pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,99 +19,99 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
20
19
  @pulumi.input_type
21
20
  class AuthBackendArgs:
22
21
  def __init__(__self__, *,
23
- url: pulumi.Input[builtins.str],
24
- binddn: Optional[pulumi.Input[builtins.str]] = None,
25
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
26
- case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
27
- certificate: Optional[pulumi.Input[builtins.str]] = None,
28
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
29
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
30
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
31
- deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
32
- description: Optional[pulumi.Input[builtins.str]] = None,
33
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
34
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
35
- discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
36
- groupattr: Optional[pulumi.Input[builtins.str]] = None,
37
- groupdn: Optional[pulumi.Input[builtins.str]] = None,
38
- groupfilter: Optional[pulumi.Input[builtins.str]] = None,
39
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
40
- local: Optional[pulumi.Input[builtins.bool]] = None,
41
- max_page_size: Optional[pulumi.Input[builtins.int]] = None,
42
- namespace: Optional[pulumi.Input[builtins.str]] = None,
43
- path: Optional[pulumi.Input[builtins.str]] = None,
44
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
45
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
46
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
47
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
48
- tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
49
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
50
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
51
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
52
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
53
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
54
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
55
- token_period: Optional[pulumi.Input[builtins.int]] = None,
56
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
57
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
58
- token_type: Optional[pulumi.Input[builtins.str]] = None,
59
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
60
- use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
61
- userattr: Optional[pulumi.Input[builtins.str]] = None,
62
- userdn: Optional[pulumi.Input[builtins.str]] = None,
63
- userfilter: Optional[pulumi.Input[builtins.str]] = None,
64
- username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
22
+ url: pulumi.Input[_builtins.str],
23
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
24
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
25
+ case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
27
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
28
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
29
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
30
+ deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ description: Optional[pulumi.Input[_builtins.str]] = None,
32
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ groupattr: Optional[pulumi.Input[_builtins.str]] = None,
36
+ groupdn: Optional[pulumi.Input[_builtins.str]] = None,
37
+ groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
38
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
39
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
41
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
42
+ path: Optional[pulumi.Input[_builtins.str]] = None,
43
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
44
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
45
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
46
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
47
+ tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
48
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
49
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
50
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
51
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
52
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
53
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
54
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
55
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
56
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
57
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
58
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
59
+ use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
60
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
61
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
62
+ userfilter: Optional[pulumi.Input[_builtins.str]] = None,
63
+ username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None):
65
64
  """
66
65
  The set of arguments for constructing a AuthBackend resource.
67
- :param pulumi.Input[builtins.str] url: The URL of the LDAP server
68
- :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
69
- :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
70
- :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
71
- :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
72
- :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
73
- :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
74
- :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
75
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
76
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
66
+ :param pulumi.Input[_builtins.str] url: The URL of the LDAP server
67
+ :param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
68
+ :param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
69
+ :param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
70
+ :param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
71
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
72
+ :param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
73
+ :param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
74
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
75
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
77
76
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
78
- :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
79
- :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
80
- :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
81
- :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
82
- :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
83
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
84
- :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
77
+ :param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
78
+ :param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
79
+ :param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
80
+ :param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
81
+ :param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
82
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
83
+ :param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
85
84
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
86
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
85
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
87
86
  The value should not contain leading or trailing forward slashes.
88
87
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
88
  *Available only for Vault Enterprise*.
90
- :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
91
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
89
+ :param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
90
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
92
91
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
93
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
92
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
94
93
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
95
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
94
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
96
95
  a rotation when a scheduled token rotation occurs. The default rotation window is
97
96
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
98
- :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
99
- :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
100
- :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
101
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
102
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
103
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
104
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
105
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
106
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
107
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
108
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
109
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
110
- :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
111
- :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
112
- :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
113
- :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
114
- :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
115
- :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
97
+ :param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
98
+ :param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
99
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
100
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
101
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
102
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
103
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
104
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
105
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
106
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
107
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
108
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
109
+ :param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
110
+ :param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
111
+ :param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
112
+ :param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
113
+ :param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
114
+ :param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
116
115
  """
117
116
  pulumi.set(__self__, "url", url)
118
117
  if binddn is not None:
@@ -198,135 +197,135 @@ class AuthBackendArgs:
198
197
  if username_as_alias is not None:
199
198
  pulumi.set(__self__, "username_as_alias", username_as_alias)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter
203
- def url(self) -> pulumi.Input[builtins.str]:
202
+ def url(self) -> pulumi.Input[_builtins.str]:
204
203
  """
205
204
  The URL of the LDAP server
206
205
  """
207
206
  return pulumi.get(self, "url")
208
207
 
209
208
  @url.setter
210
- def url(self, value: pulumi.Input[builtins.str]):
209
+ def url(self, value: pulumi.Input[_builtins.str]):
211
210
  pulumi.set(self, "url", value)
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter
215
- def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
216
215
  """
217
216
  DN of object to bind when performing user search
218
217
  """
219
218
  return pulumi.get(self, "binddn")
220
219
 
221
220
  @binddn.setter
222
- def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
223
222
  pulumi.set(self, "binddn", value)
224
223
 
225
- @property
224
+ @_builtins.property
226
225
  @pulumi.getter
227
- def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
226
+ def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
228
227
  """
229
228
  Password to use with `binddn` when performing user search
230
229
  """
231
230
  return pulumi.get(self, "bindpass")
232
231
 
233
232
  @bindpass.setter
234
- def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
233
+ def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
235
234
  pulumi.set(self, "bindpass", value)
236
235
 
237
- @property
236
+ @_builtins.property
238
237
  @pulumi.getter(name="caseSensitiveNames")
239
- def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
238
+ def case_sensitive_names(self) -> Optional[pulumi.Input[_builtins.bool]]:
240
239
  """
241
240
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
242
241
  """
243
242
  return pulumi.get(self, "case_sensitive_names")
244
243
 
245
244
  @case_sensitive_names.setter
246
- def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
245
+ def case_sensitive_names(self, value: Optional[pulumi.Input[_builtins.bool]]):
247
246
  pulumi.set(self, "case_sensitive_names", value)
248
247
 
249
- @property
248
+ @_builtins.property
250
249
  @pulumi.getter
251
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
250
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
252
251
  """
253
252
  Trusted CA to validate TLS certificate
254
253
  """
255
254
  return pulumi.get(self, "certificate")
256
255
 
257
256
  @certificate.setter
258
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
257
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
259
258
  pulumi.set(self, "certificate", value)
260
259
 
261
- @property
260
+ @_builtins.property
262
261
  @pulumi.getter(name="clientTlsCert")
263
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
262
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
264
263
  return pulumi.get(self, "client_tls_cert")
265
264
 
266
265
  @client_tls_cert.setter
267
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
266
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
268
267
  pulumi.set(self, "client_tls_cert", value)
269
268
 
270
- @property
269
+ @_builtins.property
271
270
  @pulumi.getter(name="clientTlsKey")
272
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
271
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
273
272
  return pulumi.get(self, "client_tls_key")
274
273
 
275
274
  @client_tls_key.setter
276
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
275
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
277
276
  pulumi.set(self, "client_tls_key", value)
278
277
 
279
- @property
278
+ @_builtins.property
280
279
  @pulumi.getter(name="connectionTimeout")
281
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
280
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
282
281
  """
283
282
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
284
283
  """
285
284
  return pulumi.get(self, "connection_timeout")
286
285
 
287
286
  @connection_timeout.setter
288
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
287
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
289
288
  pulumi.set(self, "connection_timeout", value)
290
289
 
291
- @property
290
+ @_builtins.property
292
291
  @pulumi.getter(name="denyNullBind")
293
- def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
292
+ def deny_null_bind(self) -> Optional[pulumi.Input[_builtins.bool]]:
294
293
  """
295
294
  Prevents users from bypassing authentication when providing an empty password.
296
295
  """
297
296
  return pulumi.get(self, "deny_null_bind")
298
297
 
299
298
  @deny_null_bind.setter
300
- def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
299
+ def deny_null_bind(self, value: Optional[pulumi.Input[_builtins.bool]]):
301
300
  pulumi.set(self, "deny_null_bind", value)
302
301
 
303
- @property
302
+ @_builtins.property
304
303
  @pulumi.getter
305
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
304
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
306
305
  """
307
306
  Description for the LDAP auth backend mount
308
307
  """
309
308
  return pulumi.get(self, "description")
310
309
 
311
310
  @description.setter
312
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
311
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
313
312
  pulumi.set(self, "description", value)
314
313
 
315
- @property
314
+ @_builtins.property
316
315
  @pulumi.getter(name="disableAutomatedRotation")
317
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
316
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
318
317
  """
319
318
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
320
319
  """
321
320
  return pulumi.get(self, "disable_automated_rotation")
322
321
 
323
322
  @disable_automated_rotation.setter
324
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
323
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
325
324
  pulumi.set(self, "disable_automated_rotation", value)
326
325
 
327
- @property
326
+ @_builtins.property
328
327
  @pulumi.getter(name="disableRemount")
329
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
328
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
330
329
  """
331
330
  If set, opts out of mount migration on path updates.
332
331
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -334,84 +333,84 @@ class AuthBackendArgs:
334
333
  return pulumi.get(self, "disable_remount")
335
334
 
336
335
  @disable_remount.setter
337
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
336
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
338
337
  pulumi.set(self, "disable_remount", value)
339
338
 
340
- @property
339
+ @_builtins.property
341
340
  @pulumi.getter
342
- def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
341
+ def discoverdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
343
342
  """
344
343
  Use anonymous bind to discover the bind DN of a user.
345
344
  """
346
345
  return pulumi.get(self, "discoverdn")
347
346
 
348
347
  @discoverdn.setter
349
- def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
348
+ def discoverdn(self, value: Optional[pulumi.Input[_builtins.bool]]):
350
349
  pulumi.set(self, "discoverdn", value)
351
350
 
352
- @property
351
+ @_builtins.property
353
352
  @pulumi.getter
354
- def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
353
+ def groupattr(self) -> Optional[pulumi.Input[_builtins.str]]:
355
354
  """
356
355
  LDAP attribute to follow on objects returned by groupfilter
357
356
  """
358
357
  return pulumi.get(self, "groupattr")
359
358
 
360
359
  @groupattr.setter
361
- def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
360
+ def groupattr(self, value: Optional[pulumi.Input[_builtins.str]]):
362
361
  pulumi.set(self, "groupattr", value)
363
362
 
364
- @property
363
+ @_builtins.property
365
364
  @pulumi.getter
366
- def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
365
+ def groupdn(self) -> Optional[pulumi.Input[_builtins.str]]:
367
366
  """
368
367
  Base DN under which to perform group search
369
368
  """
370
369
  return pulumi.get(self, "groupdn")
371
370
 
372
371
  @groupdn.setter
373
- def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
372
+ def groupdn(self, value: Optional[pulumi.Input[_builtins.str]]):
374
373
  pulumi.set(self, "groupdn", value)
375
374
 
376
- @property
375
+ @_builtins.property
377
376
  @pulumi.getter
378
- def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
377
+ def groupfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
379
378
  """
380
379
  Go template used to construct group membership query
381
380
  """
382
381
  return pulumi.get(self, "groupfilter")
383
382
 
384
383
  @groupfilter.setter
385
- def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
384
+ def groupfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
386
385
  pulumi.set(self, "groupfilter", value)
387
386
 
388
- @property
387
+ @_builtins.property
389
388
  @pulumi.getter(name="insecureTls")
390
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
389
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
391
390
  """
392
391
  Control whether or TLS certificates must be validated
393
392
  """
394
393
  return pulumi.get(self, "insecure_tls")
395
394
 
396
395
  @insecure_tls.setter
397
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
396
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
398
397
  pulumi.set(self, "insecure_tls", value)
399
398
 
400
- @property
399
+ @_builtins.property
401
400
  @pulumi.getter
402
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
401
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
403
402
  """
404
403
  Specifies if the auth method is local only.
405
404
  """
406
405
  return pulumi.get(self, "local")
407
406
 
408
407
  @local.setter
409
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
408
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
410
409
  pulumi.set(self, "local", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter(name="maxPageSize")
414
- def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
413
+ def max_page_size(self) -> Optional[pulumi.Input[_builtins.int]]:
415
414
  """
416
415
  Sets the max page size for LDAP lookups, by default it's set to -1.
417
416
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
@@ -419,12 +418,12 @@ class AuthBackendArgs:
419
418
  return pulumi.get(self, "max_page_size")
420
419
 
421
420
  @max_page_size.setter
422
- def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
421
+ def max_page_size(self, value: Optional[pulumi.Input[_builtins.int]]):
423
422
  pulumi.set(self, "max_page_size", value)
424
423
 
425
- @property
424
+ @_builtins.property
426
425
  @pulumi.getter
427
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
426
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
428
427
  """
429
428
  The namespace to provision the resource in.
430
429
  The value should not contain leading or trailing forward slashes.
@@ -434,24 +433,24 @@ class AuthBackendArgs:
434
433
  return pulumi.get(self, "namespace")
435
434
 
436
435
  @namespace.setter
437
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
436
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
438
437
  pulumi.set(self, "namespace", value)
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter
442
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
441
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
443
442
  """
444
443
  Path to mount the LDAP auth backend under
445
444
  """
446
445
  return pulumi.get(self, "path")
447
446
 
448
447
  @path.setter
449
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
448
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
450
449
  pulumi.set(self, "path", value)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter(name="rotationPeriod")
454
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
453
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
455
454
  """
456
455
  The amount of time in seconds Vault should wait before rotating the root credential.
457
456
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -459,12 +458,12 @@ class AuthBackendArgs:
459
458
  return pulumi.get(self, "rotation_period")
460
459
 
461
460
  @rotation_period.setter
462
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
461
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
463
462
  pulumi.set(self, "rotation_period", value)
464
463
 
465
- @property
464
+ @_builtins.property
466
465
  @pulumi.getter(name="rotationSchedule")
467
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
466
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
468
467
  """
469
468
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
470
469
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -472,12 +471,12 @@ class AuthBackendArgs:
472
471
  return pulumi.get(self, "rotation_schedule")
473
472
 
474
473
  @rotation_schedule.setter
475
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
474
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
476
475
  pulumi.set(self, "rotation_schedule", value)
477
476
 
478
- @property
477
+ @_builtins.property
479
478
  @pulumi.getter(name="rotationWindow")
480
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
479
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
481
480
  """
482
481
  The maximum amount of time in seconds allowed to complete
483
482
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -486,324 +485,324 @@ class AuthBackendArgs:
486
485
  return pulumi.get(self, "rotation_window")
487
486
 
488
487
  @rotation_window.setter
489
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
488
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
490
489
  pulumi.set(self, "rotation_window", value)
491
490
 
492
- @property
491
+ @_builtins.property
493
492
  @pulumi.getter
494
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
493
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
495
494
  """
496
495
  Control use of TLS when conecting to LDAP
497
496
  """
498
497
  return pulumi.get(self, "starttls")
499
498
 
500
499
  @starttls.setter
501
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
500
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
502
501
  pulumi.set(self, "starttls", value)
503
502
 
504
- @property
503
+ @_builtins.property
505
504
  @pulumi.getter(name="tlsMaxVersion")
506
- def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
505
+ def tls_max_version(self) -> Optional[pulumi.Input[_builtins.str]]:
507
506
  """
508
507
  Maximum acceptable version of TLS
509
508
  """
510
509
  return pulumi.get(self, "tls_max_version")
511
510
 
512
511
  @tls_max_version.setter
513
- def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
512
+ def tls_max_version(self, value: Optional[pulumi.Input[_builtins.str]]):
514
513
  pulumi.set(self, "tls_max_version", value)
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter(name="tlsMinVersion")
518
- def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
517
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
519
518
  """
520
519
  Minimum acceptable version of TLS
521
520
  """
522
521
  return pulumi.get(self, "tls_min_version")
523
522
 
524
523
  @tls_min_version.setter
525
- def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
524
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
526
525
  pulumi.set(self, "tls_min_version", value)
527
526
 
528
- @property
527
+ @_builtins.property
529
528
  @pulumi.getter(name="tokenBoundCidrs")
530
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
529
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
531
530
  """
532
531
  Specifies the blocks of IP addresses which are allowed to use the generated token
533
532
  """
534
533
  return pulumi.get(self, "token_bound_cidrs")
535
534
 
536
535
  @token_bound_cidrs.setter
537
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
536
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
538
537
  pulumi.set(self, "token_bound_cidrs", value)
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter(name="tokenExplicitMaxTtl")
542
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
541
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
543
542
  """
544
543
  Generated Token's Explicit Maximum TTL in seconds
545
544
  """
546
545
  return pulumi.get(self, "token_explicit_max_ttl")
547
546
 
548
547
  @token_explicit_max_ttl.setter
549
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
548
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
550
549
  pulumi.set(self, "token_explicit_max_ttl", value)
551
550
 
552
- @property
551
+ @_builtins.property
553
552
  @pulumi.getter(name="tokenMaxTtl")
554
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
553
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
555
554
  """
556
555
  The maximum lifetime of the generated token
557
556
  """
558
557
  return pulumi.get(self, "token_max_ttl")
559
558
 
560
559
  @token_max_ttl.setter
561
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
560
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
562
561
  pulumi.set(self, "token_max_ttl", value)
563
562
 
564
- @property
563
+ @_builtins.property
565
564
  @pulumi.getter(name="tokenNoDefaultPolicy")
566
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
565
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
567
566
  """
568
567
  If true, the 'default' policy will not automatically be added to generated tokens
569
568
  """
570
569
  return pulumi.get(self, "token_no_default_policy")
571
570
 
572
571
  @token_no_default_policy.setter
573
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
572
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
574
573
  pulumi.set(self, "token_no_default_policy", value)
575
574
 
576
- @property
575
+ @_builtins.property
577
576
  @pulumi.getter(name="tokenNumUses")
578
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
577
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
579
578
  """
580
579
  The maximum number of times a token may be used, a value of zero means unlimited
581
580
  """
582
581
  return pulumi.get(self, "token_num_uses")
583
582
 
584
583
  @token_num_uses.setter
585
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
584
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
586
585
  pulumi.set(self, "token_num_uses", value)
587
586
 
588
- @property
587
+ @_builtins.property
589
588
  @pulumi.getter(name="tokenPeriod")
590
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
589
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
591
590
  """
592
591
  Generated Token's Period
593
592
  """
594
593
  return pulumi.get(self, "token_period")
595
594
 
596
595
  @token_period.setter
597
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
596
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
598
597
  pulumi.set(self, "token_period", value)
599
598
 
600
- @property
599
+ @_builtins.property
601
600
  @pulumi.getter(name="tokenPolicies")
602
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
601
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
603
602
  """
604
603
  Generated Token's Policies
605
604
  """
606
605
  return pulumi.get(self, "token_policies")
607
606
 
608
607
  @token_policies.setter
609
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
608
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
610
609
  pulumi.set(self, "token_policies", value)
611
610
 
612
- @property
611
+ @_builtins.property
613
612
  @pulumi.getter(name="tokenTtl")
614
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
613
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
615
614
  """
616
615
  The initial ttl of the token to generate in seconds
617
616
  """
618
617
  return pulumi.get(self, "token_ttl")
619
618
 
620
619
  @token_ttl.setter
621
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
620
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
622
621
  pulumi.set(self, "token_ttl", value)
623
622
 
624
- @property
623
+ @_builtins.property
625
624
  @pulumi.getter(name="tokenType")
626
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
625
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
627
626
  """
628
627
  The type of token to generate, service or batch
629
628
  """
630
629
  return pulumi.get(self, "token_type")
631
630
 
632
631
  @token_type.setter
633
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
632
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
634
633
  pulumi.set(self, "token_type", value)
635
634
 
636
- @property
635
+ @_builtins.property
637
636
  @pulumi.getter
638
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
637
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
639
638
  """
640
639
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
641
640
  """
642
641
  return pulumi.get(self, "upndomain")
643
642
 
644
643
  @upndomain.setter
645
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
644
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
646
645
  pulumi.set(self, "upndomain", value)
647
646
 
648
- @property
647
+ @_builtins.property
649
648
  @pulumi.getter(name="useTokenGroups")
650
- def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
649
+ def use_token_groups(self) -> Optional[pulumi.Input[_builtins.bool]]:
651
650
  """
652
651
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
653
652
  """
654
653
  return pulumi.get(self, "use_token_groups")
655
654
 
656
655
  @use_token_groups.setter
657
- def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
656
+ def use_token_groups(self, value: Optional[pulumi.Input[_builtins.bool]]):
658
657
  pulumi.set(self, "use_token_groups", value)
659
658
 
660
- @property
659
+ @_builtins.property
661
660
  @pulumi.getter
662
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
661
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
663
662
  """
664
663
  Attribute on user object matching username passed in
665
664
  """
666
665
  return pulumi.get(self, "userattr")
667
666
 
668
667
  @userattr.setter
669
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
668
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
670
669
  pulumi.set(self, "userattr", value)
671
670
 
672
- @property
671
+ @_builtins.property
673
672
  @pulumi.getter
674
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
673
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
675
674
  """
676
675
  Base DN under which to perform user search
677
676
  """
678
677
  return pulumi.get(self, "userdn")
679
678
 
680
679
  @userdn.setter
681
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
680
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
682
681
  pulumi.set(self, "userdn", value)
683
682
 
684
- @property
683
+ @_builtins.property
685
684
  @pulumi.getter
686
- def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
685
+ def userfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
687
686
  """
688
687
  LDAP user search filter
689
688
  """
690
689
  return pulumi.get(self, "userfilter")
691
690
 
692
691
  @userfilter.setter
693
- def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
692
+ def userfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
694
693
  pulumi.set(self, "userfilter", value)
695
694
 
696
- @property
695
+ @_builtins.property
697
696
  @pulumi.getter(name="usernameAsAlias")
698
- def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
697
+ def username_as_alias(self) -> Optional[pulumi.Input[_builtins.bool]]:
699
698
  """
700
699
  Force the auth method to use the username passed by the user as the alias name.
701
700
  """
702
701
  return pulumi.get(self, "username_as_alias")
703
702
 
704
703
  @username_as_alias.setter
705
- def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
704
+ def username_as_alias(self, value: Optional[pulumi.Input[_builtins.bool]]):
706
705
  pulumi.set(self, "username_as_alias", value)
707
706
 
708
707
 
709
708
  @pulumi.input_type
710
709
  class _AuthBackendState:
711
710
  def __init__(__self__, *,
712
- accessor: Optional[pulumi.Input[builtins.str]] = None,
713
- binddn: Optional[pulumi.Input[builtins.str]] = None,
714
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
715
- case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
716
- certificate: Optional[pulumi.Input[builtins.str]] = None,
717
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
718
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
719
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
720
- deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
721
- description: Optional[pulumi.Input[builtins.str]] = None,
722
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
723
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
724
- discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
725
- groupattr: Optional[pulumi.Input[builtins.str]] = None,
726
- groupdn: Optional[pulumi.Input[builtins.str]] = None,
727
- groupfilter: Optional[pulumi.Input[builtins.str]] = None,
728
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
729
- local: Optional[pulumi.Input[builtins.bool]] = None,
730
- max_page_size: Optional[pulumi.Input[builtins.int]] = None,
731
- namespace: Optional[pulumi.Input[builtins.str]] = None,
732
- path: Optional[pulumi.Input[builtins.str]] = None,
733
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
734
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
735
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
736
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
737
- tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
738
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
739
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
740
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
741
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
742
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
743
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
744
- token_period: Optional[pulumi.Input[builtins.int]] = None,
745
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
746
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
747
- token_type: Optional[pulumi.Input[builtins.str]] = None,
748
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
749
- url: Optional[pulumi.Input[builtins.str]] = None,
750
- use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
751
- userattr: Optional[pulumi.Input[builtins.str]] = None,
752
- userdn: Optional[pulumi.Input[builtins.str]] = None,
753
- userfilter: Optional[pulumi.Input[builtins.str]] = None,
754
- username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
711
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
712
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
713
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
714
+ case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
715
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
716
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
717
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
718
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
719
+ deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
720
+ description: Optional[pulumi.Input[_builtins.str]] = None,
721
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
722
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
723
+ discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
724
+ groupattr: Optional[pulumi.Input[_builtins.str]] = None,
725
+ groupdn: Optional[pulumi.Input[_builtins.str]] = None,
726
+ groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
727
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
728
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
729
+ max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
730
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
731
+ path: Optional[pulumi.Input[_builtins.str]] = None,
732
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
733
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
734
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
735
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
736
+ tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
737
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
738
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
739
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
740
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
741
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
742
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
743
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
744
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
745
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
746
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
747
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
748
+ url: Optional[pulumi.Input[_builtins.str]] = None,
749
+ use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
750
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
751
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
752
+ userfilter: Optional[pulumi.Input[_builtins.str]] = None,
753
+ username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None):
755
754
  """
756
755
  Input properties used for looking up and filtering AuthBackend resources.
757
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
758
- :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
759
- :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
760
- :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
761
- :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
762
- :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
763
- :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
764
- :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
765
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
766
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
756
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth mount.
757
+ :param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
758
+ :param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
759
+ :param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
760
+ :param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
761
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
762
+ :param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
763
+ :param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
764
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
765
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
767
766
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
768
- :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
769
- :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
770
- :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
771
- :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
772
- :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
773
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
774
- :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
767
+ :param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
768
+ :param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
769
+ :param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
770
+ :param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
771
+ :param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
772
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
773
+ :param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
775
774
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
776
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
775
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
777
776
  The value should not contain leading or trailing forward slashes.
778
777
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
779
778
  *Available only for Vault Enterprise*.
780
- :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
781
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
779
+ :param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
780
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
782
781
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
783
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
782
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
784
783
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
785
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
784
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
786
785
  a rotation when a scheduled token rotation occurs. The default rotation window is
787
786
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
788
- :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
789
- :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
790
- :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
791
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
792
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
793
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
794
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
795
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
796
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
797
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
798
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
799
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
800
- :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
801
- :param pulumi.Input[builtins.str] url: The URL of the LDAP server
802
- :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
803
- :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
804
- :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
805
- :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
806
- :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
787
+ :param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
788
+ :param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
789
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
790
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
791
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
792
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
793
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
794
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
795
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
796
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
797
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
798
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
799
+ :param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
800
+ :param pulumi.Input[_builtins.str] url: The URL of the LDAP server
801
+ :param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
802
+ :param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
803
+ :param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
804
+ :param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
805
+ :param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
807
806
  """
808
807
  if accessor is not None:
809
808
  pulumi.set(__self__, "accessor", accessor)
@@ -892,135 +891,135 @@ class _AuthBackendState:
892
891
  if username_as_alias is not None:
893
892
  pulumi.set(__self__, "username_as_alias", username_as_alias)
894
893
 
895
- @property
894
+ @_builtins.property
896
895
  @pulumi.getter
897
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
896
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
898
897
  """
899
898
  The accessor for this auth mount.
900
899
  """
901
900
  return pulumi.get(self, "accessor")
902
901
 
903
902
  @accessor.setter
904
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
903
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
905
904
  pulumi.set(self, "accessor", value)
906
905
 
907
- @property
906
+ @_builtins.property
908
907
  @pulumi.getter
909
- def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
908
+ def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
910
909
  """
911
910
  DN of object to bind when performing user search
912
911
  """
913
912
  return pulumi.get(self, "binddn")
914
913
 
915
914
  @binddn.setter
916
- def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
915
+ def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
917
916
  pulumi.set(self, "binddn", value)
918
917
 
919
- @property
918
+ @_builtins.property
920
919
  @pulumi.getter
921
- def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
920
+ def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
922
921
  """
923
922
  Password to use with `binddn` when performing user search
924
923
  """
925
924
  return pulumi.get(self, "bindpass")
926
925
 
927
926
  @bindpass.setter
928
- def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
927
+ def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
929
928
  pulumi.set(self, "bindpass", value)
930
929
 
931
- @property
930
+ @_builtins.property
932
931
  @pulumi.getter(name="caseSensitiveNames")
933
- def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
932
+ def case_sensitive_names(self) -> Optional[pulumi.Input[_builtins.bool]]:
934
933
  """
935
934
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
936
935
  """
937
936
  return pulumi.get(self, "case_sensitive_names")
938
937
 
939
938
  @case_sensitive_names.setter
940
- def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
939
+ def case_sensitive_names(self, value: Optional[pulumi.Input[_builtins.bool]]):
941
940
  pulumi.set(self, "case_sensitive_names", value)
942
941
 
943
- @property
942
+ @_builtins.property
944
943
  @pulumi.getter
945
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
944
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
946
945
  """
947
946
  Trusted CA to validate TLS certificate
948
947
  """
949
948
  return pulumi.get(self, "certificate")
950
949
 
951
950
  @certificate.setter
952
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
951
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
953
952
  pulumi.set(self, "certificate", value)
954
953
 
955
- @property
954
+ @_builtins.property
956
955
  @pulumi.getter(name="clientTlsCert")
957
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
956
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
958
957
  return pulumi.get(self, "client_tls_cert")
959
958
 
960
959
  @client_tls_cert.setter
961
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
960
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
962
961
  pulumi.set(self, "client_tls_cert", value)
963
962
 
964
- @property
963
+ @_builtins.property
965
964
  @pulumi.getter(name="clientTlsKey")
966
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
965
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
967
966
  return pulumi.get(self, "client_tls_key")
968
967
 
969
968
  @client_tls_key.setter
970
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
969
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
971
970
  pulumi.set(self, "client_tls_key", value)
972
971
 
973
- @property
972
+ @_builtins.property
974
973
  @pulumi.getter(name="connectionTimeout")
975
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
974
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
976
975
  """
977
976
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
978
977
  """
979
978
  return pulumi.get(self, "connection_timeout")
980
979
 
981
980
  @connection_timeout.setter
982
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
981
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
983
982
  pulumi.set(self, "connection_timeout", value)
984
983
 
985
- @property
984
+ @_builtins.property
986
985
  @pulumi.getter(name="denyNullBind")
987
- def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
986
+ def deny_null_bind(self) -> Optional[pulumi.Input[_builtins.bool]]:
988
987
  """
989
988
  Prevents users from bypassing authentication when providing an empty password.
990
989
  """
991
990
  return pulumi.get(self, "deny_null_bind")
992
991
 
993
992
  @deny_null_bind.setter
994
- def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
993
+ def deny_null_bind(self, value: Optional[pulumi.Input[_builtins.bool]]):
995
994
  pulumi.set(self, "deny_null_bind", value)
996
995
 
997
- @property
996
+ @_builtins.property
998
997
  @pulumi.getter
999
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
998
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
1000
999
  """
1001
1000
  Description for the LDAP auth backend mount
1002
1001
  """
1003
1002
  return pulumi.get(self, "description")
1004
1003
 
1005
1004
  @description.setter
1006
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
1005
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
1007
1006
  pulumi.set(self, "description", value)
1008
1007
 
1009
- @property
1008
+ @_builtins.property
1010
1009
  @pulumi.getter(name="disableAutomatedRotation")
1011
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1010
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1012
1011
  """
1013
1012
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1014
1013
  """
1015
1014
  return pulumi.get(self, "disable_automated_rotation")
1016
1015
 
1017
1016
  @disable_automated_rotation.setter
1018
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1017
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1019
1018
  pulumi.set(self, "disable_automated_rotation", value)
1020
1019
 
1021
- @property
1020
+ @_builtins.property
1022
1021
  @pulumi.getter(name="disableRemount")
1023
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
1022
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
1024
1023
  """
1025
1024
  If set, opts out of mount migration on path updates.
1026
1025
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -1028,84 +1027,84 @@ class _AuthBackendState:
1028
1027
  return pulumi.get(self, "disable_remount")
1029
1028
 
1030
1029
  @disable_remount.setter
1031
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
1030
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
1032
1031
  pulumi.set(self, "disable_remount", value)
1033
1032
 
1034
- @property
1033
+ @_builtins.property
1035
1034
  @pulumi.getter
1036
- def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
1035
+ def discoverdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
1037
1036
  """
1038
1037
  Use anonymous bind to discover the bind DN of a user.
1039
1038
  """
1040
1039
  return pulumi.get(self, "discoverdn")
1041
1040
 
1042
1041
  @discoverdn.setter
1043
- def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
1042
+ def discoverdn(self, value: Optional[pulumi.Input[_builtins.bool]]):
1044
1043
  pulumi.set(self, "discoverdn", value)
1045
1044
 
1046
- @property
1045
+ @_builtins.property
1047
1046
  @pulumi.getter
1048
- def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
1047
+ def groupattr(self) -> Optional[pulumi.Input[_builtins.str]]:
1049
1048
  """
1050
1049
  LDAP attribute to follow on objects returned by groupfilter
1051
1050
  """
1052
1051
  return pulumi.get(self, "groupattr")
1053
1052
 
1054
1053
  @groupattr.setter
1055
- def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
1054
+ def groupattr(self, value: Optional[pulumi.Input[_builtins.str]]):
1056
1055
  pulumi.set(self, "groupattr", value)
1057
1056
 
1058
- @property
1057
+ @_builtins.property
1059
1058
  @pulumi.getter
1060
- def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
1059
+ def groupdn(self) -> Optional[pulumi.Input[_builtins.str]]:
1061
1060
  """
1062
1061
  Base DN under which to perform group search
1063
1062
  """
1064
1063
  return pulumi.get(self, "groupdn")
1065
1064
 
1066
1065
  @groupdn.setter
1067
- def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
1066
+ def groupdn(self, value: Optional[pulumi.Input[_builtins.str]]):
1068
1067
  pulumi.set(self, "groupdn", value)
1069
1068
 
1070
- @property
1069
+ @_builtins.property
1071
1070
  @pulumi.getter
1072
- def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
1071
+ def groupfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
1073
1072
  """
1074
1073
  Go template used to construct group membership query
1075
1074
  """
1076
1075
  return pulumi.get(self, "groupfilter")
1077
1076
 
1078
1077
  @groupfilter.setter
1079
- def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
1078
+ def groupfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
1080
1079
  pulumi.set(self, "groupfilter", value)
1081
1080
 
1082
- @property
1081
+ @_builtins.property
1083
1082
  @pulumi.getter(name="insecureTls")
1084
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
1083
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1085
1084
  """
1086
1085
  Control whether or TLS certificates must be validated
1087
1086
  """
1088
1087
  return pulumi.get(self, "insecure_tls")
1089
1088
 
1090
1089
  @insecure_tls.setter
1091
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
1090
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1092
1091
  pulumi.set(self, "insecure_tls", value)
1093
1092
 
1094
- @property
1093
+ @_builtins.property
1095
1094
  @pulumi.getter
1096
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1095
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1097
1096
  """
1098
1097
  Specifies if the auth method is local only.
1099
1098
  """
1100
1099
  return pulumi.get(self, "local")
1101
1100
 
1102
1101
  @local.setter
1103
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1102
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
1104
1103
  pulumi.set(self, "local", value)
1105
1104
 
1106
- @property
1105
+ @_builtins.property
1107
1106
  @pulumi.getter(name="maxPageSize")
1108
- def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
1107
+ def max_page_size(self) -> Optional[pulumi.Input[_builtins.int]]:
1109
1108
  """
1110
1109
  Sets the max page size for LDAP lookups, by default it's set to -1.
1111
1110
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
@@ -1113,12 +1112,12 @@ class _AuthBackendState:
1113
1112
  return pulumi.get(self, "max_page_size")
1114
1113
 
1115
1114
  @max_page_size.setter
1116
- def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
1115
+ def max_page_size(self, value: Optional[pulumi.Input[_builtins.int]]):
1117
1116
  pulumi.set(self, "max_page_size", value)
1118
1117
 
1119
- @property
1118
+ @_builtins.property
1120
1119
  @pulumi.getter
1121
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1120
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1122
1121
  """
1123
1122
  The namespace to provision the resource in.
1124
1123
  The value should not contain leading or trailing forward slashes.
@@ -1128,24 +1127,24 @@ class _AuthBackendState:
1128
1127
  return pulumi.get(self, "namespace")
1129
1128
 
1130
1129
  @namespace.setter
1131
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1130
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1132
1131
  pulumi.set(self, "namespace", value)
1133
1132
 
1134
- @property
1133
+ @_builtins.property
1135
1134
  @pulumi.getter
1136
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
1135
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1137
1136
  """
1138
1137
  Path to mount the LDAP auth backend under
1139
1138
  """
1140
1139
  return pulumi.get(self, "path")
1141
1140
 
1142
1141
  @path.setter
1143
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
1142
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1144
1143
  pulumi.set(self, "path", value)
1145
1144
 
1146
- @property
1145
+ @_builtins.property
1147
1146
  @pulumi.getter(name="rotationPeriod")
1148
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
1147
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1149
1148
  """
1150
1149
  The amount of time in seconds Vault should wait before rotating the root credential.
1151
1150
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1153,12 +1152,12 @@ class _AuthBackendState:
1153
1152
  return pulumi.get(self, "rotation_period")
1154
1153
 
1155
1154
  @rotation_period.setter
1156
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
1155
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1157
1156
  pulumi.set(self, "rotation_period", value)
1158
1157
 
1159
- @property
1158
+ @_builtins.property
1160
1159
  @pulumi.getter(name="rotationSchedule")
1161
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
1160
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
1162
1161
  """
1163
1162
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1164
1163
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -1166,12 +1165,12 @@ class _AuthBackendState:
1166
1165
  return pulumi.get(self, "rotation_schedule")
1167
1166
 
1168
1167
  @rotation_schedule.setter
1169
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
1168
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
1170
1169
  pulumi.set(self, "rotation_schedule", value)
1171
1170
 
1172
- @property
1171
+ @_builtins.property
1173
1172
  @pulumi.getter(name="rotationWindow")
1174
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1173
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1175
1174
  """
1176
1175
  The maximum amount of time in seconds allowed to complete
1177
1176
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1180,235 +1179,235 @@ class _AuthBackendState:
1180
1179
  return pulumi.get(self, "rotation_window")
1181
1180
 
1182
1181
  @rotation_window.setter
1183
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1182
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1184
1183
  pulumi.set(self, "rotation_window", value)
1185
1184
 
1186
- @property
1185
+ @_builtins.property
1187
1186
  @pulumi.getter
1188
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
1187
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1189
1188
  """
1190
1189
  Control use of TLS when conecting to LDAP
1191
1190
  """
1192
1191
  return pulumi.get(self, "starttls")
1193
1192
 
1194
1193
  @starttls.setter
1195
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
1194
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1196
1195
  pulumi.set(self, "starttls", value)
1197
1196
 
1198
- @property
1197
+ @_builtins.property
1199
1198
  @pulumi.getter(name="tlsMaxVersion")
1200
- def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
1199
+ def tls_max_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1201
1200
  """
1202
1201
  Maximum acceptable version of TLS
1203
1202
  """
1204
1203
  return pulumi.get(self, "tls_max_version")
1205
1204
 
1206
1205
  @tls_max_version.setter
1207
- def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
1206
+ def tls_max_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1208
1207
  pulumi.set(self, "tls_max_version", value)
1209
1208
 
1210
- @property
1209
+ @_builtins.property
1211
1210
  @pulumi.getter(name="tlsMinVersion")
1212
- def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
1211
+ def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1213
1212
  """
1214
1213
  Minimum acceptable version of TLS
1215
1214
  """
1216
1215
  return pulumi.get(self, "tls_min_version")
1217
1216
 
1218
1217
  @tls_min_version.setter
1219
- def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
1218
+ def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1220
1219
  pulumi.set(self, "tls_min_version", value)
1221
1220
 
1222
- @property
1221
+ @_builtins.property
1223
1222
  @pulumi.getter(name="tokenBoundCidrs")
1224
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1223
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1225
1224
  """
1226
1225
  Specifies the blocks of IP addresses which are allowed to use the generated token
1227
1226
  """
1228
1227
  return pulumi.get(self, "token_bound_cidrs")
1229
1228
 
1230
1229
  @token_bound_cidrs.setter
1231
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1230
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1232
1231
  pulumi.set(self, "token_bound_cidrs", value)
1233
1232
 
1234
- @property
1233
+ @_builtins.property
1235
1234
  @pulumi.getter(name="tokenExplicitMaxTtl")
1236
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1235
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1237
1236
  """
1238
1237
  Generated Token's Explicit Maximum TTL in seconds
1239
1238
  """
1240
1239
  return pulumi.get(self, "token_explicit_max_ttl")
1241
1240
 
1242
1241
  @token_explicit_max_ttl.setter
1243
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1242
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1244
1243
  pulumi.set(self, "token_explicit_max_ttl", value)
1245
1244
 
1246
- @property
1245
+ @_builtins.property
1247
1246
  @pulumi.getter(name="tokenMaxTtl")
1248
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1247
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1249
1248
  """
1250
1249
  The maximum lifetime of the generated token
1251
1250
  """
1252
1251
  return pulumi.get(self, "token_max_ttl")
1253
1252
 
1254
1253
  @token_max_ttl.setter
1255
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1254
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1256
1255
  pulumi.set(self, "token_max_ttl", value)
1257
1256
 
1258
- @property
1257
+ @_builtins.property
1259
1258
  @pulumi.getter(name="tokenNoDefaultPolicy")
1260
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
1259
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
1261
1260
  """
1262
1261
  If true, the 'default' policy will not automatically be added to generated tokens
1263
1262
  """
1264
1263
  return pulumi.get(self, "token_no_default_policy")
1265
1264
 
1266
1265
  @token_no_default_policy.setter
1267
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
1266
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
1268
1267
  pulumi.set(self, "token_no_default_policy", value)
1269
1268
 
1270
- @property
1269
+ @_builtins.property
1271
1270
  @pulumi.getter(name="tokenNumUses")
1272
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
1271
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
1273
1272
  """
1274
1273
  The maximum number of times a token may be used, a value of zero means unlimited
1275
1274
  """
1276
1275
  return pulumi.get(self, "token_num_uses")
1277
1276
 
1278
1277
  @token_num_uses.setter
1279
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
1278
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
1280
1279
  pulumi.set(self, "token_num_uses", value)
1281
1280
 
1282
- @property
1281
+ @_builtins.property
1283
1282
  @pulumi.getter(name="tokenPeriod")
1284
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
1283
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1285
1284
  """
1286
1285
  Generated Token's Period
1287
1286
  """
1288
1287
  return pulumi.get(self, "token_period")
1289
1288
 
1290
1289
  @token_period.setter
1291
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
1290
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1292
1291
  pulumi.set(self, "token_period", value)
1293
1292
 
1294
- @property
1293
+ @_builtins.property
1295
1294
  @pulumi.getter(name="tokenPolicies")
1296
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1295
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1297
1296
  """
1298
1297
  Generated Token's Policies
1299
1298
  """
1300
1299
  return pulumi.get(self, "token_policies")
1301
1300
 
1302
1301
  @token_policies.setter
1303
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1302
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1304
1303
  pulumi.set(self, "token_policies", value)
1305
1304
 
1306
- @property
1305
+ @_builtins.property
1307
1306
  @pulumi.getter(name="tokenTtl")
1308
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
1307
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1309
1308
  """
1310
1309
  The initial ttl of the token to generate in seconds
1311
1310
  """
1312
1311
  return pulumi.get(self, "token_ttl")
1313
1312
 
1314
1313
  @token_ttl.setter
1315
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
1314
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1316
1315
  pulumi.set(self, "token_ttl", value)
1317
1316
 
1318
- @property
1317
+ @_builtins.property
1319
1318
  @pulumi.getter(name="tokenType")
1320
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
1319
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
1321
1320
  """
1322
1321
  The type of token to generate, service or batch
1323
1322
  """
1324
1323
  return pulumi.get(self, "token_type")
1325
1324
 
1326
1325
  @token_type.setter
1327
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
1326
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
1328
1327
  pulumi.set(self, "token_type", value)
1329
1328
 
1330
- @property
1329
+ @_builtins.property
1331
1330
  @pulumi.getter
1332
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
1331
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
1333
1332
  """
1334
1333
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1335
1334
  """
1336
1335
  return pulumi.get(self, "upndomain")
1337
1336
 
1338
1337
  @upndomain.setter
1339
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
1338
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
1340
1339
  pulumi.set(self, "upndomain", value)
1341
1340
 
1342
- @property
1341
+ @_builtins.property
1343
1342
  @pulumi.getter
1344
- def url(self) -> Optional[pulumi.Input[builtins.str]]:
1343
+ def url(self) -> Optional[pulumi.Input[_builtins.str]]:
1345
1344
  """
1346
1345
  The URL of the LDAP server
1347
1346
  """
1348
1347
  return pulumi.get(self, "url")
1349
1348
 
1350
1349
  @url.setter
1351
- def url(self, value: Optional[pulumi.Input[builtins.str]]):
1350
+ def url(self, value: Optional[pulumi.Input[_builtins.str]]):
1352
1351
  pulumi.set(self, "url", value)
1353
1352
 
1354
- @property
1353
+ @_builtins.property
1355
1354
  @pulumi.getter(name="useTokenGroups")
1356
- def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
1355
+ def use_token_groups(self) -> Optional[pulumi.Input[_builtins.bool]]:
1357
1356
  """
1358
1357
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1359
1358
  """
1360
1359
  return pulumi.get(self, "use_token_groups")
1361
1360
 
1362
1361
  @use_token_groups.setter
1363
- def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
1362
+ def use_token_groups(self, value: Optional[pulumi.Input[_builtins.bool]]):
1364
1363
  pulumi.set(self, "use_token_groups", value)
1365
1364
 
1366
- @property
1365
+ @_builtins.property
1367
1366
  @pulumi.getter
1368
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
1367
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
1369
1368
  """
1370
1369
  Attribute on user object matching username passed in
1371
1370
  """
1372
1371
  return pulumi.get(self, "userattr")
1373
1372
 
1374
1373
  @userattr.setter
1375
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
1374
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
1376
1375
  pulumi.set(self, "userattr", value)
1377
1376
 
1378
- @property
1377
+ @_builtins.property
1379
1378
  @pulumi.getter
1380
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
1379
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
1381
1380
  """
1382
1381
  Base DN under which to perform user search
1383
1382
  """
1384
1383
  return pulumi.get(self, "userdn")
1385
1384
 
1386
1385
  @userdn.setter
1387
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
1386
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
1388
1387
  pulumi.set(self, "userdn", value)
1389
1388
 
1390
- @property
1389
+ @_builtins.property
1391
1390
  @pulumi.getter
1392
- def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
1391
+ def userfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
1393
1392
  """
1394
1393
  LDAP user search filter
1395
1394
  """
1396
1395
  return pulumi.get(self, "userfilter")
1397
1396
 
1398
1397
  @userfilter.setter
1399
- def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
1398
+ def userfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
1400
1399
  pulumi.set(self, "userfilter", value)
1401
1400
 
1402
- @property
1401
+ @_builtins.property
1403
1402
  @pulumi.getter(name="usernameAsAlias")
1404
- def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
1403
+ def username_as_alias(self) -> Optional[pulumi.Input[_builtins.bool]]:
1405
1404
  """
1406
1405
  Force the auth method to use the username passed by the user as the alias name.
1407
1406
  """
1408
1407
  return pulumi.get(self, "username_as_alias")
1409
1408
 
1410
1409
  @username_as_alias.setter
1411
- def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
1410
+ def username_as_alias(self, value: Optional[pulumi.Input[_builtins.bool]]):
1412
1411
  pulumi.set(self, "username_as_alias", value)
1413
1412
 
1414
1413
 
@@ -1418,48 +1417,48 @@ class AuthBackend(pulumi.CustomResource):
1418
1417
  def __init__(__self__,
1419
1418
  resource_name: str,
1420
1419
  opts: Optional[pulumi.ResourceOptions] = None,
1421
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1422
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1423
- case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1424
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1425
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1426
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1427
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1428
- deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1429
- description: Optional[pulumi.Input[builtins.str]] = None,
1430
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1431
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1432
- discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1433
- groupattr: Optional[pulumi.Input[builtins.str]] = None,
1434
- groupdn: Optional[pulumi.Input[builtins.str]] = None,
1435
- groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1436
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1437
- local: Optional[pulumi.Input[builtins.bool]] = None,
1438
- max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1439
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1440
- path: Optional[pulumi.Input[builtins.str]] = None,
1441
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1442
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1443
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1444
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1445
- tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1446
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1447
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1448
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1449
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1450
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1451
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1452
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1453
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1454
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1455
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1456
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1457
- url: Optional[pulumi.Input[builtins.str]] = None,
1458
- use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1459
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1460
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1461
- userfilter: Optional[pulumi.Input[builtins.str]] = None,
1462
- username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
1420
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1421
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1422
+ case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
1423
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1424
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1425
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1426
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1427
+ deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
1428
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1429
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1430
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1431
+ discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
1432
+ groupattr: Optional[pulumi.Input[_builtins.str]] = None,
1433
+ groupdn: Optional[pulumi.Input[_builtins.str]] = None,
1434
+ groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
1435
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1436
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1437
+ max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
1438
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1439
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1440
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1441
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1442
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1443
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1444
+ tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
1445
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
1446
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1447
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1448
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1449
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1450
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1451
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1452
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1453
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1454
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1455
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1456
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1457
+ use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
1458
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1459
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1460
+ userfilter: Optional[pulumi.Input[_builtins.str]] = None,
1461
+ username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None,
1463
1462
  __props__=None):
1464
1463
  """
1465
1464
  Provides a resource for managing an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -1493,55 +1492,55 @@ class AuthBackend(pulumi.CustomResource):
1493
1492
 
1494
1493
  :param str resource_name: The name of the resource.
1495
1494
  :param pulumi.ResourceOptions opts: Options for the resource.
1496
- :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
1497
- :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
1498
- :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1499
- :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
1500
- :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1501
- :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1502
- :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
1503
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1504
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1495
+ :param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
1496
+ :param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
1497
+ :param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1498
+ :param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
1499
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1500
+ :param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1501
+ :param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
1502
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1503
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1505
1504
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1506
- :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1507
- :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1508
- :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
1509
- :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
1510
- :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1511
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1512
- :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1505
+ :param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1506
+ :param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1507
+ :param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
1508
+ :param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
1509
+ :param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1510
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
1511
+ :param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1513
1512
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
1514
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1513
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1515
1514
  The value should not contain leading or trailing forward slashes.
1516
1515
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1517
1516
  *Available only for Vault Enterprise*.
1518
- :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
1519
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1517
+ :param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
1518
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1520
1519
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1521
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1520
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1522
1521
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1523
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1522
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1524
1523
  a rotation when a scheduled token rotation occurs. The default rotation window is
1525
1524
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1526
- :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
1527
- :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
1528
- :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
1529
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1530
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1531
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1532
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1533
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1534
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1535
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1536
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1537
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1538
- :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1539
- :param pulumi.Input[builtins.str] url: The URL of the LDAP server
1540
- :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1541
- :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
1542
- :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
1543
- :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
1544
- :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1525
+ :param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
1526
+ :param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
1527
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
1528
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1529
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1530
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1531
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1532
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1533
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1534
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1535
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1536
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1537
+ :param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1538
+ :param pulumi.Input[_builtins.str] url: The URL of the LDAP server
1539
+ :param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1540
+ :param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
1541
+ :param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
1542
+ :param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
1543
+ :param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1545
1544
  """
1546
1545
  ...
1547
1546
  @overload
@@ -1594,48 +1593,48 @@ class AuthBackend(pulumi.CustomResource):
1594
1593
  def _internal_init(__self__,
1595
1594
  resource_name: str,
1596
1595
  opts: Optional[pulumi.ResourceOptions] = None,
1597
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1598
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1599
- case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1600
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1601
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1602
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1603
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1604
- deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1605
- description: Optional[pulumi.Input[builtins.str]] = None,
1606
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1607
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1608
- discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1609
- groupattr: Optional[pulumi.Input[builtins.str]] = None,
1610
- groupdn: Optional[pulumi.Input[builtins.str]] = None,
1611
- groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1612
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1613
- local: Optional[pulumi.Input[builtins.bool]] = None,
1614
- max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1615
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1616
- path: Optional[pulumi.Input[builtins.str]] = None,
1617
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1618
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1619
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1620
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1621
- tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1622
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1623
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1624
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1625
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1626
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1627
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1628
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1629
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1630
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1631
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1632
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1633
- url: Optional[pulumi.Input[builtins.str]] = None,
1634
- use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1635
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1636
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1637
- userfilter: Optional[pulumi.Input[builtins.str]] = None,
1638
- username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
1596
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1597
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1598
+ case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
1599
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1600
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1601
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1602
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1603
+ deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
1604
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1605
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1606
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1607
+ discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
1608
+ groupattr: Optional[pulumi.Input[_builtins.str]] = None,
1609
+ groupdn: Optional[pulumi.Input[_builtins.str]] = None,
1610
+ groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
1611
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1612
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1613
+ max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
1614
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1615
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1616
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1617
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1618
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1619
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1620
+ tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
1621
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
1622
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1623
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1624
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1625
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1626
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1627
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1628
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1629
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1630
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1631
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1632
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1633
+ use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
1634
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1635
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1636
+ userfilter: Optional[pulumi.Input[_builtins.str]] = None,
1637
+ username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None,
1639
1638
  __props__=None):
1640
1639
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1641
1640
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1702,49 +1701,49 @@ class AuthBackend(pulumi.CustomResource):
1702
1701
  def get(resource_name: str,
1703
1702
  id: pulumi.Input[str],
1704
1703
  opts: Optional[pulumi.ResourceOptions] = None,
1705
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1706
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1707
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1708
- case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
1709
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1710
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1711
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1712
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1713
- deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
1714
- description: Optional[pulumi.Input[builtins.str]] = None,
1715
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1716
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1717
- discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
1718
- groupattr: Optional[pulumi.Input[builtins.str]] = None,
1719
- groupdn: Optional[pulumi.Input[builtins.str]] = None,
1720
- groupfilter: Optional[pulumi.Input[builtins.str]] = None,
1721
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1722
- local: Optional[pulumi.Input[builtins.bool]] = None,
1723
- max_page_size: Optional[pulumi.Input[builtins.int]] = None,
1724
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1725
- path: Optional[pulumi.Input[builtins.str]] = None,
1726
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1727
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1728
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1729
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1730
- tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
1731
- tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
1732
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1733
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1734
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1735
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1736
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1737
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1738
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1739
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1740
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1741
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1742
- url: Optional[pulumi.Input[builtins.str]] = None,
1743
- use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
1744
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1745
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1746
- userfilter: Optional[pulumi.Input[builtins.str]] = None,
1747
- username_as_alias: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
1704
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1705
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1706
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1707
+ case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
1708
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1709
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1710
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1711
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1712
+ deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
1713
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1714
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1715
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1716
+ discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
1717
+ groupattr: Optional[pulumi.Input[_builtins.str]] = None,
1718
+ groupdn: Optional[pulumi.Input[_builtins.str]] = None,
1719
+ groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
1720
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1721
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1722
+ max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
1723
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1724
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1725
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1726
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1727
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1728
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1729
+ tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
1730
+ tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
1731
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1732
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1733
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1734
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1735
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1736
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1737
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1738
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1739
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1740
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1741
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1742
+ use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
1743
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1744
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1745
+ userfilter: Optional[pulumi.Input[_builtins.str]] = None,
1746
+ username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackend':
1748
1747
  """
1749
1748
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
1750
1749
  properties used to qualify the lookup.
@@ -1752,56 +1751,56 @@ class AuthBackend(pulumi.CustomResource):
1752
1751
  :param str resource_name: The unique name of the resulting resource.
1753
1752
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1754
1753
  :param pulumi.ResourceOptions opts: Options for the resource.
1755
- :param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
1756
- :param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
1757
- :param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
1758
- :param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1759
- :param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
1760
- :param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1761
- :param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1762
- :param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
1763
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1764
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1754
+ :param pulumi.Input[_builtins.str] accessor: The accessor for this auth mount.
1755
+ :param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
1756
+ :param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
1757
+ :param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1758
+ :param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
1759
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1760
+ :param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
1761
+ :param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
1762
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1763
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1765
1764
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1766
- :param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1767
- :param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1768
- :param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
1769
- :param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
1770
- :param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1771
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1772
- :param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1765
+ :param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
1766
+ :param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
1767
+ :param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
1768
+ :param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
1769
+ :param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
1770
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
1771
+ :param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
1773
1772
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
1774
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1773
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1775
1774
  The value should not contain leading or trailing forward slashes.
1776
1775
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1777
1776
  *Available only for Vault Enterprise*.
1778
- :param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
1779
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1777
+ :param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
1778
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1780
1779
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1781
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1780
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1782
1781
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1783
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1782
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1784
1783
  a rotation when a scheduled token rotation occurs. The default rotation window is
1785
1784
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1786
- :param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
1787
- :param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
1788
- :param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
1789
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1790
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1791
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1792
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1793
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1794
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1795
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1796
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1797
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1798
- :param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1799
- :param pulumi.Input[builtins.str] url: The URL of the LDAP server
1800
- :param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1801
- :param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
1802
- :param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
1803
- :param pulumi.Input[builtins.str] userfilter: LDAP user search filter
1804
- :param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1785
+ :param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
1786
+ :param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
1787
+ :param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
1788
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1789
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1790
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1791
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1792
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1793
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1794
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1795
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1796
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1797
+ :param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1798
+ :param pulumi.Input[_builtins.str] url: The URL of the LDAP server
1799
+ :param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
1800
+ :param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
1801
+ :param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
1802
+ :param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
1803
+ :param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
1805
1804
  """
1806
1805
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1807
1806
 
@@ -1852,157 +1851,157 @@ class AuthBackend(pulumi.CustomResource):
1852
1851
  __props__.__dict__["username_as_alias"] = username_as_alias
1853
1852
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
1854
1853
 
1855
- @property
1854
+ @_builtins.property
1856
1855
  @pulumi.getter
1857
- def accessor(self) -> pulumi.Output[builtins.str]:
1856
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1858
1857
  """
1859
1858
  The accessor for this auth mount.
1860
1859
  """
1861
1860
  return pulumi.get(self, "accessor")
1862
1861
 
1863
- @property
1862
+ @_builtins.property
1864
1863
  @pulumi.getter
1865
- def binddn(self) -> pulumi.Output[builtins.str]:
1864
+ def binddn(self) -> pulumi.Output[_builtins.str]:
1866
1865
  """
1867
1866
  DN of object to bind when performing user search
1868
1867
  """
1869
1868
  return pulumi.get(self, "binddn")
1870
1869
 
1871
- @property
1870
+ @_builtins.property
1872
1871
  @pulumi.getter
1873
- def bindpass(self) -> pulumi.Output[builtins.str]:
1872
+ def bindpass(self) -> pulumi.Output[_builtins.str]:
1874
1873
  """
1875
1874
  Password to use with `binddn` when performing user search
1876
1875
  """
1877
1876
  return pulumi.get(self, "bindpass")
1878
1877
 
1879
- @property
1878
+ @_builtins.property
1880
1879
  @pulumi.getter(name="caseSensitiveNames")
1881
- def case_sensitive_names(self) -> pulumi.Output[builtins.bool]:
1880
+ def case_sensitive_names(self) -> pulumi.Output[_builtins.bool]:
1882
1881
  """
1883
1882
  Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
1884
1883
  """
1885
1884
  return pulumi.get(self, "case_sensitive_names")
1886
1885
 
1887
- @property
1886
+ @_builtins.property
1888
1887
  @pulumi.getter
1889
- def certificate(self) -> pulumi.Output[builtins.str]:
1888
+ def certificate(self) -> pulumi.Output[_builtins.str]:
1890
1889
  """
1891
1890
  Trusted CA to validate TLS certificate
1892
1891
  """
1893
1892
  return pulumi.get(self, "certificate")
1894
1893
 
1895
- @property
1894
+ @_builtins.property
1896
1895
  @pulumi.getter(name="clientTlsCert")
1897
- def client_tls_cert(self) -> pulumi.Output[builtins.str]:
1896
+ def client_tls_cert(self) -> pulumi.Output[_builtins.str]:
1898
1897
  return pulumi.get(self, "client_tls_cert")
1899
1898
 
1900
- @property
1899
+ @_builtins.property
1901
1900
  @pulumi.getter(name="clientTlsKey")
1902
- def client_tls_key(self) -> pulumi.Output[builtins.str]:
1901
+ def client_tls_key(self) -> pulumi.Output[_builtins.str]:
1903
1902
  return pulumi.get(self, "client_tls_key")
1904
1903
 
1905
- @property
1904
+ @_builtins.property
1906
1905
  @pulumi.getter(name="connectionTimeout")
1907
- def connection_timeout(self) -> pulumi.Output[builtins.int]:
1906
+ def connection_timeout(self) -> pulumi.Output[_builtins.int]:
1908
1907
  """
1909
1908
  Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
1910
1909
  """
1911
1910
  return pulumi.get(self, "connection_timeout")
1912
1911
 
1913
- @property
1912
+ @_builtins.property
1914
1913
  @pulumi.getter(name="denyNullBind")
1915
- def deny_null_bind(self) -> pulumi.Output[builtins.bool]:
1914
+ def deny_null_bind(self) -> pulumi.Output[_builtins.bool]:
1916
1915
  """
1917
1916
  Prevents users from bypassing authentication when providing an empty password.
1918
1917
  """
1919
1918
  return pulumi.get(self, "deny_null_bind")
1920
1919
 
1921
- @property
1920
+ @_builtins.property
1922
1921
  @pulumi.getter
1923
- def description(self) -> pulumi.Output[builtins.str]:
1922
+ def description(self) -> pulumi.Output[_builtins.str]:
1924
1923
  """
1925
1924
  Description for the LDAP auth backend mount
1926
1925
  """
1927
1926
  return pulumi.get(self, "description")
1928
1927
 
1929
- @property
1928
+ @_builtins.property
1930
1929
  @pulumi.getter(name="disableAutomatedRotation")
1931
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1930
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1932
1931
  """
1933
1932
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1934
1933
  """
1935
1934
  return pulumi.get(self, "disable_automated_rotation")
1936
1935
 
1937
- @property
1936
+ @_builtins.property
1938
1937
  @pulumi.getter(name="disableRemount")
1939
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1938
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1940
1939
  """
1941
1940
  If set, opts out of mount migration on path updates.
1942
1941
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1943
1942
  """
1944
1943
  return pulumi.get(self, "disable_remount")
1945
1944
 
1946
- @property
1945
+ @_builtins.property
1947
1946
  @pulumi.getter
1948
- def discoverdn(self) -> pulumi.Output[builtins.bool]:
1947
+ def discoverdn(self) -> pulumi.Output[_builtins.bool]:
1949
1948
  """
1950
1949
  Use anonymous bind to discover the bind DN of a user.
1951
1950
  """
1952
1951
  return pulumi.get(self, "discoverdn")
1953
1952
 
1954
- @property
1953
+ @_builtins.property
1955
1954
  @pulumi.getter
1956
- def groupattr(self) -> pulumi.Output[builtins.str]:
1955
+ def groupattr(self) -> pulumi.Output[_builtins.str]:
1957
1956
  """
1958
1957
  LDAP attribute to follow on objects returned by groupfilter
1959
1958
  """
1960
1959
  return pulumi.get(self, "groupattr")
1961
1960
 
1962
- @property
1961
+ @_builtins.property
1963
1962
  @pulumi.getter
1964
- def groupdn(self) -> pulumi.Output[builtins.str]:
1963
+ def groupdn(self) -> pulumi.Output[_builtins.str]:
1965
1964
  """
1966
1965
  Base DN under which to perform group search
1967
1966
  """
1968
1967
  return pulumi.get(self, "groupdn")
1969
1968
 
1970
- @property
1969
+ @_builtins.property
1971
1970
  @pulumi.getter
1972
- def groupfilter(self) -> pulumi.Output[builtins.str]:
1971
+ def groupfilter(self) -> pulumi.Output[_builtins.str]:
1973
1972
  """
1974
1973
  Go template used to construct group membership query
1975
1974
  """
1976
1975
  return pulumi.get(self, "groupfilter")
1977
1976
 
1978
- @property
1977
+ @_builtins.property
1979
1978
  @pulumi.getter(name="insecureTls")
1980
- def insecure_tls(self) -> pulumi.Output[builtins.bool]:
1979
+ def insecure_tls(self) -> pulumi.Output[_builtins.bool]:
1981
1980
  """
1982
1981
  Control whether or TLS certificates must be validated
1983
1982
  """
1984
1983
  return pulumi.get(self, "insecure_tls")
1985
1984
 
1986
- @property
1985
+ @_builtins.property
1987
1986
  @pulumi.getter
1988
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1987
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1989
1988
  """
1990
1989
  Specifies if the auth method is local only.
1991
1990
  """
1992
1991
  return pulumi.get(self, "local")
1993
1992
 
1994
- @property
1993
+ @_builtins.property
1995
1994
  @pulumi.getter(name="maxPageSize")
1996
- def max_page_size(self) -> pulumi.Output[Optional[builtins.int]]:
1995
+ def max_page_size(self) -> pulumi.Output[Optional[_builtins.int]]:
1997
1996
  """
1998
1997
  Sets the max page size for LDAP lookups, by default it's set to -1.
1999
1998
  *Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
2000
1999
  """
2001
2000
  return pulumi.get(self, "max_page_size")
2002
2001
 
2003
- @property
2002
+ @_builtins.property
2004
2003
  @pulumi.getter
2005
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
2004
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
2006
2005
  """
2007
2006
  The namespace to provision the resource in.
2008
2007
  The value should not contain leading or trailing forward slashes.
@@ -2011,35 +2010,35 @@ class AuthBackend(pulumi.CustomResource):
2011
2010
  """
2012
2011
  return pulumi.get(self, "namespace")
2013
2012
 
2014
- @property
2013
+ @_builtins.property
2015
2014
  @pulumi.getter
2016
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
2015
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
2017
2016
  """
2018
2017
  Path to mount the LDAP auth backend under
2019
2018
  """
2020
2019
  return pulumi.get(self, "path")
2021
2020
 
2022
- @property
2021
+ @_builtins.property
2023
2022
  @pulumi.getter(name="rotationPeriod")
2024
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
2023
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
2025
2024
  """
2026
2025
  The amount of time in seconds Vault should wait before rotating the root credential.
2027
2026
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
2028
2027
  """
2029
2028
  return pulumi.get(self, "rotation_period")
2030
2029
 
2031
- @property
2030
+ @_builtins.property
2032
2031
  @pulumi.getter(name="rotationSchedule")
2033
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
2032
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
2034
2033
  """
2035
2034
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
2036
2035
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
2037
2036
  """
2038
2037
  return pulumi.get(self, "rotation_schedule")
2039
2038
 
2040
- @property
2039
+ @_builtins.property
2041
2040
  @pulumi.getter(name="rotationWindow")
2042
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
2041
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
2043
2042
  """
2044
2043
  The maximum amount of time in seconds allowed to complete
2045
2044
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -2047,153 +2046,153 @@ class AuthBackend(pulumi.CustomResource):
2047
2046
  """
2048
2047
  return pulumi.get(self, "rotation_window")
2049
2048
 
2050
- @property
2049
+ @_builtins.property
2051
2050
  @pulumi.getter
2052
- def starttls(self) -> pulumi.Output[builtins.bool]:
2051
+ def starttls(self) -> pulumi.Output[_builtins.bool]:
2053
2052
  """
2054
2053
  Control use of TLS when conecting to LDAP
2055
2054
  """
2056
2055
  return pulumi.get(self, "starttls")
2057
2056
 
2058
- @property
2057
+ @_builtins.property
2059
2058
  @pulumi.getter(name="tlsMaxVersion")
2060
- def tls_max_version(self) -> pulumi.Output[builtins.str]:
2059
+ def tls_max_version(self) -> pulumi.Output[_builtins.str]:
2061
2060
  """
2062
2061
  Maximum acceptable version of TLS
2063
2062
  """
2064
2063
  return pulumi.get(self, "tls_max_version")
2065
2064
 
2066
- @property
2065
+ @_builtins.property
2067
2066
  @pulumi.getter(name="tlsMinVersion")
2068
- def tls_min_version(self) -> pulumi.Output[builtins.str]:
2067
+ def tls_min_version(self) -> pulumi.Output[_builtins.str]:
2069
2068
  """
2070
2069
  Minimum acceptable version of TLS
2071
2070
  """
2072
2071
  return pulumi.get(self, "tls_min_version")
2073
2072
 
2074
- @property
2073
+ @_builtins.property
2075
2074
  @pulumi.getter(name="tokenBoundCidrs")
2076
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2075
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
2077
2076
  """
2078
2077
  Specifies the blocks of IP addresses which are allowed to use the generated token
2079
2078
  """
2080
2079
  return pulumi.get(self, "token_bound_cidrs")
2081
2080
 
2082
- @property
2081
+ @_builtins.property
2083
2082
  @pulumi.getter(name="tokenExplicitMaxTtl")
2084
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2083
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
2085
2084
  """
2086
2085
  Generated Token's Explicit Maximum TTL in seconds
2087
2086
  """
2088
2087
  return pulumi.get(self, "token_explicit_max_ttl")
2089
2088
 
2090
- @property
2089
+ @_builtins.property
2091
2090
  @pulumi.getter(name="tokenMaxTtl")
2092
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2091
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
2093
2092
  """
2094
2093
  The maximum lifetime of the generated token
2095
2094
  """
2096
2095
  return pulumi.get(self, "token_max_ttl")
2097
2096
 
2098
- @property
2097
+ @_builtins.property
2099
2098
  @pulumi.getter(name="tokenNoDefaultPolicy")
2100
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
2099
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
2101
2100
  """
2102
2101
  If true, the 'default' policy will not automatically be added to generated tokens
2103
2102
  """
2104
2103
  return pulumi.get(self, "token_no_default_policy")
2105
2104
 
2106
- @property
2105
+ @_builtins.property
2107
2106
  @pulumi.getter(name="tokenNumUses")
2108
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
2107
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
2109
2108
  """
2110
2109
  The maximum number of times a token may be used, a value of zero means unlimited
2111
2110
  """
2112
2111
  return pulumi.get(self, "token_num_uses")
2113
2112
 
2114
- @property
2113
+ @_builtins.property
2115
2114
  @pulumi.getter(name="tokenPeriod")
2116
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
2115
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
2117
2116
  """
2118
2117
  Generated Token's Period
2119
2118
  """
2120
2119
  return pulumi.get(self, "token_period")
2121
2120
 
2122
- @property
2121
+ @_builtins.property
2123
2122
  @pulumi.getter(name="tokenPolicies")
2124
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
2123
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
2125
2124
  """
2126
2125
  Generated Token's Policies
2127
2126
  """
2128
2127
  return pulumi.get(self, "token_policies")
2129
2128
 
2130
- @property
2129
+ @_builtins.property
2131
2130
  @pulumi.getter(name="tokenTtl")
2132
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
2131
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
2133
2132
  """
2134
2133
  The initial ttl of the token to generate in seconds
2135
2134
  """
2136
2135
  return pulumi.get(self, "token_ttl")
2137
2136
 
2138
- @property
2137
+ @_builtins.property
2139
2138
  @pulumi.getter(name="tokenType")
2140
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
2139
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
2141
2140
  """
2142
2141
  The type of token to generate, service or batch
2143
2142
  """
2144
2143
  return pulumi.get(self, "token_type")
2145
2144
 
2146
- @property
2145
+ @_builtins.property
2147
2146
  @pulumi.getter
2148
- def upndomain(self) -> pulumi.Output[builtins.str]:
2147
+ def upndomain(self) -> pulumi.Output[_builtins.str]:
2149
2148
  """
2150
2149
  The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
2151
2150
  """
2152
2151
  return pulumi.get(self, "upndomain")
2153
2152
 
2154
- @property
2153
+ @_builtins.property
2155
2154
  @pulumi.getter
2156
- def url(self) -> pulumi.Output[builtins.str]:
2155
+ def url(self) -> pulumi.Output[_builtins.str]:
2157
2156
  """
2158
2157
  The URL of the LDAP server
2159
2158
  """
2160
2159
  return pulumi.get(self, "url")
2161
2160
 
2162
- @property
2161
+ @_builtins.property
2163
2162
  @pulumi.getter(name="useTokenGroups")
2164
- def use_token_groups(self) -> pulumi.Output[builtins.bool]:
2163
+ def use_token_groups(self) -> pulumi.Output[_builtins.bool]:
2165
2164
  """
2166
2165
  Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
2167
2166
  """
2168
2167
  return pulumi.get(self, "use_token_groups")
2169
2168
 
2170
- @property
2169
+ @_builtins.property
2171
2170
  @pulumi.getter
2172
- def userattr(self) -> pulumi.Output[builtins.str]:
2171
+ def userattr(self) -> pulumi.Output[_builtins.str]:
2173
2172
  """
2174
2173
  Attribute on user object matching username passed in
2175
2174
  """
2176
2175
  return pulumi.get(self, "userattr")
2177
2176
 
2178
- @property
2177
+ @_builtins.property
2179
2178
  @pulumi.getter
2180
- def userdn(self) -> pulumi.Output[builtins.str]:
2179
+ def userdn(self) -> pulumi.Output[_builtins.str]:
2181
2180
  """
2182
2181
  Base DN under which to perform user search
2183
2182
  """
2184
2183
  return pulumi.get(self, "userdn")
2185
2184
 
2186
- @property
2185
+ @_builtins.property
2187
2186
  @pulumi.getter
2188
- def userfilter(self) -> pulumi.Output[builtins.str]:
2187
+ def userfilter(self) -> pulumi.Output[_builtins.str]:
2189
2188
  """
2190
2189
  LDAP user search filter
2191
2190
  """
2192
2191
  return pulumi.get(self, "userfilter")
2193
2192
 
2194
- @property
2193
+ @_builtins.property
2195
2194
  @pulumi.getter(name="usernameAsAlias")
2196
- def username_as_alias(self) -> pulumi.Output[builtins.bool]:
2195
+ def username_as_alias(self) -> pulumi.Output[_builtins.bool]:
2197
2196
  """
2198
2197
  Force the auth method to use the username passed by the user as the alias name.
2199
2198
  """