pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,50 +20,50 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
19
20
  @pulumi.input_type
20
21
  class AuthBackendConfigArgs:
21
22
  def __init__(__self__, *,
22
- resource: pulumi.Input[str],
23
- tenant_id: pulumi.Input[str],
24
- backend: Optional[pulumi.Input[str]] = None,
25
- client_id: Optional[pulumi.Input[str]] = None,
26
- client_secret: Optional[pulumi.Input[str]] = None,
27
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
28
- environment: Optional[pulumi.Input[str]] = None,
29
- identity_token_audience: Optional[pulumi.Input[str]] = None,
30
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
31
- namespace: Optional[pulumi.Input[str]] = None,
32
- rotation_period: Optional[pulumi.Input[int]] = None,
33
- rotation_schedule: Optional[pulumi.Input[str]] = None,
34
- rotation_window: Optional[pulumi.Input[int]] = None):
23
+ resource: pulumi.Input[builtins.str],
24
+ tenant_id: pulumi.Input[builtins.str],
25
+ backend: Optional[pulumi.Input[builtins.str]] = None,
26
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
27
+ client_secret: Optional[pulumi.Input[builtins.str]] = None,
28
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
29
+ environment: Optional[pulumi.Input[builtins.str]] = None,
30
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
31
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
33
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
34
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
35
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None):
35
36
  """
36
37
  The set of arguments for constructing a AuthBackendConfig resource.
37
- :param pulumi.Input[str] resource: The configured URL for the application registered in
38
+ :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
38
39
  Azure Active Directory.
39
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
40
+ :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
40
41
  organization.
41
- :param pulumi.Input[str] backend: The path the Azure auth backend being configured was
42
+ :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
42
43
  mounted at. Defaults to `azure`.
43
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
44
+ :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
44
45
  Currently read permissions to query compute resources are required.
45
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the
46
+ :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
46
47
  Azure APIs.
47
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
48
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
48
49
  *Available only for Vault Enterprise*
49
- :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
50
+ :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
50
51
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
51
52
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
52
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
53
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
53
54
  *Available only for Vault Enterprise*
54
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
55
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
55
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
56
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
56
57
  The value should not contain leading or trailing forward slashes.
57
58
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
58
59
  *Available only for Vault Enterprise*.
59
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
60
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
60
61
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
61
62
  *Available only for Vault Enterprise*
62
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
63
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
63
64
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
64
65
  *Available only for Vault Enterprise*
65
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
66
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
66
67
  a rotation when a scheduled token rotation occurs. The default rotation window is
67
68
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
68
69
  *Available only for Vault Enterprise*
@@ -94,7 +95,7 @@ class AuthBackendConfigArgs:
94
95
 
95
96
  @property
96
97
  @pulumi.getter
97
- def resource(self) -> pulumi.Input[str]:
98
+ def resource(self) -> pulumi.Input[builtins.str]:
98
99
  """
99
100
  The configured URL for the application registered in
100
101
  Azure Active Directory.
@@ -102,12 +103,12 @@ class AuthBackendConfigArgs:
102
103
  return pulumi.get(self, "resource")
103
104
 
104
105
  @resource.setter
105
- def resource(self, value: pulumi.Input[str]):
106
+ def resource(self, value: pulumi.Input[builtins.str]):
106
107
  pulumi.set(self, "resource", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter(name="tenantId")
110
- def tenant_id(self) -> pulumi.Input[str]:
111
+ def tenant_id(self) -> pulumi.Input[builtins.str]:
111
112
  """
112
113
  The tenant id for the Azure Active Directory
113
114
  organization.
@@ -115,12 +116,12 @@ class AuthBackendConfigArgs:
115
116
  return pulumi.get(self, "tenant_id")
116
117
 
117
118
  @tenant_id.setter
118
- def tenant_id(self, value: pulumi.Input[str]):
119
+ def tenant_id(self, value: pulumi.Input[builtins.str]):
119
120
  pulumi.set(self, "tenant_id", value)
120
121
 
121
122
  @property
122
123
  @pulumi.getter
123
- def backend(self) -> Optional[pulumi.Input[str]]:
124
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  The path the Azure auth backend being configured was
126
127
  mounted at. Defaults to `azure`.
@@ -128,12 +129,12 @@ class AuthBackendConfigArgs:
128
129
  return pulumi.get(self, "backend")
129
130
 
130
131
  @backend.setter
131
- def backend(self, value: Optional[pulumi.Input[str]]):
132
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
132
133
  pulumi.set(self, "backend", value)
133
134
 
134
135
  @property
135
136
  @pulumi.getter(name="clientId")
136
- def client_id(self) -> Optional[pulumi.Input[str]]:
137
+ def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
137
138
  """
138
139
  The client id for credentials to query the Azure APIs.
139
140
  Currently read permissions to query compute resources are required.
@@ -141,12 +142,12 @@ class AuthBackendConfigArgs:
141
142
  return pulumi.get(self, "client_id")
142
143
 
143
144
  @client_id.setter
144
- def client_id(self, value: Optional[pulumi.Input[str]]):
145
+ def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
145
146
  pulumi.set(self, "client_id", value)
146
147
 
147
148
  @property
148
149
  @pulumi.getter(name="clientSecret")
149
- def client_secret(self) -> Optional[pulumi.Input[str]]:
150
+ def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
150
151
  """
151
152
  The client secret for credentials to query the
152
153
  Azure APIs.
@@ -154,12 +155,12 @@ class AuthBackendConfigArgs:
154
155
  return pulumi.get(self, "client_secret")
155
156
 
156
157
  @client_secret.setter
157
- def client_secret(self, value: Optional[pulumi.Input[str]]):
158
+ def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
158
159
  pulumi.set(self, "client_secret", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="disableAutomatedRotation")
162
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
163
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
163
164
  """
164
165
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
165
166
  *Available only for Vault Enterprise*
@@ -167,12 +168,12 @@ class AuthBackendConfigArgs:
167
168
  return pulumi.get(self, "disable_automated_rotation")
168
169
 
169
170
  @disable_automated_rotation.setter
170
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
171
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
171
172
  pulumi.set(self, "disable_automated_rotation", value)
172
173
 
173
174
  @property
174
175
  @pulumi.getter
175
- def environment(self) -> Optional[pulumi.Input[str]]:
176
+ def environment(self) -> Optional[pulumi.Input[builtins.str]]:
176
177
  """
177
178
  The Azure cloud environment. Valid values:
178
179
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -181,12 +182,12 @@ class AuthBackendConfigArgs:
181
182
  return pulumi.get(self, "environment")
182
183
 
183
184
  @environment.setter
184
- def environment(self, value: Optional[pulumi.Input[str]]):
185
+ def environment(self, value: Optional[pulumi.Input[builtins.str]]):
185
186
  pulumi.set(self, "environment", value)
186
187
 
187
188
  @property
188
189
  @pulumi.getter(name="identityTokenAudience")
189
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
190
+ def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
190
191
  """
191
192
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
192
193
  *Available only for Vault Enterprise*
@@ -194,24 +195,24 @@ class AuthBackendConfigArgs:
194
195
  return pulumi.get(self, "identity_token_audience")
195
196
 
196
197
  @identity_token_audience.setter
197
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
198
+ def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
198
199
  pulumi.set(self, "identity_token_audience", value)
199
200
 
200
201
  @property
201
202
  @pulumi.getter(name="identityTokenTtl")
202
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
203
+ def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
203
204
  """
204
205
  The TTL of generated identity tokens in seconds.
205
206
  """
206
207
  return pulumi.get(self, "identity_token_ttl")
207
208
 
208
209
  @identity_token_ttl.setter
209
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
210
+ def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
210
211
  pulumi.set(self, "identity_token_ttl", value)
211
212
 
212
213
  @property
213
214
  @pulumi.getter
214
- def namespace(self) -> Optional[pulumi.Input[str]]:
215
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
215
216
  """
216
217
  The namespace to provision the resource in.
217
218
  The value should not contain leading or trailing forward slashes.
@@ -221,12 +222,12 @@ class AuthBackendConfigArgs:
221
222
  return pulumi.get(self, "namespace")
222
223
 
223
224
  @namespace.setter
224
- def namespace(self, value: Optional[pulumi.Input[str]]):
225
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
225
226
  pulumi.set(self, "namespace", value)
226
227
 
227
228
  @property
228
229
  @pulumi.getter(name="rotationPeriod")
229
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
230
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
230
231
  """
231
232
  The amount of time in seconds Vault should wait before rotating the root credential.
232
233
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -235,12 +236,12 @@ class AuthBackendConfigArgs:
235
236
  return pulumi.get(self, "rotation_period")
236
237
 
237
238
  @rotation_period.setter
238
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
239
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
239
240
  pulumi.set(self, "rotation_period", value)
240
241
 
241
242
  @property
242
243
  @pulumi.getter(name="rotationSchedule")
243
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
244
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
244
245
  """
245
246
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
246
247
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -249,12 +250,12 @@ class AuthBackendConfigArgs:
249
250
  return pulumi.get(self, "rotation_schedule")
250
251
 
251
252
  @rotation_schedule.setter
252
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
253
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
253
254
  pulumi.set(self, "rotation_schedule", value)
254
255
 
255
256
  @property
256
257
  @pulumi.getter(name="rotationWindow")
257
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
258
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
258
259
  """
259
260
  The maximum amount of time in seconds allowed to complete
260
261
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -264,59 +265,59 @@ class AuthBackendConfigArgs:
264
265
  return pulumi.get(self, "rotation_window")
265
266
 
266
267
  @rotation_window.setter
267
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
268
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
268
269
  pulumi.set(self, "rotation_window", value)
269
270
 
270
271
 
271
272
  @pulumi.input_type
272
273
  class _AuthBackendConfigState:
273
274
  def __init__(__self__, *,
274
- backend: Optional[pulumi.Input[str]] = None,
275
- client_id: Optional[pulumi.Input[str]] = None,
276
- client_secret: Optional[pulumi.Input[str]] = None,
277
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
278
- environment: Optional[pulumi.Input[str]] = None,
279
- identity_token_audience: Optional[pulumi.Input[str]] = None,
280
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
281
- namespace: Optional[pulumi.Input[str]] = None,
282
- resource: Optional[pulumi.Input[str]] = None,
283
- rotation_period: Optional[pulumi.Input[int]] = None,
284
- rotation_schedule: Optional[pulumi.Input[str]] = None,
285
- rotation_window: Optional[pulumi.Input[int]] = None,
286
- tenant_id: Optional[pulumi.Input[str]] = None):
275
+ backend: Optional[pulumi.Input[builtins.str]] = None,
276
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
277
+ client_secret: Optional[pulumi.Input[builtins.str]] = None,
278
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
279
+ environment: Optional[pulumi.Input[builtins.str]] = None,
280
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
281
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
282
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
283
+ resource: Optional[pulumi.Input[builtins.str]] = None,
284
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
285
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
286
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
287
+ tenant_id: Optional[pulumi.Input[builtins.str]] = None):
287
288
  """
288
289
  Input properties used for looking up and filtering AuthBackendConfig resources.
289
- :param pulumi.Input[str] backend: The path the Azure auth backend being configured was
290
+ :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
290
291
  mounted at. Defaults to `azure`.
291
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
292
+ :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
292
293
  Currently read permissions to query compute resources are required.
293
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the
294
+ :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
294
295
  Azure APIs.
295
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
296
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
296
297
  *Available only for Vault Enterprise*
297
- :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
298
+ :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
298
299
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
299
300
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
300
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
301
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
301
302
  *Available only for Vault Enterprise*
302
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
303
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
303
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
304
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
304
305
  The value should not contain leading or trailing forward slashes.
305
306
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
306
307
  *Available only for Vault Enterprise*.
307
- :param pulumi.Input[str] resource: The configured URL for the application registered in
308
+ :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
308
309
  Azure Active Directory.
309
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
310
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
310
311
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
311
312
  *Available only for Vault Enterprise*
312
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
313
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
313
314
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
314
315
  *Available only for Vault Enterprise*
315
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
316
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
316
317
  a rotation when a scheduled token rotation occurs. The default rotation window is
317
318
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
318
319
  *Available only for Vault Enterprise*
319
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
320
+ :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
320
321
  organization.
321
322
  """
322
323
  if backend is not None:
@@ -348,7 +349,7 @@ class _AuthBackendConfigState:
348
349
 
349
350
  @property
350
351
  @pulumi.getter
351
- def backend(self) -> Optional[pulumi.Input[str]]:
352
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
352
353
  """
353
354
  The path the Azure auth backend being configured was
354
355
  mounted at. Defaults to `azure`.
@@ -356,12 +357,12 @@ class _AuthBackendConfigState:
356
357
  return pulumi.get(self, "backend")
357
358
 
358
359
  @backend.setter
359
- def backend(self, value: Optional[pulumi.Input[str]]):
360
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
360
361
  pulumi.set(self, "backend", value)
361
362
 
362
363
  @property
363
364
  @pulumi.getter(name="clientId")
364
- def client_id(self) -> Optional[pulumi.Input[str]]:
365
+ def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
365
366
  """
366
367
  The client id for credentials to query the Azure APIs.
367
368
  Currently read permissions to query compute resources are required.
@@ -369,12 +370,12 @@ class _AuthBackendConfigState:
369
370
  return pulumi.get(self, "client_id")
370
371
 
371
372
  @client_id.setter
372
- def client_id(self, value: Optional[pulumi.Input[str]]):
373
+ def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
373
374
  pulumi.set(self, "client_id", value)
374
375
 
375
376
  @property
376
377
  @pulumi.getter(name="clientSecret")
377
- def client_secret(self) -> Optional[pulumi.Input[str]]:
378
+ def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
378
379
  """
379
380
  The client secret for credentials to query the
380
381
  Azure APIs.
@@ -382,12 +383,12 @@ class _AuthBackendConfigState:
382
383
  return pulumi.get(self, "client_secret")
383
384
 
384
385
  @client_secret.setter
385
- def client_secret(self, value: Optional[pulumi.Input[str]]):
386
+ def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
386
387
  pulumi.set(self, "client_secret", value)
387
388
 
388
389
  @property
389
390
  @pulumi.getter(name="disableAutomatedRotation")
390
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
391
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
391
392
  """
392
393
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
393
394
  *Available only for Vault Enterprise*
@@ -395,12 +396,12 @@ class _AuthBackendConfigState:
395
396
  return pulumi.get(self, "disable_automated_rotation")
396
397
 
397
398
  @disable_automated_rotation.setter
398
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
399
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
399
400
  pulumi.set(self, "disable_automated_rotation", value)
400
401
 
401
402
  @property
402
403
  @pulumi.getter
403
- def environment(self) -> Optional[pulumi.Input[str]]:
404
+ def environment(self) -> Optional[pulumi.Input[builtins.str]]:
404
405
  """
405
406
  The Azure cloud environment. Valid values:
406
407
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -409,12 +410,12 @@ class _AuthBackendConfigState:
409
410
  return pulumi.get(self, "environment")
410
411
 
411
412
  @environment.setter
412
- def environment(self, value: Optional[pulumi.Input[str]]):
413
+ def environment(self, value: Optional[pulumi.Input[builtins.str]]):
413
414
  pulumi.set(self, "environment", value)
414
415
 
415
416
  @property
416
417
  @pulumi.getter(name="identityTokenAudience")
417
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
418
+ def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
418
419
  """
419
420
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
420
421
  *Available only for Vault Enterprise*
@@ -422,24 +423,24 @@ class _AuthBackendConfigState:
422
423
  return pulumi.get(self, "identity_token_audience")
423
424
 
424
425
  @identity_token_audience.setter
425
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
426
+ def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
426
427
  pulumi.set(self, "identity_token_audience", value)
427
428
 
428
429
  @property
429
430
  @pulumi.getter(name="identityTokenTtl")
430
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
431
+ def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
431
432
  """
432
433
  The TTL of generated identity tokens in seconds.
433
434
  """
434
435
  return pulumi.get(self, "identity_token_ttl")
435
436
 
436
437
  @identity_token_ttl.setter
437
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
438
+ def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
438
439
  pulumi.set(self, "identity_token_ttl", value)
439
440
 
440
441
  @property
441
442
  @pulumi.getter
442
- def namespace(self) -> Optional[pulumi.Input[str]]:
443
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
443
444
  """
444
445
  The namespace to provision the resource in.
445
446
  The value should not contain leading or trailing forward slashes.
@@ -449,12 +450,12 @@ class _AuthBackendConfigState:
449
450
  return pulumi.get(self, "namespace")
450
451
 
451
452
  @namespace.setter
452
- def namespace(self, value: Optional[pulumi.Input[str]]):
453
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
453
454
  pulumi.set(self, "namespace", value)
454
455
 
455
456
  @property
456
457
  @pulumi.getter
457
- def resource(self) -> Optional[pulumi.Input[str]]:
458
+ def resource(self) -> Optional[pulumi.Input[builtins.str]]:
458
459
  """
459
460
  The configured URL for the application registered in
460
461
  Azure Active Directory.
@@ -462,12 +463,12 @@ class _AuthBackendConfigState:
462
463
  return pulumi.get(self, "resource")
463
464
 
464
465
  @resource.setter
465
- def resource(self, value: Optional[pulumi.Input[str]]):
466
+ def resource(self, value: Optional[pulumi.Input[builtins.str]]):
466
467
  pulumi.set(self, "resource", value)
467
468
 
468
469
  @property
469
470
  @pulumi.getter(name="rotationPeriod")
470
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
471
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
471
472
  """
472
473
  The amount of time in seconds Vault should wait before rotating the root credential.
473
474
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -476,12 +477,12 @@ class _AuthBackendConfigState:
476
477
  return pulumi.get(self, "rotation_period")
477
478
 
478
479
  @rotation_period.setter
479
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
480
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
480
481
  pulumi.set(self, "rotation_period", value)
481
482
 
482
483
  @property
483
484
  @pulumi.getter(name="rotationSchedule")
484
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
485
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
485
486
  """
486
487
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
487
488
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -490,12 +491,12 @@ class _AuthBackendConfigState:
490
491
  return pulumi.get(self, "rotation_schedule")
491
492
 
492
493
  @rotation_schedule.setter
493
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
494
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
494
495
  pulumi.set(self, "rotation_schedule", value)
495
496
 
496
497
  @property
497
498
  @pulumi.getter(name="rotationWindow")
498
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
499
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
499
500
  """
500
501
  The maximum amount of time in seconds allowed to complete
501
502
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -505,12 +506,12 @@ class _AuthBackendConfigState:
505
506
  return pulumi.get(self, "rotation_window")
506
507
 
507
508
  @rotation_window.setter
508
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
509
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
509
510
  pulumi.set(self, "rotation_window", value)
510
511
 
511
512
  @property
512
513
  @pulumi.getter(name="tenantId")
513
- def tenant_id(self) -> Optional[pulumi.Input[str]]:
514
+ def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
514
515
  """
515
516
  The tenant id for the Azure Active Directory
516
517
  organization.
@@ -518,7 +519,7 @@ class _AuthBackendConfigState:
518
519
  return pulumi.get(self, "tenant_id")
519
520
 
520
521
  @tenant_id.setter
521
- def tenant_id(self, value: Optional[pulumi.Input[str]]):
522
+ def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
522
523
  pulumi.set(self, "tenant_id", value)
523
524
 
524
525
 
@@ -527,19 +528,19 @@ class AuthBackendConfig(pulumi.CustomResource):
527
528
  def __init__(__self__,
528
529
  resource_name: str,
529
530
  opts: Optional[pulumi.ResourceOptions] = None,
530
- backend: Optional[pulumi.Input[str]] = None,
531
- client_id: Optional[pulumi.Input[str]] = None,
532
- client_secret: Optional[pulumi.Input[str]] = None,
533
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
534
- environment: Optional[pulumi.Input[str]] = None,
535
- identity_token_audience: Optional[pulumi.Input[str]] = None,
536
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
537
- namespace: Optional[pulumi.Input[str]] = None,
538
- resource: Optional[pulumi.Input[str]] = None,
539
- rotation_period: Optional[pulumi.Input[int]] = None,
540
- rotation_schedule: Optional[pulumi.Input[str]] = None,
541
- rotation_window: Optional[pulumi.Input[int]] = None,
542
- tenant_id: Optional[pulumi.Input[str]] = None,
531
+ backend: Optional[pulumi.Input[builtins.str]] = None,
532
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
533
+ client_secret: Optional[pulumi.Input[builtins.str]] = None,
534
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
535
+ environment: Optional[pulumi.Input[builtins.str]] = None,
536
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
537
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
538
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
539
+ resource: Optional[pulumi.Input[builtins.str]] = None,
540
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
541
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
542
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
543
+ tenant_id: Optional[pulumi.Input[builtins.str]] = None,
543
544
  __props__=None):
544
545
  """
545
546
  ## Example Usage
@@ -587,37 +588,37 @@ class AuthBackendConfig(pulumi.CustomResource):
587
588
 
588
589
  :param str resource_name: The name of the resource.
589
590
  :param pulumi.ResourceOptions opts: Options for the resource.
590
- :param pulumi.Input[str] backend: The path the Azure auth backend being configured was
591
+ :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
591
592
  mounted at. Defaults to `azure`.
592
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
593
+ :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
593
594
  Currently read permissions to query compute resources are required.
594
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the
595
+ :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
595
596
  Azure APIs.
596
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
597
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
597
598
  *Available only for Vault Enterprise*
598
- :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
599
+ :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
599
600
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
600
601
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
601
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
602
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
602
603
  *Available only for Vault Enterprise*
603
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
604
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
604
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
605
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
605
606
  The value should not contain leading or trailing forward slashes.
606
607
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
607
608
  *Available only for Vault Enterprise*.
608
- :param pulumi.Input[str] resource: The configured URL for the application registered in
609
+ :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
609
610
  Azure Active Directory.
610
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
611
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
611
612
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
612
613
  *Available only for Vault Enterprise*
613
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
614
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
614
615
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
615
616
  *Available only for Vault Enterprise*
616
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
617
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
617
618
  a rotation when a scheduled token rotation occurs. The default rotation window is
618
619
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
619
620
  *Available only for Vault Enterprise*
620
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
621
+ :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
621
622
  organization.
622
623
  """
623
624
  ...
@@ -685,19 +686,19 @@ class AuthBackendConfig(pulumi.CustomResource):
685
686
  def _internal_init(__self__,
686
687
  resource_name: str,
687
688
  opts: Optional[pulumi.ResourceOptions] = None,
688
- backend: Optional[pulumi.Input[str]] = None,
689
- client_id: Optional[pulumi.Input[str]] = None,
690
- client_secret: Optional[pulumi.Input[str]] = None,
691
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
692
- environment: Optional[pulumi.Input[str]] = None,
693
- identity_token_audience: Optional[pulumi.Input[str]] = None,
694
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
695
- namespace: Optional[pulumi.Input[str]] = None,
696
- resource: Optional[pulumi.Input[str]] = None,
697
- rotation_period: Optional[pulumi.Input[int]] = None,
698
- rotation_schedule: Optional[pulumi.Input[str]] = None,
699
- rotation_window: Optional[pulumi.Input[int]] = None,
700
- tenant_id: Optional[pulumi.Input[str]] = None,
689
+ backend: Optional[pulumi.Input[builtins.str]] = None,
690
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
691
+ client_secret: Optional[pulumi.Input[builtins.str]] = None,
692
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
693
+ environment: Optional[pulumi.Input[builtins.str]] = None,
694
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
695
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
696
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
697
+ resource: Optional[pulumi.Input[builtins.str]] = None,
698
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
699
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
700
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
701
+ tenant_id: Optional[pulumi.Input[builtins.str]] = None,
701
702
  __props__=None):
702
703
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
703
704
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -736,19 +737,19 @@ class AuthBackendConfig(pulumi.CustomResource):
736
737
  def get(resource_name: str,
737
738
  id: pulumi.Input[str],
738
739
  opts: Optional[pulumi.ResourceOptions] = None,
739
- backend: Optional[pulumi.Input[str]] = None,
740
- client_id: Optional[pulumi.Input[str]] = None,
741
- client_secret: Optional[pulumi.Input[str]] = None,
742
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
743
- environment: Optional[pulumi.Input[str]] = None,
744
- identity_token_audience: Optional[pulumi.Input[str]] = None,
745
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
746
- namespace: Optional[pulumi.Input[str]] = None,
747
- resource: Optional[pulumi.Input[str]] = None,
748
- rotation_period: Optional[pulumi.Input[int]] = None,
749
- rotation_schedule: Optional[pulumi.Input[str]] = None,
750
- rotation_window: Optional[pulumi.Input[int]] = None,
751
- tenant_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfig':
740
+ backend: Optional[pulumi.Input[builtins.str]] = None,
741
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
742
+ client_secret: Optional[pulumi.Input[builtins.str]] = None,
743
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
744
+ environment: Optional[pulumi.Input[builtins.str]] = None,
745
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
746
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
747
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
748
+ resource: Optional[pulumi.Input[builtins.str]] = None,
749
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
750
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
751
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
752
+ tenant_id: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfig':
752
753
  """
753
754
  Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
754
755
  properties used to qualify the lookup.
@@ -756,37 +757,37 @@ class AuthBackendConfig(pulumi.CustomResource):
756
757
  :param str resource_name: The unique name of the resulting resource.
757
758
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
758
759
  :param pulumi.ResourceOptions opts: Options for the resource.
759
- :param pulumi.Input[str] backend: The path the Azure auth backend being configured was
760
+ :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
760
761
  mounted at. Defaults to `azure`.
761
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
762
+ :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
762
763
  Currently read permissions to query compute resources are required.
763
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the
764
+ :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
764
765
  Azure APIs.
765
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
766
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
766
767
  *Available only for Vault Enterprise*
767
- :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
768
+ :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
768
769
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
769
770
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
770
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
771
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
771
772
  *Available only for Vault Enterprise*
772
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
773
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
773
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
774
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
774
775
  The value should not contain leading or trailing forward slashes.
775
776
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
776
777
  *Available only for Vault Enterprise*.
777
- :param pulumi.Input[str] resource: The configured URL for the application registered in
778
+ :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
778
779
  Azure Active Directory.
779
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
780
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
780
781
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
781
782
  *Available only for Vault Enterprise*
782
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
783
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
783
784
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
784
785
  *Available only for Vault Enterprise*
785
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
786
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
786
787
  a rotation when a scheduled token rotation occurs. The default rotation window is
787
788
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
788
789
  *Available only for Vault Enterprise*
789
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory
790
+ :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
790
791
  organization.
791
792
  """
792
793
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -810,7 +811,7 @@ class AuthBackendConfig(pulumi.CustomResource):
810
811
 
811
812
  @property
812
813
  @pulumi.getter
813
- def backend(self) -> pulumi.Output[Optional[str]]:
814
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
814
815
  """
815
816
  The path the Azure auth backend being configured was
816
817
  mounted at. Defaults to `azure`.
@@ -819,7 +820,7 @@ class AuthBackendConfig(pulumi.CustomResource):
819
820
 
820
821
  @property
821
822
  @pulumi.getter(name="clientId")
822
- def client_id(self) -> pulumi.Output[Optional[str]]:
823
+ def client_id(self) -> pulumi.Output[Optional[builtins.str]]:
823
824
  """
824
825
  The client id for credentials to query the Azure APIs.
825
826
  Currently read permissions to query compute resources are required.
@@ -828,7 +829,7 @@ class AuthBackendConfig(pulumi.CustomResource):
828
829
 
829
830
  @property
830
831
  @pulumi.getter(name="clientSecret")
831
- def client_secret(self) -> pulumi.Output[Optional[str]]:
832
+ def client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
832
833
  """
833
834
  The client secret for credentials to query the
834
835
  Azure APIs.
@@ -837,7 +838,7 @@ class AuthBackendConfig(pulumi.CustomResource):
837
838
 
838
839
  @property
839
840
  @pulumi.getter(name="disableAutomatedRotation")
840
- def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
841
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
841
842
  """
842
843
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
843
844
  *Available only for Vault Enterprise*
@@ -846,7 +847,7 @@ class AuthBackendConfig(pulumi.CustomResource):
846
847
 
847
848
  @property
848
849
  @pulumi.getter
849
- def environment(self) -> pulumi.Output[Optional[str]]:
850
+ def environment(self) -> pulumi.Output[Optional[builtins.str]]:
850
851
  """
851
852
  The Azure cloud environment. Valid values:
852
853
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -856,7 +857,7 @@ class AuthBackendConfig(pulumi.CustomResource):
856
857
 
857
858
  @property
858
859
  @pulumi.getter(name="identityTokenAudience")
859
- def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
860
+ def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
860
861
  """
861
862
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
862
863
  *Available only for Vault Enterprise*
@@ -865,7 +866,7 @@ class AuthBackendConfig(pulumi.CustomResource):
865
866
 
866
867
  @property
867
868
  @pulumi.getter(name="identityTokenTtl")
868
- def identity_token_ttl(self) -> pulumi.Output[int]:
869
+ def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
869
870
  """
870
871
  The TTL of generated identity tokens in seconds.
871
872
  """
@@ -873,7 +874,7 @@ class AuthBackendConfig(pulumi.CustomResource):
873
874
 
874
875
  @property
875
876
  @pulumi.getter
876
- def namespace(self) -> pulumi.Output[Optional[str]]:
877
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
877
878
  """
878
879
  The namespace to provision the resource in.
879
880
  The value should not contain leading or trailing forward slashes.
@@ -884,7 +885,7 @@ class AuthBackendConfig(pulumi.CustomResource):
884
885
 
885
886
  @property
886
887
  @pulumi.getter
887
- def resource(self) -> pulumi.Output[str]:
888
+ def resource(self) -> pulumi.Output[builtins.str]:
888
889
  """
889
890
  The configured URL for the application registered in
890
891
  Azure Active Directory.
@@ -893,7 +894,7 @@ class AuthBackendConfig(pulumi.CustomResource):
893
894
 
894
895
  @property
895
896
  @pulumi.getter(name="rotationPeriod")
896
- def rotation_period(self) -> pulumi.Output[Optional[int]]:
897
+ def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
897
898
  """
898
899
  The amount of time in seconds Vault should wait before rotating the root credential.
899
900
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -903,7 +904,7 @@ class AuthBackendConfig(pulumi.CustomResource):
903
904
 
904
905
  @property
905
906
  @pulumi.getter(name="rotationSchedule")
906
- def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
907
+ def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
907
908
  """
908
909
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
909
910
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -913,7 +914,7 @@ class AuthBackendConfig(pulumi.CustomResource):
913
914
 
914
915
  @property
915
916
  @pulumi.getter(name="rotationWindow")
916
- def rotation_window(self) -> pulumi.Output[Optional[int]]:
917
+ def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
917
918
  """
918
919
  The maximum amount of time in seconds allowed to complete
919
920
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -924,7 +925,7 @@ class AuthBackendConfig(pulumi.CustomResource):
924
925
 
925
926
  @property
926
927
  @pulumi.getter(name="tenantId")
927
- def tenant_id(self) -> pulumi.Output[str]:
928
+ def tenant_id(self) -> pulumi.Output[builtins.str]:
928
929
  """
929
930
  The tenant id for the Azure Active Directory
930
931
  organization.