init__(__self__, *,
25
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
26
- default_role: Optional[pulumi.Input[builtins.str]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
30
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
31
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- local: Optional[pulumi.Input[builtins.bool]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
36
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
37
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
38
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
39
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
40
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
41
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
42
- path: Optional[pulumi.Input[builtins.str]] = None,
43
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
24
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
25
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
26
+ description: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
29
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
30
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
34
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
36
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
37
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
38
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
39
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
40
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
41
+ path: Optional[pulumi.Input[_builtins.str]] = None,
42
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
44
43
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
45
- type: Optional[pulumi.Input[builtins.str]] = None):
44
+ type: Optional[pulumi.Input[_builtins.str]] = None):
46
45
  """
47
46
  The set of arguments for constructing a AuthBackend resource.
48
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
49
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
50
- :param pulumi.Input[builtins.str] description: The description of the auth backend
51
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
47
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
48
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
49
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
50
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
52
51
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
53
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
54
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
55
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
56
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
57
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
58
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
52
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
53
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
56
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
57
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
59
58
  The value should not contain leading or trailing forward slashes.
60
59
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
61
60
  *Available only for Vault Enterprise*.
62
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
61
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
63
62
 
64
63
  * tune - (Optional) Extra configuration block. Structure is documented below.
65
64
 
66
65
  The `tune` block is used to tune the auth backend:
67
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
68
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
69
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
70
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
71
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
72
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
73
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
74
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
75
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
66
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
67
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
68
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
69
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
70
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
71
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
72
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
73
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
74
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
76
75
  """
77
76
  if bound_issuer is not None:
78
77
  pulumi.set(__self__, "bound_issuer", bound_issuer)
@@ -117,45 +116,45 @@ class AuthBackendArgs:
117
116
  if type is not None:
118
117
  pulumi.set(__self__, "type", type)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter(name="boundIssuer")
122
- def bound_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
121
+ def bound_issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
123
122
  """
124
123
  The value against which to match the iss claim in a JWT
125
124
  """
126
125
  return pulumi.get(self, "bound_issuer")
127
126
 
128
127
  @bound_issuer.setter
129
- def bound_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
128
+ def bound_issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
130
129
  pulumi.set(self, "bound_issuer", value)
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="defaultRole")
134
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
133
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
135
134
  """
136
135
  The default role to use if none is provided during login
137
136
  """
138
137
  return pulumi.get(self, "default_role")
139
138
 
140
139
  @default_role.setter
141
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
140
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
142
141
  pulumi.set(self, "default_role", value)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter
146
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
145
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
147
146
  """
148
147
  The description of the auth backend
149
148
  """
150
149
  return pulumi.get(self, "description")
151
150
 
152
151
  @description.setter
153
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
152
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
154
153
  pulumi.set(self, "description", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter(name="disableRemount")
158
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
157
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
159
158
  """
160
159
  If set, opts out of mount migration on path updates.
161
160
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -163,72 +162,72 @@ class AuthBackendArgs:
163
162
  return pulumi.get(self, "disable_remount")
164
163
 
165
164
  @disable_remount.setter
166
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
165
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
167
166
  pulumi.set(self, "disable_remount", value)
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter(name="jwksCaPem")
171
- def jwks_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
170
+ def jwks_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
172
171
  """
173
172
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
174
173
  """
175
174
  return pulumi.get(self, "jwks_ca_pem")
176
175
 
177
176
  @jwks_ca_pem.setter
178
- def jwks_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
177
+ def jwks_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
179
178
  pulumi.set(self, "jwks_ca_pem", value)
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter(name="jwksUrl")
183
- def jwks_url(self) -> Optional[pulumi.Input[builtins.str]]:
182
+ def jwks_url(self) -> Optional[pulumi.Input[_builtins.str]]:
184
183
  """
185
184
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
186
185
  """
187
186
  return pulumi.get(self, "jwks_url")
188
187
 
189
188
  @jwks_url.setter
190
- def jwks_url(self, value: Optional[pulumi.Input[builtins.str]]):
189
+ def jwks_url(self, value: Optional[pulumi.Input[_builtins.str]]):
191
190
  pulumi.set(self, "jwks_url", value)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter(name="jwtSupportedAlgs")
195
- def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
194
+ def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
196
195
  """
197
196
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
198
197
  """
199
198
  return pulumi.get(self, "jwt_supported_algs")
200
199
 
201
200
  @jwt_supported_algs.setter
202
- def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
201
+ def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
203
202
  pulumi.set(self, "jwt_supported_algs", value)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter(name="jwtValidationPubkeys")
207
- def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
206
+ def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
207
  """
209
208
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
210
209
  """
211
210
  return pulumi.get(self, "jwt_validation_pubkeys")
212
211
 
213
212
  @jwt_validation_pubkeys.setter
214
- def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
213
+ def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
214
  pulumi.set(self, "jwt_validation_pubkeys", value)
216
215
 
217
- @property
216
+ @_builtins.property
218
217
  @pulumi.getter
219
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
218
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
220
219
  """
221
220
  Specifies if the auth method is local only.
222
221
  """
223
222
  return pulumi.get(self, "local")
224
223
 
225
224
  @local.setter
226
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
225
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
227
226
  pulumi.set(self, "local", value)
228
227
 
229
- @property
228
+ @_builtins.property
230
229
  @pulumi.getter
231
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
230
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
232
231
  """
233
232
  The namespace to provision the resource in.
234
233
  The value should not contain leading or trailing forward slashes.
@@ -238,12 +237,12 @@ class AuthBackendArgs:
238
237
  return pulumi.get(self, "namespace")
239
238
 
240
239
  @namespace.setter
241
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
240
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
242
241
  pulumi.set(self, "namespace", value)
243
242
 
244
- @property
243
+ @_builtins.property
245
244
  @pulumi.getter(name="namespaceInState")
246
- def namespace_in_state(self) -> Optional[pulumi.Input[builtins.bool]]:
245
+ def namespace_in_state(self) -> Optional[pulumi.Input[_builtins.bool]]:
247
246
  """
248
247
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
249
248
 
@@ -254,106 +253,106 @@ class AuthBackendArgs:
254
253
  return pulumi.get(self, "namespace_in_state")
255
254
 
256
255
  @namespace_in_state.setter
257
- def namespace_in_state(self, value: Optional[pulumi.Input[builtins.bool]]):
256
+ def namespace_in_state(self, value: Optional[pulumi.Input[_builtins.bool]]):
258
257
  pulumi.set(self, "namespace_in_state", value)
259
258
 
260
- @property
259
+ @_builtins.property
261
260
  @pulumi.getter(name="oidcClientId")
262
- def oidc_client_id(self) -> Optional[pulumi.Input[builtins.str]]:
261
+ def oidc_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
263
262
  """
264
263
  Client ID used for OIDC backends
265
264
  """
266
265
  return pulumi.get(self, "oidc_client_id")
267
266
 
268
267
  @oidc_client_id.setter
269
- def oidc_client_id(self, value: Optional[pulumi.Input[builtins.str]]):
268
+ def oidc_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
270
269
  pulumi.set(self, "oidc_client_id", value)
271
270
 
272
- @property
271
+ @_builtins.property
273
272
  @pulumi.getter(name="oidcClientSecret")
274
- def oidc_client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
273
+ def oidc_client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
275
274
  """
276
275
  Client Secret used for OIDC backends
277
276
  """
278
277
  return pulumi.get(self, "oidc_client_secret")
279
278
 
280
279
  @oidc_client_secret.setter
281
- def oidc_client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
280
+ def oidc_client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
282
281
  pulumi.set(self, "oidc_client_secret", value)
283
282
 
284
- @property
283
+ @_builtins.property
285
284
  @pulumi.getter(name="oidcDiscoveryCaPem")
286
- def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
285
+ def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
287
286
  """
288
287
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
289
288
  """
290
289
  return pulumi.get(self, "oidc_discovery_ca_pem")
291
290
 
292
291
  @oidc_discovery_ca_pem.setter
293
- def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
292
+ def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
294
293
  pulumi.set(self, "oidc_discovery_ca_pem", value)
295
294
 
296
- @property
295
+ @_builtins.property
297
296
  @pulumi.getter(name="oidcDiscoveryUrl")
298
- def oidc_discovery_url(self) -> Optional[pulumi.Input[builtins.str]]:
297
+ def oidc_discovery_url(self) -> Optional[pulumi.Input[_builtins.str]]:
299
298
  """
300
299
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
301
300
  """
302
301
  return pulumi.get(self, "oidc_discovery_url")
303
302
 
304
303
  @oidc_discovery_url.setter
305
- def oidc_discovery_url(self, value: Optional[pulumi.Input[builtins.str]]):
304
+ def oidc_discovery_url(self, value: Optional[pulumi.Input[_builtins.str]]):
306
305
  pulumi.set(self, "oidc_discovery_url", value)
307
306
 
308
- @property
307
+ @_builtins.property
309
308
  @pulumi.getter(name="oidcResponseMode")
310
- def oidc_response_mode(self) -> Optional[pulumi.Input[builtins.str]]:
309
+ def oidc_response_mode(self) -> Optional[pulumi.Input[_builtins.str]]:
311
310
  """
312
311
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
313
312
  """
314
313
  return pulumi.get(self, "oidc_response_mode")
315
314
 
316
315
  @oidc_response_mode.setter
317
- def oidc_response_mode(self, value: Optional[pulumi.Input[builtins.str]]):
316
+ def oidc_response_mode(self, value: Optional[pulumi.Input[_builtins.str]]):
318
317
  pulumi.set(self, "oidc_response_mode", value)
319
318
 
320
- @property
319
+ @_builtins.property
321
320
  @pulumi.getter(name="oidcResponseTypes")
322
- def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
321
+ def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
323
322
  """
324
323
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
325
324
  """
326
325
  return pulumi.get(self, "oidc_response_types")
327
326
 
328
327
  @oidc_response_types.setter
329
- def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
328
+ def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
330
329
  pulumi.set(self, "oidc_response_types", value)
331
330
 
332
- @property
331
+ @_builtins.property
333
332
  @pulumi.getter
334
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
333
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
335
334
  """
336
335
  Path to mount the JWT/OIDC auth backend
337
336
  """
338
337
  return pulumi.get(self, "path")
339
338
 
340
339
  @path.setter
341
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
340
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
342
341
  pulumi.set(self, "path", value)
343
342
 
344
- @property
343
+ @_builtins.property
345
344
  @pulumi.getter(name="providerConfig")
346
- def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
345
+ def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
347
346
  """
348
347
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
349
348
  """
350
349
  return pulumi.get(self, "provider_config")
351
350
 
352
351
  @provider_config.setter
353
- def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
352
+ def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
354
353
  pulumi.set(self, "provider_config", value)
355
354
 
356
- @property
355
+ @_builtins.property
357
356
  @pulumi.getter
358
357
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
359
358
  return pulumi.get(self, "tune")
@@ -362,75 +361,75 @@ class AuthBackendArgs:
362
361
  def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
363
362
  pulumi.set(self, "tune", value)
364
363
 
365
- @property
364
+ @_builtins.property
366
365
  @pulumi.getter
367
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
366
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
368
367
  """
369
368
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
370
369
  """
371
370
  return pulumi.get(self, "type")
372
371
 
373
372
  @type.setter
374
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
373
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
375
374
  pulumi.set(self, "type", value)
376
375
 
377
376
 
378
377
  @pulumi.input_type
379
378
  class _AuthBackendState:
380
379
  def __init__(__self__, *,
381
- accessor: Optional[pulumi.Input[builtins.str]] = None,
382
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
383
- default_role: Optional[pulumi.Input[builtins.str]] = None,
384
- description: Optional[pulumi.Input[builtins.str]] = None,
385
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
386
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
387
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
388
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
389
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
390
- local: Optional[pulumi.Input[builtins.bool]] = None,
391
- namespace: Optional[pulumi.Input[builtins.str]] = None,
392
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
393
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
394
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
395
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
396
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
397
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
398
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
399
- path: Optional[pulumi.Input[builtins.str]] = None,
400
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
380
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
381
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
382
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
383
+ description: Optional[pulumi.Input[_builtins.str]] = None,
384
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
385
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
386
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
387
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
388
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
389
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
390
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
391
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
392
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
393
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
394
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
395
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
396
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
397
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
398
+ path: Optional[pulumi.Input[_builtins.str]] = None,
399
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
401
400
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None,
402
- type: Optional[pulumi.Input[builtins.str]] = None):
401
+ type: Optional[pulumi.Input[_builtins.str]] = None):
403
402
  """
404
403
  Input properties used for looking up and filtering AuthBackend resources.
405
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth method
406
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
407
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
408
- :param pulumi.Input[builtins.str] description: The description of the auth backend
409
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
404
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth method
405
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
406
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
407
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
408
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
410
409
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
411
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
412
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
413
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
414
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
415
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
416
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
410
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
411
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
412
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
413
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
414
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
415
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
417
416
  The value should not contain leading or trailing forward slashes.
418
417
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
419
418
  *Available only for Vault Enterprise*.
420
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
419
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
421
420
 
422
421
  * tune - (Optional) Extra configuration block. Structure is documented below.
423
422
 
424
423
  The `tune` block is used to tune the auth backend:
425
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
426
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
427
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
428
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
429
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
430
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
431
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
432
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
433
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
424
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
425
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
426
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
427
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
428
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
429
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
430
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
431
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
432
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
434
433
  """
435
434
  if accessor is not None:
436
435
  pulumi.set(__self__, "accessor", accessor)
@@ -477,57 +476,57 @@ class _AuthBackendState:
477
476
  if type is not None:
478
477
  pulumi.set(__self__, "type", type)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter
482
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
481
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
483
482
  """
484
483
  The accessor for this auth method
485
484
  """
486
485
  return pulumi.get(self, "accessor")
487
486
 
488
487
  @accessor.setter
489
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
488
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
490
489
  pulumi.set(self, "accessor", value)
491
490
 
492
- @property
491
+ @_builtins.property
493
492
  @pulumi.getter(name="boundIssuer")
494
- def bound_issuer(self) -> Optional[pulumi.Input[builtins.str]]:
493
+ def bound_issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
495
494
  """
496
495
  The value against which to match the iss claim in a JWT
497
496
  """
498
497
  return pulumi.get(self, "bound_issuer")
499
498
 
500
499
  @bound_issuer.setter
501
- def bound_issuer(self, value: Optional[pulumi.Input[builtins.str]]):
500
+ def bound_issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
502
501
  pulumi.set(self, "bound_issuer", value)
503
502
 
504
- @property
503
+ @_builtins.property
505
504
  @pulumi.getter(name="defaultRole")
506
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
505
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
507
506
  """
508
507
  The default role to use if none is provided during login
509
508
  """
510
509
  return pulumi.get(self, "default_role")
511
510
 
512
511
  @default_role.setter
513
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
512
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
514
513
  pulumi.set(self, "default_role", value)
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter
518
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
517
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
519
518
  """
520
519
  The description of the auth backend
521
520
  """
522
521
  return pulumi.get(self, "description")
523
522
 
524
523
  @description.setter
525
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
524
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
526
525
  pulumi.set(self, "description", value)
527
526
 
528
- @property
527
+ @_builtins.property
529
528
  @pulumi.getter(name="disableRemount")
530
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
529
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
531
530
  """
532
531
  If set, opts out of mount migration on path updates.
533
532
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -535,72 +534,72 @@ class _AuthBackendState:
535
534
  return pulumi.get(self, "disable_remount")
536
535
 
537
536
  @disable_remount.setter
538
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
537
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
539
538
  pulumi.set(self, "disable_remount", value)
540
539
 
541
- @property
540
+ @_builtins.property
542
541
  @pulumi.getter(name="jwksCaPem")
543
- def jwks_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
542
+ def jwks_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
544
543
  """
545
544
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
546
545
  """
547
546
  return pulumi.get(self, "jwks_ca_pem")
548
547
 
549
548
  @jwks_ca_pem.setter
550
- def jwks_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
549
+ def jwks_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
551
550
  pulumi.set(self, "jwks_ca_pem", value)
552
551
 
553
- @property
552
+ @_builtins.property
554
553
  @pulumi.getter(name="jwksUrl")
555
- def jwks_url(self) -> Optional[pulumi.Input[builtins.str]]:
554
+ def jwks_url(self) -> Optional[pulumi.Input[_builtins.str]]:
556
555
  """
557
556
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
558
557
  """
559
558
  return pulumi.get(self, "jwks_url")
560
559
 
561
560
  @jwks_url.setter
562
- def jwks_url(self, value: Optional[pulumi.Input[builtins.str]]):
561
+ def jwks_url(self, value: Optional[pulumi.Input[_builtins.str]]):
563
562
  pulumi.set(self, "jwks_url", value)
564
563
 
565
- @property
564
+ @_builtins.property
566
565
  @pulumi.getter(name="jwtSupportedAlgs")
567
- def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
566
+ def jwt_supported_algs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
568
567
  """
569
568
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
570
569
  """
571
570
  return pulumi.get(self, "jwt_supported_algs")
572
571
 
573
572
  @jwt_supported_algs.setter
574
- def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
573
+ def jwt_supported_algs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
575
574
  pulumi.set(self, "jwt_supported_algs", value)
576
575
 
577
- @property
576
+ @_builtins.property
578
577
  @pulumi.getter(name="jwtValidationPubkeys")
579
- def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
578
+ def jwt_validation_pubkeys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
580
579
  """
581
580
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
582
581
  """
583
582
  return pulumi.get(self, "jwt_validation_pubkeys")
584
583
 
585
584
  @jwt_validation_pubkeys.setter
586
- def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
585
+ def jwt_validation_pubkeys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
587
586
  pulumi.set(self, "jwt_validation_pubkeys", value)
588
587
 
589
- @property
588
+ @_builtins.property
590
589
  @pulumi.getter
591
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
590
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
592
591
  """
593
592
  Specifies if the auth method is local only.
594
593
  """
595
594
  return pulumi.get(self, "local")
596
595
 
597
596
  @local.setter
598
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
597
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
599
598
  pulumi.set(self, "local", value)
600
599
 
601
- @property
600
+ @_builtins.property
602
601
  @pulumi.getter
603
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
602
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
604
603
  """
605
604
  The namespace to provision the resource in.
606
605
  The value should not contain leading or trailing forward slashes.
@@ -610,12 +609,12 @@ class _AuthBackendState:
610
609
  return pulumi.get(self, "namespace")
611
610
 
612
611
  @namespace.setter
613
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
612
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
614
613
  pulumi.set(self, "namespace", value)
615
614
 
616
- @property
615
+ @_builtins.property
617
616
  @pulumi.getter(name="namespaceInState")
618
- def namespace_in_state(self) -> Optional[pulumi.Input[builtins.bool]]:
617
+ def namespace_in_state(self) -> Optional[pulumi.Input[_builtins.bool]]:
619
618
  """
620
619
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
621
620
 
@@ -626,106 +625,106 @@ class _AuthBackendState:
626
625
  return pulumi.get(self, "namespace_in_state")
627
626
 
628
627
  @namespace_in_state.setter
629
- def namespace_in_state(self, value: Optional[pulumi.Input[builtins.bool]]):
628
+ def namespace_in_state(self, value: Optional[pulumi.Input[_builtins.bool]]):
630
629
  pulumi.set(self, "namespace_in_state", value)
631
630
 
632
- @property
631
+ @_builtins.property
633
632
  @pulumi.getter(name="oidcClientId")
634
- def oidc_client_id(self) -> Optional[pulumi.Input[builtins.str]]:
633
+ def oidc_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
635
634
  """
636
635
  Client ID used for OIDC backends
637
636
  """
638
637
  return pulumi.get(self, "oidc_client_id")
639
638
 
640
639
  @oidc_client_id.setter
641
- def oidc_client_id(self, value: Optional[pulumi.Input[builtins.str]]):
640
+ def oidc_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
642
641
  pulumi.set(self, "oidc_client_id", value)
643
642
 
644
- @property
643
+ @_builtins.property
645
644
  @pulumi.getter(name="oidcClientSecret")
646
- def oidc_client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
645
+ def oidc_client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
647
646
  """
648
647
  Client Secret used for OIDC backends
649
648
  """
650
649
  return pulumi.get(self, "oidc_client_secret")
651
650
 
652
651
  @oidc_client_secret.setter
653
- def oidc_client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
652
+ def oidc_client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
654
653
  pulumi.set(self, "oidc_client_secret", value)
655
654
 
656
- @property
655
+ @_builtins.property
657
656
  @pulumi.getter(name="oidcDiscoveryCaPem")
658
- def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[builtins.str]]:
657
+ def oidc_discovery_ca_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
659
658
  """
660
659
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
661
660
  """
662
661
  return pulumi.get(self, "oidc_discovery_ca_pem")
663
662
 
664
663
  @oidc_discovery_ca_pem.setter
665
- def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[builtins.str]]):
664
+ def oidc_discovery_ca_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
666
665
  pulumi.set(self, "oidc_discovery_ca_pem", value)
667
666
 
668
- @property
667
+ @_builtins.property
669
668
  @pulumi.getter(name="oidcDiscoveryUrl")
670
- def oidc_discovery_url(self) -> Optional[pulumi.Input[builtins.str]]:
669
+ def oidc_discovery_url(self) -> Optional[pulumi.Input[_builtins.str]]:
671
670
  """
672
671
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
673
672
  """
674
673
  return pulumi.get(self, "oidc_discovery_url")
675
674
 
676
675
  @oidc_discovery_url.setter
677
- def oidc_discovery_url(self, value: Optional[pulumi.Input[builtins.str]]):
676
+ def oidc_discovery_url(self, value: Optional[pulumi.Input[_builtins.str]]):
678
677
  pulumi.set(self, "oidc_discovery_url", value)
679
678
 
680
- @property
679
+ @_builtins.property
681
680
  @pulumi.getter(name="oidcResponseMode")
682
- def oidc_response_mode(self) -> Optional[pulumi.Input[builtins.str]]:
681
+ def oidc_response_mode(self) -> Optional[pulumi.Input[_builtins.str]]:
683
682
  """
684
683
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
685
684
  """
686
685
  return pulumi.get(self, "oidc_response_mode")
687
686
 
688
687
  @oidc_response_mode.setter
689
- def oidc_response_mode(self, value: Optional[pulumi.Input[builtins.str]]):
688
+ def oidc_response_mode(self, value: Optional[pulumi.Input[_builtins.str]]):
690
689
  pulumi.set(self, "oidc_response_mode", value)
691
690
 
692
- @property
691
+ @_builtins.property
693
692
  @pulumi.getter(name="oidcResponseTypes")
694
- def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
693
+ def oidc_response_types(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
695
694
  """
696
695
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
697
696
  """
698
697
  return pulumi.get(self, "oidc_response_types")
699
698
 
700
699
  @oidc_response_types.setter
701
- def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
700
+ def oidc_response_types(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
702
701
  pulumi.set(self, "oidc_response_types", value)
703
702
 
704
- @property
703
+ @_builtins.property
705
704
  @pulumi.getter
706
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
705
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
707
706
  """
708
707
  Path to mount the JWT/OIDC auth backend
709
708
  """
710
709
  return pulumi.get(self, "path")
711
710
 
712
711
  @path.setter
713
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
712
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
714
713
  pulumi.set(self, "path", value)
715
714
 
716
- @property
715
+ @_builtins.property
717
716
  @pulumi.getter(name="providerConfig")
718
- def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
717
+ def provider_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
719
718
  """
720
719
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
721
720
  """
722
721
  return pulumi.get(self, "provider_config")
723
722
 
724
723
  @provider_config.setter
725
- def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
724
+ def provider_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
726
725
  pulumi.set(self, "provider_config", value)
727
726
 
728
- @property
727
+ @_builtins.property
729
728
  @pulumi.getter
730
729
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
731
730
  return pulumi.get(self, "tune")
@@ -734,16 +733,16 @@ class _AuthBackendState:
734
733
  def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
735
734
  pulumi.set(self, "tune", value)
736
735
 
737
- @property
736
+ @_builtins.property
738
737
  @pulumi.getter
739
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
738
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
740
739
  """
741
740
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
742
741
  """
743
742
  return pulumi.get(self, "type")
744
743
 
745
744
  @type.setter
746
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
745
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
747
746
  pulumi.set(self, "type", value)
748
747
 
749
748
 
@@ -753,27 +752,27 @@ class AuthBackend(pulumi.CustomResource):
753
752
  def __init__(__self__,
754
753
  resource_name: str,
755
754
  opts: Optional[pulumi.ResourceOptions] = None,
756
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
757
- default_role: Optional[pulumi.Input[builtins.str]] = None,
758
- description: Optional[pulumi.Input[builtins.str]] = None,
759
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
760
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
761
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
762
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
763
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
764
- local: Optional[pulumi.Input[builtins.bool]] = None,
765
- namespace: Optional[pulumi.Input[builtins.str]] = None,
766
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
767
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
768
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
769
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
770
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
771
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
772
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
773
- path: Optional[pulumi.Input[builtins.str]] = None,
774
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
755
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
756
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
757
+ description: Optional[pulumi.Input[_builtins.str]] = None,
758
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
759
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
760
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
761
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
762
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
763
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
764
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
765
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
766
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
767
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
768
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
769
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
770
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
771
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
772
+ path: Optional[pulumi.Input[_builtins.str]] = None,
773
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
775
774
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
776
- type: Optional[pulumi.Input[builtins.str]] = None,
775
+ type: Optional[pulumi.Input[_builtins.str]] = None,
777
776
  __props__=None):
778
777
  """
779
778
  Provides a resource for managing an
@@ -847,34 +846,34 @@ class AuthBackend(pulumi.CustomResource):
847
846
 
848
847
  :param str resource_name: The name of the resource.
849
848
  :param pulumi.ResourceOptions opts: Options for the resource.
850
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
851
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
852
- :param pulumi.Input[builtins.str] description: The description of the auth backend
853
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
849
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
850
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
851
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
852
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
854
853
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
855
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
856
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
857
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
858
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
859
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
860
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
854
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
855
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
856
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
857
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
858
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
859
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
861
860
  The value should not contain leading or trailing forward slashes.
862
861
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
863
862
  *Available only for Vault Enterprise*.
864
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
863
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
865
864
 
866
865
  * tune - (Optional) Extra configuration block. Structure is documented below.
867
866
 
868
867
  The `tune` block is used to tune the auth backend:
869
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
870
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
871
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
872
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
873
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
874
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
875
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
876
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
877
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
868
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
869
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
870
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
871
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
872
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
873
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
874
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
875
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
876
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
878
877
  """
879
878
  ...
880
879
  @overload
@@ -967,27 +966,27 @@ class AuthBackend(pulumi.CustomResource):
967
966
  def _internal_init(__self__,
968
967
  resource_name: str,
969
968
  opts: Optional[pulumi.ResourceOptions] = None,
970
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
971
- default_role: Optional[pulumi.Input[builtins.str]] = None,
972
- description: Optional[pulumi.Input[builtins.str]] = None,
973
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
974
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
975
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
976
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
977
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
978
- local: Optional[pulumi.Input[builtins.bool]] = None,
979
- namespace: Optional[pulumi.Input[builtins.str]] = None,
980
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
981
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
982
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
983
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
984
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
985
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
986
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
987
- path: Optional[pulumi.Input[builtins.str]] = None,
988
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
969
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
970
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
971
+ description: Optional[pulumi.Input[_builtins.str]] = None,
972
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
973
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
974
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
975
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
976
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
977
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
978
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
979
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
980
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
981
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
982
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
983
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
984
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
985
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
986
+ path: Optional[pulumi.Input[_builtins.str]] = None,
987
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
989
988
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
990
- type: Optional[pulumi.Input[builtins.str]] = None,
989
+ type: Optional[pulumi.Input[_builtins.str]] = None,
991
990
  __props__=None):
992
991
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
993
992
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1031,28 +1030,28 @@ class AuthBackend(pulumi.CustomResource):
1031
1030
  def get(resource_name: str,
1032
1031
  id: pulumi.Input[str],
1033
1032
  opts: Optional[pulumi.ResourceOptions] = None,
1034
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1035
- bound_issuer: Optional[pulumi.Input[builtins.str]] = None,
1036
- default_role: Optional[pulumi.Input[builtins.str]] = None,
1037
- description: Optional[pulumi.Input[builtins.str]] = None,
1038
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1039
- jwks_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
1040
- jwks_url: Optional[pulumi.Input[builtins.str]] = None,
1041
- jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1042
- jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1043
- local: Optional[pulumi.Input[builtins.bool]] = None,
1044
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1045
- namespace_in_state: Optional[pulumi.Input[builtins.bool]] = None,
1046
- oidc_client_id: Optional[pulumi.Input[builtins.str]] = None,
1047
- oidc_client_secret: Optional[pulumi.Input[builtins.str]] = None,
1048
- oidc_discovery_ca_pem: Optional[pulumi.Input[builtins.str]] = None,
1049
- oidc_discovery_url: Optional[pulumi.Input[builtins.str]] = None,
1050
- oidc_response_mode: Optional[pulumi.Input[builtins.str]] = None,
1051
- oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1052
- path: Optional[pulumi.Input[builtins.str]] = None,
1053
- provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1033
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1034
+ bound_issuer: Optional[pulumi.Input[_builtins.str]] = None,
1035
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
1036
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1037
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1038
+ jwks_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1039
+ jwks_url: Optional[pulumi.Input[_builtins.str]] = None,
1040
+ jwt_supported_algs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1041
+ jwt_validation_pubkeys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1042
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1043
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1044
+ namespace_in_state: Optional[pulumi.Input[_builtins.bool]] = None,
1045
+ oidc_client_id: Optional[pulumi.Input[_builtins.str]] = None,
1046
+ oidc_client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1047
+ oidc_discovery_ca_pem: Optional[pulumi.Input[_builtins.str]] = None,
1048
+ oidc_discovery_url: Optional[pulumi.Input[_builtins.str]] = None,
1049
+ oidc_response_mode: Optional[pulumi.Input[_builtins.str]] = None,
1050
+ oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1051
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1052
+ provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1054
1053
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
1055
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackend':
1054
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackend':
1056
1055
  """
1057
1056
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
1058
1057
  properties used to qualify the lookup.
@@ -1060,35 +1059,35 @@ class AuthBackend(pulumi.CustomResource):
1060
1059
  :param str resource_name: The unique name of the resulting resource.
1061
1060
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1062
1061
  :param pulumi.ResourceOptions opts: Options for the resource.
1063
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth method
1064
- :param pulumi.Input[builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
1065
- :param pulumi.Input[builtins.str] default_role: The default role to use if none is provided during login
1066
- :param pulumi.Input[builtins.str] description: The description of the auth backend
1067
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1062
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth method
1063
+ :param pulumi.Input[_builtins.str] bound_issuer: The value against which to match the iss claim in a JWT
1064
+ :param pulumi.Input[_builtins.str] default_role: The default role to use if none is provided during login
1065
+ :param pulumi.Input[_builtins.str] description: The description of the auth backend
1066
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1068
1067
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1069
- :param pulumi.Input[builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1070
- :param pulumi.Input[builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1071
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1072
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1073
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1074
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1068
+ :param pulumi.Input[_builtins.str] jwks_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1069
+ :param pulumi.Input[_builtins.str] jwks_url: JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1070
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_supported_algs: A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1071
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] jwt_validation_pubkeys: A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1072
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
1073
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1075
1074
  The value should not contain leading or trailing forward slashes.
1076
1075
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1077
1076
  *Available only for Vault Enterprise*.
1078
- :param pulumi.Input[builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1077
+ :param pulumi.Input[_builtins.bool] namespace_in_state: Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1079
1078
 
1080
1079
  * tune - (Optional) Extra configuration block. Structure is documented below.
1081
1080
 
1082
1081
  The `tune` block is used to tune the auth backend:
1083
- :param pulumi.Input[builtins.str] oidc_client_id: Client ID used for OIDC backends
1084
- :param pulumi.Input[builtins.str] oidc_client_secret: Client Secret used for OIDC backends
1085
- :param pulumi.Input[builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1086
- :param pulumi.Input[builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1087
- :param pulumi.Input[builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1088
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1089
- :param pulumi.Input[builtins.str] path: Path to mount the JWT/OIDC auth backend
1090
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1091
- :param pulumi.Input[builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1082
+ :param pulumi.Input[_builtins.str] oidc_client_id: Client ID used for OIDC backends
1083
+ :param pulumi.Input[_builtins.str] oidc_client_secret: Client Secret used for OIDC backends
1084
+ :param pulumi.Input[_builtins.str] oidc_discovery_ca_pem: The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1085
+ :param pulumi.Input[_builtins.str] oidc_discovery_url: The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1086
+ :param pulumi.Input[_builtins.str] oidc_response_mode: The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1087
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] oidc_response_types: List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1088
+ :param pulumi.Input[_builtins.str] path: Path to mount the JWT/OIDC auth backend
1089
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] provider_config: Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1090
+ :param pulumi.Input[_builtins.str] type: Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1092
1091
  """
1093
1092
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1094
1093
 
@@ -1118,90 +1117,90 @@ class AuthBackend(pulumi.CustomResource):
1118
1117
  __props__.__dict__["type"] = type
1119
1118
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
1120
1119
 
1121
- @property
1120
+ @_builtins.property
1122
1121
  @pulumi.getter
1123
- def accessor(self) -> pulumi.Output[builtins.str]:
1122
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1124
1123
  """
1125
1124
  The accessor for this auth method
1126
1125
  """
1127
1126
  return pulumi.get(self, "accessor")
1128
1127
 
1129
- @property
1128
+ @_builtins.property
1130
1129
  @pulumi.getter(name="boundIssuer")
1131
- def bound_issuer(self) -> pulumi.Output[Optional[builtins.str]]:
1130
+ def bound_issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
1132
1131
  """
1133
1132
  The value against which to match the iss claim in a JWT
1134
1133
  """
1135
1134
  return pulumi.get(self, "bound_issuer")
1136
1135
 
1137
- @property
1136
+ @_builtins.property
1138
1137
  @pulumi.getter(name="defaultRole")
1139
- def default_role(self) -> pulumi.Output[Optional[builtins.str]]:
1138
+ def default_role(self) -> pulumi.Output[Optional[_builtins.str]]:
1140
1139
  """
1141
1140
  The default role to use if none is provided during login
1142
1141
  """
1143
1142
  return pulumi.get(self, "default_role")
1144
1143
 
1145
- @property
1144
+ @_builtins.property
1146
1145
  @pulumi.getter
1147
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1146
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1148
1147
  """
1149
1148
  The description of the auth backend
1150
1149
  """
1151
1150
  return pulumi.get(self, "description")
1152
1151
 
1153
- @property
1152
+ @_builtins.property
1154
1153
  @pulumi.getter(name="disableRemount")
1155
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1154
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1156
1155
  """
1157
1156
  If set, opts out of mount migration on path updates.
1158
1157
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1159
1158
  """
1160
1159
  return pulumi.get(self, "disable_remount")
1161
1160
 
1162
- @property
1161
+ @_builtins.property
1163
1162
  @pulumi.getter(name="jwksCaPem")
1164
- def jwks_ca_pem(self) -> pulumi.Output[Optional[builtins.str]]:
1163
+ def jwks_ca_pem(self) -> pulumi.Output[Optional[_builtins.str]]:
1165
1164
  """
1166
1165
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
1167
1166
  """
1168
1167
  return pulumi.get(self, "jwks_ca_pem")
1169
1168
 
1170
- @property
1169
+ @_builtins.property
1171
1170
  @pulumi.getter(name="jwksUrl")
1172
- def jwks_url(self) -> pulumi.Output[Optional[builtins.str]]:
1171
+ def jwks_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1173
1172
  """
1174
1173
  JWKS URL to use to authenticate signatures. Cannot be used with "oidc_discovery_url" or "jwt_validation_pubkeys".
1175
1174
  """
1176
1175
  return pulumi.get(self, "jwks_url")
1177
1176
 
1178
- @property
1177
+ @_builtins.property
1179
1178
  @pulumi.getter(name="jwtSupportedAlgs")
1180
- def jwt_supported_algs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1179
+ def jwt_supported_algs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1181
1180
  """
1182
1181
  A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
1183
1182
  """
1184
1183
  return pulumi.get(self, "jwt_supported_algs")
1185
1184
 
1186
- @property
1185
+ @_builtins.property
1187
1186
  @pulumi.getter(name="jwtValidationPubkeys")
1188
- def jwt_validation_pubkeys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1187
+ def jwt_validation_pubkeys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1189
1188
  """
1190
1189
  A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with `oidc_discovery_url`
1191
1190
  """
1192
1191
  return pulumi.get(self, "jwt_validation_pubkeys")
1193
1192
 
1194
- @property
1193
+ @_builtins.property
1195
1194
  @pulumi.getter
1196
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1195
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1197
1196
  """
1198
1197
  Specifies if the auth method is local only.
1199
1198
  """
1200
1199
  return pulumi.get(self, "local")
1201
1200
 
1202
- @property
1201
+ @_builtins.property
1203
1202
  @pulumi.getter
1204
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1203
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1205
1204
  """
1206
1205
  The namespace to provision the resource in.
1207
1206
  The value should not contain leading or trailing forward slashes.
@@ -1210,9 +1209,9 @@ class AuthBackend(pulumi.CustomResource):
1210
1209
  """
1211
1210
  return pulumi.get(self, "namespace")
1212
1211
 
1213
- @property
1212
+ @_builtins.property
1214
1213
  @pulumi.getter(name="namespaceInState")
1215
- def namespace_in_state(self) -> pulumi.Output[Optional[builtins.bool]]:
1214
+ def namespace_in_state(self) -> pulumi.Output[Optional[_builtins.bool]]:
1216
1215
  """
1217
1216
  Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
1218
1217
 
@@ -1222,78 +1221,78 @@ class AuthBackend(pulumi.CustomResource):
1222
1221
  """
1223
1222
  return pulumi.get(self, "namespace_in_state")
1224
1223
 
1225
- @property
1224
+ @_builtins.property
1226
1225
  @pulumi.getter(name="oidcClientId")
1227
- def oidc_client_id(self) -> pulumi.Output[Optional[builtins.str]]:
1226
+ def oidc_client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
1228
1227
  """
1229
1228
  Client ID used for OIDC backends
1230
1229
  """
1231
1230
  return pulumi.get(self, "oidc_client_id")
1232
1231
 
1233
- @property
1232
+ @_builtins.property
1234
1233
  @pulumi.getter(name="oidcClientSecret")
1235
- def oidc_client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
1234
+ def oidc_client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
1236
1235
  """
1237
1236
  Client Secret used for OIDC backends
1238
1237
  """
1239
1238
  return pulumi.get(self, "oidc_client_secret")
1240
1239
 
1241
- @property
1240
+ @_builtins.property
1242
1241
  @pulumi.getter(name="oidcDiscoveryCaPem")
1243
- def oidc_discovery_ca_pem(self) -> pulumi.Output[Optional[builtins.str]]:
1242
+ def oidc_discovery_ca_pem(self) -> pulumi.Output[Optional[_builtins.str]]:
1244
1243
  """
1245
1244
  The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
1246
1245
  """
1247
1246
  return pulumi.get(self, "oidc_discovery_ca_pem")
1248
1247
 
1249
- @property
1248
+ @_builtins.property
1250
1249
  @pulumi.getter(name="oidcDiscoveryUrl")
1251
- def oidc_discovery_url(self) -> pulumi.Output[Optional[builtins.str]]:
1250
+ def oidc_discovery_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1252
1251
  """
1253
1252
  The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwt_validation_pubkeys`
1254
1253
  """
1255
1254
  return pulumi.get(self, "oidc_discovery_url")
1256
1255
 
1257
- @property
1256
+ @_builtins.property
1258
1257
  @pulumi.getter(name="oidcResponseMode")
1259
- def oidc_response_mode(self) -> pulumi.Output[Optional[builtins.str]]:
1258
+ def oidc_response_mode(self) -> pulumi.Output[Optional[_builtins.str]]:
1260
1259
  """
1261
1260
  The response mode to be used in the OAuth2 request. Allowed values are `query` and `form_post`. Defaults to `query`. If using Vault namespaces, and `oidc_response_mode` is `form_post`, then `namespace_in_state` should be set to `false`.
1262
1261
  """
1263
1262
  return pulumi.get(self, "oidc_response_mode")
1264
1263
 
1265
- @property
1264
+ @_builtins.property
1266
1265
  @pulumi.getter(name="oidcResponseTypes")
1267
- def oidc_response_types(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1266
+ def oidc_response_types(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1268
1267
  """
1269
1268
  List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `id_token` may only be used if `oidc_response_mode` is set to `form_post`.
1270
1269
  """
1271
1270
  return pulumi.get(self, "oidc_response_types")
1272
1271
 
1273
- @property
1272
+ @_builtins.property
1274
1273
  @pulumi.getter
1275
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1274
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1276
1275
  """
1277
1276
  Path to mount the JWT/OIDC auth backend
1278
1277
  """
1279
1278
  return pulumi.get(self, "path")
1280
1279
 
1281
- @property
1280
+ @_builtins.property
1282
1281
  @pulumi.getter(name="providerConfig")
1283
- def provider_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1282
+ def provider_config(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1284
1283
  """
1285
1284
  Provider specific handling configuration. All values may be strings, and the provider will convert to the appropriate type when configuring Vault.
1286
1285
  """
1287
1286
  return pulumi.get(self, "provider_config")
1288
1287
 
1289
- @property
1288
+ @_builtins.property
1290
1289
  @pulumi.getter
1291
1290
  def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1292
1291
  return pulumi.get(self, "tune")
1293
1292
 
1294
- @property
1293
+ @_builtins.property
1295
1294
  @pulumi.getter
1296
- def type(self) -> pulumi.Output[Optional[builtins.str]]:
1295
+ def type(self) -> pulumi.Output[Optional[_builtins.str]]:
1297
1296
  """
1298
1297
  Type of auth backend. Should be one of `jwt` or `oidc`. Default - `jwt`
1299
1298
  """