pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,101 +19,101 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- binddn: pulumi.Input[builtins.str],
24
- bindpass: pulumi.Input[builtins.str],
25
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- certificate: Optional[pulumi.Input[builtins.str]] = None,
30
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
31
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
32
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
33
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
34
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
35
- description: Optional[pulumi.Input[builtins.str]] = None,
36
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
37
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
38
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
39
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
40
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
41
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
42
- local: Optional[pulumi.Input[builtins.bool]] = None,
43
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
44
- namespace: Optional[pulumi.Input[builtins.str]] = None,
45
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
46
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
47
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
48
- path: Optional[pulumi.Input[builtins.str]] = None,
49
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
50
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
51
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
52
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
53
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
54
- schema: Optional[pulumi.Input[builtins.str]] = None,
55
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
56
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
57
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
58
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
59
- url: Optional[pulumi.Input[builtins.str]] = None,
60
- userattr: Optional[pulumi.Input[builtins.str]] = None,
61
- userdn: Optional[pulumi.Input[builtins.str]] = None):
22
+ binddn: pulumi.Input[_builtins.str],
23
+ bindpass: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
30
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
32
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ description: Optional[pulumi.Input[_builtins.str]] = None,
35
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
39
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
41
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
42
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
43
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
44
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
45
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
47
+ path: Optional[pulumi.Input[_builtins.str]] = None,
48
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
49
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
50
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
51
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
52
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
53
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
54
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
55
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
56
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
57
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
58
+ url: Optional[pulumi.Input[_builtins.str]] = None,
59
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
60
+ userdn: Optional[pulumi.Input[_builtins.str]] = None):
62
61
  """
63
62
  The set of arguments for constructing a SecretBackend resource.
64
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
65
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
66
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
67
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
68
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
69
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
70
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
63
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
64
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
66
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
67
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
69
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
71
70
  x509 PEM encoded.
72
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
73
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
74
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
71
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
72
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
73
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
75
74
  the next URL in the configuration.
76
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
77
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
78
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
79
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
80
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
81
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
82
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
83
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
75
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
76
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
77
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
78
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
79
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
80
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
81
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
82
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
84
83
  Defaults to `false`.
85
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
86
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
84
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
85
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
87
86
  replication.Tolerance duration to use when checking the last rotation time.
88
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
89
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
87
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
88
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
90
89
  The value should not contain leading or trailing forward slashes.
91
90
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
92
91
  *Available only for Vault Enterprise*.
93
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
94
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
95
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
96
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
92
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
93
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
94
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
95
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
97
96
  not begin or end with a `/`. Defaults to `ldap`.
98
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
99
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
97
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
98
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
100
99
  before returning back an error.
101
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
100
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
102
101
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
103
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
102
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
104
103
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
105
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
104
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
106
105
  a rotation when a scheduled token rotation occurs. The default rotation window is
107
106
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
108
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
109
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
110
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
107
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
108
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
109
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
111
110
  Defaults to false. Requires Vault 1.16 or above.
112
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
113
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
114
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
111
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
112
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
113
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
115
114
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
116
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
117
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
115
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
116
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
118
117
  """
119
118
  pulumi.set(__self__, "binddn", binddn)
120
119
  pulumi.set(__self__, "bindpass", bindpass)
@@ -193,81 +192,81 @@ class SecretBackendArgs:
193
192
  if userdn is not None:
194
193
  pulumi.set(__self__, "userdn", userdn)
195
194
 
196
- @property
195
+ @_builtins.property
197
196
  @pulumi.getter
198
- def binddn(self) -> pulumi.Input[builtins.str]:
197
+ def binddn(self) -> pulumi.Input[_builtins.str]:
199
198
  """
200
199
  Distinguished name of object to bind when performing user and group search.
201
200
  """
202
201
  return pulumi.get(self, "binddn")
203
202
 
204
203
  @binddn.setter
205
- def binddn(self, value: pulumi.Input[builtins.str]):
204
+ def binddn(self, value: pulumi.Input[_builtins.str]):
206
205
  pulumi.set(self, "binddn", value)
207
206
 
208
- @property
207
+ @_builtins.property
209
208
  @pulumi.getter
210
- def bindpass(self) -> pulumi.Input[builtins.str]:
209
+ def bindpass(self) -> pulumi.Input[_builtins.str]:
211
210
  """
212
211
  Password to use along with binddn when performing user search.
213
212
  """
214
213
  return pulumi.get(self, "bindpass")
215
214
 
216
215
  @bindpass.setter
217
- def bindpass(self, value: pulumi.Input[builtins.str]):
216
+ def bindpass(self, value: pulumi.Input[_builtins.str]):
218
217
  pulumi.set(self, "bindpass", value)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter(name="allowedManagedKeys")
222
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
221
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
223
222
  """
224
223
  List of managed key registry entry names that the mount in question is allowed to access
225
224
  """
226
225
  return pulumi.get(self, "allowed_managed_keys")
227
226
 
228
227
  @allowed_managed_keys.setter
229
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
228
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
230
229
  pulumi.set(self, "allowed_managed_keys", value)
231
230
 
232
- @property
231
+ @_builtins.property
233
232
  @pulumi.getter(name="allowedResponseHeaders")
234
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
233
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
235
234
  """
236
235
  List of headers to allow and pass from the request to the plugin
237
236
  """
238
237
  return pulumi.get(self, "allowed_response_headers")
239
238
 
240
239
  @allowed_response_headers.setter
241
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
240
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
242
241
  pulumi.set(self, "allowed_response_headers", value)
243
242
 
244
- @property
243
+ @_builtins.property
245
244
  @pulumi.getter(name="auditNonHmacRequestKeys")
246
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
245
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
247
246
  """
248
247
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
249
248
  """
250
249
  return pulumi.get(self, "audit_non_hmac_request_keys")
251
250
 
252
251
  @audit_non_hmac_request_keys.setter
253
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
252
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
254
253
  pulumi.set(self, "audit_non_hmac_request_keys", value)
255
254
 
256
- @property
255
+ @_builtins.property
257
256
  @pulumi.getter(name="auditNonHmacResponseKeys")
258
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
257
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
259
258
  """
260
259
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
261
260
  """
262
261
  return pulumi.get(self, "audit_non_hmac_response_keys")
263
262
 
264
263
  @audit_non_hmac_response_keys.setter
265
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
264
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
266
265
  pulumi.set(self, "audit_non_hmac_response_keys", value)
267
266
 
268
- @property
267
+ @_builtins.property
269
268
  @pulumi.getter
270
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
269
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
271
270
  """
272
271
  CA certificate to use when verifying LDAP server certificate, must be
273
272
  x509 PEM encoded.
@@ -275,36 +274,36 @@ class SecretBackendArgs:
275
274
  return pulumi.get(self, "certificate")
276
275
 
277
276
  @certificate.setter
278
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
277
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
279
278
  pulumi.set(self, "certificate", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="clientTlsCert")
283
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
286
285
  """
287
286
  return pulumi.get(self, "client_tls_cert")
288
287
 
289
288
  @client_tls_cert.setter
290
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
289
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
291
290
  pulumi.set(self, "client_tls_cert", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter(name="clientTlsKey")
295
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
294
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
296
295
  """
297
296
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
298
297
  """
299
298
  return pulumi.get(self, "client_tls_key")
300
299
 
301
300
  @client_tls_key.setter
302
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
301
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
303
302
  pulumi.set(self, "client_tls_key", value)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter(name="connectionTimeout")
307
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
306
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
308
307
  """
309
308
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
310
309
  the next URL in the configuration.
@@ -312,96 +311,96 @@ class SecretBackendArgs:
312
311
  return pulumi.get(self, "connection_timeout")
313
312
 
314
313
  @connection_timeout.setter
315
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
314
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
316
315
  pulumi.set(self, "connection_timeout", value)
317
316
 
318
- @property
317
+ @_builtins.property
319
318
  @pulumi.getter(name="defaultLeaseTtlSeconds")
320
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
319
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
321
320
  """
322
321
  Default lease duration for secrets in seconds.
323
322
  """
324
323
  return pulumi.get(self, "default_lease_ttl_seconds")
325
324
 
326
325
  @default_lease_ttl_seconds.setter
327
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
326
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
328
327
  pulumi.set(self, "default_lease_ttl_seconds", value)
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter(name="delegatedAuthAccessors")
332
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
331
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
333
332
  """
334
333
  List of headers to allow and pass from the request to the plugin
335
334
  """
336
335
  return pulumi.get(self, "delegated_auth_accessors")
337
336
 
338
337
  @delegated_auth_accessors.setter
339
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
338
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
340
339
  pulumi.set(self, "delegated_auth_accessors", value)
341
340
 
342
- @property
341
+ @_builtins.property
343
342
  @pulumi.getter
344
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
343
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
345
344
  """
346
345
  Human-friendly description of the mount for the Active Directory backend.
347
346
  """
348
347
  return pulumi.get(self, "description")
349
348
 
350
349
  @description.setter
351
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
350
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
352
351
  pulumi.set(self, "description", value)
353
352
 
354
- @property
353
+ @_builtins.property
355
354
  @pulumi.getter(name="disableAutomatedRotation")
356
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
355
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
357
356
  """
358
357
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
359
358
  """
360
359
  return pulumi.get(self, "disable_automated_rotation")
361
360
 
362
361
  @disable_automated_rotation.setter
363
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
362
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
364
363
  pulumi.set(self, "disable_automated_rotation", value)
365
364
 
366
- @property
365
+ @_builtins.property
367
366
  @pulumi.getter(name="disableRemount")
368
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
367
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
369
368
  """
370
369
  If set, opts out of mount migration on path updates.
371
370
  """
372
371
  return pulumi.get(self, "disable_remount")
373
372
 
374
373
  @disable_remount.setter
375
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
374
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
376
375
  pulumi.set(self, "disable_remount", value)
377
376
 
378
- @property
377
+ @_builtins.property
379
378
  @pulumi.getter(name="externalEntropyAccess")
380
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
379
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
381
380
  """
382
381
  Enable the secrets engine to access Vault's external entropy source
383
382
  """
384
383
  return pulumi.get(self, "external_entropy_access")
385
384
 
386
385
  @external_entropy_access.setter
387
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
386
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
388
387
  pulumi.set(self, "external_entropy_access", value)
389
388
 
390
- @property
389
+ @_builtins.property
391
390
  @pulumi.getter(name="identityTokenKey")
392
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
391
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
393
392
  """
394
393
  The key to use for signing plugin workload identity tokens
395
394
  """
396
395
  return pulumi.get(self, "identity_token_key")
397
396
 
398
397
  @identity_token_key.setter
399
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
398
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
400
399
  pulumi.set(self, "identity_token_key", value)
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter(name="insecureTls")
404
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
403
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
405
404
  """
406
405
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
407
406
  Defaults to `false`.
@@ -409,24 +408,24 @@ class SecretBackendArgs:
409
408
  return pulumi.get(self, "insecure_tls")
410
409
 
411
410
  @insecure_tls.setter
412
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
411
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
413
412
  pulumi.set(self, "insecure_tls", value)
414
413
 
415
- @property
414
+ @_builtins.property
416
415
  @pulumi.getter(name="listingVisibility")
417
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
416
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
418
417
  """
419
418
  Specifies whether to show this mount in the UI-specific listing endpoint
420
419
  """
421
420
  return pulumi.get(self, "listing_visibility")
422
421
 
423
422
  @listing_visibility.setter
424
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
423
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
425
424
  pulumi.set(self, "listing_visibility", value)
426
425
 
427
- @property
426
+ @_builtins.property
428
427
  @pulumi.getter
429
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
428
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
430
429
  """
431
430
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
432
431
  replication.Tolerance duration to use when checking the last rotation time.
@@ -434,24 +433,24 @@ class SecretBackendArgs:
434
433
  return pulumi.get(self, "local")
435
434
 
436
435
  @local.setter
437
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
436
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
438
437
  pulumi.set(self, "local", value)
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter(name="maxLeaseTtlSeconds")
442
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
441
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
443
442
  """
444
443
  Maximum possible lease duration for secrets in seconds.
445
444
  """
446
445
  return pulumi.get(self, "max_lease_ttl_seconds")
447
446
 
448
447
  @max_lease_ttl_seconds.setter
449
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
448
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
450
449
  pulumi.set(self, "max_lease_ttl_seconds", value)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter
454
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
453
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
455
454
  """
456
455
  The namespace to provision the resource in.
457
456
  The value should not contain leading or trailing forward slashes.
@@ -461,48 +460,48 @@ class SecretBackendArgs:
461
460
  return pulumi.get(self, "namespace")
462
461
 
463
462
  @namespace.setter
464
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
463
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
465
464
  pulumi.set(self, "namespace", value)
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter
469
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
468
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
470
469
  """
471
470
  Specifies mount type specific options that are passed to the backend
472
471
  """
473
472
  return pulumi.get(self, "options")
474
473
 
475
474
  @options.setter
476
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
475
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
477
476
  pulumi.set(self, "options", value)
478
477
 
479
- @property
478
+ @_builtins.property
480
479
  @pulumi.getter(name="passthroughRequestHeaders")
481
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
480
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
482
481
  """
483
482
  List of headers to allow and pass from the request to the plugin
484
483
  """
485
484
  return pulumi.get(self, "passthrough_request_headers")
486
485
 
487
486
  @passthrough_request_headers.setter
488
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
487
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
489
488
  pulumi.set(self, "passthrough_request_headers", value)
490
489
 
491
- @property
490
+ @_builtins.property
492
491
  @pulumi.getter(name="passwordPolicy")
493
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
492
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
494
493
  """
495
494
  Name of the password policy to use to generate passwords.
496
495
  """
497
496
  return pulumi.get(self, "password_policy")
498
497
 
499
498
  @password_policy.setter
500
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
499
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
501
500
  pulumi.set(self, "password_policy", value)
502
501
 
503
- @property
502
+ @_builtins.property
504
503
  @pulumi.getter
505
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
504
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
506
505
  """
507
506
  The unique path this backend should be mounted at. Must
508
507
  not begin or end with a `/`. Defaults to `ldap`.
@@ -510,24 +509,24 @@ class SecretBackendArgs:
510
509
  return pulumi.get(self, "path")
511
510
 
512
511
  @path.setter
513
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
512
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
514
513
  pulumi.set(self, "path", value)
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter(name="pluginVersion")
518
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
517
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
519
518
  """
520
519
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
521
520
  """
522
521
  return pulumi.get(self, "plugin_version")
523
522
 
524
523
  @plugin_version.setter
525
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
524
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
526
525
  pulumi.set(self, "plugin_version", value)
527
526
 
528
- @property
527
+ @_builtins.property
529
528
  @pulumi.getter(name="requestTimeout")
530
- def request_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
529
+ def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
531
530
  """
532
531
  Timeout, in seconds, for the connection when making requests against the server
533
532
  before returning back an error.
@@ -535,12 +534,12 @@ class SecretBackendArgs:
535
534
  return pulumi.get(self, "request_timeout")
536
535
 
537
536
  @request_timeout.setter
538
- def request_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
537
+ def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
539
538
  pulumi.set(self, "request_timeout", value)
540
539
 
541
- @property
540
+ @_builtins.property
542
541
  @pulumi.getter(name="rotationPeriod")
543
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
542
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
544
543
  """
545
544
  The amount of time in seconds Vault should wait before rotating the root credential.
546
545
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -548,12 +547,12 @@ class SecretBackendArgs:
548
547
  return pulumi.get(self, "rotation_period")
549
548
 
550
549
  @rotation_period.setter
551
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
550
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
552
551
  pulumi.set(self, "rotation_period", value)
553
552
 
554
- @property
553
+ @_builtins.property
555
554
  @pulumi.getter(name="rotationSchedule")
556
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
555
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
557
556
  """
558
557
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
559
558
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -561,12 +560,12 @@ class SecretBackendArgs:
561
560
  return pulumi.get(self, "rotation_schedule")
562
561
 
563
562
  @rotation_schedule.setter
564
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
563
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
565
564
  pulumi.set(self, "rotation_schedule", value)
566
565
 
567
- @property
566
+ @_builtins.property
568
567
  @pulumi.getter(name="rotationWindow")
569
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
568
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
570
569
  """
571
570
  The maximum amount of time in seconds allowed to complete
572
571
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -575,36 +574,36 @@ class SecretBackendArgs:
575
574
  return pulumi.get(self, "rotation_window")
576
575
 
577
576
  @rotation_window.setter
578
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
577
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
579
578
  pulumi.set(self, "rotation_window", value)
580
579
 
581
- @property
580
+ @_builtins.property
582
581
  @pulumi.getter
583
- def schema(self) -> Optional[pulumi.Input[builtins.str]]:
582
+ def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
584
583
  """
585
584
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
586
585
  """
587
586
  return pulumi.get(self, "schema")
588
587
 
589
588
  @schema.setter
590
- def schema(self, value: Optional[pulumi.Input[builtins.str]]):
589
+ def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
591
590
  pulumi.set(self, "schema", value)
592
591
 
593
- @property
592
+ @_builtins.property
594
593
  @pulumi.getter(name="sealWrap")
595
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
594
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
596
595
  """
597
596
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
598
597
  """
599
598
  return pulumi.get(self, "seal_wrap")
600
599
 
601
600
  @seal_wrap.setter
602
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
601
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
603
602
  pulumi.set(self, "seal_wrap", value)
604
603
 
605
- @property
604
+ @_builtins.property
606
605
  @pulumi.getter(name="skipStaticRoleImportRotation")
607
- def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
606
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
608
607
  """
609
608
  If set to true, static roles will not be rotated during import.
610
609
  Defaults to false. Requires Vault 1.16 or above.
@@ -612,36 +611,36 @@ class SecretBackendArgs:
612
611
  return pulumi.get(self, "skip_static_role_import_rotation")
613
612
 
614
613
  @skip_static_role_import_rotation.setter
615
- def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
614
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
616
615
  pulumi.set(self, "skip_static_role_import_rotation", value)
617
616
 
618
- @property
617
+ @_builtins.property
619
618
  @pulumi.getter
620
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
619
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
621
620
  """
622
621
  Issue a StartTLS command after establishing unencrypted connection.
623
622
  """
624
623
  return pulumi.get(self, "starttls")
625
624
 
626
625
  @starttls.setter
627
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
626
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
628
627
  pulumi.set(self, "starttls", value)
629
628
 
630
- @property
629
+ @_builtins.property
631
630
  @pulumi.getter
632
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
631
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
633
632
  """
634
633
  Enables userPrincipalDomain login with [username]@UPNDomain.
635
634
  """
636
635
  return pulumi.get(self, "upndomain")
637
636
 
638
637
  @upndomain.setter
639
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
638
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
640
639
  pulumi.set(self, "upndomain", value)
641
640
 
642
- @property
641
+ @_builtins.property
643
642
  @pulumi.getter
644
- def url(self) -> Optional[pulumi.Input[builtins.str]]:
643
+ def url(self) -> Optional[pulumi.Input[_builtins.str]]:
645
644
  """
646
645
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
647
646
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
@@ -649,134 +648,134 @@ class SecretBackendArgs:
649
648
  return pulumi.get(self, "url")
650
649
 
651
650
  @url.setter
652
- def url(self, value: Optional[pulumi.Input[builtins.str]]):
651
+ def url(self, value: Optional[pulumi.Input[_builtins.str]]):
653
652
  pulumi.set(self, "url", value)
654
653
 
655
- @property
654
+ @_builtins.property
656
655
  @pulumi.getter
657
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
656
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
658
657
  """
659
658
  Attribute used when searching users. Defaults to `cn`.
660
659
  """
661
660
  return pulumi.get(self, "userattr")
662
661
 
663
662
  @userattr.setter
664
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
663
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
665
664
  pulumi.set(self, "userattr", value)
666
665
 
667
- @property
666
+ @_builtins.property
668
667
  @pulumi.getter
669
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
668
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
670
669
  """
671
670
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
672
671
  """
673
672
  return pulumi.get(self, "userdn")
674
673
 
675
674
  @userdn.setter
676
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
675
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
677
676
  pulumi.set(self, "userdn", value)
678
677
 
679
678
 
680
679
  @pulumi.input_type
681
680
  class _SecretBackendState:
682
681
  def __init__(__self__, *,
683
- accessor: Optional[pulumi.Input[builtins.str]] = None,
684
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
685
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
686
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
687
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
688
- binddn: Optional[pulumi.Input[builtins.str]] = None,
689
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
690
- certificate: Optional[pulumi.Input[builtins.str]] = None,
691
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
692
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
693
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
694
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
695
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
696
- description: Optional[pulumi.Input[builtins.str]] = None,
697
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
698
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
699
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
700
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
701
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
702
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
703
- local: Optional[pulumi.Input[builtins.bool]] = None,
704
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
705
- namespace: Optional[pulumi.Input[builtins.str]] = None,
706
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
707
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
708
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
709
- path: Optional[pulumi.Input[builtins.str]] = None,
710
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
711
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
712
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
713
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
714
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
715
- schema: Optional[pulumi.Input[builtins.str]] = None,
716
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
717
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
718
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
719
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
720
- url: Optional[pulumi.Input[builtins.str]] = None,
721
- userattr: Optional[pulumi.Input[builtins.str]] = None,
722
- userdn: Optional[pulumi.Input[builtins.str]] = None):
682
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
683
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
684
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
685
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
686
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
687
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
688
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
689
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
690
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
691
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
692
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
693
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
694
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
695
+ description: Optional[pulumi.Input[_builtins.str]] = None,
696
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
697
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
698
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
699
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
700
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
701
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
702
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
703
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
704
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
705
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
706
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
707
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
708
+ path: Optional[pulumi.Input[_builtins.str]] = None,
709
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
710
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
711
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
712
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
713
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
714
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
715
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
716
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
717
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
718
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
719
+ url: Optional[pulumi.Input[_builtins.str]] = None,
720
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
721
+ userdn: Optional[pulumi.Input[_builtins.str]] = None):
723
722
  """
724
723
  Input properties used for looking up and filtering SecretBackend resources.
725
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
726
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
727
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
728
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
729
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
730
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
731
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
732
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
724
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
725
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
726
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
727
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
728
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
729
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
730
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
731
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
733
732
  x509 PEM encoded.
734
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
735
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
736
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
733
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
734
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
735
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
737
736
  the next URL in the configuration.
738
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
739
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
740
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
741
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
742
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
743
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
744
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
745
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
737
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
738
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
739
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
740
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
741
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
742
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
743
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
744
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
746
745
  Defaults to `false`.
747
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
748
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
746
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
747
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
749
748
  replication.Tolerance duration to use when checking the last rotation time.
750
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
751
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
749
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
750
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
752
751
  The value should not contain leading or trailing forward slashes.
753
752
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
754
753
  *Available only for Vault Enterprise*.
755
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
756
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
757
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
758
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
754
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
755
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
756
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
757
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
759
758
  not begin or end with a `/`. Defaults to `ldap`.
760
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
761
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
759
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
760
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
762
761
  before returning back an error.
763
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
762
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
764
763
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
765
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
764
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
766
765
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
767
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
766
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
768
767
  a rotation when a scheduled token rotation occurs. The default rotation window is
769
768
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
770
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
771
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
772
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
769
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
770
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
771
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
773
772
  Defaults to false. Requires Vault 1.16 or above.
774
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
775
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
776
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
773
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
774
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
775
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
777
776
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
778
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
779
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
777
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
778
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
780
779
  """
781
780
  if accessor is not None:
782
781
  pulumi.set(__self__, "accessor", accessor)
@@ -859,93 +858,93 @@ class _SecretBackendState:
859
858
  if userdn is not None:
860
859
  pulumi.set(__self__, "userdn", userdn)
861
860
 
862
- @property
861
+ @_builtins.property
863
862
  @pulumi.getter
864
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
863
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
865
864
  """
866
865
  Accessor of the mount
867
866
  """
868
867
  return pulumi.get(self, "accessor")
869
868
 
870
869
  @accessor.setter
871
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
870
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
872
871
  pulumi.set(self, "accessor", value)
873
872
 
874
- @property
873
+ @_builtins.property
875
874
  @pulumi.getter(name="allowedManagedKeys")
876
- def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
875
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
877
876
  """
878
877
  List of managed key registry entry names that the mount in question is allowed to access
879
878
  """
880
879
  return pulumi.get(self, "allowed_managed_keys")
881
880
 
882
881
  @allowed_managed_keys.setter
883
- def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
882
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
884
883
  pulumi.set(self, "allowed_managed_keys", value)
885
884
 
886
- @property
885
+ @_builtins.property
887
886
  @pulumi.getter(name="allowedResponseHeaders")
888
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
887
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
889
888
  """
890
889
  List of headers to allow and pass from the request to the plugin
891
890
  """
892
891
  return pulumi.get(self, "allowed_response_headers")
893
892
 
894
893
  @allowed_response_headers.setter
895
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
894
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
896
895
  pulumi.set(self, "allowed_response_headers", value)
897
896
 
898
- @property
897
+ @_builtins.property
899
898
  @pulumi.getter(name="auditNonHmacRequestKeys")
900
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
899
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
901
900
  """
902
901
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
903
902
  """
904
903
  return pulumi.get(self, "audit_non_hmac_request_keys")
905
904
 
906
905
  @audit_non_hmac_request_keys.setter
907
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
906
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
908
907
  pulumi.set(self, "audit_non_hmac_request_keys", value)
909
908
 
910
- @property
909
+ @_builtins.property
911
910
  @pulumi.getter(name="auditNonHmacResponseKeys")
912
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
911
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
913
912
  """
914
913
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
915
914
  """
916
915
  return pulumi.get(self, "audit_non_hmac_response_keys")
917
916
 
918
917
  @audit_non_hmac_response_keys.setter
919
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
918
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
920
919
  pulumi.set(self, "audit_non_hmac_response_keys", value)
921
920
 
922
- @property
921
+ @_builtins.property
923
922
  @pulumi.getter
924
- def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
923
+ def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
925
924
  """
926
925
  Distinguished name of object to bind when performing user and group search.
927
926
  """
928
927
  return pulumi.get(self, "binddn")
929
928
 
930
929
  @binddn.setter
931
- def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
930
+ def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
932
931
  pulumi.set(self, "binddn", value)
933
932
 
934
- @property
933
+ @_builtins.property
935
934
  @pulumi.getter
936
- def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
935
+ def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
937
936
  """
938
937
  Password to use along with binddn when performing user search.
939
938
  """
940
939
  return pulumi.get(self, "bindpass")
941
940
 
942
941
  @bindpass.setter
943
- def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
942
+ def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
944
943
  pulumi.set(self, "bindpass", value)
945
944
 
946
- @property
945
+ @_builtins.property
947
946
  @pulumi.getter
948
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
947
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
949
948
  """
950
949
  CA certificate to use when verifying LDAP server certificate, must be
951
950
  x509 PEM encoded.
@@ -953,36 +952,36 @@ class _SecretBackendState:
953
952
  return pulumi.get(self, "certificate")
954
953
 
955
954
  @certificate.setter
956
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
955
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
957
956
  pulumi.set(self, "certificate", value)
958
957
 
959
- @property
958
+ @_builtins.property
960
959
  @pulumi.getter(name="clientTlsCert")
961
- def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
960
+ def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
962
961
  """
963
962
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
964
963
  """
965
964
  return pulumi.get(self, "client_tls_cert")
966
965
 
967
966
  @client_tls_cert.setter
968
- def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
967
+ def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
969
968
  pulumi.set(self, "client_tls_cert", value)
970
969
 
971
- @property
970
+ @_builtins.property
972
971
  @pulumi.getter(name="clientTlsKey")
973
- def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
972
+ def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
974
973
  """
975
974
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
976
975
  """
977
976
  return pulumi.get(self, "client_tls_key")
978
977
 
979
978
  @client_tls_key.setter
980
- def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
979
+ def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
981
980
  pulumi.set(self, "client_tls_key", value)
982
981
 
983
- @property
982
+ @_builtins.property
984
983
  @pulumi.getter(name="connectionTimeout")
985
- def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
984
+ def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
986
985
  """
987
986
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
988
987
  the next URL in the configuration.
@@ -990,96 +989,96 @@ class _SecretBackendState:
990
989
  return pulumi.get(self, "connection_timeout")
991
990
 
992
991
  @connection_timeout.setter
993
- def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
992
+ def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
994
993
  pulumi.set(self, "connection_timeout", value)
995
994
 
996
- @property
995
+ @_builtins.property
997
996
  @pulumi.getter(name="defaultLeaseTtlSeconds")
998
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
997
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
999
998
  """
1000
999
  Default lease duration for secrets in seconds.
1001
1000
  """
1002
1001
  return pulumi.get(self, "default_lease_ttl_seconds")
1003
1002
 
1004
1003
  @default_lease_ttl_seconds.setter
1005
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1004
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1006
1005
  pulumi.set(self, "default_lease_ttl_seconds", value)
1007
1006
 
1008
- @property
1007
+ @_builtins.property
1009
1008
  @pulumi.getter(name="delegatedAuthAccessors")
1010
- def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1009
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1011
1010
  """
1012
1011
  List of headers to allow and pass from the request to the plugin
1013
1012
  """
1014
1013
  return pulumi.get(self, "delegated_auth_accessors")
1015
1014
 
1016
1015
  @delegated_auth_accessors.setter
1017
- def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1016
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1018
1017
  pulumi.set(self, "delegated_auth_accessors", value)
1019
1018
 
1020
- @property
1019
+ @_builtins.property
1021
1020
  @pulumi.getter
1022
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
1021
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
1023
1022
  """
1024
1023
  Human-friendly description of the mount for the Active Directory backend.
1025
1024
  """
1026
1025
  return pulumi.get(self, "description")
1027
1026
 
1028
1027
  @description.setter
1029
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
1028
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
1030
1029
  pulumi.set(self, "description", value)
1031
1030
 
1032
- @property
1031
+ @_builtins.property
1033
1032
  @pulumi.getter(name="disableAutomatedRotation")
1034
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1033
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1035
1034
  """
1036
1035
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1037
1036
  """
1038
1037
  return pulumi.get(self, "disable_automated_rotation")
1039
1038
 
1040
1039
  @disable_automated_rotation.setter
1041
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1040
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1042
1041
  pulumi.set(self, "disable_automated_rotation", value)
1043
1042
 
1044
- @property
1043
+ @_builtins.property
1045
1044
  @pulumi.getter(name="disableRemount")
1046
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
1045
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
1047
1046
  """
1048
1047
  If set, opts out of mount migration on path updates.
1049
1048
  """
1050
1049
  return pulumi.get(self, "disable_remount")
1051
1050
 
1052
1051
  @disable_remount.setter
1053
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
1052
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
1054
1053
  pulumi.set(self, "disable_remount", value)
1055
1054
 
1056
- @property
1055
+ @_builtins.property
1057
1056
  @pulumi.getter(name="externalEntropyAccess")
1058
- def external_entropy_access(self) -> Optional[pulumi.Input[builtins.bool]]:
1057
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
1059
1058
  """
1060
1059
  Enable the secrets engine to access Vault's external entropy source
1061
1060
  """
1062
1061
  return pulumi.get(self, "external_entropy_access")
1063
1062
 
1064
1063
  @external_entropy_access.setter
1065
- def external_entropy_access(self, value: Optional[pulumi.Input[builtins.bool]]):
1064
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
1066
1065
  pulumi.set(self, "external_entropy_access", value)
1067
1066
 
1068
- @property
1067
+ @_builtins.property
1069
1068
  @pulumi.getter(name="identityTokenKey")
1070
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
1069
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
1071
1070
  """
1072
1071
  The key to use for signing plugin workload identity tokens
1073
1072
  """
1074
1073
  return pulumi.get(self, "identity_token_key")
1075
1074
 
1076
1075
  @identity_token_key.setter
1077
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
1076
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
1078
1077
  pulumi.set(self, "identity_token_key", value)
1079
1078
 
1080
- @property
1079
+ @_builtins.property
1081
1080
  @pulumi.getter(name="insecureTls")
1082
- def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
1081
+ def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1083
1082
  """
1084
1083
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
1085
1084
  Defaults to `false`.
@@ -1087,24 +1086,24 @@ class _SecretBackendState:
1087
1086
  return pulumi.get(self, "insecure_tls")
1088
1087
 
1089
1088
  @insecure_tls.setter
1090
- def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
1089
+ def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1091
1090
  pulumi.set(self, "insecure_tls", value)
1092
1091
 
1093
- @property
1092
+ @_builtins.property
1094
1093
  @pulumi.getter(name="listingVisibility")
1095
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
1094
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
1096
1095
  """
1097
1096
  Specifies whether to show this mount in the UI-specific listing endpoint
1098
1097
  """
1099
1098
  return pulumi.get(self, "listing_visibility")
1100
1099
 
1101
1100
  @listing_visibility.setter
1102
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
1101
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
1103
1102
  pulumi.set(self, "listing_visibility", value)
1104
1103
 
1105
- @property
1104
+ @_builtins.property
1106
1105
  @pulumi.getter
1107
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
1106
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1108
1107
  """
1109
1108
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
1110
1109
  replication.Tolerance duration to use when checking the last rotation time.
@@ -1112,24 +1111,24 @@ class _SecretBackendState:
1112
1111
  return pulumi.get(self, "local")
1113
1112
 
1114
1113
  @local.setter
1115
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
1114
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
1116
1115
  pulumi.set(self, "local", value)
1117
1116
 
1118
- @property
1117
+ @_builtins.property
1119
1118
  @pulumi.getter(name="maxLeaseTtlSeconds")
1120
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
1119
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
1121
1120
  """
1122
1121
  Maximum possible lease duration for secrets in seconds.
1123
1122
  """
1124
1123
  return pulumi.get(self, "max_lease_ttl_seconds")
1125
1124
 
1126
1125
  @max_lease_ttl_seconds.setter
1127
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
1126
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
1128
1127
  pulumi.set(self, "max_lease_ttl_seconds", value)
1129
1128
 
1130
- @property
1129
+ @_builtins.property
1131
1130
  @pulumi.getter
1132
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1131
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1133
1132
  """
1134
1133
  The namespace to provision the resource in.
1135
1134
  The value should not contain leading or trailing forward slashes.
@@ -1139,48 +1138,48 @@ class _SecretBackendState:
1139
1138
  return pulumi.get(self, "namespace")
1140
1139
 
1141
1140
  @namespace.setter
1142
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1141
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1143
1142
  pulumi.set(self, "namespace", value)
1144
1143
 
1145
- @property
1144
+ @_builtins.property
1146
1145
  @pulumi.getter
1147
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
1146
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
1148
1147
  """
1149
1148
  Specifies mount type specific options that are passed to the backend
1150
1149
  """
1151
1150
  return pulumi.get(self, "options")
1152
1151
 
1153
1152
  @options.setter
1154
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
1153
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
1155
1154
  pulumi.set(self, "options", value)
1156
1155
 
1157
- @property
1156
+ @_builtins.property
1158
1157
  @pulumi.getter(name="passthroughRequestHeaders")
1159
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
1158
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1160
1159
  """
1161
1160
  List of headers to allow and pass from the request to the plugin
1162
1161
  """
1163
1162
  return pulumi.get(self, "passthrough_request_headers")
1164
1163
 
1165
1164
  @passthrough_request_headers.setter
1166
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
1165
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1167
1166
  pulumi.set(self, "passthrough_request_headers", value)
1168
1167
 
1169
- @property
1168
+ @_builtins.property
1170
1169
  @pulumi.getter(name="passwordPolicy")
1171
- def password_policy(self) -> Optional[pulumi.Input[builtins.str]]:
1170
+ def password_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
1172
1171
  """
1173
1172
  Name of the password policy to use to generate passwords.
1174
1173
  """
1175
1174
  return pulumi.get(self, "password_policy")
1176
1175
 
1177
1176
  @password_policy.setter
1178
- def password_policy(self, value: Optional[pulumi.Input[builtins.str]]):
1177
+ def password_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
1179
1178
  pulumi.set(self, "password_policy", value)
1180
1179
 
1181
- @property
1180
+ @_builtins.property
1182
1181
  @pulumi.getter
1183
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
1182
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1184
1183
  """
1185
1184
  The unique path this backend should be mounted at. Must
1186
1185
  not begin or end with a `/`. Defaults to `ldap`.
@@ -1188,24 +1187,24 @@ class _SecretBackendState:
1188
1187
  return pulumi.get(self, "path")
1189
1188
 
1190
1189
  @path.setter
1191
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
1190
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1192
1191
  pulumi.set(self, "path", value)
1193
1192
 
1194
- @property
1193
+ @_builtins.property
1195
1194
  @pulumi.getter(name="pluginVersion")
1196
- def plugin_version(self) -> Optional[pulumi.Input[builtins.str]]:
1195
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1197
1196
  """
1198
1197
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1199
1198
  """
1200
1199
  return pulumi.get(self, "plugin_version")
1201
1200
 
1202
1201
  @plugin_version.setter
1203
- def plugin_version(self, value: Optional[pulumi.Input[builtins.str]]):
1202
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1204
1203
  pulumi.set(self, "plugin_version", value)
1205
1204
 
1206
- @property
1205
+ @_builtins.property
1207
1206
  @pulumi.getter(name="requestTimeout")
1208
- def request_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
1207
+ def request_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
1209
1208
  """
1210
1209
  Timeout, in seconds, for the connection when making requests against the server
1211
1210
  before returning back an error.
@@ -1213,12 +1212,12 @@ class _SecretBackendState:
1213
1212
  return pulumi.get(self, "request_timeout")
1214
1213
 
1215
1214
  @request_timeout.setter
1216
- def request_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
1215
+ def request_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
1217
1216
  pulumi.set(self, "request_timeout", value)
1218
1217
 
1219
- @property
1218
+ @_builtins.property
1220
1219
  @pulumi.getter(name="rotationPeriod")
1221
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
1220
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1222
1221
  """
1223
1222
  The amount of time in seconds Vault should wait before rotating the root credential.
1224
1223
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1226,12 +1225,12 @@ class _SecretBackendState:
1226
1225
  return pulumi.get(self, "rotation_period")
1227
1226
 
1228
1227
  @rotation_period.setter
1229
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
1228
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1230
1229
  pulumi.set(self, "rotation_period", value)
1231
1230
 
1232
- @property
1231
+ @_builtins.property
1233
1232
  @pulumi.getter(name="rotationSchedule")
1234
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
1233
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
1235
1234
  """
1236
1235
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1237
1236
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -1239,12 +1238,12 @@ class _SecretBackendState:
1239
1238
  return pulumi.get(self, "rotation_schedule")
1240
1239
 
1241
1240
  @rotation_schedule.setter
1242
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
1241
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
1243
1242
  pulumi.set(self, "rotation_schedule", value)
1244
1243
 
1245
- @property
1244
+ @_builtins.property
1246
1245
  @pulumi.getter(name="rotationWindow")
1247
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
1246
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1248
1247
  """
1249
1248
  The maximum amount of time in seconds allowed to complete
1250
1249
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1253,36 +1252,36 @@ class _SecretBackendState:
1253
1252
  return pulumi.get(self, "rotation_window")
1254
1253
 
1255
1254
  @rotation_window.setter
1256
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
1255
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1257
1256
  pulumi.set(self, "rotation_window", value)
1258
1257
 
1259
- @property
1258
+ @_builtins.property
1260
1259
  @pulumi.getter
1261
- def schema(self) -> Optional[pulumi.Input[builtins.str]]:
1260
+ def schema(self) -> Optional[pulumi.Input[_builtins.str]]:
1262
1261
  """
1263
1262
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1264
1263
  """
1265
1264
  return pulumi.get(self, "schema")
1266
1265
 
1267
1266
  @schema.setter
1268
- def schema(self, value: Optional[pulumi.Input[builtins.str]]):
1267
+ def schema(self, value: Optional[pulumi.Input[_builtins.str]]):
1269
1268
  pulumi.set(self, "schema", value)
1270
1269
 
1271
- @property
1270
+ @_builtins.property
1272
1271
  @pulumi.getter(name="sealWrap")
1273
- def seal_wrap(self) -> Optional[pulumi.Input[builtins.bool]]:
1272
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1274
1273
  """
1275
1274
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1276
1275
  """
1277
1276
  return pulumi.get(self, "seal_wrap")
1278
1277
 
1279
1278
  @seal_wrap.setter
1280
- def seal_wrap(self, value: Optional[pulumi.Input[builtins.bool]]):
1279
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1281
1280
  pulumi.set(self, "seal_wrap", value)
1282
1281
 
1283
- @property
1282
+ @_builtins.property
1284
1283
  @pulumi.getter(name="skipStaticRoleImportRotation")
1285
- def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
1284
+ def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1286
1285
  """
1287
1286
  If set to true, static roles will not be rotated during import.
1288
1287
  Defaults to false. Requires Vault 1.16 or above.
@@ -1290,36 +1289,36 @@ class _SecretBackendState:
1290
1289
  return pulumi.get(self, "skip_static_role_import_rotation")
1291
1290
 
1292
1291
  @skip_static_role_import_rotation.setter
1293
- def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
1292
+ def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1294
1293
  pulumi.set(self, "skip_static_role_import_rotation", value)
1295
1294
 
1296
- @property
1295
+ @_builtins.property
1297
1296
  @pulumi.getter
1298
- def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
1297
+ def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
1299
1298
  """
1300
1299
  Issue a StartTLS command after establishing unencrypted connection.
1301
1300
  """
1302
1301
  return pulumi.get(self, "starttls")
1303
1302
 
1304
1303
  @starttls.setter
1305
- def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
1304
+ def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
1306
1305
  pulumi.set(self, "starttls", value)
1307
1306
 
1308
- @property
1307
+ @_builtins.property
1309
1308
  @pulumi.getter
1310
- def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
1309
+ def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
1311
1310
  """
1312
1311
  Enables userPrincipalDomain login with [username]@UPNDomain.
1313
1312
  """
1314
1313
  return pulumi.get(self, "upndomain")
1315
1314
 
1316
1315
  @upndomain.setter
1317
- def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
1316
+ def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
1318
1317
  pulumi.set(self, "upndomain", value)
1319
1318
 
1320
- @property
1319
+ @_builtins.property
1321
1320
  @pulumi.getter
1322
- def url(self) -> Optional[pulumi.Input[builtins.str]]:
1321
+ def url(self) -> Optional[pulumi.Input[_builtins.str]]:
1323
1322
  """
1324
1323
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
1325
1324
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
@@ -1327,31 +1326,31 @@ class _SecretBackendState:
1327
1326
  return pulumi.get(self, "url")
1328
1327
 
1329
1328
  @url.setter
1330
- def url(self, value: Optional[pulumi.Input[builtins.str]]):
1329
+ def url(self, value: Optional[pulumi.Input[_builtins.str]]):
1331
1330
  pulumi.set(self, "url", value)
1332
1331
 
1333
- @property
1332
+ @_builtins.property
1334
1333
  @pulumi.getter
1335
- def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
1334
+ def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
1336
1335
  """
1337
1336
  Attribute used when searching users. Defaults to `cn`.
1338
1337
  """
1339
1338
  return pulumi.get(self, "userattr")
1340
1339
 
1341
1340
  @userattr.setter
1342
- def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
1341
+ def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
1343
1342
  pulumi.set(self, "userattr", value)
1344
1343
 
1345
- @property
1344
+ @_builtins.property
1346
1345
  @pulumi.getter
1347
- def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
1346
+ def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
1348
1347
  """
1349
1348
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1350
1349
  """
1351
1350
  return pulumi.get(self, "userdn")
1352
1351
 
1353
1352
  @userdn.setter
1354
- def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
1353
+ def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
1355
1354
  pulumi.set(self, "userdn", value)
1356
1355
 
1357
1356
 
@@ -1361,45 +1360,45 @@ class SecretBackend(pulumi.CustomResource):
1361
1360
  def __init__(__self__,
1362
1361
  resource_name: str,
1363
1362
  opts: Optional[pulumi.ResourceOptions] = None,
1364
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1365
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1366
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1367
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1368
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1369
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1370
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1371
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1372
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1373
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1374
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1375
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1376
- description: Optional[pulumi.Input[builtins.str]] = None,
1377
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1378
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1379
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1380
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1381
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1382
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1383
- local: Optional[pulumi.Input[builtins.bool]] = None,
1384
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1385
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1386
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1387
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1388
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1389
- path: Optional[pulumi.Input[builtins.str]] = None,
1390
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1391
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1392
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1393
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1394
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1395
- schema: Optional[pulumi.Input[builtins.str]] = None,
1396
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1397
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1398
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1399
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1400
- url: Optional[pulumi.Input[builtins.str]] = None,
1401
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1402
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1363
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1364
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1365
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1366
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1367
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1368
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1369
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1370
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1371
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1372
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1373
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1374
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1375
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1376
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1377
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1378
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1379
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1380
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1381
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1382
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1383
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1384
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1385
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1386
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1387
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1388
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1389
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1390
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1391
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1392
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1393
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1394
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1395
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1396
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1397
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1398
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1399
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1400
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1401
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1403
1402
  __props__=None):
1404
1403
  """
1405
1404
  ## Example Usage
@@ -1429,60 +1428,60 @@ class SecretBackend(pulumi.CustomResource):
1429
1428
 
1430
1429
  :param str resource_name: The name of the resource.
1431
1430
  :param pulumi.ResourceOptions opts: Options for the resource.
1432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1434
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1436
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1437
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
1438
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1431
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1433
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1434
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1435
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1436
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
1437
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1439
1438
  x509 PEM encoded.
1440
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1441
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1442
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1439
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1440
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1441
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1443
1442
  the next URL in the configuration.
1444
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1445
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1446
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1447
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1448
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1449
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1450
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1451
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1443
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1444
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1445
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1446
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1447
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1448
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1449
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1450
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1452
1451
  Defaults to `false`.
1453
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1454
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1452
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1453
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1455
1454
  replication.Tolerance duration to use when checking the last rotation time.
1456
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1457
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1455
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1456
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1458
1457
  The value should not contain leading or trailing forward slashes.
1459
1458
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1460
1459
  *Available only for Vault Enterprise*.
1461
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1462
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1463
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
1464
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1460
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1461
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1462
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
1463
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1465
1464
  not begin or end with a `/`. Defaults to `ldap`.
1466
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1467
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1465
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1466
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1468
1467
  before returning back an error.
1469
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1468
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1470
1469
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1471
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1470
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1472
1471
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1473
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1472
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1474
1473
  a rotation when a scheduled token rotation occurs. The default rotation window is
1475
1474
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1476
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1477
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1478
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1475
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1476
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1477
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1479
1478
  Defaults to false. Requires Vault 1.16 or above.
1480
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1481
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1482
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1479
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1480
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1481
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1483
1482
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
1484
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1485
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1483
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1484
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1486
1485
  """
1487
1486
  ...
1488
1487
  @overload
@@ -1531,45 +1530,45 @@ class SecretBackend(pulumi.CustomResource):
1531
1530
  def _internal_init(__self__,
1532
1531
  resource_name: str,
1533
1532
  opts: Optional[pulumi.ResourceOptions] = None,
1534
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1535
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1536
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1537
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1538
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1539
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1540
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1541
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1542
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1543
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1544
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1545
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1546
- description: Optional[pulumi.Input[builtins.str]] = None,
1547
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1548
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1549
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1550
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1551
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1552
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1553
- local: Optional[pulumi.Input[builtins.bool]] = None,
1554
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1555
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1556
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1557
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1558
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1559
- path: Optional[pulumi.Input[builtins.str]] = None,
1560
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1561
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1562
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1563
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1564
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1565
- schema: Optional[pulumi.Input[builtins.str]] = None,
1566
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1567
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1568
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1569
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1570
- url: Optional[pulumi.Input[builtins.str]] = None,
1571
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1572
- userdn: Optional[pulumi.Input[builtins.str]] = None,
1533
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1534
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1535
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1536
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1537
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1538
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1539
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1540
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1541
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1542
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1543
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1544
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1545
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1546
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1547
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1548
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1549
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1550
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1551
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1552
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1553
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1554
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1555
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1556
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1557
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1558
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1559
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1560
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1561
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1562
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1563
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1564
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1565
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1566
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1567
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1568
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1569
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1570
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1571
+ userdn: Optional[pulumi.Input[_builtins.str]] = None,
1573
1572
  __props__=None):
1574
1573
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1575
1574
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1635,46 +1634,46 @@ class SecretBackend(pulumi.CustomResource):
1635
1634
  def get(resource_name: str,
1636
1635
  id: pulumi.Input[str],
1637
1636
  opts: Optional[pulumi.ResourceOptions] = None,
1638
- accessor: Optional[pulumi.Input[builtins.str]] = None,
1639
- allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1640
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1641
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1642
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1643
- binddn: Optional[pulumi.Input[builtins.str]] = None,
1644
- bindpass: Optional[pulumi.Input[builtins.str]] = None,
1645
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1646
- client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
1647
- client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
1648
- connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
1649
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1650
- delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1651
- description: Optional[pulumi.Input[builtins.str]] = None,
1652
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1653
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1654
- external_entropy_access: Optional[pulumi.Input[builtins.bool]] = None,
1655
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1656
- insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
1657
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
1658
- local: Optional[pulumi.Input[builtins.bool]] = None,
1659
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1660
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1661
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
1662
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1663
- password_policy: Optional[pulumi.Input[builtins.str]] = None,
1664
- path: Optional[pulumi.Input[builtins.str]] = None,
1665
- plugin_version: Optional[pulumi.Input[builtins.str]] = None,
1666
- request_timeout: Optional[pulumi.Input[builtins.int]] = None,
1667
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1668
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1669
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1670
- schema: Optional[pulumi.Input[builtins.str]] = None,
1671
- seal_wrap: Optional[pulumi.Input[builtins.bool]] = None,
1672
- skip_static_role_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1673
- starttls: Optional[pulumi.Input[builtins.bool]] = None,
1674
- upndomain: Optional[pulumi.Input[builtins.str]] = None,
1675
- url: Optional[pulumi.Input[builtins.str]] = None,
1676
- userattr: Optional[pulumi.Input[builtins.str]] = None,
1677
- userdn: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1637
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1638
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1639
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1640
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1641
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1642
+ binddn: Optional[pulumi.Input[_builtins.str]] = None,
1643
+ bindpass: Optional[pulumi.Input[_builtins.str]] = None,
1644
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1645
+ client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
1646
+ client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
1647
+ connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1648
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1649
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1650
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1651
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1652
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1653
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1654
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1655
+ insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1656
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1657
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1658
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1659
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1660
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1661
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1662
+ password_policy: Optional[pulumi.Input[_builtins.str]] = None,
1663
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1664
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1665
+ request_timeout: Optional[pulumi.Input[_builtins.int]] = None,
1666
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1667
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1668
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1669
+ schema: Optional[pulumi.Input[_builtins.str]] = None,
1670
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1671
+ skip_static_role_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1672
+ starttls: Optional[pulumi.Input[_builtins.bool]] = None,
1673
+ upndomain: Optional[pulumi.Input[_builtins.str]] = None,
1674
+ url: Optional[pulumi.Input[_builtins.str]] = None,
1675
+ userattr: Optional[pulumi.Input[_builtins.str]] = None,
1676
+ userdn: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1678
1677
  """
1679
1678
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
1680
1679
  properties used to qualify the lookup.
@@ -1682,61 +1681,61 @@ class SecretBackend(pulumi.CustomResource):
1682
1681
  :param str resource_name: The unique name of the resulting resource.
1683
1682
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1684
1683
  :param pulumi.ResourceOptions opts: Options for the resource.
1685
- :param pulumi.Input[builtins.str] accessor: Accessor of the mount
1686
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1687
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1688
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1689
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1690
- :param pulumi.Input[builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1691
- :param pulumi.Input[builtins.str] bindpass: Password to use along with binddn when performing user search.
1692
- :param pulumi.Input[builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1684
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1685
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1686
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1687
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1688
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1689
+ :param pulumi.Input[_builtins.str] binddn: Distinguished name of object to bind when performing user and group search.
1690
+ :param pulumi.Input[_builtins.str] bindpass: Password to use along with binddn when performing user search.
1691
+ :param pulumi.Input[_builtins.str] certificate: CA certificate to use when verifying LDAP server certificate, must be
1693
1692
  x509 PEM encoded.
1694
- :param pulumi.Input[builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1695
- :param pulumi.Input[builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1696
- :param pulumi.Input[builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1693
+ :param pulumi.Input[_builtins.str] client_tls_cert: Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1694
+ :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1695
+ :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1697
1696
  the next URL in the configuration.
1698
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1699
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1700
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1701
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1702
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1703
- :param pulumi.Input[builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1704
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1705
- :param pulumi.Input[builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1697
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1698
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1699
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1700
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1701
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1702
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1703
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1704
+ :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1706
1705
  Defaults to `false`.
1707
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1708
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1706
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1707
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1709
1708
  replication.Tolerance duration to use when checking the last rotation time.
1710
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1711
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1709
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1710
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1712
1711
  The value should not contain leading or trailing forward slashes.
1713
1712
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1714
1713
  *Available only for Vault Enterprise*.
1715
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1716
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1717
- :param pulumi.Input[builtins.str] password_policy: Name of the password policy to use to generate passwords.
1718
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1714
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1715
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1716
+ :param pulumi.Input[_builtins.str] password_policy: Name of the password policy to use to generate passwords.
1717
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1719
1718
  not begin or end with a `/`. Defaults to `ldap`.
1720
- :param pulumi.Input[builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1721
- :param pulumi.Input[builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1719
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1720
+ :param pulumi.Input[_builtins.int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
1722
1721
  before returning back an error.
1723
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1722
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1724
1723
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1725
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1724
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1726
1725
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1727
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1726
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1728
1727
  a rotation when a scheduled token rotation occurs. The default rotation window is
1729
1728
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1730
- :param pulumi.Input[builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1731
- :param pulumi.Input[builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1732
- :param pulumi.Input[builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1729
+ :param pulumi.Input[_builtins.str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
1730
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1731
+ :param pulumi.Input[_builtins.bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
1733
1732
  Defaults to false. Requires Vault 1.16 or above.
1734
- :param pulumi.Input[builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1735
- :param pulumi.Input[builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1736
- :param pulumi.Input[builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1733
+ :param pulumi.Input[_builtins.bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
1734
+ :param pulumi.Input[_builtins.str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
1735
+ :param pulumi.Input[_builtins.str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
1737
1736
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
1738
- :param pulumi.Input[builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1739
- :param pulumi.Input[builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1737
+ :param pulumi.Input[_builtins.str] userattr: Attribute used when searching users. Defaults to `cn`.
1738
+ :param pulumi.Input[_builtins.str] userdn: LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
1740
1739
  """
1741
1740
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1742
1741
 
@@ -1784,189 +1783,189 @@ class SecretBackend(pulumi.CustomResource):
1784
1783
  __props__.__dict__["userdn"] = userdn
1785
1784
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
1786
1785
 
1787
- @property
1786
+ @_builtins.property
1788
1787
  @pulumi.getter
1789
- def accessor(self) -> pulumi.Output[builtins.str]:
1788
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1790
1789
  """
1791
1790
  Accessor of the mount
1792
1791
  """
1793
1792
  return pulumi.get(self, "accessor")
1794
1793
 
1795
- @property
1794
+ @_builtins.property
1796
1795
  @pulumi.getter(name="allowedManagedKeys")
1797
- def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1796
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1798
1797
  """
1799
1798
  List of managed key registry entry names that the mount in question is allowed to access
1800
1799
  """
1801
1800
  return pulumi.get(self, "allowed_managed_keys")
1802
1801
 
1803
- @property
1802
+ @_builtins.property
1804
1803
  @pulumi.getter(name="allowedResponseHeaders")
1805
- def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1804
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1806
1805
  """
1807
1806
  List of headers to allow and pass from the request to the plugin
1808
1807
  """
1809
1808
  return pulumi.get(self, "allowed_response_headers")
1810
1809
 
1811
- @property
1810
+ @_builtins.property
1812
1811
  @pulumi.getter(name="auditNonHmacRequestKeys")
1813
- def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1812
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1814
1813
  """
1815
1814
  Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1816
1815
  """
1817
1816
  return pulumi.get(self, "audit_non_hmac_request_keys")
1818
1817
 
1819
- @property
1818
+ @_builtins.property
1820
1819
  @pulumi.getter(name="auditNonHmacResponseKeys")
1821
- def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[builtins.str]]:
1820
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1822
1821
  """
1823
1822
  Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1824
1823
  """
1825
1824
  return pulumi.get(self, "audit_non_hmac_response_keys")
1826
1825
 
1827
- @property
1826
+ @_builtins.property
1828
1827
  @pulumi.getter
1829
- def binddn(self) -> pulumi.Output[builtins.str]:
1828
+ def binddn(self) -> pulumi.Output[_builtins.str]:
1830
1829
  """
1831
1830
  Distinguished name of object to bind when performing user and group search.
1832
1831
  """
1833
1832
  return pulumi.get(self, "binddn")
1834
1833
 
1835
- @property
1834
+ @_builtins.property
1836
1835
  @pulumi.getter
1837
- def bindpass(self) -> pulumi.Output[builtins.str]:
1836
+ def bindpass(self) -> pulumi.Output[_builtins.str]:
1838
1837
  """
1839
1838
  Password to use along with binddn when performing user search.
1840
1839
  """
1841
1840
  return pulumi.get(self, "bindpass")
1842
1841
 
1843
- @property
1842
+ @_builtins.property
1844
1843
  @pulumi.getter
1845
- def certificate(self) -> pulumi.Output[Optional[builtins.str]]:
1844
+ def certificate(self) -> pulumi.Output[Optional[_builtins.str]]:
1846
1845
  """
1847
1846
  CA certificate to use when verifying LDAP server certificate, must be
1848
1847
  x509 PEM encoded.
1849
1848
  """
1850
1849
  return pulumi.get(self, "certificate")
1851
1850
 
1852
- @property
1851
+ @_builtins.property
1853
1852
  @pulumi.getter(name="clientTlsCert")
1854
- def client_tls_cert(self) -> pulumi.Output[Optional[builtins.str]]:
1853
+ def client_tls_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
1855
1854
  """
1856
1855
  Client certificate to provide to the LDAP server, must be x509 PEM encoded.
1857
1856
  """
1858
1857
  return pulumi.get(self, "client_tls_cert")
1859
1858
 
1860
- @property
1859
+ @_builtins.property
1861
1860
  @pulumi.getter(name="clientTlsKey")
1862
- def client_tls_key(self) -> pulumi.Output[Optional[builtins.str]]:
1861
+ def client_tls_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1863
1862
  """
1864
1863
  Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1865
1864
  """
1866
1865
  return pulumi.get(self, "client_tls_key")
1867
1866
 
1868
- @property
1867
+ @_builtins.property
1869
1868
  @pulumi.getter(name="connectionTimeout")
1870
- def connection_timeout(self) -> pulumi.Output[Optional[builtins.int]]:
1869
+ def connection_timeout(self) -> pulumi.Output[Optional[_builtins.int]]:
1871
1870
  """
1872
1871
  Timeout, in seconds, when attempting to connect to the LDAP server before trying
1873
1872
  the next URL in the configuration.
1874
1873
  """
1875
1874
  return pulumi.get(self, "connection_timeout")
1876
1875
 
1877
- @property
1876
+ @_builtins.property
1878
1877
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1879
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1878
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1880
1879
  """
1881
1880
  Default lease duration for secrets in seconds.
1882
1881
  """
1883
1882
  return pulumi.get(self, "default_lease_ttl_seconds")
1884
1883
 
1885
- @property
1884
+ @_builtins.property
1886
1885
  @pulumi.getter(name="delegatedAuthAccessors")
1887
- def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1886
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1888
1887
  """
1889
1888
  List of headers to allow and pass from the request to the plugin
1890
1889
  """
1891
1890
  return pulumi.get(self, "delegated_auth_accessors")
1892
1891
 
1893
- @property
1892
+ @_builtins.property
1894
1893
  @pulumi.getter
1895
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1894
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1896
1895
  """
1897
1896
  Human-friendly description of the mount for the Active Directory backend.
1898
1897
  """
1899
1898
  return pulumi.get(self, "description")
1900
1899
 
1901
- @property
1900
+ @_builtins.property
1902
1901
  @pulumi.getter(name="disableAutomatedRotation")
1903
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1902
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1904
1903
  """
1905
1904
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1906
1905
  """
1907
1906
  return pulumi.get(self, "disable_automated_rotation")
1908
1907
 
1909
- @property
1908
+ @_builtins.property
1910
1909
  @pulumi.getter(name="disableRemount")
1911
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1910
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1912
1911
  """
1913
1912
  If set, opts out of mount migration on path updates.
1914
1913
  """
1915
1914
  return pulumi.get(self, "disable_remount")
1916
1915
 
1917
- @property
1916
+ @_builtins.property
1918
1917
  @pulumi.getter(name="externalEntropyAccess")
1919
- def external_entropy_access(self) -> pulumi.Output[Optional[builtins.bool]]:
1918
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1920
1919
  """
1921
1920
  Enable the secrets engine to access Vault's external entropy source
1922
1921
  """
1923
1922
  return pulumi.get(self, "external_entropy_access")
1924
1923
 
1925
- @property
1924
+ @_builtins.property
1926
1925
  @pulumi.getter(name="identityTokenKey")
1927
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1926
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1928
1927
  """
1929
1928
  The key to use for signing plugin workload identity tokens
1930
1929
  """
1931
1930
  return pulumi.get(self, "identity_token_key")
1932
1931
 
1933
- @property
1932
+ @_builtins.property
1934
1933
  @pulumi.getter(name="insecureTls")
1935
- def insecure_tls(self) -> pulumi.Output[Optional[builtins.bool]]:
1934
+ def insecure_tls(self) -> pulumi.Output[Optional[_builtins.bool]]:
1936
1935
  """
1937
1936
  Skip LDAP server SSL Certificate verification. This is not recommended for production.
1938
1937
  Defaults to `false`.
1939
1938
  """
1940
1939
  return pulumi.get(self, "insecure_tls")
1941
1940
 
1942
- @property
1941
+ @_builtins.property
1943
1942
  @pulumi.getter(name="listingVisibility")
1944
- def listing_visibility(self) -> pulumi.Output[Optional[builtins.str]]:
1943
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1945
1944
  """
1946
1945
  Specifies whether to show this mount in the UI-specific listing endpoint
1947
1946
  """
1948
1947
  return pulumi.get(self, "listing_visibility")
1949
1948
 
1950
- @property
1949
+ @_builtins.property
1951
1950
  @pulumi.getter
1952
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1951
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1953
1952
  """
1954
1953
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
1955
1954
  replication.Tolerance duration to use when checking the last rotation time.
1956
1955
  """
1957
1956
  return pulumi.get(self, "local")
1958
1957
 
1959
- @property
1958
+ @_builtins.property
1960
1959
  @pulumi.getter(name="maxLeaseTtlSeconds")
1961
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1960
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1962
1961
  """
1963
1962
  Maximum possible lease duration for secrets in seconds.
1964
1963
  """
1965
1964
  return pulumi.get(self, "max_lease_ttl_seconds")
1966
1965
 
1967
- @property
1966
+ @_builtins.property
1968
1967
  @pulumi.getter
1969
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1968
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1970
1969
  """
1971
1970
  The namespace to provision the resource in.
1972
1971
  The value should not contain leading or trailing forward slashes.
@@ -1975,77 +1974,77 @@ class SecretBackend(pulumi.CustomResource):
1975
1974
  """
1976
1975
  return pulumi.get(self, "namespace")
1977
1976
 
1978
- @property
1977
+ @_builtins.property
1979
1978
  @pulumi.getter
1980
- def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1979
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1981
1980
  """
1982
1981
  Specifies mount type specific options that are passed to the backend
1983
1982
  """
1984
1983
  return pulumi.get(self, "options")
1985
1984
 
1986
- @property
1985
+ @_builtins.property
1987
1986
  @pulumi.getter(name="passthroughRequestHeaders")
1988
- def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1987
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1989
1988
  """
1990
1989
  List of headers to allow and pass from the request to the plugin
1991
1990
  """
1992
1991
  return pulumi.get(self, "passthrough_request_headers")
1993
1992
 
1994
- @property
1993
+ @_builtins.property
1995
1994
  @pulumi.getter(name="passwordPolicy")
1996
- def password_policy(self) -> pulumi.Output[Optional[builtins.str]]:
1995
+ def password_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
1997
1996
  """
1998
1997
  Name of the password policy to use to generate passwords.
1999
1998
  """
2000
1999
  return pulumi.get(self, "password_policy")
2001
2000
 
2002
- @property
2001
+ @_builtins.property
2003
2002
  @pulumi.getter
2004
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
2003
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
2005
2004
  """
2006
2005
  The unique path this backend should be mounted at. Must
2007
2006
  not begin or end with a `/`. Defaults to `ldap`.
2008
2007
  """
2009
2008
  return pulumi.get(self, "path")
2010
2009
 
2011
- @property
2010
+ @_builtins.property
2012
2011
  @pulumi.getter(name="pluginVersion")
2013
- def plugin_version(self) -> pulumi.Output[Optional[builtins.str]]:
2012
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
2014
2013
  """
2015
2014
  Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
2016
2015
  """
2017
2016
  return pulumi.get(self, "plugin_version")
2018
2017
 
2019
- @property
2018
+ @_builtins.property
2020
2019
  @pulumi.getter(name="requestTimeout")
2021
- def request_timeout(self) -> pulumi.Output[builtins.int]:
2020
+ def request_timeout(self) -> pulumi.Output[_builtins.int]:
2022
2021
  """
2023
2022
  Timeout, in seconds, for the connection when making requests against the server
2024
2023
  before returning back an error.
2025
2024
  """
2026
2025
  return pulumi.get(self, "request_timeout")
2027
2026
 
2028
- @property
2027
+ @_builtins.property
2029
2028
  @pulumi.getter(name="rotationPeriod")
2030
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
2029
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
2031
2030
  """
2032
2031
  The amount of time in seconds Vault should wait before rotating the root credential.
2033
2032
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
2034
2033
  """
2035
2034
  return pulumi.get(self, "rotation_period")
2036
2035
 
2037
- @property
2036
+ @_builtins.property
2038
2037
  @pulumi.getter(name="rotationSchedule")
2039
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
2038
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
2040
2039
  """
2041
2040
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
2042
2041
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
2043
2042
  """
2044
2043
  return pulumi.get(self, "rotation_schedule")
2045
2044
 
2046
- @property
2045
+ @_builtins.property
2047
2046
  @pulumi.getter(name="rotationWindow")
2048
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
2047
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
2049
2048
  """
2050
2049
  The maximum amount of time in seconds allowed to complete
2051
2050
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -2053,67 +2052,67 @@ class SecretBackend(pulumi.CustomResource):
2053
2052
  """
2054
2053
  return pulumi.get(self, "rotation_window")
2055
2054
 
2056
- @property
2055
+ @_builtins.property
2057
2056
  @pulumi.getter
2058
- def schema(self) -> pulumi.Output[builtins.str]:
2057
+ def schema(self) -> pulumi.Output[_builtins.str]:
2059
2058
  """
2060
2059
  The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
2061
2060
  """
2062
2061
  return pulumi.get(self, "schema")
2063
2062
 
2064
- @property
2063
+ @_builtins.property
2065
2064
  @pulumi.getter(name="sealWrap")
2066
- def seal_wrap(self) -> pulumi.Output[builtins.bool]:
2065
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
2067
2066
  """
2068
2067
  Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
2069
2068
  """
2070
2069
  return pulumi.get(self, "seal_wrap")
2071
2070
 
2072
- @property
2071
+ @_builtins.property
2073
2072
  @pulumi.getter(name="skipStaticRoleImportRotation")
2074
- def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
2073
+ def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
2075
2074
  """
2076
2075
  If set to true, static roles will not be rotated during import.
2077
2076
  Defaults to false. Requires Vault 1.16 or above.
2078
2077
  """
2079
2078
  return pulumi.get(self, "skip_static_role_import_rotation")
2080
2079
 
2081
- @property
2080
+ @_builtins.property
2082
2081
  @pulumi.getter
2083
- def starttls(self) -> pulumi.Output[builtins.bool]:
2082
+ def starttls(self) -> pulumi.Output[_builtins.bool]:
2084
2083
  """
2085
2084
  Issue a StartTLS command after establishing unencrypted connection.
2086
2085
  """
2087
2086
  return pulumi.get(self, "starttls")
2088
2087
 
2089
- @property
2088
+ @_builtins.property
2090
2089
  @pulumi.getter
2091
- def upndomain(self) -> pulumi.Output[builtins.str]:
2090
+ def upndomain(self) -> pulumi.Output[_builtins.str]:
2092
2091
  """
2093
2092
  Enables userPrincipalDomain login with [username]@UPNDomain.
2094
2093
  """
2095
2094
  return pulumi.get(self, "upndomain")
2096
2095
 
2097
- @property
2096
+ @_builtins.property
2098
2097
  @pulumi.getter
2099
- def url(self) -> pulumi.Output[builtins.str]:
2098
+ def url(self) -> pulumi.Output[_builtins.str]:
2100
2099
  """
2101
2100
  LDAP URL to connect to. Multiple URLs can be specified by concatenating
2102
2101
  them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
2103
2102
  """
2104
2103
  return pulumi.get(self, "url")
2105
2104
 
2106
- @property
2105
+ @_builtins.property
2107
2106
  @pulumi.getter
2108
- def userattr(self) -> pulumi.Output[builtins.str]:
2107
+ def userattr(self) -> pulumi.Output[_builtins.str]:
2109
2108
  """
2110
2109
  Attribute used when searching users. Defaults to `cn`.
2111
2110
  """
2112
2111
  return pulumi.get(self, "userattr")
2113
2112
 
2114
- @property
2113
+ @_builtins.property
2115
2114
  @pulumi.getter
2116
- def userdn(self) -> pulumi.Output[Optional[builtins.str]]:
2115
+ def userdn(self) -> pulumi.Output[Optional[_builtins.str]]:
2117
2116
  """
2118
2117
  LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
2119
2118
  """