pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,683 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['OciAuthBackendArgs', 'OciAuthBackend']
20
+
21
+ @pulumi.input_type
22
+ class OciAuthBackendArgs:
23
+ def __init__(__self__, *,
24
+ home_tenancy_id: pulumi.Input[_builtins.str],
25
+ description: Optional[pulumi.Input[_builtins.str]] = None,
26
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ path: Optional[pulumi.Input[_builtins.str]] = None,
30
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
31
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
32
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
33
+ tune: Optional[pulumi.Input['OciAuthBackendTuneArgs']] = None):
34
+ """
35
+ The set of arguments for constructing a OciAuthBackend resource.
36
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
37
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
38
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
39
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
45
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
46
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
47
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
48
+ Can only be used with rotation_schedule.
49
+ :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
50
+
51
+ The `tune` block is used to tune the auth backend:
52
+ """
53
+ pulumi.set(__self__, "home_tenancy_id", home_tenancy_id)
54
+ if description is not None:
55
+ pulumi.set(__self__, "description", description)
56
+ if disable_automated_rotation is not None:
57
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
58
+ if disable_remount is not None:
59
+ pulumi.set(__self__, "disable_remount", disable_remount)
60
+ if namespace is not None:
61
+ pulumi.set(__self__, "namespace", namespace)
62
+ if path is not None:
63
+ pulumi.set(__self__, "path", path)
64
+ if rotation_period is not None:
65
+ pulumi.set(__self__, "rotation_period", rotation_period)
66
+ if rotation_schedule is not None:
67
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
68
+ if rotation_window is not None:
69
+ pulumi.set(__self__, "rotation_window", rotation_window)
70
+ if tune is not None:
71
+ pulumi.set(__self__, "tune", tune)
72
+
73
+ @_builtins.property
74
+ @pulumi.getter(name="homeTenancyId")
75
+ def home_tenancy_id(self) -> pulumi.Input[_builtins.str]:
76
+ """
77
+ The Tenancy OCID of your OCI account.
78
+ """
79
+ return pulumi.get(self, "home_tenancy_id")
80
+
81
+ @home_tenancy_id.setter
82
+ def home_tenancy_id(self, value: pulumi.Input[_builtins.str]):
83
+ pulumi.set(self, "home_tenancy_id", value)
84
+
85
+ @_builtins.property
86
+ @pulumi.getter
87
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
88
+ """
89
+ A description of the auth backend.
90
+ """
91
+ return pulumi.get(self, "description")
92
+
93
+ @description.setter
94
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
95
+ pulumi.set(self, "description", value)
96
+
97
+ @_builtins.property
98
+ @pulumi.getter(name="disableAutomatedRotation")
99
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
100
+ """
101
+ Stops rotation of the root credential until set to false.
102
+ """
103
+ return pulumi.get(self, "disable_automated_rotation")
104
+
105
+ @disable_automated_rotation.setter
106
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
107
+ pulumi.set(self, "disable_automated_rotation", value)
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="disableRemount")
111
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
112
+ """
113
+ If set, opts out of mount migration on path updates.
114
+ """
115
+ return pulumi.get(self, "disable_remount")
116
+
117
+ @disable_remount.setter
118
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
119
+ pulumi.set(self, "disable_remount", value)
120
+
121
+ @_builtins.property
122
+ @pulumi.getter
123
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
124
+ """
125
+ The namespace to provision the resource in.
126
+ The value should not contain leading or trailing forward slashes.
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
128
+ *Available only for Vault Enterprise*.
129
+ """
130
+ return pulumi.get(self, "namespace")
131
+
132
+ @namespace.setter
133
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
134
+ pulumi.set(self, "namespace", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter
138
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
139
+ """
140
+ Unique name of the auth backend to configure.
141
+ """
142
+ return pulumi.get(self, "path")
143
+
144
+ @path.setter
145
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
146
+ pulumi.set(self, "path", value)
147
+
148
+ @_builtins.property
149
+ @pulumi.getter(name="rotationPeriod")
150
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
151
+ """
152
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
153
+ """
154
+ return pulumi.get(self, "rotation_period")
155
+
156
+ @rotation_period.setter
157
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
158
+ pulumi.set(self, "rotation_period", value)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="rotationSchedule")
162
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
163
+ """
164
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
165
+ """
166
+ return pulumi.get(self, "rotation_schedule")
167
+
168
+ @rotation_schedule.setter
169
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
170
+ pulumi.set(self, "rotation_schedule", value)
171
+
172
+ @_builtins.property
173
+ @pulumi.getter(name="rotationWindow")
174
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
175
+ """
176
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
177
+ Can only be used with rotation_schedule.
178
+ """
179
+ return pulumi.get(self, "rotation_window")
180
+
181
+ @rotation_window.setter
182
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
183
+ pulumi.set(self, "rotation_window", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter
187
+ def tune(self) -> Optional[pulumi.Input['OciAuthBackendTuneArgs']]:
188
+ """
189
+ Extra configuration block. Structure is documented below.
190
+
191
+ The `tune` block is used to tune the auth backend:
192
+ """
193
+ return pulumi.get(self, "tune")
194
+
195
+ @tune.setter
196
+ def tune(self, value: Optional[pulumi.Input['OciAuthBackendTuneArgs']]):
197
+ pulumi.set(self, "tune", value)
198
+
199
+
200
+ @pulumi.input_type
201
+ class _OciAuthBackendState:
202
+ def __init__(__self__, *,
203
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
204
+ description: Optional[pulumi.Input[_builtins.str]] = None,
205
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
206
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
207
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
208
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
209
+ path: Optional[pulumi.Input[_builtins.str]] = None,
210
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
211
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
212
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
213
+ tune: Optional[pulumi.Input['OciAuthBackendTuneArgs']] = None):
214
+ """
215
+ Input properties used for looking up and filtering OciAuthBackend resources.
216
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the auth backend
217
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
218
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
219
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
220
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
221
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
222
+ The value should not contain leading or trailing forward slashes.
223
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
224
+ *Available only for Vault Enterprise*.
225
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
226
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
227
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
228
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
229
+ Can only be used with rotation_schedule.
230
+ :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
231
+
232
+ The `tune` block is used to tune the auth backend:
233
+ """
234
+ if accessor is not None:
235
+ pulumi.set(__self__, "accessor", accessor)
236
+ if description is not None:
237
+ pulumi.set(__self__, "description", description)
238
+ if disable_automated_rotation is not None:
239
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
240
+ if disable_remount is not None:
241
+ pulumi.set(__self__, "disable_remount", disable_remount)
242
+ if home_tenancy_id is not None:
243
+ pulumi.set(__self__, "home_tenancy_id", home_tenancy_id)
244
+ if namespace is not None:
245
+ pulumi.set(__self__, "namespace", namespace)
246
+ if path is not None:
247
+ pulumi.set(__self__, "path", path)
248
+ if rotation_period is not None:
249
+ pulumi.set(__self__, "rotation_period", rotation_period)
250
+ if rotation_schedule is not None:
251
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
252
+ if rotation_window is not None:
253
+ pulumi.set(__self__, "rotation_window", rotation_window)
254
+ if tune is not None:
255
+ pulumi.set(__self__, "tune", tune)
256
+
257
+ @_builtins.property
258
+ @pulumi.getter
259
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
260
+ """
261
+ The accessor of the auth backend
262
+ """
263
+ return pulumi.get(self, "accessor")
264
+
265
+ @accessor.setter
266
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
267
+ pulumi.set(self, "accessor", value)
268
+
269
+ @_builtins.property
270
+ @pulumi.getter
271
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
272
+ """
273
+ A description of the auth backend.
274
+ """
275
+ return pulumi.get(self, "description")
276
+
277
+ @description.setter
278
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
279
+ pulumi.set(self, "description", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="disableAutomatedRotation")
283
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
284
+ """
285
+ Stops rotation of the root credential until set to false.
286
+ """
287
+ return pulumi.get(self, "disable_automated_rotation")
288
+
289
+ @disable_automated_rotation.setter
290
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
291
+ pulumi.set(self, "disable_automated_rotation", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="disableRemount")
295
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
296
+ """
297
+ If set, opts out of mount migration on path updates.
298
+ """
299
+ return pulumi.get(self, "disable_remount")
300
+
301
+ @disable_remount.setter
302
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
303
+ pulumi.set(self, "disable_remount", value)
304
+
305
+ @_builtins.property
306
+ @pulumi.getter(name="homeTenancyId")
307
+ def home_tenancy_id(self) -> Optional[pulumi.Input[_builtins.str]]:
308
+ """
309
+ The Tenancy OCID of your OCI account.
310
+ """
311
+ return pulumi.get(self, "home_tenancy_id")
312
+
313
+ @home_tenancy_id.setter
314
+ def home_tenancy_id(self, value: Optional[pulumi.Input[_builtins.str]]):
315
+ pulumi.set(self, "home_tenancy_id", value)
316
+
317
+ @_builtins.property
318
+ @pulumi.getter
319
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
320
+ """
321
+ The namespace to provision the resource in.
322
+ The value should not contain leading or trailing forward slashes.
323
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
324
+ *Available only for Vault Enterprise*.
325
+ """
326
+ return pulumi.get(self, "namespace")
327
+
328
+ @namespace.setter
329
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
330
+ pulumi.set(self, "namespace", value)
331
+
332
+ @_builtins.property
333
+ @pulumi.getter
334
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
335
+ """
336
+ Unique name of the auth backend to configure.
337
+ """
338
+ return pulumi.get(self, "path")
339
+
340
+ @path.setter
341
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
342
+ pulumi.set(self, "path", value)
343
+
344
+ @_builtins.property
345
+ @pulumi.getter(name="rotationPeriod")
346
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
347
+ """
348
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
349
+ """
350
+ return pulumi.get(self, "rotation_period")
351
+
352
+ @rotation_period.setter
353
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
354
+ pulumi.set(self, "rotation_period", value)
355
+
356
+ @_builtins.property
357
+ @pulumi.getter(name="rotationSchedule")
358
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
359
+ """
360
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
361
+ """
362
+ return pulumi.get(self, "rotation_schedule")
363
+
364
+ @rotation_schedule.setter
365
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
366
+ pulumi.set(self, "rotation_schedule", value)
367
+
368
+ @_builtins.property
369
+ @pulumi.getter(name="rotationWindow")
370
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
371
+ """
372
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
373
+ Can only be used with rotation_schedule.
374
+ """
375
+ return pulumi.get(self, "rotation_window")
376
+
377
+ @rotation_window.setter
378
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
379
+ pulumi.set(self, "rotation_window", value)
380
+
381
+ @_builtins.property
382
+ @pulumi.getter
383
+ def tune(self) -> Optional[pulumi.Input['OciAuthBackendTuneArgs']]:
384
+ """
385
+ Extra configuration block. Structure is documented below.
386
+
387
+ The `tune` block is used to tune the auth backend:
388
+ """
389
+ return pulumi.get(self, "tune")
390
+
391
+ @tune.setter
392
+ def tune(self, value: Optional[pulumi.Input['OciAuthBackendTuneArgs']]):
393
+ pulumi.set(self, "tune", value)
394
+
395
+
396
+ @pulumi.type_token("vault:index/ociAuthBackend:OciAuthBackend")
397
+ class OciAuthBackend(pulumi.CustomResource):
398
+ @overload
399
+ def __init__(__self__,
400
+ resource_name: str,
401
+ opts: Optional[pulumi.ResourceOptions] = None,
402
+ description: Optional[pulumi.Input[_builtins.str]] = None,
403
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
404
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
405
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
406
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
407
+ path: Optional[pulumi.Input[_builtins.str]] = None,
408
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
409
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
410
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
411
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None,
412
+ __props__=None):
413
+ """
414
+ ## Example Usage
415
+
416
+ ```python
417
+ import pulumi
418
+ import pulumi_vault as vault
419
+
420
+ example = vault.OciAuthBackend("example",
421
+ path=example_vault_auth_backend["path"],
422
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
423
+ ```
424
+
425
+ ## Import
426
+
427
+ OCI auth backends can be imported using the backend's `path`, e.g.
428
+
429
+ ```sh
430
+ $ pulumi import vault:index/ociAuthBackend:OciAuthBackend example oci
431
+ ```
432
+
433
+ :param str resource_name: The name of the resource.
434
+ :param pulumi.ResourceOptions opts: Options for the resource.
435
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
436
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
437
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
438
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
439
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
440
+ The value should not contain leading or trailing forward slashes.
441
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
442
+ *Available only for Vault Enterprise*.
443
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
444
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
445
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
446
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
447
+ Can only be used with rotation_schedule.
448
+ :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
449
+
450
+ The `tune` block is used to tune the auth backend:
451
+ """
452
+ ...
453
+ @overload
454
+ def __init__(__self__,
455
+ resource_name: str,
456
+ args: OciAuthBackendArgs,
457
+ opts: Optional[pulumi.ResourceOptions] = None):
458
+ """
459
+ ## Example Usage
460
+
461
+ ```python
462
+ import pulumi
463
+ import pulumi_vault as vault
464
+
465
+ example = vault.OciAuthBackend("example",
466
+ path=example_vault_auth_backend["path"],
467
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
468
+ ```
469
+
470
+ ## Import
471
+
472
+ OCI auth backends can be imported using the backend's `path`, e.g.
473
+
474
+ ```sh
475
+ $ pulumi import vault:index/ociAuthBackend:OciAuthBackend example oci
476
+ ```
477
+
478
+ :param str resource_name: The name of the resource.
479
+ :param OciAuthBackendArgs args: The arguments to use to populate this resource's properties.
480
+ :param pulumi.ResourceOptions opts: Options for the resource.
481
+ """
482
+ ...
483
+ def __init__(__self__, resource_name: str, *args, **kwargs):
484
+ resource_args, opts = _utilities.get_resource_args_opts(OciAuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
485
+ if resource_args is not None:
486
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
487
+ else:
488
+ __self__._internal_init(resource_name, *args, **kwargs)
489
+
490
+ def _internal_init(__self__,
491
+ resource_name: str,
492
+ opts: Optional[pulumi.ResourceOptions] = None,
493
+ description: Optional[pulumi.Input[_builtins.str]] = None,
494
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
495
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
496
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
497
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
498
+ path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
500
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
501
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
502
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None,
503
+ __props__=None):
504
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
505
+ if not isinstance(opts, pulumi.ResourceOptions):
506
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
507
+ if opts.id is None:
508
+ if __props__ is not None:
509
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
510
+ __props__ = OciAuthBackendArgs.__new__(OciAuthBackendArgs)
511
+
512
+ __props__.__dict__["description"] = description
513
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
514
+ __props__.__dict__["disable_remount"] = disable_remount
515
+ if home_tenancy_id is None and not opts.urn:
516
+ raise TypeError("Missing required property 'home_tenancy_id'")
517
+ __props__.__dict__["home_tenancy_id"] = None if home_tenancy_id is None else pulumi.Output.secret(home_tenancy_id)
518
+ __props__.__dict__["namespace"] = namespace
519
+ __props__.__dict__["path"] = path
520
+ __props__.__dict__["rotation_period"] = rotation_period
521
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
522
+ __props__.__dict__["rotation_window"] = rotation_window
523
+ __props__.__dict__["tune"] = tune
524
+ __props__.__dict__["accessor"] = None
525
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["homeTenancyId"])
526
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
527
+ super(OciAuthBackend, __self__).__init__(
528
+ 'vault:index/ociAuthBackend:OciAuthBackend',
529
+ resource_name,
530
+ __props__,
531
+ opts)
532
+
533
+ @staticmethod
534
+ def get(resource_name: str,
535
+ id: pulumi.Input[str],
536
+ opts: Optional[pulumi.ResourceOptions] = None,
537
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
538
+ description: Optional[pulumi.Input[_builtins.str]] = None,
539
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
540
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
541
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
542
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
543
+ path: Optional[pulumi.Input[_builtins.str]] = None,
544
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
545
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
546
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
547
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None) -> 'OciAuthBackend':
548
+ """
549
+ Get an existing OciAuthBackend resource's state with the given name, id, and optional extra
550
+ properties used to qualify the lookup.
551
+
552
+ :param str resource_name: The unique name of the resulting resource.
553
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
554
+ :param pulumi.ResourceOptions opts: Options for the resource.
555
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the auth backend
556
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
557
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
558
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
559
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
560
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
561
+ The value should not contain leading or trailing forward slashes.
562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
563
+ *Available only for Vault Enterprise*.
564
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
565
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
566
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
567
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
568
+ Can only be used with rotation_schedule.
569
+ :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
570
+
571
+ The `tune` block is used to tune the auth backend:
572
+ """
573
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
574
+
575
+ __props__ = _OciAuthBackendState.__new__(_OciAuthBackendState)
576
+
577
+ __props__.__dict__["accessor"] = accessor
578
+ __props__.__dict__["description"] = description
579
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
580
+ __props__.__dict__["disable_remount"] = disable_remount
581
+ __props__.__dict__["home_tenancy_id"] = home_tenancy_id
582
+ __props__.__dict__["namespace"] = namespace
583
+ __props__.__dict__["path"] = path
584
+ __props__.__dict__["rotation_period"] = rotation_period
585
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
586
+ __props__.__dict__["rotation_window"] = rotation_window
587
+ __props__.__dict__["tune"] = tune
588
+ return OciAuthBackend(resource_name, opts=opts, __props__=__props__)
589
+
590
+ @_builtins.property
591
+ @pulumi.getter
592
+ def accessor(self) -> pulumi.Output[_builtins.str]:
593
+ """
594
+ The accessor of the auth backend
595
+ """
596
+ return pulumi.get(self, "accessor")
597
+
598
+ @_builtins.property
599
+ @pulumi.getter
600
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
601
+ """
602
+ A description of the auth backend.
603
+ """
604
+ return pulumi.get(self, "description")
605
+
606
+ @_builtins.property
607
+ @pulumi.getter(name="disableAutomatedRotation")
608
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
609
+ """
610
+ Stops rotation of the root credential until set to false.
611
+ """
612
+ return pulumi.get(self, "disable_automated_rotation")
613
+
614
+ @_builtins.property
615
+ @pulumi.getter(name="disableRemount")
616
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
617
+ """
618
+ If set, opts out of mount migration on path updates.
619
+ """
620
+ return pulumi.get(self, "disable_remount")
621
+
622
+ @_builtins.property
623
+ @pulumi.getter(name="homeTenancyId")
624
+ def home_tenancy_id(self) -> pulumi.Output[_builtins.str]:
625
+ """
626
+ The Tenancy OCID of your OCI account.
627
+ """
628
+ return pulumi.get(self, "home_tenancy_id")
629
+
630
+ @_builtins.property
631
+ @pulumi.getter
632
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
633
+ """
634
+ The namespace to provision the resource in.
635
+ The value should not contain leading or trailing forward slashes.
636
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
637
+ *Available only for Vault Enterprise*.
638
+ """
639
+ return pulumi.get(self, "namespace")
640
+
641
+ @_builtins.property
642
+ @pulumi.getter
643
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
644
+ """
645
+ Unique name of the auth backend to configure.
646
+ """
647
+ return pulumi.get(self, "path")
648
+
649
+ @_builtins.property
650
+ @pulumi.getter(name="rotationPeriod")
651
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
652
+ """
653
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
654
+ """
655
+ return pulumi.get(self, "rotation_period")
656
+
657
+ @_builtins.property
658
+ @pulumi.getter(name="rotationSchedule")
659
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
660
+ """
661
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
662
+ """
663
+ return pulumi.get(self, "rotation_schedule")
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="rotationWindow")
667
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
668
+ """
669
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
670
+ Can only be used with rotation_schedule.
671
+ """
672
+ return pulumi.get(self, "rotation_window")
673
+
674
+ @_builtins.property
675
+ @pulumi.getter
676
+ def tune(self) -> pulumi.Output['outputs.OciAuthBackendTune']:
677
+ """
678
+ Extra configuration block. Structure is documented below.
679
+
680
+ The `tune` block is used to tune the auth backend:
681
+ """
682
+ return pulumi.get(self, "tune")
683
+