pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,50 +20,50 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendConfigArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
resource: pulumi.Input[str],
|
23
|
-
tenant_id: pulumi.Input[str],
|
24
|
-
backend: Optional[pulumi.Input[str]] = None,
|
25
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
26
|
-
client_secret: Optional[pulumi.Input[str]] = None,
|
27
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
28
|
-
environment: Optional[pulumi.Input[str]] = None,
|
29
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
30
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
31
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
33
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
34
|
-
rotation_window: Optional[pulumi.Input[int]] = None):
|
23
|
+
resource: pulumi.Input[builtins.str],
|
24
|
+
tenant_id: pulumi.Input[builtins.str],
|
25
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
client_secret: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
29
|
+
environment: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
33
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
34
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
35
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None):
|
35
36
|
"""
|
36
37
|
The set of arguments for constructing a AuthBackendConfig resource.
|
37
|
-
:param pulumi.Input[str] resource: The configured URL for the application registered in
|
38
|
+
:param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
|
38
39
|
Azure Active Directory.
|
39
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
|
40
|
+
:param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
40
41
|
organization.
|
41
|
-
:param pulumi.Input[str] backend: The path the Azure auth backend being configured was
|
42
|
+
:param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
|
42
43
|
mounted at. Defaults to `azure`.
|
43
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
|
44
|
+
:param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
44
45
|
Currently read permissions to query compute resources are required.
|
45
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the
|
46
|
+
:param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
|
46
47
|
Azure APIs.
|
47
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
48
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
48
49
|
*Available only for Vault Enterprise*
|
49
|
-
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
50
|
+
:param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
|
50
51
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
51
52
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
52
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
53
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
53
54
|
*Available only for Vault Enterprise*
|
54
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
55
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
55
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
56
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
56
57
|
The value should not contain leading or trailing forward slashes.
|
57
58
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
58
59
|
*Available only for Vault Enterprise*.
|
59
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
60
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
60
61
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
61
62
|
*Available only for Vault Enterprise*
|
62
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
63
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
63
64
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
64
65
|
*Available only for Vault Enterprise*
|
65
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
66
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
66
67
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
67
68
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
68
69
|
*Available only for Vault Enterprise*
|
@@ -94,7 +95,7 @@ class AuthBackendConfigArgs:
|
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter
|
97
|
-
def resource(self) -> pulumi.Input[str]:
|
98
|
+
def resource(self) -> pulumi.Input[builtins.str]:
|
98
99
|
"""
|
99
100
|
The configured URL for the application registered in
|
100
101
|
Azure Active Directory.
|
@@ -102,12 +103,12 @@ class AuthBackendConfigArgs:
|
|
102
103
|
return pulumi.get(self, "resource")
|
103
104
|
|
104
105
|
@resource.setter
|
105
|
-
def resource(self, value: pulumi.Input[str]):
|
106
|
+
def resource(self, value: pulumi.Input[builtins.str]):
|
106
107
|
pulumi.set(self, "resource", value)
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter(name="tenantId")
|
110
|
-
def tenant_id(self) -> pulumi.Input[str]:
|
111
|
+
def tenant_id(self) -> pulumi.Input[builtins.str]:
|
111
112
|
"""
|
112
113
|
The tenant id for the Azure Active Directory
|
113
114
|
organization.
|
@@ -115,12 +116,12 @@ class AuthBackendConfigArgs:
|
|
115
116
|
return pulumi.get(self, "tenant_id")
|
116
117
|
|
117
118
|
@tenant_id.setter
|
118
|
-
def tenant_id(self, value: pulumi.Input[str]):
|
119
|
+
def tenant_id(self, value: pulumi.Input[builtins.str]):
|
119
120
|
pulumi.set(self, "tenant_id", value)
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter
|
123
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
The path the Azure auth backend being configured was
|
126
127
|
mounted at. Defaults to `azure`.
|
@@ -128,12 +129,12 @@ class AuthBackendConfigArgs:
|
|
128
129
|
return pulumi.get(self, "backend")
|
129
130
|
|
130
131
|
@backend.setter
|
131
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
132
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
132
133
|
pulumi.set(self, "backend", value)
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter(name="clientId")
|
136
|
-
def client_id(self) -> Optional[pulumi.Input[str]]:
|
137
|
+
def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
137
138
|
"""
|
138
139
|
The client id for credentials to query the Azure APIs.
|
139
140
|
Currently read permissions to query compute resources are required.
|
@@ -141,12 +142,12 @@ class AuthBackendConfigArgs:
|
|
141
142
|
return pulumi.get(self, "client_id")
|
142
143
|
|
143
144
|
@client_id.setter
|
144
|
-
def client_id(self, value: Optional[pulumi.Input[str]]):
|
145
|
+
def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
145
146
|
pulumi.set(self, "client_id", value)
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter(name="clientSecret")
|
149
|
-
def client_secret(self) -> Optional[pulumi.Input[str]]:
|
150
|
+
def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
|
150
151
|
"""
|
151
152
|
The client secret for credentials to query the
|
152
153
|
Azure APIs.
|
@@ -154,12 +155,12 @@ class AuthBackendConfigArgs:
|
|
154
155
|
return pulumi.get(self, "client_secret")
|
155
156
|
|
156
157
|
@client_secret.setter
|
157
|
-
def client_secret(self, value: Optional[pulumi.Input[str]]):
|
158
|
+
def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
|
158
159
|
pulumi.set(self, "client_secret", value)
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter(name="disableAutomatedRotation")
|
162
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
163
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
163
164
|
"""
|
164
165
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
165
166
|
*Available only for Vault Enterprise*
|
@@ -167,12 +168,12 @@ class AuthBackendConfigArgs:
|
|
167
168
|
return pulumi.get(self, "disable_automated_rotation")
|
168
169
|
|
169
170
|
@disable_automated_rotation.setter
|
170
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
171
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
171
172
|
pulumi.set(self, "disable_automated_rotation", value)
|
172
173
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter
|
175
|
-
def environment(self) -> Optional[pulumi.Input[str]]:
|
176
|
+
def environment(self) -> Optional[pulumi.Input[builtins.str]]:
|
176
177
|
"""
|
177
178
|
The Azure cloud environment. Valid values:
|
178
179
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -181,12 +182,12 @@ class AuthBackendConfigArgs:
|
|
181
182
|
return pulumi.get(self, "environment")
|
182
183
|
|
183
184
|
@environment.setter
|
184
|
-
def environment(self, value: Optional[pulumi.Input[str]]):
|
185
|
+
def environment(self, value: Optional[pulumi.Input[builtins.str]]):
|
185
186
|
pulumi.set(self, "environment", value)
|
186
187
|
|
187
188
|
@property
|
188
189
|
@pulumi.getter(name="identityTokenAudience")
|
189
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
190
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
|
190
191
|
"""
|
191
192
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
192
193
|
*Available only for Vault Enterprise*
|
@@ -194,24 +195,24 @@ class AuthBackendConfigArgs:
|
|
194
195
|
return pulumi.get(self, "identity_token_audience")
|
195
196
|
|
196
197
|
@identity_token_audience.setter
|
197
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
198
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
|
198
199
|
pulumi.set(self, "identity_token_audience", value)
|
199
200
|
|
200
201
|
@property
|
201
202
|
@pulumi.getter(name="identityTokenTtl")
|
202
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
203
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
203
204
|
"""
|
204
205
|
The TTL of generated identity tokens in seconds.
|
205
206
|
"""
|
206
207
|
return pulumi.get(self, "identity_token_ttl")
|
207
208
|
|
208
209
|
@identity_token_ttl.setter
|
209
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
210
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
210
211
|
pulumi.set(self, "identity_token_ttl", value)
|
211
212
|
|
212
213
|
@property
|
213
214
|
@pulumi.getter
|
214
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
215
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
215
216
|
"""
|
216
217
|
The namespace to provision the resource in.
|
217
218
|
The value should not contain leading or trailing forward slashes.
|
@@ -221,12 +222,12 @@ class AuthBackendConfigArgs:
|
|
221
222
|
return pulumi.get(self, "namespace")
|
222
223
|
|
223
224
|
@namespace.setter
|
224
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
225
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
225
226
|
pulumi.set(self, "namespace", value)
|
226
227
|
|
227
228
|
@property
|
228
229
|
@pulumi.getter(name="rotationPeriod")
|
229
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
230
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
230
231
|
"""
|
231
232
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
232
233
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -235,12 +236,12 @@ class AuthBackendConfigArgs:
|
|
235
236
|
return pulumi.get(self, "rotation_period")
|
236
237
|
|
237
238
|
@rotation_period.setter
|
238
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
239
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
239
240
|
pulumi.set(self, "rotation_period", value)
|
240
241
|
|
241
242
|
@property
|
242
243
|
@pulumi.getter(name="rotationSchedule")
|
243
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
244
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
244
245
|
"""
|
245
246
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
246
247
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -249,12 +250,12 @@ class AuthBackendConfigArgs:
|
|
249
250
|
return pulumi.get(self, "rotation_schedule")
|
250
251
|
|
251
252
|
@rotation_schedule.setter
|
252
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
253
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
253
254
|
pulumi.set(self, "rotation_schedule", value)
|
254
255
|
|
255
256
|
@property
|
256
257
|
@pulumi.getter(name="rotationWindow")
|
257
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
258
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
258
259
|
"""
|
259
260
|
The maximum amount of time in seconds allowed to complete
|
260
261
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -264,59 +265,59 @@ class AuthBackendConfigArgs:
|
|
264
265
|
return pulumi.get(self, "rotation_window")
|
265
266
|
|
266
267
|
@rotation_window.setter
|
267
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
268
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
268
269
|
pulumi.set(self, "rotation_window", value)
|
269
270
|
|
270
271
|
|
271
272
|
@pulumi.input_type
|
272
273
|
class _AuthBackendConfigState:
|
273
274
|
def __init__(__self__, *,
|
274
|
-
backend: Optional[pulumi.Input[str]] = None,
|
275
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
276
|
-
client_secret: Optional[pulumi.Input[str]] = None,
|
277
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
278
|
-
environment: Optional[pulumi.Input[str]] = None,
|
279
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
280
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
281
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
282
|
-
resource: Optional[pulumi.Input[str]] = None,
|
283
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
284
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
285
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
286
|
-
tenant_id: Optional[pulumi.Input[str]] = None):
|
275
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
276
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
277
|
+
client_secret: Optional[pulumi.Input[builtins.str]] = None,
|
278
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
279
|
+
environment: Optional[pulumi.Input[builtins.str]] = None,
|
280
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
281
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
282
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
283
|
+
resource: Optional[pulumi.Input[builtins.str]] = None,
|
284
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
285
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
286
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
287
|
+
tenant_id: Optional[pulumi.Input[builtins.str]] = None):
|
287
288
|
"""
|
288
289
|
Input properties used for looking up and filtering AuthBackendConfig resources.
|
289
|
-
:param pulumi.Input[str] backend: The path the Azure auth backend being configured was
|
290
|
+
:param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
|
290
291
|
mounted at. Defaults to `azure`.
|
291
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
|
292
|
+
:param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
292
293
|
Currently read permissions to query compute resources are required.
|
293
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the
|
294
|
+
:param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
|
294
295
|
Azure APIs.
|
295
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
296
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
296
297
|
*Available only for Vault Enterprise*
|
297
|
-
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
298
|
+
:param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
|
298
299
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
299
300
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
300
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
301
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
301
302
|
*Available only for Vault Enterprise*
|
302
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
303
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
303
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
304
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
304
305
|
The value should not contain leading or trailing forward slashes.
|
305
306
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
306
307
|
*Available only for Vault Enterprise*.
|
307
|
-
:param pulumi.Input[str] resource: The configured URL for the application registered in
|
308
|
+
:param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
|
308
309
|
Azure Active Directory.
|
309
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
310
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
310
311
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
311
312
|
*Available only for Vault Enterprise*
|
312
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
313
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
313
314
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
314
315
|
*Available only for Vault Enterprise*
|
315
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
316
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
316
317
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
317
318
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
318
319
|
*Available only for Vault Enterprise*
|
319
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
|
320
|
+
:param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
320
321
|
organization.
|
321
322
|
"""
|
322
323
|
if backend is not None:
|
@@ -348,7 +349,7 @@ class _AuthBackendConfigState:
|
|
348
349
|
|
349
350
|
@property
|
350
351
|
@pulumi.getter
|
351
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
352
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
352
353
|
"""
|
353
354
|
The path the Azure auth backend being configured was
|
354
355
|
mounted at. Defaults to `azure`.
|
@@ -356,12 +357,12 @@ class _AuthBackendConfigState:
|
|
356
357
|
return pulumi.get(self, "backend")
|
357
358
|
|
358
359
|
@backend.setter
|
359
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
360
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
360
361
|
pulumi.set(self, "backend", value)
|
361
362
|
|
362
363
|
@property
|
363
364
|
@pulumi.getter(name="clientId")
|
364
|
-
def client_id(self) -> Optional[pulumi.Input[str]]:
|
365
|
+
def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
365
366
|
"""
|
366
367
|
The client id for credentials to query the Azure APIs.
|
367
368
|
Currently read permissions to query compute resources are required.
|
@@ -369,12 +370,12 @@ class _AuthBackendConfigState:
|
|
369
370
|
return pulumi.get(self, "client_id")
|
370
371
|
|
371
372
|
@client_id.setter
|
372
|
-
def client_id(self, value: Optional[pulumi.Input[str]]):
|
373
|
+
def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
373
374
|
pulumi.set(self, "client_id", value)
|
374
375
|
|
375
376
|
@property
|
376
377
|
@pulumi.getter(name="clientSecret")
|
377
|
-
def client_secret(self) -> Optional[pulumi.Input[str]]:
|
378
|
+
def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
|
378
379
|
"""
|
379
380
|
The client secret for credentials to query the
|
380
381
|
Azure APIs.
|
@@ -382,12 +383,12 @@ class _AuthBackendConfigState:
|
|
382
383
|
return pulumi.get(self, "client_secret")
|
383
384
|
|
384
385
|
@client_secret.setter
|
385
|
-
def client_secret(self, value: Optional[pulumi.Input[str]]):
|
386
|
+
def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
|
386
387
|
pulumi.set(self, "client_secret", value)
|
387
388
|
|
388
389
|
@property
|
389
390
|
@pulumi.getter(name="disableAutomatedRotation")
|
390
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
391
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
391
392
|
"""
|
392
393
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
393
394
|
*Available only for Vault Enterprise*
|
@@ -395,12 +396,12 @@ class _AuthBackendConfigState:
|
|
395
396
|
return pulumi.get(self, "disable_automated_rotation")
|
396
397
|
|
397
398
|
@disable_automated_rotation.setter
|
398
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
399
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
399
400
|
pulumi.set(self, "disable_automated_rotation", value)
|
400
401
|
|
401
402
|
@property
|
402
403
|
@pulumi.getter
|
403
|
-
def environment(self) -> Optional[pulumi.Input[str]]:
|
404
|
+
def environment(self) -> Optional[pulumi.Input[builtins.str]]:
|
404
405
|
"""
|
405
406
|
The Azure cloud environment. Valid values:
|
406
407
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -409,12 +410,12 @@ class _AuthBackendConfigState:
|
|
409
410
|
return pulumi.get(self, "environment")
|
410
411
|
|
411
412
|
@environment.setter
|
412
|
-
def environment(self, value: Optional[pulumi.Input[str]]):
|
413
|
+
def environment(self, value: Optional[pulumi.Input[builtins.str]]):
|
413
414
|
pulumi.set(self, "environment", value)
|
414
415
|
|
415
416
|
@property
|
416
417
|
@pulumi.getter(name="identityTokenAudience")
|
417
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
418
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
|
418
419
|
"""
|
419
420
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
420
421
|
*Available only for Vault Enterprise*
|
@@ -422,24 +423,24 @@ class _AuthBackendConfigState:
|
|
422
423
|
return pulumi.get(self, "identity_token_audience")
|
423
424
|
|
424
425
|
@identity_token_audience.setter
|
425
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
426
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
|
426
427
|
pulumi.set(self, "identity_token_audience", value)
|
427
428
|
|
428
429
|
@property
|
429
430
|
@pulumi.getter(name="identityTokenTtl")
|
430
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
431
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
431
432
|
"""
|
432
433
|
The TTL of generated identity tokens in seconds.
|
433
434
|
"""
|
434
435
|
return pulumi.get(self, "identity_token_ttl")
|
435
436
|
|
436
437
|
@identity_token_ttl.setter
|
437
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
438
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
438
439
|
pulumi.set(self, "identity_token_ttl", value)
|
439
440
|
|
440
441
|
@property
|
441
442
|
@pulumi.getter
|
442
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
443
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
443
444
|
"""
|
444
445
|
The namespace to provision the resource in.
|
445
446
|
The value should not contain leading or trailing forward slashes.
|
@@ -449,12 +450,12 @@ class _AuthBackendConfigState:
|
|
449
450
|
return pulumi.get(self, "namespace")
|
450
451
|
|
451
452
|
@namespace.setter
|
452
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
453
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
453
454
|
pulumi.set(self, "namespace", value)
|
454
455
|
|
455
456
|
@property
|
456
457
|
@pulumi.getter
|
457
|
-
def resource(self) -> Optional[pulumi.Input[str]]:
|
458
|
+
def resource(self) -> Optional[pulumi.Input[builtins.str]]:
|
458
459
|
"""
|
459
460
|
The configured URL for the application registered in
|
460
461
|
Azure Active Directory.
|
@@ -462,12 +463,12 @@ class _AuthBackendConfigState:
|
|
462
463
|
return pulumi.get(self, "resource")
|
463
464
|
|
464
465
|
@resource.setter
|
465
|
-
def resource(self, value: Optional[pulumi.Input[str]]):
|
466
|
+
def resource(self, value: Optional[pulumi.Input[builtins.str]]):
|
466
467
|
pulumi.set(self, "resource", value)
|
467
468
|
|
468
469
|
@property
|
469
470
|
@pulumi.getter(name="rotationPeriod")
|
470
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
471
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
471
472
|
"""
|
472
473
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
473
474
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -476,12 +477,12 @@ class _AuthBackendConfigState:
|
|
476
477
|
return pulumi.get(self, "rotation_period")
|
477
478
|
|
478
479
|
@rotation_period.setter
|
479
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
480
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
480
481
|
pulumi.set(self, "rotation_period", value)
|
481
482
|
|
482
483
|
@property
|
483
484
|
@pulumi.getter(name="rotationSchedule")
|
484
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
485
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
485
486
|
"""
|
486
487
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
487
488
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -490,12 +491,12 @@ class _AuthBackendConfigState:
|
|
490
491
|
return pulumi.get(self, "rotation_schedule")
|
491
492
|
|
492
493
|
@rotation_schedule.setter
|
493
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
494
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
494
495
|
pulumi.set(self, "rotation_schedule", value)
|
495
496
|
|
496
497
|
@property
|
497
498
|
@pulumi.getter(name="rotationWindow")
|
498
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
499
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
499
500
|
"""
|
500
501
|
The maximum amount of time in seconds allowed to complete
|
501
502
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -505,12 +506,12 @@ class _AuthBackendConfigState:
|
|
505
506
|
return pulumi.get(self, "rotation_window")
|
506
507
|
|
507
508
|
@rotation_window.setter
|
508
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
509
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
509
510
|
pulumi.set(self, "rotation_window", value)
|
510
511
|
|
511
512
|
@property
|
512
513
|
@pulumi.getter(name="tenantId")
|
513
|
-
def tenant_id(self) -> Optional[pulumi.Input[str]]:
|
514
|
+
def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
514
515
|
"""
|
515
516
|
The tenant id for the Azure Active Directory
|
516
517
|
organization.
|
@@ -518,7 +519,7 @@ class _AuthBackendConfigState:
|
|
518
519
|
return pulumi.get(self, "tenant_id")
|
519
520
|
|
520
521
|
@tenant_id.setter
|
521
|
-
def tenant_id(self, value: Optional[pulumi.Input[str]]):
|
522
|
+
def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
522
523
|
pulumi.set(self, "tenant_id", value)
|
523
524
|
|
524
525
|
|
@@ -527,19 +528,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
527
528
|
def __init__(__self__,
|
528
529
|
resource_name: str,
|
529
530
|
opts: Optional[pulumi.ResourceOptions] = None,
|
530
|
-
backend: Optional[pulumi.Input[str]] = None,
|
531
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
532
|
-
client_secret: Optional[pulumi.Input[str]] = None,
|
533
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
534
|
-
environment: Optional[pulumi.Input[str]] = None,
|
535
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
536
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
537
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
538
|
-
resource: Optional[pulumi.Input[str]] = None,
|
539
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
540
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
541
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
542
|
-
tenant_id: Optional[pulumi.Input[str]] = None,
|
531
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
532
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
533
|
+
client_secret: Optional[pulumi.Input[builtins.str]] = None,
|
534
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
535
|
+
environment: Optional[pulumi.Input[builtins.str]] = None,
|
536
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
537
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
538
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
539
|
+
resource: Optional[pulumi.Input[builtins.str]] = None,
|
540
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
541
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
542
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
543
|
+
tenant_id: Optional[pulumi.Input[builtins.str]] = None,
|
543
544
|
__props__=None):
|
544
545
|
"""
|
545
546
|
## Example Usage
|
@@ -587,37 +588,37 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
587
588
|
|
588
589
|
:param str resource_name: The name of the resource.
|
589
590
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
590
|
-
:param pulumi.Input[str] backend: The path the Azure auth backend being configured was
|
591
|
+
:param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
|
591
592
|
mounted at. Defaults to `azure`.
|
592
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
|
593
|
+
:param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
593
594
|
Currently read permissions to query compute resources are required.
|
594
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the
|
595
|
+
:param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
|
595
596
|
Azure APIs.
|
596
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
597
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
597
598
|
*Available only for Vault Enterprise*
|
598
|
-
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
599
|
+
:param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
|
599
600
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
600
601
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
601
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
602
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
602
603
|
*Available only for Vault Enterprise*
|
603
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
604
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
604
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
605
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
605
606
|
The value should not contain leading or trailing forward slashes.
|
606
607
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
607
608
|
*Available only for Vault Enterprise*.
|
608
|
-
:param pulumi.Input[str] resource: The configured URL for the application registered in
|
609
|
+
:param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
|
609
610
|
Azure Active Directory.
|
610
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
611
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
611
612
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
612
613
|
*Available only for Vault Enterprise*
|
613
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
614
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
614
615
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
615
616
|
*Available only for Vault Enterprise*
|
616
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
617
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
617
618
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
618
619
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
619
620
|
*Available only for Vault Enterprise*
|
620
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
|
621
|
+
:param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
621
622
|
organization.
|
622
623
|
"""
|
623
624
|
...
|
@@ -685,19 +686,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
685
686
|
def _internal_init(__self__,
|
686
687
|
resource_name: str,
|
687
688
|
opts: Optional[pulumi.ResourceOptions] = None,
|
688
|
-
backend: Optional[pulumi.Input[str]] = None,
|
689
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
690
|
-
client_secret: Optional[pulumi.Input[str]] = None,
|
691
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
692
|
-
environment: Optional[pulumi.Input[str]] = None,
|
693
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
694
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
695
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
696
|
-
resource: Optional[pulumi.Input[str]] = None,
|
697
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
698
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
699
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
700
|
-
tenant_id: Optional[pulumi.Input[str]] = None,
|
689
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
690
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
691
|
+
client_secret: Optional[pulumi.Input[builtins.str]] = None,
|
692
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
693
|
+
environment: Optional[pulumi.Input[builtins.str]] = None,
|
694
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
695
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
696
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
697
|
+
resource: Optional[pulumi.Input[builtins.str]] = None,
|
698
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
699
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
700
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
701
|
+
tenant_id: Optional[pulumi.Input[builtins.str]] = None,
|
701
702
|
__props__=None):
|
702
703
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
703
704
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -736,19 +737,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
736
737
|
def get(resource_name: str,
|
737
738
|
id: pulumi.Input[str],
|
738
739
|
opts: Optional[pulumi.ResourceOptions] = None,
|
739
|
-
backend: Optional[pulumi.Input[str]] = None,
|
740
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
741
|
-
client_secret: Optional[pulumi.Input[str]] = None,
|
742
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
743
|
-
environment: Optional[pulumi.Input[str]] = None,
|
744
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
745
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
746
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
747
|
-
resource: Optional[pulumi.Input[str]] = None,
|
748
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
749
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
750
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
751
|
-
tenant_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfig':
|
740
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
741
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
742
|
+
client_secret: Optional[pulumi.Input[builtins.str]] = None,
|
743
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
744
|
+
environment: Optional[pulumi.Input[builtins.str]] = None,
|
745
|
+
identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
|
746
|
+
identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
747
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
748
|
+
resource: Optional[pulumi.Input[builtins.str]] = None,
|
749
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
750
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
751
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
752
|
+
tenant_id: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfig':
|
752
753
|
"""
|
753
754
|
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
754
755
|
properties used to qualify the lookup.
|
@@ -756,37 +757,37 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
756
757
|
:param str resource_name: The unique name of the resulting resource.
|
757
758
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
758
759
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
759
|
-
:param pulumi.Input[str] backend: The path the Azure auth backend being configured was
|
760
|
+
:param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
|
760
761
|
mounted at. Defaults to `azure`.
|
761
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
|
762
|
+
:param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
762
763
|
Currently read permissions to query compute resources are required.
|
763
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the
|
764
|
+
:param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
|
764
765
|
Azure APIs.
|
765
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
766
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
766
767
|
*Available only for Vault Enterprise*
|
767
|
-
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
768
|
+
:param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
|
768
769
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
769
770
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
770
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
771
|
+
:param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
771
772
|
*Available only for Vault Enterprise*
|
772
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
773
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
773
|
+
:param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
774
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
774
775
|
The value should not contain leading or trailing forward slashes.
|
775
776
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
776
777
|
*Available only for Vault Enterprise*.
|
777
|
-
:param pulumi.Input[str] resource: The configured URL for the application registered in
|
778
|
+
:param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
|
778
779
|
Azure Active Directory.
|
779
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
780
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
780
781
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
781
782
|
*Available only for Vault Enterprise*
|
782
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
783
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
783
784
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
784
785
|
*Available only for Vault Enterprise*
|
785
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
786
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
786
787
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
787
788
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
788
789
|
*Available only for Vault Enterprise*
|
789
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
|
790
|
+
:param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
790
791
|
organization.
|
791
792
|
"""
|
792
793
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -810,7 +811,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
810
811
|
|
811
812
|
@property
|
812
813
|
@pulumi.getter
|
813
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
814
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
814
815
|
"""
|
815
816
|
The path the Azure auth backend being configured was
|
816
817
|
mounted at. Defaults to `azure`.
|
@@ -819,7 +820,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
819
820
|
|
820
821
|
@property
|
821
822
|
@pulumi.getter(name="clientId")
|
822
|
-
def client_id(self) -> pulumi.Output[Optional[str]]:
|
823
|
+
def client_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
823
824
|
"""
|
824
825
|
The client id for credentials to query the Azure APIs.
|
825
826
|
Currently read permissions to query compute resources are required.
|
@@ -828,7 +829,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
828
829
|
|
829
830
|
@property
|
830
831
|
@pulumi.getter(name="clientSecret")
|
831
|
-
def client_secret(self) -> pulumi.Output[Optional[str]]:
|
832
|
+
def client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
|
832
833
|
"""
|
833
834
|
The client secret for credentials to query the
|
834
835
|
Azure APIs.
|
@@ -837,7 +838,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
837
838
|
|
838
839
|
@property
|
839
840
|
@pulumi.getter(name="disableAutomatedRotation")
|
840
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
|
841
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
841
842
|
"""
|
842
843
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
843
844
|
*Available only for Vault Enterprise*
|
@@ -846,7 +847,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
846
847
|
|
847
848
|
@property
|
848
849
|
@pulumi.getter
|
849
|
-
def environment(self) -> pulumi.Output[Optional[str]]:
|
850
|
+
def environment(self) -> pulumi.Output[Optional[builtins.str]]:
|
850
851
|
"""
|
851
852
|
The Azure cloud environment. Valid values:
|
852
853
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -856,7 +857,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
856
857
|
|
857
858
|
@property
|
858
859
|
@pulumi.getter(name="identityTokenAudience")
|
859
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
|
860
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
|
860
861
|
"""
|
861
862
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
862
863
|
*Available only for Vault Enterprise*
|
@@ -865,7 +866,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
865
866
|
|
866
867
|
@property
|
867
868
|
@pulumi.getter(name="identityTokenTtl")
|
868
|
-
def identity_token_ttl(self) -> pulumi.Output[int]:
|
869
|
+
def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
|
869
870
|
"""
|
870
871
|
The TTL of generated identity tokens in seconds.
|
871
872
|
"""
|
@@ -873,7 +874,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
873
874
|
|
874
875
|
@property
|
875
876
|
@pulumi.getter
|
876
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
877
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
877
878
|
"""
|
878
879
|
The namespace to provision the resource in.
|
879
880
|
The value should not contain leading or trailing forward slashes.
|
@@ -884,7 +885,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
884
885
|
|
885
886
|
@property
|
886
887
|
@pulumi.getter
|
887
|
-
def resource(self) -> pulumi.Output[str]:
|
888
|
+
def resource(self) -> pulumi.Output[builtins.str]:
|
888
889
|
"""
|
889
890
|
The configured URL for the application registered in
|
890
891
|
Azure Active Directory.
|
@@ -893,7 +894,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
893
894
|
|
894
895
|
@property
|
895
896
|
@pulumi.getter(name="rotationPeriod")
|
896
|
-
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
897
|
+
def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
897
898
|
"""
|
898
899
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
899
900
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -903,7 +904,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
903
904
|
|
904
905
|
@property
|
905
906
|
@pulumi.getter(name="rotationSchedule")
|
906
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
907
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
|
907
908
|
"""
|
908
909
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
909
910
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -913,7 +914,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
913
914
|
|
914
915
|
@property
|
915
916
|
@pulumi.getter(name="rotationWindow")
|
916
|
-
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
917
|
+
def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
|
917
918
|
"""
|
918
919
|
The maximum amount of time in seconds allowed to complete
|
919
920
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -924,7 +925,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
924
925
|
|
925
926
|
@property
|
926
927
|
@pulumi.getter(name="tenantId")
|
927
|
-
def tenant_id(self) -> pulumi.Output[str]:
|
928
|
+
def tenant_id(self) -> pulumi.Output[builtins.str]:
|
928
929
|
"""
|
929
930
|
The tenant id for the Azure Active Directory
|
930
931
|
organization.
|