pulumi-vault 6.6.0a1741415971__tar.gz → 6.6.0a1741836364__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/PKG-INFO +1 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/__init__.py +8 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_client.py +228 -4
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend.py +266 -50
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend_static_role.py +217 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/auth_backend_config.py +257 -5
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/backend.py +249 -4
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/_inputs.py +1692 -36
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/outputs.py +1170 -18
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_connection.py +220 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_static_role.py +143 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secrets_mount.py +8 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/auth_backend.py +222 -2
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_backend.py +244 -4
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend.py +222 -2
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend.py +222 -2
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/__init__.py +2 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/_inputs.py +0 -6
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_acme.py +47 -0
- pulumi_vault-6.6.0a1741836364/pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_cmpv2.py +61 -14
- pulumi_vault-6.6.0a1741836364/pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +18 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/outputs.py +0 -4
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_role.py +252 -3
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault-6.6.0a1741836364/pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_role.py +7 -7
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/__init__.py +2 -0
- pulumi_vault-6.6.0a1741836364/pulumi_vault/transit/get_sign.py +324 -0
- pulumi_vault-6.6.0a1741836364/pulumi_vault/transit/get_verify.py +354 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/secret_backend_key.py +162 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/SOURCES.txt +5 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pyproject.toml +1 -1
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/README.md +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_auth_backends.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_namespace.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_namespaces.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_raft_autopilot_state.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/get_static_credentials.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/token.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/setup.cfg +0 -0
@@ -1029,6 +1029,14 @@ _utilities.register(
|
|
1029
1029
|
"vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
|
1030
1030
|
}
|
1031
1031
|
},
|
1032
|
+
{
|
1033
|
+
"pkg": "vault",
|
1034
|
+
"mod": "pkiSecret/backendConfigAutoTidy",
|
1035
|
+
"fqn": "pulumi_vault.pkisecret",
|
1036
|
+
"classes": {
|
1037
|
+
"vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy": "BackendConfigAutoTidy"
|
1038
|
+
}
|
1039
|
+
},
|
1032
1040
|
{
|
1033
1041
|
"pkg": "vault",
|
1034
1042
|
"mod": "pkiSecret/backendConfigCluster",
|
@@ -21,6 +21,7 @@ class AuthBackendClientArgs:
|
|
21
21
|
def __init__(__self__, *,
|
22
22
|
access_key: Optional[pulumi.Input[str]] = None,
|
23
23
|
backend: Optional[pulumi.Input[str]] = None,
|
24
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
24
25
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
25
26
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
26
27
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
@@ -29,6 +30,9 @@ class AuthBackendClientArgs:
|
|
29
30
|
max_retries: Optional[pulumi.Input[int]] = None,
|
30
31
|
namespace: Optional[pulumi.Input[str]] = None,
|
31
32
|
role_arn: Optional[pulumi.Input[str]] = None,
|
33
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
34
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
35
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
32
36
|
secret_key: Optional[pulumi.Input[str]] = None,
|
33
37
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
34
38
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -39,6 +43,7 @@ class AuthBackendClientArgs:
|
|
39
43
|
auth backend. Mutually exclusive with `identity_token_audience`.
|
40
44
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
41
45
|
mounted at. Defaults to `aws`.
|
46
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
42
47
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
43
48
|
calls.
|
44
49
|
:param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
|
@@ -58,6 +63,13 @@ class AuthBackendClientArgs:
|
|
58
63
|
*Available only for Vault Enterprise*.
|
59
64
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
60
65
|
*Available only for Vault Enterprise*
|
66
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
67
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
68
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
69
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
70
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
71
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
72
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
61
73
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
62
74
|
auth backend.
|
63
75
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -74,6 +86,8 @@ class AuthBackendClientArgs:
|
|
74
86
|
pulumi.set(__self__, "access_key", access_key)
|
75
87
|
if backend is not None:
|
76
88
|
pulumi.set(__self__, "backend", backend)
|
89
|
+
if disable_automated_rotation is not None:
|
90
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
77
91
|
if ec2_endpoint is not None:
|
78
92
|
pulumi.set(__self__, "ec2_endpoint", ec2_endpoint)
|
79
93
|
if iam_endpoint is not None:
|
@@ -90,6 +104,12 @@ class AuthBackendClientArgs:
|
|
90
104
|
pulumi.set(__self__, "namespace", namespace)
|
91
105
|
if role_arn is not None:
|
92
106
|
pulumi.set(__self__, "role_arn", role_arn)
|
107
|
+
if rotation_period is not None:
|
108
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
109
|
+
if rotation_schedule is not None:
|
110
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
111
|
+
if rotation_window is not None:
|
112
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
93
113
|
if secret_key is not None:
|
94
114
|
pulumi.set(__self__, "secret_key", secret_key)
|
95
115
|
if sts_endpoint is not None:
|
@@ -125,6 +145,18 @@ class AuthBackendClientArgs:
|
|
125
145
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
126
146
|
pulumi.set(self, "backend", value)
|
127
147
|
|
148
|
+
@property
|
149
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
150
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
151
|
+
"""
|
152
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
153
|
+
"""
|
154
|
+
return pulumi.get(self, "disable_automated_rotation")
|
155
|
+
|
156
|
+
@disable_automated_rotation.setter
|
157
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
158
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
159
|
+
|
128
160
|
@property
|
129
161
|
@pulumi.getter(name="ec2Endpoint")
|
130
162
|
def ec2_endpoint(self) -> Optional[pulumi.Input[str]]:
|
@@ -232,6 +264,46 @@ class AuthBackendClientArgs:
|
|
232
264
|
def role_arn(self, value: Optional[pulumi.Input[str]]):
|
233
265
|
pulumi.set(self, "role_arn", value)
|
234
266
|
|
267
|
+
@property
|
268
|
+
@pulumi.getter(name="rotationPeriod")
|
269
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
270
|
+
"""
|
271
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
272
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
273
|
+
"""
|
274
|
+
return pulumi.get(self, "rotation_period")
|
275
|
+
|
276
|
+
@rotation_period.setter
|
277
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
278
|
+
pulumi.set(self, "rotation_period", value)
|
279
|
+
|
280
|
+
@property
|
281
|
+
@pulumi.getter(name="rotationSchedule")
|
282
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
283
|
+
"""
|
284
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
285
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
286
|
+
"""
|
287
|
+
return pulumi.get(self, "rotation_schedule")
|
288
|
+
|
289
|
+
@rotation_schedule.setter
|
290
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
291
|
+
pulumi.set(self, "rotation_schedule", value)
|
292
|
+
|
293
|
+
@property
|
294
|
+
@pulumi.getter(name="rotationWindow")
|
295
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
296
|
+
"""
|
297
|
+
The maximum amount of time in seconds allowed to complete
|
298
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
299
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
300
|
+
"""
|
301
|
+
return pulumi.get(self, "rotation_window")
|
302
|
+
|
303
|
+
@rotation_window.setter
|
304
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
305
|
+
pulumi.set(self, "rotation_window", value)
|
306
|
+
|
235
307
|
@property
|
236
308
|
@pulumi.getter(name="secretKey")
|
237
309
|
def secret_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -293,6 +365,7 @@ class _AuthBackendClientState:
|
|
293
365
|
def __init__(__self__, *,
|
294
366
|
access_key: Optional[pulumi.Input[str]] = None,
|
295
367
|
backend: Optional[pulumi.Input[str]] = None,
|
368
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
296
369
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
297
370
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
298
371
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
@@ -301,6 +374,9 @@ class _AuthBackendClientState:
|
|
301
374
|
max_retries: Optional[pulumi.Input[int]] = None,
|
302
375
|
namespace: Optional[pulumi.Input[str]] = None,
|
303
376
|
role_arn: Optional[pulumi.Input[str]] = None,
|
377
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
378
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
379
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
304
380
|
secret_key: Optional[pulumi.Input[str]] = None,
|
305
381
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
306
382
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -311,6 +387,7 @@ class _AuthBackendClientState:
|
|
311
387
|
auth backend. Mutually exclusive with `identity_token_audience`.
|
312
388
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
313
389
|
mounted at. Defaults to `aws`.
|
390
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
314
391
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
315
392
|
calls.
|
316
393
|
:param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
|
@@ -330,6 +407,13 @@ class _AuthBackendClientState:
|
|
330
407
|
*Available only for Vault Enterprise*.
|
331
408
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
332
409
|
*Available only for Vault Enterprise*
|
410
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
411
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
412
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
413
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
414
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
415
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
416
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
333
417
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
334
418
|
auth backend.
|
335
419
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -346,6 +430,8 @@ class _AuthBackendClientState:
|
|
346
430
|
pulumi.set(__self__, "access_key", access_key)
|
347
431
|
if backend is not None:
|
348
432
|
pulumi.set(__self__, "backend", backend)
|
433
|
+
if disable_automated_rotation is not None:
|
434
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
349
435
|
if ec2_endpoint is not None:
|
350
436
|
pulumi.set(__self__, "ec2_endpoint", ec2_endpoint)
|
351
437
|
if iam_endpoint is not None:
|
@@ -362,6 +448,12 @@ class _AuthBackendClientState:
|
|
362
448
|
pulumi.set(__self__, "namespace", namespace)
|
363
449
|
if role_arn is not None:
|
364
450
|
pulumi.set(__self__, "role_arn", role_arn)
|
451
|
+
if rotation_period is not None:
|
452
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
453
|
+
if rotation_schedule is not None:
|
454
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
455
|
+
if rotation_window is not None:
|
456
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
365
457
|
if secret_key is not None:
|
366
458
|
pulumi.set(__self__, "secret_key", secret_key)
|
367
459
|
if sts_endpoint is not None:
|
@@ -397,6 +489,18 @@ class _AuthBackendClientState:
|
|
397
489
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
398
490
|
pulumi.set(self, "backend", value)
|
399
491
|
|
492
|
+
@property
|
493
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
494
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
495
|
+
"""
|
496
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
497
|
+
"""
|
498
|
+
return pulumi.get(self, "disable_automated_rotation")
|
499
|
+
|
500
|
+
@disable_automated_rotation.setter
|
501
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
502
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
503
|
+
|
400
504
|
@property
|
401
505
|
@pulumi.getter(name="ec2Endpoint")
|
402
506
|
def ec2_endpoint(self) -> Optional[pulumi.Input[str]]:
|
@@ -504,6 +608,46 @@ class _AuthBackendClientState:
|
|
504
608
|
def role_arn(self, value: Optional[pulumi.Input[str]]):
|
505
609
|
pulumi.set(self, "role_arn", value)
|
506
610
|
|
611
|
+
@property
|
612
|
+
@pulumi.getter(name="rotationPeriod")
|
613
|
+
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
614
|
+
"""
|
615
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
616
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
617
|
+
"""
|
618
|
+
return pulumi.get(self, "rotation_period")
|
619
|
+
|
620
|
+
@rotation_period.setter
|
621
|
+
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
622
|
+
pulumi.set(self, "rotation_period", value)
|
623
|
+
|
624
|
+
@property
|
625
|
+
@pulumi.getter(name="rotationSchedule")
|
626
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
627
|
+
"""
|
628
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
629
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
630
|
+
"""
|
631
|
+
return pulumi.get(self, "rotation_schedule")
|
632
|
+
|
633
|
+
@rotation_schedule.setter
|
634
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
635
|
+
pulumi.set(self, "rotation_schedule", value)
|
636
|
+
|
637
|
+
@property
|
638
|
+
@pulumi.getter(name="rotationWindow")
|
639
|
+
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
640
|
+
"""
|
641
|
+
The maximum amount of time in seconds allowed to complete
|
642
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
643
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
644
|
+
"""
|
645
|
+
return pulumi.get(self, "rotation_window")
|
646
|
+
|
647
|
+
@rotation_window.setter
|
648
|
+
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
649
|
+
pulumi.set(self, "rotation_window", value)
|
650
|
+
|
507
651
|
@property
|
508
652
|
@pulumi.getter(name="secretKey")
|
509
653
|
def secret_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -567,6 +711,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
567
711
|
opts: Optional[pulumi.ResourceOptions] = None,
|
568
712
|
access_key: Optional[pulumi.Input[str]] = None,
|
569
713
|
backend: Optional[pulumi.Input[str]] = None,
|
714
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
570
715
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
571
716
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
572
717
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
@@ -575,6 +720,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
575
720
|
max_retries: Optional[pulumi.Input[int]] = None,
|
576
721
|
namespace: Optional[pulumi.Input[str]] = None,
|
577
722
|
role_arn: Optional[pulumi.Input[str]] = None,
|
723
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
724
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
725
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
578
726
|
secret_key: Optional[pulumi.Input[str]] = None,
|
579
727
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
580
728
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -592,7 +740,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
592
740
|
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
593
741
|
identity_token_audience="<TOKEN_AUDIENCE>",
|
594
742
|
identity_token_ttl="<TOKEN_TTL>",
|
595
|
-
role_arn="<AWS_ROLE_ARN>"
|
743
|
+
role_arn="<AWS_ROLE_ARN>",
|
744
|
+
rotation_schedule="0 * * * SAT",
|
745
|
+
rotation_window=3600)
|
596
746
|
```
|
597
747
|
|
598
748
|
```python
|
@@ -603,7 +753,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
603
753
|
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
604
754
|
backend=example.path,
|
605
755
|
access_key="INSERT_AWS_ACCESS_KEY",
|
606
|
-
secret_key="INSERT_AWS_SECRET_KEY"
|
756
|
+
secret_key="INSERT_AWS_SECRET_KEY",
|
757
|
+
rotation_schedule="0 * * * SAT",
|
758
|
+
rotation_window=3600)
|
607
759
|
```
|
608
760
|
|
609
761
|
## Import
|
@@ -620,6 +772,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
620
772
|
auth backend. Mutually exclusive with `identity_token_audience`.
|
621
773
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
622
774
|
mounted at. Defaults to `aws`.
|
775
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
623
776
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
624
777
|
calls.
|
625
778
|
:param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
|
@@ -639,6 +792,13 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
639
792
|
*Available only for Vault Enterprise*.
|
640
793
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
641
794
|
*Available only for Vault Enterprise*
|
795
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
796
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
797
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
798
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
799
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
800
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
801
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
642
802
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
643
803
|
auth backend.
|
644
804
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -669,7 +829,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
669
829
|
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
670
830
|
identity_token_audience="<TOKEN_AUDIENCE>",
|
671
831
|
identity_token_ttl="<TOKEN_TTL>",
|
672
|
-
role_arn="<AWS_ROLE_ARN>"
|
832
|
+
role_arn="<AWS_ROLE_ARN>",
|
833
|
+
rotation_schedule="0 * * * SAT",
|
834
|
+
rotation_window=3600)
|
673
835
|
```
|
674
836
|
|
675
837
|
```python
|
@@ -680,7 +842,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
680
842
|
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
681
843
|
backend=example.path,
|
682
844
|
access_key="INSERT_AWS_ACCESS_KEY",
|
683
|
-
secret_key="INSERT_AWS_SECRET_KEY"
|
845
|
+
secret_key="INSERT_AWS_SECRET_KEY",
|
846
|
+
rotation_schedule="0 * * * SAT",
|
847
|
+
rotation_window=3600)
|
684
848
|
```
|
685
849
|
|
686
850
|
## Import
|
@@ -708,6 +872,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
708
872
|
opts: Optional[pulumi.ResourceOptions] = None,
|
709
873
|
access_key: Optional[pulumi.Input[str]] = None,
|
710
874
|
backend: Optional[pulumi.Input[str]] = None,
|
875
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
711
876
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
712
877
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
713
878
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
@@ -716,6 +881,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
716
881
|
max_retries: Optional[pulumi.Input[int]] = None,
|
717
882
|
namespace: Optional[pulumi.Input[str]] = None,
|
718
883
|
role_arn: Optional[pulumi.Input[str]] = None,
|
884
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
885
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
886
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
719
887
|
secret_key: Optional[pulumi.Input[str]] = None,
|
720
888
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
721
889
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -731,6 +899,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
731
899
|
|
732
900
|
__props__.__dict__["access_key"] = None if access_key is None else pulumi.Output.secret(access_key)
|
733
901
|
__props__.__dict__["backend"] = backend
|
902
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
734
903
|
__props__.__dict__["ec2_endpoint"] = ec2_endpoint
|
735
904
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
736
905
|
__props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
|
@@ -739,6 +908,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
739
908
|
__props__.__dict__["max_retries"] = max_retries
|
740
909
|
__props__.__dict__["namespace"] = namespace
|
741
910
|
__props__.__dict__["role_arn"] = role_arn
|
911
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
912
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
913
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
742
914
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
743
915
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
744
916
|
__props__.__dict__["sts_region"] = sts_region
|
@@ -757,6 +929,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
757
929
|
opts: Optional[pulumi.ResourceOptions] = None,
|
758
930
|
access_key: Optional[pulumi.Input[str]] = None,
|
759
931
|
backend: Optional[pulumi.Input[str]] = None,
|
932
|
+
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
760
933
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
761
934
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
762
935
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
@@ -765,6 +938,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
765
938
|
max_retries: Optional[pulumi.Input[int]] = None,
|
766
939
|
namespace: Optional[pulumi.Input[str]] = None,
|
767
940
|
role_arn: Optional[pulumi.Input[str]] = None,
|
941
|
+
rotation_period: Optional[pulumi.Input[int]] = None,
|
942
|
+
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
943
|
+
rotation_window: Optional[pulumi.Input[int]] = None,
|
768
944
|
secret_key: Optional[pulumi.Input[str]] = None,
|
769
945
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
770
946
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -780,6 +956,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
780
956
|
auth backend. Mutually exclusive with `identity_token_audience`.
|
781
957
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
782
958
|
mounted at. Defaults to `aws`.
|
959
|
+
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
783
960
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
784
961
|
calls.
|
785
962
|
:param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
|
@@ -799,6 +976,13 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
799
976
|
*Available only for Vault Enterprise*.
|
800
977
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
801
978
|
*Available only for Vault Enterprise*
|
979
|
+
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
980
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
981
|
+
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
982
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
983
|
+
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
984
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
985
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
802
986
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
803
987
|
auth backend.
|
804
988
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -817,6 +1001,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
817
1001
|
|
818
1002
|
__props__.__dict__["access_key"] = access_key
|
819
1003
|
__props__.__dict__["backend"] = backend
|
1004
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
820
1005
|
__props__.__dict__["ec2_endpoint"] = ec2_endpoint
|
821
1006
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
822
1007
|
__props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
|
@@ -825,6 +1010,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
825
1010
|
__props__.__dict__["max_retries"] = max_retries
|
826
1011
|
__props__.__dict__["namespace"] = namespace
|
827
1012
|
__props__.__dict__["role_arn"] = role_arn
|
1013
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
1014
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
1015
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
828
1016
|
__props__.__dict__["secret_key"] = secret_key
|
829
1017
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
830
1018
|
__props__.__dict__["sts_region"] = sts_region
|
@@ -849,6 +1037,14 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
849
1037
|
"""
|
850
1038
|
return pulumi.get(self, "backend")
|
851
1039
|
|
1040
|
+
@property
|
1041
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
1042
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
|
1043
|
+
"""
|
1044
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1045
|
+
"""
|
1046
|
+
return pulumi.get(self, "disable_automated_rotation")
|
1047
|
+
|
852
1048
|
@property
|
853
1049
|
@pulumi.getter(name="ec2Endpoint")
|
854
1050
|
def ec2_endpoint(self) -> pulumi.Output[Optional[str]]:
|
@@ -924,6 +1120,34 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
924
1120
|
"""
|
925
1121
|
return pulumi.get(self, "role_arn")
|
926
1122
|
|
1123
|
+
@property
|
1124
|
+
@pulumi.getter(name="rotationPeriod")
|
1125
|
+
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
1126
|
+
"""
|
1127
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
1128
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1129
|
+
"""
|
1130
|
+
return pulumi.get(self, "rotation_period")
|
1131
|
+
|
1132
|
+
@property
|
1133
|
+
@pulumi.getter(name="rotationSchedule")
|
1134
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
1135
|
+
"""
|
1136
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1137
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1138
|
+
"""
|
1139
|
+
return pulumi.get(self, "rotation_schedule")
|
1140
|
+
|
1141
|
+
@property
|
1142
|
+
@pulumi.getter(name="rotationWindow")
|
1143
|
+
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
1144
|
+
"""
|
1145
|
+
The maximum amount of time in seconds allowed to complete
|
1146
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1147
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1148
|
+
"""
|
1149
|
+
return pulumi.get(self, "rotation_window")
|
1150
|
+
|
927
1151
|
@property
|
928
1152
|
@pulumi.getter(name="secretKey")
|
929
1153
|
def secret_key(self) -> pulumi.Output[Optional[str]]:
|