pulumi-vault 6.6.0a1741415971__tar.gz → 6.6.0a1741836364__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (270) hide show
  1. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/PKG-INFO +1 -1
  2. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/__init__.py +8 -0
  3. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_client.py +228 -4
  4. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend.py +266 -50
  5. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend_static_role.py +217 -0
  6. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/auth_backend_config.py +257 -5
  7. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/backend.py +249 -4
  8. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/_inputs.py +1692 -36
  9. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/outputs.py +1170 -18
  10. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_connection.py +220 -0
  11. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_static_role.py +143 -1
  12. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secrets_mount.py +8 -0
  13. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/auth_backend.py +222 -2
  14. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_backend.py +244 -4
  15. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend.py +222 -2
  16. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend.py +222 -2
  17. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/__init__.py +2 -0
  18. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/_inputs.py +0 -6
  19. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_acme.py +47 -0
  20. pulumi_vault-6.6.0a1741836364/pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
  21. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_cmpv2.py +61 -14
  22. pulumi_vault-6.6.0a1741836364/pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  23. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +18 -1
  24. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
  25. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/outputs.py +0 -4
  26. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
  27. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
  28. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
  29. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
  30. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_role.py +252 -3
  31. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
  32. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
  33. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
  34. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pulumi-plugin.json +1 -1
  35. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/__init__.py +1 -0
  36. pulumi_vault-6.6.0a1741836364/pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  37. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_role.py +7 -7
  38. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/__init__.py +2 -0
  39. pulumi_vault-6.6.0a1741836364/pulumi_vault/transit/get_sign.py +324 -0
  40. pulumi_vault-6.6.0a1741836364/pulumi_vault/transit/get_verify.py +354 -0
  41. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/secret_backend_key.py +162 -0
  42. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/PKG-INFO +1 -1
  43. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/SOURCES.txt +5 -0
  44. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pyproject.toml +1 -1
  45. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/README.md +0 -0
  46. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/_inputs.py +0 -0
  47. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/_utilities.py +0 -0
  48. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/__init__.py +0 -0
  49. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/get_access_credentials.py +0 -0
  50. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_backend.py +0 -0
  51. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_library.py +0 -0
  52. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ad/secret_role.py +0 -0
  53. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/alicloud/__init__.py +0 -0
  54. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
  55. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/__init__.py +0 -0
  56. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_login.py +0 -0
  57. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_role.py +0 -0
  58. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
  59. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
  60. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/audit.py +0 -0
  61. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/audit_request_header.py +0 -0
  62. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/auth_backend.py +0 -0
  63. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/__init__.py +0 -0
  64. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_cert.py +0 -0
  65. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
  66. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
  67. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_login.py +0 -0
  68. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_role.py +0 -0
  69. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
  70. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
  71. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
  72. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/get_access_credentials.py +0 -0
  73. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
  74. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/aws/secret_backend_role.py +0 -0
  75. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/__init__.py +0 -0
  76. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/_inputs.py +0 -0
  77. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/auth_backend_role.py +0 -0
  78. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/backend_role.py +0 -0
  79. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/get_access_credentials.py +0 -0
  80. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/azure/outputs.py +0 -0
  81. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/cert_auth_backend_role.py +0 -0
  82. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/__init__.py +0 -0
  83. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/__init__.pyi +0 -0
  84. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/_inputs.py +0 -0
  85. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/outputs.py +0 -0
  86. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/ui_custom_message.py +0 -0
  87. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/config/vars.py +0 -0
  88. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/__init__.py +0 -0
  89. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/secret_backend.py +0 -0
  90. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/consul/secret_backend_role.py +0 -0
  91. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/__init__.py +0 -0
  92. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/database/secret_backend_role.py +0 -0
  93. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/egp_policy.py +0 -0
  94. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/__init__.py +0 -0
  95. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/_inputs.py +0 -0
  96. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/auth_backend_role.py +0 -0
  97. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
  98. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/outputs.py +0 -0
  99. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
  100. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_roleset.py +0 -0
  101. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/gcp/secret_static_account.py +0 -0
  102. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/__init__.py +0 -0
  103. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/endpoint.py +0 -0
  104. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/get_secret.py +0 -0
  105. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/generic/secret.py +0 -0
  106. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_auth_backend.py +0 -0
  107. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_auth_backends.py +0 -0
  108. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_namespace.py +0 -0
  109. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_namespaces.py +0 -0
  110. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_nomad_access_token.py +0 -0
  111. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_policy_document.py +0 -0
  112. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/get_raft_autopilot_state.py +0 -0
  113. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/__init__.py +0 -0
  114. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/_inputs.py +0 -0
  115. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/auth_backend.py +0 -0
  116. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/outputs.py +0 -0
  117. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/team.py +0 -0
  118. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/github/user.py +0 -0
  119. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/__init__.py +0 -0
  120. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity.py +0 -0
  121. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity_alias.py +0 -0
  122. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/entity_policies.py +0 -0
  123. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_entity.py +0 -0
  124. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_group.py +0 -0
  125. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
  126. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
  127. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
  128. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group.py +0 -0
  129. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_alias.py +0 -0
  130. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
  131. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_member_group_ids.py +0 -0
  132. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/group_policies.py +0 -0
  133. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_duo.py +0 -0
  134. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
  135. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_okta.py +0 -0
  136. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_pingid.py +0 -0
  137. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/mfa_totp.py +0 -0
  138. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc.py +0 -0
  139. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_assignment.py +0 -0
  140. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_client.py +0 -0
  141. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_key.py +0 -0
  142. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
  143. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_provider.py +0 -0
  144. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_role.py +0 -0
  145. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/oidc_scope.py +0 -0
  146. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/identity/outputs.py +0 -0
  147. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/__init__.py +0 -0
  148. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/_inputs.py +0 -0
  149. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/auth_backend.py +0 -0
  150. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/auth_backend_role.py +0 -0
  151. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/jwt/outputs.py +0 -0
  152. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/__init__.py +0 -0
  153. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_backend.py +0 -0
  154. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_role.py +0 -0
  155. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kmip/secret_scope.py +0 -0
  156. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/__init__.py +0 -0
  157. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
  158. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
  159. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
  160. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
  161. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
  162. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/secret_backend.py +0 -0
  163. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
  164. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/__init__.py +0 -0
  165. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/_inputs.py +0 -0
  166. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret.py +0 -0
  167. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
  168. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secret_v2.py +0 -0
  169. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secrets_list.py +0 -0
  170. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
  171. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/outputs.py +0 -0
  172. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret.py +0 -0
  173. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret_backend_v2.py +0 -0
  174. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/kv/secret_v2.py +0 -0
  175. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/__init__.py +0 -0
  176. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend_group.py +0 -0
  177. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/auth_backend_user.py +0 -0
  178. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
  179. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/get_static_credentials.py +0 -0
  180. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
  181. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
  182. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
  183. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/__init__.py +0 -0
  184. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/_inputs.py +0 -0
  185. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/keys.py +0 -0
  186. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/managed/outputs.py +0 -0
  187. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_duo.py +0 -0
  188. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_okta.py +0 -0
  189. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_pingid.py +0 -0
  190. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mfa_totp.py +0 -0
  191. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/__init__.py +0 -0
  192. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
  193. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
  194. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/mount.py +0 -0
  195. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/namespace.py +0 -0
  196. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/nomad_secret_backend.py +0 -0
  197. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/nomad_secret_role.py +0 -0
  198. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/__init__.py +0 -0
  199. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/_inputs.py +0 -0
  200. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend.py +0 -0
  201. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend_group.py +0 -0
  202. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/auth_backend_user.py +0 -0
  203. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/okta/outputs.py +0 -0
  204. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/outputs.py +0 -0
  205. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/password_policy.py +0 -0
  206. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
  207. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
  208. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
  209. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
  210. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
  211. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
  212. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
  213. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
  214. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
  215. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
  216. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
  217. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
  218. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/plugin.py +0 -0
  219. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/plugin_pinned_version.py +0 -0
  220. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/policy.py +0 -0
  221. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/provider.py +0 -0
  222. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/py.typed +0 -0
  223. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/quota_lease_count.py +0 -0
  224. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/quota_rate_limit.py +0 -0
  225. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/__init__.py +0 -0
  226. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/_inputs.py +0 -0
  227. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/outputs.py +0 -0
  228. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
  229. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
  230. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/raft_autopilot.py +0 -0
  231. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
  232. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/rgp_policy.py +0 -0
  233. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/__init__.py +0 -0
  234. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/auth_backend.py +0 -0
  235. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/saml/auth_backend_role.py +0 -0
  236. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/__init__.py +0 -0
  237. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/_inputs.py +0 -0
  238. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/outputs.py +0 -0
  239. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_association.py +0 -0
  240. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
  241. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
  242. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_config.py +0 -0
  243. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
  244. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
  245. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_github_apps.py +0 -0
  246. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
  247. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/_inputs.py +0 -0
  248. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/outputs.py +0 -0
  249. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
  250. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/ssh/secret_backend_role.py +0 -0
  251. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/__init__.py +0 -0
  252. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
  253. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
  254. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/token.py +0 -0
  255. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/tokenauth/__init__.py +0 -0
  256. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
  257. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/__init__.py +0 -0
  258. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/alphabet.py +0 -0
  259. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/get_decode.py +0 -0
  260. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/get_encode.py +0 -0
  261. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/role.py +0 -0
  262. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/template.py +0 -0
  263. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transform/transformation.py +0 -0
  264. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/get_decrypt.py +0 -0
  265. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/get_encrypt.py +0 -0
  266. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault/transit/secret_cache_config.py +0 -0
  267. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/dependency_links.txt +0 -0
  268. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/requires.txt +0 -0
  269. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/pulumi_vault.egg-info/top_level.txt +0 -0
  270. {pulumi_vault-6.6.0a1741415971 → pulumi_vault-6.6.0a1741836364}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.2
2
2
  Name: pulumi_vault
3
- Version: 6.6.0a1741415971
3
+ Version: 6.6.0a1741836364
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1029,6 +1029,14 @@ _utilities.register(
1029
1029
  "vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
1030
1030
  }
1031
1031
  },
1032
+ {
1033
+ "pkg": "vault",
1034
+ "mod": "pkiSecret/backendConfigAutoTidy",
1035
+ "fqn": "pulumi_vault.pkisecret",
1036
+ "classes": {
1037
+ "vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy": "BackendConfigAutoTidy"
1038
+ }
1039
+ },
1032
1040
  {
1033
1041
  "pkg": "vault",
1034
1042
  "mod": "pkiSecret/backendConfigCluster",
@@ -21,6 +21,7 @@ class AuthBackendClientArgs:
21
21
  def __init__(__self__, *,
22
22
  access_key: Optional[pulumi.Input[str]] = None,
23
23
  backend: Optional[pulumi.Input[str]] = None,
24
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
24
25
  ec2_endpoint: Optional[pulumi.Input[str]] = None,
25
26
  iam_endpoint: Optional[pulumi.Input[str]] = None,
26
27
  iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
@@ -29,6 +30,9 @@ class AuthBackendClientArgs:
29
30
  max_retries: Optional[pulumi.Input[int]] = None,
30
31
  namespace: Optional[pulumi.Input[str]] = None,
31
32
  role_arn: Optional[pulumi.Input[str]] = None,
33
+ rotation_period: Optional[pulumi.Input[int]] = None,
34
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
35
+ rotation_window: Optional[pulumi.Input[int]] = None,
32
36
  secret_key: Optional[pulumi.Input[str]] = None,
33
37
  sts_endpoint: Optional[pulumi.Input[str]] = None,
34
38
  sts_region: Optional[pulumi.Input[str]] = None,
@@ -39,6 +43,7 @@ class AuthBackendClientArgs:
39
43
  auth backend. Mutually exclusive with `identity_token_audience`.
40
44
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
41
45
  mounted at. Defaults to `aws`.
46
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
42
47
  :param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
43
48
  calls.
44
49
  :param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
@@ -58,6 +63,13 @@ class AuthBackendClientArgs:
58
63
  *Available only for Vault Enterprise*.
59
64
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
60
65
  *Available only for Vault Enterprise*
66
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
67
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
68
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
69
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
70
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
71
+ a rotation when a scheduled token rotation occurs. The default rotation window is
72
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
61
73
  :param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
62
74
  auth backend.
63
75
  :param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
@@ -74,6 +86,8 @@ class AuthBackendClientArgs:
74
86
  pulumi.set(__self__, "access_key", access_key)
75
87
  if backend is not None:
76
88
  pulumi.set(__self__, "backend", backend)
89
+ if disable_automated_rotation is not None:
90
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
77
91
  if ec2_endpoint is not None:
78
92
  pulumi.set(__self__, "ec2_endpoint", ec2_endpoint)
79
93
  if iam_endpoint is not None:
@@ -90,6 +104,12 @@ class AuthBackendClientArgs:
90
104
  pulumi.set(__self__, "namespace", namespace)
91
105
  if role_arn is not None:
92
106
  pulumi.set(__self__, "role_arn", role_arn)
107
+ if rotation_period is not None:
108
+ pulumi.set(__self__, "rotation_period", rotation_period)
109
+ if rotation_schedule is not None:
110
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
111
+ if rotation_window is not None:
112
+ pulumi.set(__self__, "rotation_window", rotation_window)
93
113
  if secret_key is not None:
94
114
  pulumi.set(__self__, "secret_key", secret_key)
95
115
  if sts_endpoint is not None:
@@ -125,6 +145,18 @@ class AuthBackendClientArgs:
125
145
  def backend(self, value: Optional[pulumi.Input[str]]):
126
146
  pulumi.set(self, "backend", value)
127
147
 
148
+ @property
149
+ @pulumi.getter(name="disableAutomatedRotation")
150
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
151
+ """
152
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
153
+ """
154
+ return pulumi.get(self, "disable_automated_rotation")
155
+
156
+ @disable_automated_rotation.setter
157
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
158
+ pulumi.set(self, "disable_automated_rotation", value)
159
+
128
160
  @property
129
161
  @pulumi.getter(name="ec2Endpoint")
130
162
  def ec2_endpoint(self) -> Optional[pulumi.Input[str]]:
@@ -232,6 +264,46 @@ class AuthBackendClientArgs:
232
264
  def role_arn(self, value: Optional[pulumi.Input[str]]):
233
265
  pulumi.set(self, "role_arn", value)
234
266
 
267
+ @property
268
+ @pulumi.getter(name="rotationPeriod")
269
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
270
+ """
271
+ The amount of time in seconds Vault should wait before rotating the root credential.
272
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
273
+ """
274
+ return pulumi.get(self, "rotation_period")
275
+
276
+ @rotation_period.setter
277
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
278
+ pulumi.set(self, "rotation_period", value)
279
+
280
+ @property
281
+ @pulumi.getter(name="rotationSchedule")
282
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
283
+ """
284
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
285
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
286
+ """
287
+ return pulumi.get(self, "rotation_schedule")
288
+
289
+ @rotation_schedule.setter
290
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
291
+ pulumi.set(self, "rotation_schedule", value)
292
+
293
+ @property
294
+ @pulumi.getter(name="rotationWindow")
295
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
296
+ """
297
+ The maximum amount of time in seconds allowed to complete
298
+ a rotation when a scheduled token rotation occurs. The default rotation window is
299
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
300
+ """
301
+ return pulumi.get(self, "rotation_window")
302
+
303
+ @rotation_window.setter
304
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
305
+ pulumi.set(self, "rotation_window", value)
306
+
235
307
  @property
236
308
  @pulumi.getter(name="secretKey")
237
309
  def secret_key(self) -> Optional[pulumi.Input[str]]:
@@ -293,6 +365,7 @@ class _AuthBackendClientState:
293
365
  def __init__(__self__, *,
294
366
  access_key: Optional[pulumi.Input[str]] = None,
295
367
  backend: Optional[pulumi.Input[str]] = None,
368
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
296
369
  ec2_endpoint: Optional[pulumi.Input[str]] = None,
297
370
  iam_endpoint: Optional[pulumi.Input[str]] = None,
298
371
  iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
@@ -301,6 +374,9 @@ class _AuthBackendClientState:
301
374
  max_retries: Optional[pulumi.Input[int]] = None,
302
375
  namespace: Optional[pulumi.Input[str]] = None,
303
376
  role_arn: Optional[pulumi.Input[str]] = None,
377
+ rotation_period: Optional[pulumi.Input[int]] = None,
378
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
379
+ rotation_window: Optional[pulumi.Input[int]] = None,
304
380
  secret_key: Optional[pulumi.Input[str]] = None,
305
381
  sts_endpoint: Optional[pulumi.Input[str]] = None,
306
382
  sts_region: Optional[pulumi.Input[str]] = None,
@@ -311,6 +387,7 @@ class _AuthBackendClientState:
311
387
  auth backend. Mutually exclusive with `identity_token_audience`.
312
388
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
313
389
  mounted at. Defaults to `aws`.
390
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
314
391
  :param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
315
392
  calls.
316
393
  :param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
@@ -330,6 +407,13 @@ class _AuthBackendClientState:
330
407
  *Available only for Vault Enterprise*.
331
408
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
332
409
  *Available only for Vault Enterprise*
410
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
411
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
412
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
413
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
414
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
415
+ a rotation when a scheduled token rotation occurs. The default rotation window is
416
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
333
417
  :param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
334
418
  auth backend.
335
419
  :param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
@@ -346,6 +430,8 @@ class _AuthBackendClientState:
346
430
  pulumi.set(__self__, "access_key", access_key)
347
431
  if backend is not None:
348
432
  pulumi.set(__self__, "backend", backend)
433
+ if disable_automated_rotation is not None:
434
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
349
435
  if ec2_endpoint is not None:
350
436
  pulumi.set(__self__, "ec2_endpoint", ec2_endpoint)
351
437
  if iam_endpoint is not None:
@@ -362,6 +448,12 @@ class _AuthBackendClientState:
362
448
  pulumi.set(__self__, "namespace", namespace)
363
449
  if role_arn is not None:
364
450
  pulumi.set(__self__, "role_arn", role_arn)
451
+ if rotation_period is not None:
452
+ pulumi.set(__self__, "rotation_period", rotation_period)
453
+ if rotation_schedule is not None:
454
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
455
+ if rotation_window is not None:
456
+ pulumi.set(__self__, "rotation_window", rotation_window)
365
457
  if secret_key is not None:
366
458
  pulumi.set(__self__, "secret_key", secret_key)
367
459
  if sts_endpoint is not None:
@@ -397,6 +489,18 @@ class _AuthBackendClientState:
397
489
  def backend(self, value: Optional[pulumi.Input[str]]):
398
490
  pulumi.set(self, "backend", value)
399
491
 
492
+ @property
493
+ @pulumi.getter(name="disableAutomatedRotation")
494
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
495
+ """
496
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
497
+ """
498
+ return pulumi.get(self, "disable_automated_rotation")
499
+
500
+ @disable_automated_rotation.setter
501
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
502
+ pulumi.set(self, "disable_automated_rotation", value)
503
+
400
504
  @property
401
505
  @pulumi.getter(name="ec2Endpoint")
402
506
  def ec2_endpoint(self) -> Optional[pulumi.Input[str]]:
@@ -504,6 +608,46 @@ class _AuthBackendClientState:
504
608
  def role_arn(self, value: Optional[pulumi.Input[str]]):
505
609
  pulumi.set(self, "role_arn", value)
506
610
 
611
+ @property
612
+ @pulumi.getter(name="rotationPeriod")
613
+ def rotation_period(self) -> Optional[pulumi.Input[int]]:
614
+ """
615
+ The amount of time in seconds Vault should wait before rotating the root credential.
616
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
617
+ """
618
+ return pulumi.get(self, "rotation_period")
619
+
620
+ @rotation_period.setter
621
+ def rotation_period(self, value: Optional[pulumi.Input[int]]):
622
+ pulumi.set(self, "rotation_period", value)
623
+
624
+ @property
625
+ @pulumi.getter(name="rotationSchedule")
626
+ def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
627
+ """
628
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
629
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
630
+ """
631
+ return pulumi.get(self, "rotation_schedule")
632
+
633
+ @rotation_schedule.setter
634
+ def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
635
+ pulumi.set(self, "rotation_schedule", value)
636
+
637
+ @property
638
+ @pulumi.getter(name="rotationWindow")
639
+ def rotation_window(self) -> Optional[pulumi.Input[int]]:
640
+ """
641
+ The maximum amount of time in seconds allowed to complete
642
+ a rotation when a scheduled token rotation occurs. The default rotation window is
643
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
644
+ """
645
+ return pulumi.get(self, "rotation_window")
646
+
647
+ @rotation_window.setter
648
+ def rotation_window(self, value: Optional[pulumi.Input[int]]):
649
+ pulumi.set(self, "rotation_window", value)
650
+
507
651
  @property
508
652
  @pulumi.getter(name="secretKey")
509
653
  def secret_key(self) -> Optional[pulumi.Input[str]]:
@@ -567,6 +711,7 @@ class AuthBackendClient(pulumi.CustomResource):
567
711
  opts: Optional[pulumi.ResourceOptions] = None,
568
712
  access_key: Optional[pulumi.Input[str]] = None,
569
713
  backend: Optional[pulumi.Input[str]] = None,
714
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
570
715
  ec2_endpoint: Optional[pulumi.Input[str]] = None,
571
716
  iam_endpoint: Optional[pulumi.Input[str]] = None,
572
717
  iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
@@ -575,6 +720,9 @@ class AuthBackendClient(pulumi.CustomResource):
575
720
  max_retries: Optional[pulumi.Input[int]] = None,
576
721
  namespace: Optional[pulumi.Input[str]] = None,
577
722
  role_arn: Optional[pulumi.Input[str]] = None,
723
+ rotation_period: Optional[pulumi.Input[int]] = None,
724
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
725
+ rotation_window: Optional[pulumi.Input[int]] = None,
578
726
  secret_key: Optional[pulumi.Input[str]] = None,
579
727
  sts_endpoint: Optional[pulumi.Input[str]] = None,
580
728
  sts_region: Optional[pulumi.Input[str]] = None,
@@ -592,7 +740,9 @@ class AuthBackendClient(pulumi.CustomResource):
592
740
  example_auth_backend_client = vault.aws.AuthBackendClient("example",
593
741
  identity_token_audience="<TOKEN_AUDIENCE>",
594
742
  identity_token_ttl="<TOKEN_TTL>",
595
- role_arn="<AWS_ROLE_ARN>")
743
+ role_arn="<AWS_ROLE_ARN>",
744
+ rotation_schedule="0 * * * SAT",
745
+ rotation_window=3600)
596
746
  ```
597
747
 
598
748
  ```python
@@ -603,7 +753,9 @@ class AuthBackendClient(pulumi.CustomResource):
603
753
  example_auth_backend_client = vault.aws.AuthBackendClient("example",
604
754
  backend=example.path,
605
755
  access_key="INSERT_AWS_ACCESS_KEY",
606
- secret_key="INSERT_AWS_SECRET_KEY")
756
+ secret_key="INSERT_AWS_SECRET_KEY",
757
+ rotation_schedule="0 * * * SAT",
758
+ rotation_window=3600)
607
759
  ```
608
760
 
609
761
  ## Import
@@ -620,6 +772,7 @@ class AuthBackendClient(pulumi.CustomResource):
620
772
  auth backend. Mutually exclusive with `identity_token_audience`.
621
773
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
622
774
  mounted at. Defaults to `aws`.
775
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
623
776
  :param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
624
777
  calls.
625
778
  :param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
@@ -639,6 +792,13 @@ class AuthBackendClient(pulumi.CustomResource):
639
792
  *Available only for Vault Enterprise*.
640
793
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
641
794
  *Available only for Vault Enterprise*
795
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
796
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
797
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
798
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
799
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
800
+ a rotation when a scheduled token rotation occurs. The default rotation window is
801
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
642
802
  :param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
643
803
  auth backend.
644
804
  :param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
@@ -669,7 +829,9 @@ class AuthBackendClient(pulumi.CustomResource):
669
829
  example_auth_backend_client = vault.aws.AuthBackendClient("example",
670
830
  identity_token_audience="<TOKEN_AUDIENCE>",
671
831
  identity_token_ttl="<TOKEN_TTL>",
672
- role_arn="<AWS_ROLE_ARN>")
832
+ role_arn="<AWS_ROLE_ARN>",
833
+ rotation_schedule="0 * * * SAT",
834
+ rotation_window=3600)
673
835
  ```
674
836
 
675
837
  ```python
@@ -680,7 +842,9 @@ class AuthBackendClient(pulumi.CustomResource):
680
842
  example_auth_backend_client = vault.aws.AuthBackendClient("example",
681
843
  backend=example.path,
682
844
  access_key="INSERT_AWS_ACCESS_KEY",
683
- secret_key="INSERT_AWS_SECRET_KEY")
845
+ secret_key="INSERT_AWS_SECRET_KEY",
846
+ rotation_schedule="0 * * * SAT",
847
+ rotation_window=3600)
684
848
  ```
685
849
 
686
850
  ## Import
@@ -708,6 +872,7 @@ class AuthBackendClient(pulumi.CustomResource):
708
872
  opts: Optional[pulumi.ResourceOptions] = None,
709
873
  access_key: Optional[pulumi.Input[str]] = None,
710
874
  backend: Optional[pulumi.Input[str]] = None,
875
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
711
876
  ec2_endpoint: Optional[pulumi.Input[str]] = None,
712
877
  iam_endpoint: Optional[pulumi.Input[str]] = None,
713
878
  iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
@@ -716,6 +881,9 @@ class AuthBackendClient(pulumi.CustomResource):
716
881
  max_retries: Optional[pulumi.Input[int]] = None,
717
882
  namespace: Optional[pulumi.Input[str]] = None,
718
883
  role_arn: Optional[pulumi.Input[str]] = None,
884
+ rotation_period: Optional[pulumi.Input[int]] = None,
885
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
886
+ rotation_window: Optional[pulumi.Input[int]] = None,
719
887
  secret_key: Optional[pulumi.Input[str]] = None,
720
888
  sts_endpoint: Optional[pulumi.Input[str]] = None,
721
889
  sts_region: Optional[pulumi.Input[str]] = None,
@@ -731,6 +899,7 @@ class AuthBackendClient(pulumi.CustomResource):
731
899
 
732
900
  __props__.__dict__["access_key"] = None if access_key is None else pulumi.Output.secret(access_key)
733
901
  __props__.__dict__["backend"] = backend
902
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
734
903
  __props__.__dict__["ec2_endpoint"] = ec2_endpoint
735
904
  __props__.__dict__["iam_endpoint"] = iam_endpoint
736
905
  __props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
@@ -739,6 +908,9 @@ class AuthBackendClient(pulumi.CustomResource):
739
908
  __props__.__dict__["max_retries"] = max_retries
740
909
  __props__.__dict__["namespace"] = namespace
741
910
  __props__.__dict__["role_arn"] = role_arn
911
+ __props__.__dict__["rotation_period"] = rotation_period
912
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
913
+ __props__.__dict__["rotation_window"] = rotation_window
742
914
  __props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
743
915
  __props__.__dict__["sts_endpoint"] = sts_endpoint
744
916
  __props__.__dict__["sts_region"] = sts_region
@@ -757,6 +929,7 @@ class AuthBackendClient(pulumi.CustomResource):
757
929
  opts: Optional[pulumi.ResourceOptions] = None,
758
930
  access_key: Optional[pulumi.Input[str]] = None,
759
931
  backend: Optional[pulumi.Input[str]] = None,
932
+ disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
760
933
  ec2_endpoint: Optional[pulumi.Input[str]] = None,
761
934
  iam_endpoint: Optional[pulumi.Input[str]] = None,
762
935
  iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
@@ -765,6 +938,9 @@ class AuthBackendClient(pulumi.CustomResource):
765
938
  max_retries: Optional[pulumi.Input[int]] = None,
766
939
  namespace: Optional[pulumi.Input[str]] = None,
767
940
  role_arn: Optional[pulumi.Input[str]] = None,
941
+ rotation_period: Optional[pulumi.Input[int]] = None,
942
+ rotation_schedule: Optional[pulumi.Input[str]] = None,
943
+ rotation_window: Optional[pulumi.Input[int]] = None,
768
944
  secret_key: Optional[pulumi.Input[str]] = None,
769
945
  sts_endpoint: Optional[pulumi.Input[str]] = None,
770
946
  sts_region: Optional[pulumi.Input[str]] = None,
@@ -780,6 +956,7 @@ class AuthBackendClient(pulumi.CustomResource):
780
956
  auth backend. Mutually exclusive with `identity_token_audience`.
781
957
  :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
782
958
  mounted at. Defaults to `aws`.
959
+ :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
783
960
  :param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
784
961
  calls.
785
962
  :param pulumi.Input[str] iam_endpoint: Override the URL Vault uses when making IAM API
@@ -799,6 +976,13 @@ class AuthBackendClient(pulumi.CustomResource):
799
976
  *Available only for Vault Enterprise*.
800
977
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
801
978
  *Available only for Vault Enterprise*
979
+ :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
980
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
981
+ :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
982
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
983
+ :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
984
+ a rotation when a scheduled token rotation occurs. The default rotation window is
985
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
802
986
  :param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
803
987
  auth backend.
804
988
  :param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
@@ -817,6 +1001,7 @@ class AuthBackendClient(pulumi.CustomResource):
817
1001
 
818
1002
  __props__.__dict__["access_key"] = access_key
819
1003
  __props__.__dict__["backend"] = backend
1004
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
820
1005
  __props__.__dict__["ec2_endpoint"] = ec2_endpoint
821
1006
  __props__.__dict__["iam_endpoint"] = iam_endpoint
822
1007
  __props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
@@ -825,6 +1010,9 @@ class AuthBackendClient(pulumi.CustomResource):
825
1010
  __props__.__dict__["max_retries"] = max_retries
826
1011
  __props__.__dict__["namespace"] = namespace
827
1012
  __props__.__dict__["role_arn"] = role_arn
1013
+ __props__.__dict__["rotation_period"] = rotation_period
1014
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1015
+ __props__.__dict__["rotation_window"] = rotation_window
828
1016
  __props__.__dict__["secret_key"] = secret_key
829
1017
  __props__.__dict__["sts_endpoint"] = sts_endpoint
830
1018
  __props__.__dict__["sts_region"] = sts_region
@@ -849,6 +1037,14 @@ class AuthBackendClient(pulumi.CustomResource):
849
1037
  """
850
1038
  return pulumi.get(self, "backend")
851
1039
 
1040
+ @property
1041
+ @pulumi.getter(name="disableAutomatedRotation")
1042
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
1043
+ """
1044
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1045
+ """
1046
+ return pulumi.get(self, "disable_automated_rotation")
1047
+
852
1048
  @property
853
1049
  @pulumi.getter(name="ec2Endpoint")
854
1050
  def ec2_endpoint(self) -> pulumi.Output[Optional[str]]:
@@ -924,6 +1120,34 @@ class AuthBackendClient(pulumi.CustomResource):
924
1120
  """
925
1121
  return pulumi.get(self, "role_arn")
926
1122
 
1123
+ @property
1124
+ @pulumi.getter(name="rotationPeriod")
1125
+ def rotation_period(self) -> pulumi.Output[Optional[int]]:
1126
+ """
1127
+ The amount of time in seconds Vault should wait before rotating the root credential.
1128
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1129
+ """
1130
+ return pulumi.get(self, "rotation_period")
1131
+
1132
+ @property
1133
+ @pulumi.getter(name="rotationSchedule")
1134
+ def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
1135
+ """
1136
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1137
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1138
+ """
1139
+ return pulumi.get(self, "rotation_schedule")
1140
+
1141
+ @property
1142
+ @pulumi.getter(name="rotationWindow")
1143
+ def rotation_window(self) -> pulumi.Output[Optional[int]]:
1144
+ """
1145
+ The maximum amount of time in seconds allowed to complete
1146
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1147
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1148
+ """
1149
+ return pulumi.get(self, "rotation_window")
1150
+
927
1151
  @property
928
1152
  @pulumi.getter(name="secretKey")
929
1153
  def secret_key(self) -> pulumi.Output[Optional[str]]: