pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.3.0a1755586140__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -29,6 +29,7 @@ class SecretBackendArgs:
29
29
  description: Optional[pulumi.Input[_builtins.str]] = None,
30
30
  disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
31
31
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
32
33
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
33
34
  kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
34
35
  kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
@@ -54,6 +55,7 @@ class SecretBackendArgs:
54
55
  :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
55
56
  service account JWT when Vault is running in a Kubernetes pod.
56
57
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
58
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
57
59
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
58
60
  :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
59
61
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -96,6 +98,8 @@ class SecretBackendArgs:
96
98
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
97
99
  if external_entropy_access is not None:
98
100
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
101
+ if force_no_cache is not None:
102
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
99
103
  if identity_token_key is not None:
100
104
  pulumi.set(__self__, "identity_token_key", identity_token_key)
101
105
  if kubernetes_ca_cert is not None:
@@ -242,6 +246,18 @@ class SecretBackendArgs:
242
246
  def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
243
247
  pulumi.set(self, "external_entropy_access", value)
244
248
 
249
+ @_builtins.property
250
+ @pulumi.getter(name="forceNoCache")
251
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
252
+ """
253
+ If set to true, disables caching.
254
+ """
255
+ return pulumi.get(self, "force_no_cache")
256
+
257
+ @force_no_cache.setter
258
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
259
+ pulumi.set(self, "force_no_cache", value)
260
+
245
261
  @_builtins.property
246
262
  @pulumi.getter(name="identityTokenKey")
247
263
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -410,6 +426,7 @@ class _SecretBackendState:
410
426
  description: Optional[pulumi.Input[_builtins.str]] = None,
411
427
  disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
412
428
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
429
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
413
430
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
414
431
  kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
415
432
  kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
@@ -436,6 +453,7 @@ class _SecretBackendState:
436
453
  :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
437
454
  service account JWT when Vault is running in a Kubernetes pod.
438
455
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
456
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
439
457
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
440
458
  :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
441
459
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -480,6 +498,8 @@ class _SecretBackendState:
480
498
  pulumi.set(__self__, "disable_local_ca_jwt", disable_local_ca_jwt)
481
499
  if external_entropy_access is not None:
482
500
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
501
+ if force_no_cache is not None:
502
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
483
503
  if identity_token_key is not None:
484
504
  pulumi.set(__self__, "identity_token_key", identity_token_key)
485
505
  if kubernetes_ca_cert is not None:
@@ -628,6 +648,18 @@ class _SecretBackendState:
628
648
  def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
629
649
  pulumi.set(self, "external_entropy_access", value)
630
650
 
651
+ @_builtins.property
652
+ @pulumi.getter(name="forceNoCache")
653
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
654
+ """
655
+ If set to true, disables caching.
656
+ """
657
+ return pulumi.get(self, "force_no_cache")
658
+
659
+ @force_no_cache.setter
660
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
661
+ pulumi.set(self, "force_no_cache", value)
662
+
631
663
  @_builtins.property
632
664
  @pulumi.getter(name="identityTokenKey")
633
665
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -810,6 +842,7 @@ class SecretBackend(pulumi.CustomResource):
810
842
  description: Optional[pulumi.Input[_builtins.str]] = None,
811
843
  disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
812
844
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
845
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
813
846
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
814
847
  kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
815
848
  kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
@@ -863,6 +896,7 @@ class SecretBackend(pulumi.CustomResource):
863
896
  :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
864
897
  service account JWT when Vault is running in a Kubernetes pod.
865
898
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
899
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
866
900
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
867
901
  :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
868
902
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -944,6 +978,7 @@ class SecretBackend(pulumi.CustomResource):
944
978
  description: Optional[pulumi.Input[_builtins.str]] = None,
945
979
  disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
946
980
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
981
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
947
982
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
948
983
  kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
949
984
  kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
@@ -975,6 +1010,7 @@ class SecretBackend(pulumi.CustomResource):
975
1010
  __props__.__dict__["description"] = description
976
1011
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
977
1012
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1013
+ __props__.__dict__["force_no_cache"] = force_no_cache
978
1014
  __props__.__dict__["identity_token_key"] = identity_token_key
979
1015
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
980
1016
  __props__.__dict__["kubernetes_host"] = kubernetes_host
@@ -1013,6 +1049,7 @@ class SecretBackend(pulumi.CustomResource):
1013
1049
  description: Optional[pulumi.Input[_builtins.str]] = None,
1014
1050
  disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
1015
1051
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1052
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1016
1053
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1017
1054
  kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
1018
1055
  kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1044,6 +1081,7 @@ class SecretBackend(pulumi.CustomResource):
1044
1081
  :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA certificate and
1045
1082
  service account JWT when Vault is running in a Kubernetes pod.
1046
1083
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1084
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1047
1085
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1048
1086
  :param pulumi.Input[_builtins.str] kubernetes_ca_cert: A PEM-encoded CA certificate used by the
1049
1087
  secrets engine to verify the Kubernetes API server certificate. Defaults to the local
@@ -1082,6 +1120,7 @@ class SecretBackend(pulumi.CustomResource):
1082
1120
  __props__.__dict__["description"] = description
1083
1121
  __props__.__dict__["disable_local_ca_jwt"] = disable_local_ca_jwt
1084
1122
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1123
+ __props__.__dict__["force_no_cache"] = force_no_cache
1085
1124
  __props__.__dict__["identity_token_key"] = identity_token_key
1086
1125
  __props__.__dict__["kubernetes_ca_cert"] = kubernetes_ca_cert
1087
1126
  __props__.__dict__["kubernetes_host"] = kubernetes_host
@@ -1178,6 +1217,14 @@ class SecretBackend(pulumi.CustomResource):
1178
1217
  """
1179
1218
  return pulumi.get(self, "external_entropy_access")
1180
1219
 
1220
+ @_builtins.property
1221
+ @pulumi.getter(name="forceNoCache")
1222
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1223
+ """
1224
+ If set to true, disables caching.
1225
+ """
1226
+ return pulumi.get(self, "force_no_cache")
1227
+
1181
1228
  @_builtins.property
1182
1229
  @pulumi.getter(name="identityTokenKey")
1183
1230
  def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -35,6 +35,7 @@ class SecretBackendArgs:
35
35
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
36
36
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
37
37
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
38
39
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
39
40
  insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
40
41
  listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
@@ -72,19 +73,19 @@ class SecretBackendArgs:
72
73
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
73
74
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
74
75
  the next URL in the configuration.
75
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
76
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
76
77
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
77
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
78
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
78
79
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
79
80
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
80
81
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
82
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
81
83
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
82
84
  :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
83
85
  Defaults to `false`.
84
86
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
85
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
86
- replication.Tolerance duration to use when checking the last rotation time.
87
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
87
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
88
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
88
89
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
89
90
  The value should not contain leading or trailing forward slashes.
90
91
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -145,6 +146,8 @@ class SecretBackendArgs:
145
146
  pulumi.set(__self__, "disable_remount", disable_remount)
146
147
  if external_entropy_access is not None:
147
148
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
149
+ if force_no_cache is not None:
150
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
148
151
  if identity_token_key is not None:
149
152
  pulumi.set(__self__, "identity_token_key", identity_token_key)
150
153
  if insecure_tls is not None:
@@ -318,7 +321,7 @@ class SecretBackendArgs:
318
321
  @pulumi.getter(name="defaultLeaseTtlSeconds")
319
322
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
320
323
  """
321
- Default lease duration for secrets in seconds.
324
+ Default lease duration for tokens and secrets in seconds
322
325
  """
323
326
  return pulumi.get(self, "default_lease_ttl_seconds")
324
327
 
@@ -342,7 +345,7 @@ class SecretBackendArgs:
342
345
  @pulumi.getter
343
346
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
344
347
  """
345
- Human-friendly description of the mount for the Active Directory backend.
348
+ Human-friendly description of the mount
346
349
  """
347
350
  return pulumi.get(self, "description")
348
351
 
@@ -386,6 +389,18 @@ class SecretBackendArgs:
386
389
  def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
387
390
  pulumi.set(self, "external_entropy_access", value)
388
391
 
392
+ @_builtins.property
393
+ @pulumi.getter(name="forceNoCache")
394
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
395
+ """
396
+ If set to true, disables caching.
397
+ """
398
+ return pulumi.get(self, "force_no_cache")
399
+
400
+ @force_no_cache.setter
401
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
402
+ pulumi.set(self, "force_no_cache", value)
403
+
389
404
  @_builtins.property
390
405
  @pulumi.getter(name="identityTokenKey")
391
406
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -427,8 +442,7 @@ class SecretBackendArgs:
427
442
  @pulumi.getter
428
443
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
429
444
  """
430
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
431
- replication.Tolerance duration to use when checking the last rotation time.
445
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
432
446
  """
433
447
  return pulumi.get(self, "local")
434
448
 
@@ -440,7 +454,7 @@ class SecretBackendArgs:
440
454
  @pulumi.getter(name="maxLeaseTtlSeconds")
441
455
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
442
456
  """
443
- Maximum possible lease duration for secrets in seconds.
457
+ Maximum possible lease duration for tokens and secrets in seconds
444
458
  """
445
459
  return pulumi.get(self, "max_lease_ttl_seconds")
446
460
 
@@ -696,6 +710,7 @@ class _SecretBackendState:
696
710
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
697
711
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
698
712
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
713
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
699
714
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
700
715
  insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
701
716
  listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
@@ -734,19 +749,19 @@ class _SecretBackendState:
734
749
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
735
750
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
736
751
  the next URL in the configuration.
737
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
752
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
738
753
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
739
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
754
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
740
755
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
741
756
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
742
757
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
758
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
743
759
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
744
760
  :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
745
761
  Defaults to `false`.
746
762
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
747
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
748
- replication.Tolerance duration to use when checking the last rotation time.
749
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
763
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
764
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
750
765
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
751
766
  The value should not contain leading or trailing forward slashes.
752
767
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -811,6 +826,8 @@ class _SecretBackendState:
811
826
  pulumi.set(__self__, "disable_remount", disable_remount)
812
827
  if external_entropy_access is not None:
813
828
  pulumi.set(__self__, "external_entropy_access", external_entropy_access)
829
+ if force_no_cache is not None:
830
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
814
831
  if identity_token_key is not None:
815
832
  pulumi.set(__self__, "identity_token_key", identity_token_key)
816
833
  if insecure_tls is not None:
@@ -996,7 +1013,7 @@ class _SecretBackendState:
996
1013
  @pulumi.getter(name="defaultLeaseTtlSeconds")
997
1014
  def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
998
1015
  """
999
- Default lease duration for secrets in seconds.
1016
+ Default lease duration for tokens and secrets in seconds
1000
1017
  """
1001
1018
  return pulumi.get(self, "default_lease_ttl_seconds")
1002
1019
 
@@ -1020,7 +1037,7 @@ class _SecretBackendState:
1020
1037
  @pulumi.getter
1021
1038
  def description(self) -> Optional[pulumi.Input[_builtins.str]]:
1022
1039
  """
1023
- Human-friendly description of the mount for the Active Directory backend.
1040
+ Human-friendly description of the mount
1024
1041
  """
1025
1042
  return pulumi.get(self, "description")
1026
1043
 
@@ -1064,6 +1081,18 @@ class _SecretBackendState:
1064
1081
  def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
1065
1082
  pulumi.set(self, "external_entropy_access", value)
1066
1083
 
1084
+ @_builtins.property
1085
+ @pulumi.getter(name="forceNoCache")
1086
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
1087
+ """
1088
+ If set to true, disables caching.
1089
+ """
1090
+ return pulumi.get(self, "force_no_cache")
1091
+
1092
+ @force_no_cache.setter
1093
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
1094
+ pulumi.set(self, "force_no_cache", value)
1095
+
1067
1096
  @_builtins.property
1068
1097
  @pulumi.getter(name="identityTokenKey")
1069
1098
  def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -1105,8 +1134,7 @@ class _SecretBackendState:
1105
1134
  @pulumi.getter
1106
1135
  def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
1107
1136
  """
1108
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
1109
- replication.Tolerance duration to use when checking the last rotation time.
1137
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1110
1138
  """
1111
1139
  return pulumi.get(self, "local")
1112
1140
 
@@ -1118,7 +1146,7 @@ class _SecretBackendState:
1118
1146
  @pulumi.getter(name="maxLeaseTtlSeconds")
1119
1147
  def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
1120
1148
  """
1121
- Maximum possible lease duration for secrets in seconds.
1149
+ Maximum possible lease duration for tokens and secrets in seconds
1122
1150
  """
1123
1151
  return pulumi.get(self, "max_lease_ttl_seconds")
1124
1152
 
@@ -1376,6 +1404,7 @@ class SecretBackend(pulumi.CustomResource):
1376
1404
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1377
1405
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1378
1406
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1407
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1379
1408
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1380
1409
  insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1381
1410
  listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1440,19 +1469,19 @@ class SecretBackend(pulumi.CustomResource):
1440
1469
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1441
1470
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1442
1471
  the next URL in the configuration.
1443
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1472
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1444
1473
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1445
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1474
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1446
1475
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1447
1476
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1448
1477
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1478
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1449
1479
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1450
1480
  :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1451
1481
  Defaults to `false`.
1452
1482
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1453
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1454
- replication.Tolerance duration to use when checking the last rotation time.
1455
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1483
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1484
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1456
1485
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1457
1486
  The value should not contain leading or trailing forward slashes.
1458
1487
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -1546,6 +1575,7 @@ class SecretBackend(pulumi.CustomResource):
1546
1575
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1547
1576
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1548
1577
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1578
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1549
1579
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1550
1580
  insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1551
1581
  listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1598,6 +1628,7 @@ class SecretBackend(pulumi.CustomResource):
1598
1628
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1599
1629
  __props__.__dict__["disable_remount"] = disable_remount
1600
1630
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1631
+ __props__.__dict__["force_no_cache"] = force_no_cache
1601
1632
  __props__.__dict__["identity_token_key"] = identity_token_key
1602
1633
  __props__.__dict__["insecure_tls"] = insecure_tls
1603
1634
  __props__.__dict__["listing_visibility"] = listing_visibility
@@ -1651,6 +1682,7 @@ class SecretBackend(pulumi.CustomResource):
1651
1682
  disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1652
1683
  disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1653
1684
  external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1685
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1654
1686
  identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1655
1687
  insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
1656
1688
  listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1694,19 +1726,19 @@ class SecretBackend(pulumi.CustomResource):
1694
1726
  :param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
1695
1727
  :param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
1696
1728
  the next URL in the configuration.
1697
- :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
1729
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1698
1730
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1699
- :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
1731
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
1700
1732
  :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1701
1733
  :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1702
1734
  :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1735
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1703
1736
  :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
1704
1737
  :param pulumi.Input[_builtins.bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
1705
1738
  Defaults to `false`.
1706
1739
  :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1707
- :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
1708
- replication.Tolerance duration to use when checking the last rotation time.
1709
- :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
1740
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1741
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1710
1742
  :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1711
1743
  The value should not contain leading or trailing forward slashes.
1712
1744
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -1758,6 +1790,7 @@ class SecretBackend(pulumi.CustomResource):
1758
1790
  __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1759
1791
  __props__.__dict__["disable_remount"] = disable_remount
1760
1792
  __props__.__dict__["external_entropy_access"] = external_entropy_access
1793
+ __props__.__dict__["force_no_cache"] = force_no_cache
1761
1794
  __props__.__dict__["identity_token_key"] = identity_token_key
1762
1795
  __props__.__dict__["insecure_tls"] = insecure_tls
1763
1796
  __props__.__dict__["listing_visibility"] = listing_visibility
@@ -1877,7 +1910,7 @@ class SecretBackend(pulumi.CustomResource):
1877
1910
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1878
1911
  def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1879
1912
  """
1880
- Default lease duration for secrets in seconds.
1913
+ Default lease duration for tokens and secrets in seconds
1881
1914
  """
1882
1915
  return pulumi.get(self, "default_lease_ttl_seconds")
1883
1916
 
@@ -1893,7 +1926,7 @@ class SecretBackend(pulumi.CustomResource):
1893
1926
  @pulumi.getter
1894
1927
  def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1895
1928
  """
1896
- Human-friendly description of the mount for the Active Directory backend.
1929
+ Human-friendly description of the mount
1897
1930
  """
1898
1931
  return pulumi.get(self, "description")
1899
1932
 
@@ -1921,6 +1954,14 @@ class SecretBackend(pulumi.CustomResource):
1921
1954
  """
1922
1955
  return pulumi.get(self, "external_entropy_access")
1923
1956
 
1957
+ @_builtins.property
1958
+ @pulumi.getter(name="forceNoCache")
1959
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1960
+ """
1961
+ If set to true, disables caching.
1962
+ """
1963
+ return pulumi.get(self, "force_no_cache")
1964
+
1924
1965
  @_builtins.property
1925
1966
  @pulumi.getter(name="identityTokenKey")
1926
1967
  def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
@@ -1950,8 +1991,7 @@ class SecretBackend(pulumi.CustomResource):
1950
1991
  @pulumi.getter
1951
1992
  def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1952
1993
  """
1953
- Mark the secrets engine as local-only. Local engines are not replicated or removed by
1954
- replication.Tolerance duration to use when checking the last rotation time.
1994
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1955
1995
  """
1956
1996
  return pulumi.get(self, "local")
1957
1997
 
@@ -1959,7 +1999,7 @@ class SecretBackend(pulumi.CustomResource):
1959
1999
  @pulumi.getter(name="maxLeaseTtlSeconds")
1960
2000
  def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1961
2001
  """
1962
- Maximum possible lease duration for secrets in seconds.
2002
+ Maximum possible lease duration for tokens and secrets in seconds
1963
2003
  """
1964
2004
  return pulumi.get(self, "max_lease_ttl_seconds")
1965
2005