pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,50 +19,50 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendConfigArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
resource: pulumi.Input[
|
24
|
-
tenant_id: pulumi.Input[
|
25
|
-
backend: Optional[pulumi.Input[
|
26
|
-
client_id: Optional[pulumi.Input[
|
27
|
-
client_secret: Optional[pulumi.Input[
|
28
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
29
|
-
environment: Optional[pulumi.Input[
|
30
|
-
identity_token_audience: Optional[pulumi.Input[
|
31
|
-
identity_token_ttl: Optional[pulumi.Input[
|
32
|
-
namespace: Optional[pulumi.Input[
|
33
|
-
rotation_period: Optional[pulumi.Input[
|
34
|
-
rotation_schedule: Optional[pulumi.Input[
|
35
|
-
rotation_window: Optional[pulumi.Input[
|
22
|
+
resource: pulumi.Input[_builtins.str],
|
23
|
+
tenant_id: pulumi.Input[_builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
|
36
35
|
"""
|
37
36
|
The set of arguments for constructing a AuthBackendConfig resource.
|
38
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
39
38
|
Azure Active Directory.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
41
40
|
organization.
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
43
42
|
mounted at. Defaults to `azure`.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
45
44
|
Currently read permissions to query compute resources are required.
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
47
46
|
Azure APIs.
|
48
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
49
48
|
*Available only for Vault Enterprise*
|
50
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
51
50
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
52
51
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
54
53
|
*Available only for Vault Enterprise*
|
55
|
-
:param pulumi.Input[
|
56
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
55
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
57
56
|
The value should not contain leading or trailing forward slashes.
|
58
57
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
59
58
|
*Available only for Vault Enterprise*.
|
60
|
-
:param pulumi.Input[
|
59
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
61
60
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
62
61
|
*Available only for Vault Enterprise*
|
63
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
64
63
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
65
64
|
*Available only for Vault Enterprise*
|
66
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
67
66
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
68
67
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
69
68
|
*Available only for Vault Enterprise*
|
@@ -93,9 +92,9 @@ class AuthBackendConfigArgs:
|
|
93
92
|
if rotation_window is not None:
|
94
93
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter
|
98
|
-
def resource(self) -> pulumi.Input[
|
97
|
+
def resource(self) -> pulumi.Input[_builtins.str]:
|
99
98
|
"""
|
100
99
|
The configured URL for the application registered in
|
101
100
|
Azure Active Directory.
|
@@ -103,12 +102,12 @@ class AuthBackendConfigArgs:
|
|
103
102
|
return pulumi.get(self, "resource")
|
104
103
|
|
105
104
|
@resource.setter
|
106
|
-
def resource(self, value: pulumi.Input[
|
105
|
+
def resource(self, value: pulumi.Input[_builtins.str]):
|
107
106
|
pulumi.set(self, "resource", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter(name="tenantId")
|
111
|
-
def tenant_id(self) -> pulumi.Input[
|
110
|
+
def tenant_id(self) -> pulumi.Input[_builtins.str]:
|
112
111
|
"""
|
113
112
|
The tenant id for the Azure Active Directory
|
114
113
|
organization.
|
@@ -116,12 +115,12 @@ class AuthBackendConfigArgs:
|
|
116
115
|
return pulumi.get(self, "tenant_id")
|
117
116
|
|
118
117
|
@tenant_id.setter
|
119
|
-
def tenant_id(self, value: pulumi.Input[
|
118
|
+
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
120
119
|
pulumi.set(self, "tenant_id", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
|
-
def backend(self) -> Optional[pulumi.Input[
|
123
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
The path the Azure auth backend being configured was
|
127
126
|
mounted at. Defaults to `azure`.
|
@@ -129,12 +128,12 @@ class AuthBackendConfigArgs:
|
|
129
128
|
return pulumi.get(self, "backend")
|
130
129
|
|
131
130
|
@backend.setter
|
132
|
-
def backend(self, value: Optional[pulumi.Input[
|
131
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
133
132
|
pulumi.set(self, "backend", value)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="clientId")
|
137
|
-
def client_id(self) -> Optional[pulumi.Input[
|
136
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
138
137
|
"""
|
139
138
|
The client id for credentials to query the Azure APIs.
|
140
139
|
Currently read permissions to query compute resources are required.
|
@@ -142,12 +141,12 @@ class AuthBackendConfigArgs:
|
|
142
141
|
return pulumi.get(self, "client_id")
|
143
142
|
|
144
143
|
@client_id.setter
|
145
|
-
def client_id(self, value: Optional[pulumi.Input[
|
144
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
146
145
|
pulumi.set(self, "client_id", value)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="clientSecret")
|
150
|
-
def client_secret(self) -> Optional[pulumi.Input[
|
149
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
151
150
|
"""
|
152
151
|
The client secret for credentials to query the
|
153
152
|
Azure APIs.
|
@@ -155,12 +154,12 @@ class AuthBackendConfigArgs:
|
|
155
154
|
return pulumi.get(self, "client_secret")
|
156
155
|
|
157
156
|
@client_secret.setter
|
158
|
-
def client_secret(self, value: Optional[pulumi.Input[
|
157
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "client_secret", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="disableAutomatedRotation")
|
163
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
162
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
164
163
|
"""
|
165
164
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
166
165
|
*Available only for Vault Enterprise*
|
@@ -168,12 +167,12 @@ class AuthBackendConfigArgs:
|
|
168
167
|
return pulumi.get(self, "disable_automated_rotation")
|
169
168
|
|
170
169
|
@disable_automated_rotation.setter
|
171
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
170
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
172
171
|
pulumi.set(self, "disable_automated_rotation", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter
|
176
|
-
def environment(self) -> Optional[pulumi.Input[
|
175
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
The Azure cloud environment. Valid values:
|
179
178
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -182,12 +181,12 @@ class AuthBackendConfigArgs:
|
|
182
181
|
return pulumi.get(self, "environment")
|
183
182
|
|
184
183
|
@environment.setter
|
185
|
-
def environment(self, value: Optional[pulumi.Input[
|
184
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
186
185
|
pulumi.set(self, "environment", value)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter(name="identityTokenAudience")
|
190
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
189
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
191
190
|
"""
|
192
191
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
193
192
|
*Available only for Vault Enterprise*
|
@@ -195,24 +194,24 @@ class AuthBackendConfigArgs:
|
|
195
194
|
return pulumi.get(self, "identity_token_audience")
|
196
195
|
|
197
196
|
@identity_token_audience.setter
|
198
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
197
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
199
198
|
pulumi.set(self, "identity_token_audience", value)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter(name="identityTokenTtl")
|
203
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
202
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
204
203
|
"""
|
205
204
|
The TTL of generated identity tokens in seconds.
|
206
205
|
"""
|
207
206
|
return pulumi.get(self, "identity_token_ttl")
|
208
207
|
|
209
208
|
@identity_token_ttl.setter
|
210
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
209
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
211
210
|
pulumi.set(self, "identity_token_ttl", value)
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter
|
215
|
-
def namespace(self) -> Optional[pulumi.Input[
|
214
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
215
|
"""
|
217
216
|
The namespace to provision the resource in.
|
218
217
|
The value should not contain leading or trailing forward slashes.
|
@@ -222,12 +221,12 @@ class AuthBackendConfigArgs:
|
|
222
221
|
return pulumi.get(self, "namespace")
|
223
222
|
|
224
223
|
@namespace.setter
|
225
|
-
def namespace(self, value: Optional[pulumi.Input[
|
224
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
226
225
|
pulumi.set(self, "namespace", value)
|
227
226
|
|
228
|
-
@property
|
227
|
+
@_builtins.property
|
229
228
|
@pulumi.getter(name="rotationPeriod")
|
230
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
229
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
231
230
|
"""
|
232
231
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
233
232
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -236,12 +235,12 @@ class AuthBackendConfigArgs:
|
|
236
235
|
return pulumi.get(self, "rotation_period")
|
237
236
|
|
238
237
|
@rotation_period.setter
|
239
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
238
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
240
239
|
pulumi.set(self, "rotation_period", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter(name="rotationSchedule")
|
244
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
243
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
245
244
|
"""
|
246
245
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
247
246
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -250,12 +249,12 @@ class AuthBackendConfigArgs:
|
|
250
249
|
return pulumi.get(self, "rotation_schedule")
|
251
250
|
|
252
251
|
@rotation_schedule.setter
|
253
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
252
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
254
253
|
pulumi.set(self, "rotation_schedule", value)
|
255
254
|
|
256
|
-
@property
|
255
|
+
@_builtins.property
|
257
256
|
@pulumi.getter(name="rotationWindow")
|
258
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
257
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
259
258
|
"""
|
260
259
|
The maximum amount of time in seconds allowed to complete
|
261
260
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -265,59 +264,59 @@ class AuthBackendConfigArgs:
|
|
265
264
|
return pulumi.get(self, "rotation_window")
|
266
265
|
|
267
266
|
@rotation_window.setter
|
268
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
267
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
269
268
|
pulumi.set(self, "rotation_window", value)
|
270
269
|
|
271
270
|
|
272
271
|
@pulumi.input_type
|
273
272
|
class _AuthBackendConfigState:
|
274
273
|
def __init__(__self__, *,
|
275
|
-
backend: Optional[pulumi.Input[
|
276
|
-
client_id: Optional[pulumi.Input[
|
277
|
-
client_secret: Optional[pulumi.Input[
|
278
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
279
|
-
environment: Optional[pulumi.Input[
|
280
|
-
identity_token_audience: Optional[pulumi.Input[
|
281
|
-
identity_token_ttl: Optional[pulumi.Input[
|
282
|
-
namespace: Optional[pulumi.Input[
|
283
|
-
resource: Optional[pulumi.Input[
|
284
|
-
rotation_period: Optional[pulumi.Input[
|
285
|
-
rotation_schedule: Optional[pulumi.Input[
|
286
|
-
rotation_window: Optional[pulumi.Input[
|
287
|
-
tenant_id: Optional[pulumi.Input[
|
274
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
275
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
276
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
277
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
278
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
279
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
280
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
281
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
282
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
283
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
284
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
285
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
286
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
|
288
287
|
"""
|
289
288
|
Input properties used for looking up and filtering AuthBackendConfig resources.
|
290
|
-
:param pulumi.Input[
|
289
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
291
290
|
mounted at. Defaults to `azure`.
|
292
|
-
:param pulumi.Input[
|
291
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
293
292
|
Currently read permissions to query compute resources are required.
|
294
|
-
:param pulumi.Input[
|
293
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
295
294
|
Azure APIs.
|
296
|
-
:param pulumi.Input[
|
295
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
297
296
|
*Available only for Vault Enterprise*
|
298
|
-
:param pulumi.Input[
|
297
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
299
298
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
300
299
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
301
|
-
:param pulumi.Input[
|
300
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
302
301
|
*Available only for Vault Enterprise*
|
303
|
-
:param pulumi.Input[
|
304
|
-
:param pulumi.Input[
|
302
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
303
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
305
304
|
The value should not contain leading or trailing forward slashes.
|
306
305
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
307
306
|
*Available only for Vault Enterprise*.
|
308
|
-
:param pulumi.Input[
|
307
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
309
308
|
Azure Active Directory.
|
310
|
-
:param pulumi.Input[
|
309
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
311
310
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
312
311
|
*Available only for Vault Enterprise*
|
313
|
-
:param pulumi.Input[
|
312
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
314
313
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
315
314
|
*Available only for Vault Enterprise*
|
316
|
-
:param pulumi.Input[
|
315
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
317
316
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
318
317
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
319
318
|
*Available only for Vault Enterprise*
|
320
|
-
:param pulumi.Input[
|
319
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
321
320
|
organization.
|
322
321
|
"""
|
323
322
|
if backend is not None:
|
@@ -347,9 +346,9 @@ class _AuthBackendConfigState:
|
|
347
346
|
if tenant_id is not None:
|
348
347
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter
|
352
|
-
def backend(self) -> Optional[pulumi.Input[
|
351
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
353
352
|
"""
|
354
353
|
The path the Azure auth backend being configured was
|
355
354
|
mounted at. Defaults to `azure`.
|
@@ -357,12 +356,12 @@ class _AuthBackendConfigState:
|
|
357
356
|
return pulumi.get(self, "backend")
|
358
357
|
|
359
358
|
@backend.setter
|
360
|
-
def backend(self, value: Optional[pulumi.Input[
|
359
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
361
360
|
pulumi.set(self, "backend", value)
|
362
361
|
|
363
|
-
@property
|
362
|
+
@_builtins.property
|
364
363
|
@pulumi.getter(name="clientId")
|
365
|
-
def client_id(self) -> Optional[pulumi.Input[
|
364
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
366
365
|
"""
|
367
366
|
The client id for credentials to query the Azure APIs.
|
368
367
|
Currently read permissions to query compute resources are required.
|
@@ -370,12 +369,12 @@ class _AuthBackendConfigState:
|
|
370
369
|
return pulumi.get(self, "client_id")
|
371
370
|
|
372
371
|
@client_id.setter
|
373
|
-
def client_id(self, value: Optional[pulumi.Input[
|
372
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
374
373
|
pulumi.set(self, "client_id", value)
|
375
374
|
|
376
|
-
@property
|
375
|
+
@_builtins.property
|
377
376
|
@pulumi.getter(name="clientSecret")
|
378
|
-
def client_secret(self) -> Optional[pulumi.Input[
|
377
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
379
378
|
"""
|
380
379
|
The client secret for credentials to query the
|
381
380
|
Azure APIs.
|
@@ -383,12 +382,12 @@ class _AuthBackendConfigState:
|
|
383
382
|
return pulumi.get(self, "client_secret")
|
384
383
|
|
385
384
|
@client_secret.setter
|
386
|
-
def client_secret(self, value: Optional[pulumi.Input[
|
385
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
387
386
|
pulumi.set(self, "client_secret", value)
|
388
387
|
|
389
|
-
@property
|
388
|
+
@_builtins.property
|
390
389
|
@pulumi.getter(name="disableAutomatedRotation")
|
391
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
390
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
392
391
|
"""
|
393
392
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
394
393
|
*Available only for Vault Enterprise*
|
@@ -396,12 +395,12 @@ class _AuthBackendConfigState:
|
|
396
395
|
return pulumi.get(self, "disable_automated_rotation")
|
397
396
|
|
398
397
|
@disable_automated_rotation.setter
|
399
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
398
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
400
399
|
pulumi.set(self, "disable_automated_rotation", value)
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter
|
404
|
-
def environment(self) -> Optional[pulumi.Input[
|
403
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
405
404
|
"""
|
406
405
|
The Azure cloud environment. Valid values:
|
407
406
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -410,12 +409,12 @@ class _AuthBackendConfigState:
|
|
410
409
|
return pulumi.get(self, "environment")
|
411
410
|
|
412
411
|
@environment.setter
|
413
|
-
def environment(self, value: Optional[pulumi.Input[
|
412
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
414
413
|
pulumi.set(self, "environment", value)
|
415
414
|
|
416
|
-
@property
|
415
|
+
@_builtins.property
|
417
416
|
@pulumi.getter(name="identityTokenAudience")
|
418
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
417
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
419
418
|
"""
|
420
419
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
421
420
|
*Available only for Vault Enterprise*
|
@@ -423,24 +422,24 @@ class _AuthBackendConfigState:
|
|
423
422
|
return pulumi.get(self, "identity_token_audience")
|
424
423
|
|
425
424
|
@identity_token_audience.setter
|
426
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
425
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
427
426
|
pulumi.set(self, "identity_token_audience", value)
|
428
427
|
|
429
|
-
@property
|
428
|
+
@_builtins.property
|
430
429
|
@pulumi.getter(name="identityTokenTtl")
|
431
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
430
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
432
431
|
"""
|
433
432
|
The TTL of generated identity tokens in seconds.
|
434
433
|
"""
|
435
434
|
return pulumi.get(self, "identity_token_ttl")
|
436
435
|
|
437
436
|
@identity_token_ttl.setter
|
438
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
437
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
439
438
|
pulumi.set(self, "identity_token_ttl", value)
|
440
439
|
|
441
|
-
@property
|
440
|
+
@_builtins.property
|
442
441
|
@pulumi.getter
|
443
|
-
def namespace(self) -> Optional[pulumi.Input[
|
442
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
444
443
|
"""
|
445
444
|
The namespace to provision the resource in.
|
446
445
|
The value should not contain leading or trailing forward slashes.
|
@@ -450,12 +449,12 @@ class _AuthBackendConfigState:
|
|
450
449
|
return pulumi.get(self, "namespace")
|
451
450
|
|
452
451
|
@namespace.setter
|
453
|
-
def namespace(self, value: Optional[pulumi.Input[
|
452
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
454
453
|
pulumi.set(self, "namespace", value)
|
455
454
|
|
456
|
-
@property
|
455
|
+
@_builtins.property
|
457
456
|
@pulumi.getter
|
458
|
-
def resource(self) -> Optional[pulumi.Input[
|
457
|
+
def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
|
459
458
|
"""
|
460
459
|
The configured URL for the application registered in
|
461
460
|
Azure Active Directory.
|
@@ -463,12 +462,12 @@ class _AuthBackendConfigState:
|
|
463
462
|
return pulumi.get(self, "resource")
|
464
463
|
|
465
464
|
@resource.setter
|
466
|
-
def resource(self, value: Optional[pulumi.Input[
|
465
|
+
def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
|
467
466
|
pulumi.set(self, "resource", value)
|
468
467
|
|
469
|
-
@property
|
468
|
+
@_builtins.property
|
470
469
|
@pulumi.getter(name="rotationPeriod")
|
471
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
470
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
472
471
|
"""
|
473
472
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
474
473
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -477,12 +476,12 @@ class _AuthBackendConfigState:
|
|
477
476
|
return pulumi.get(self, "rotation_period")
|
478
477
|
|
479
478
|
@rotation_period.setter
|
480
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
479
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
481
480
|
pulumi.set(self, "rotation_period", value)
|
482
481
|
|
483
|
-
@property
|
482
|
+
@_builtins.property
|
484
483
|
@pulumi.getter(name="rotationSchedule")
|
485
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
484
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
486
485
|
"""
|
487
486
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
488
487
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -491,12 +490,12 @@ class _AuthBackendConfigState:
|
|
491
490
|
return pulumi.get(self, "rotation_schedule")
|
492
491
|
|
493
492
|
@rotation_schedule.setter
|
494
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
493
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
495
494
|
pulumi.set(self, "rotation_schedule", value)
|
496
495
|
|
497
|
-
@property
|
496
|
+
@_builtins.property
|
498
497
|
@pulumi.getter(name="rotationWindow")
|
499
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
498
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
500
499
|
"""
|
501
500
|
The maximum amount of time in seconds allowed to complete
|
502
501
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -506,12 +505,12 @@ class _AuthBackendConfigState:
|
|
506
505
|
return pulumi.get(self, "rotation_window")
|
507
506
|
|
508
507
|
@rotation_window.setter
|
509
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
508
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
510
509
|
pulumi.set(self, "rotation_window", value)
|
511
510
|
|
512
|
-
@property
|
511
|
+
@_builtins.property
|
513
512
|
@pulumi.getter(name="tenantId")
|
514
|
-
def tenant_id(self) -> Optional[pulumi.Input[
|
513
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
515
514
|
"""
|
516
515
|
The tenant id for the Azure Active Directory
|
517
516
|
organization.
|
@@ -519,7 +518,7 @@ class _AuthBackendConfigState:
|
|
519
518
|
return pulumi.get(self, "tenant_id")
|
520
519
|
|
521
520
|
@tenant_id.setter
|
522
|
-
def tenant_id(self, value: Optional[pulumi.Input[
|
521
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
523
522
|
pulumi.set(self, "tenant_id", value)
|
524
523
|
|
525
524
|
|
@@ -529,19 +528,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
529
528
|
def __init__(__self__,
|
530
529
|
resource_name: str,
|
531
530
|
opts: Optional[pulumi.ResourceOptions] = None,
|
532
|
-
backend: Optional[pulumi.Input[
|
533
|
-
client_id: Optional[pulumi.Input[
|
534
|
-
client_secret: Optional[pulumi.Input[
|
535
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
536
|
-
environment: Optional[pulumi.Input[
|
537
|
-
identity_token_audience: Optional[pulumi.Input[
|
538
|
-
identity_token_ttl: Optional[pulumi.Input[
|
539
|
-
namespace: Optional[pulumi.Input[
|
540
|
-
resource: Optional[pulumi.Input[
|
541
|
-
rotation_period: Optional[pulumi.Input[
|
542
|
-
rotation_schedule: Optional[pulumi.Input[
|
543
|
-
rotation_window: Optional[pulumi.Input[
|
544
|
-
tenant_id: Optional[pulumi.Input[
|
531
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
532
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
533
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
534
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
535
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
536
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
537
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
538
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
539
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
540
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
541
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
542
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
543
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
545
544
|
__props__=None):
|
546
545
|
"""
|
547
546
|
## Example Usage
|
@@ -589,37 +588,37 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
589
588
|
|
590
589
|
:param str resource_name: The name of the resource.
|
591
590
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
592
|
-
:param pulumi.Input[
|
591
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
593
592
|
mounted at. Defaults to `azure`.
|
594
|
-
:param pulumi.Input[
|
593
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
595
594
|
Currently read permissions to query compute resources are required.
|
596
|
-
:param pulumi.Input[
|
595
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
597
596
|
Azure APIs.
|
598
|
-
:param pulumi.Input[
|
597
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
599
598
|
*Available only for Vault Enterprise*
|
600
|
-
:param pulumi.Input[
|
599
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
601
600
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
602
601
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
603
|
-
:param pulumi.Input[
|
602
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
604
603
|
*Available only for Vault Enterprise*
|
605
|
-
:param pulumi.Input[
|
606
|
-
:param pulumi.Input[
|
604
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
605
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
607
606
|
The value should not contain leading or trailing forward slashes.
|
608
607
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
609
608
|
*Available only for Vault Enterprise*.
|
610
|
-
:param pulumi.Input[
|
609
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
611
610
|
Azure Active Directory.
|
612
|
-
:param pulumi.Input[
|
611
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
613
612
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
614
613
|
*Available only for Vault Enterprise*
|
615
|
-
:param pulumi.Input[
|
614
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
616
615
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
617
616
|
*Available only for Vault Enterprise*
|
618
|
-
:param pulumi.Input[
|
617
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
619
618
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
620
619
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
621
620
|
*Available only for Vault Enterprise*
|
622
|
-
:param pulumi.Input[
|
621
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
623
622
|
organization.
|
624
623
|
"""
|
625
624
|
...
|
@@ -687,19 +686,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
687
686
|
def _internal_init(__self__,
|
688
687
|
resource_name: str,
|
689
688
|
opts: Optional[pulumi.ResourceOptions] = None,
|
690
|
-
backend: Optional[pulumi.Input[
|
691
|
-
client_id: Optional[pulumi.Input[
|
692
|
-
client_secret: Optional[pulumi.Input[
|
693
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
694
|
-
environment: Optional[pulumi.Input[
|
695
|
-
identity_token_audience: Optional[pulumi.Input[
|
696
|
-
identity_token_ttl: Optional[pulumi.Input[
|
697
|
-
namespace: Optional[pulumi.Input[
|
698
|
-
resource: Optional[pulumi.Input[
|
699
|
-
rotation_period: Optional[pulumi.Input[
|
700
|
-
rotation_schedule: Optional[pulumi.Input[
|
701
|
-
rotation_window: Optional[pulumi.Input[
|
702
|
-
tenant_id: Optional[pulumi.Input[
|
689
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
690
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
691
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
692
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
693
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
694
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
695
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
696
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
697
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
698
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
699
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
700
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
701
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
703
702
|
__props__=None):
|
704
703
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
705
704
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -738,19 +737,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
738
737
|
def get(resource_name: str,
|
739
738
|
id: pulumi.Input[str],
|
740
739
|
opts: Optional[pulumi.ResourceOptions] = None,
|
741
|
-
backend: Optional[pulumi.Input[
|
742
|
-
client_id: Optional[pulumi.Input[
|
743
|
-
client_secret: Optional[pulumi.Input[
|
744
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
745
|
-
environment: Optional[pulumi.Input[
|
746
|
-
identity_token_audience: Optional[pulumi.Input[
|
747
|
-
identity_token_ttl: Optional[pulumi.Input[
|
748
|
-
namespace: Optional[pulumi.Input[
|
749
|
-
resource: Optional[pulumi.Input[
|
750
|
-
rotation_period: Optional[pulumi.Input[
|
751
|
-
rotation_schedule: Optional[pulumi.Input[
|
752
|
-
rotation_window: Optional[pulumi.Input[
|
753
|
-
tenant_id: Optional[pulumi.Input[
|
740
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
741
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
742
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
743
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
744
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
745
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
746
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
747
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
748
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
749
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
750
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
751
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
752
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfig':
|
754
753
|
"""
|
755
754
|
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
756
755
|
properties used to qualify the lookup.
|
@@ -758,37 +757,37 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
758
757
|
:param str resource_name: The unique name of the resulting resource.
|
759
758
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
760
759
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
761
|
-
:param pulumi.Input[
|
760
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
762
761
|
mounted at. Defaults to `azure`.
|
763
|
-
:param pulumi.Input[
|
762
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
764
763
|
Currently read permissions to query compute resources are required.
|
765
|
-
:param pulumi.Input[
|
764
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
766
765
|
Azure APIs.
|
767
|
-
:param pulumi.Input[
|
766
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
768
767
|
*Available only for Vault Enterprise*
|
769
|
-
:param pulumi.Input[
|
768
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
770
769
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
771
770
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
772
|
-
:param pulumi.Input[
|
771
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
773
772
|
*Available only for Vault Enterprise*
|
774
|
-
:param pulumi.Input[
|
775
|
-
:param pulumi.Input[
|
773
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
774
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
776
775
|
The value should not contain leading or trailing forward slashes.
|
777
776
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
778
777
|
*Available only for Vault Enterprise*.
|
779
|
-
:param pulumi.Input[
|
778
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
780
779
|
Azure Active Directory.
|
781
|
-
:param pulumi.Input[
|
780
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
782
781
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
783
782
|
*Available only for Vault Enterprise*
|
784
|
-
:param pulumi.Input[
|
783
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
785
784
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
786
785
|
*Available only for Vault Enterprise*
|
787
|
-
:param pulumi.Input[
|
786
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
788
787
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
789
788
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
790
789
|
*Available only for Vault Enterprise*
|
791
|
-
:param pulumi.Input[
|
790
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
792
791
|
organization.
|
793
792
|
"""
|
794
793
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -810,45 +809,45 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
810
809
|
__props__.__dict__["tenant_id"] = tenant_id
|
811
810
|
return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
|
812
811
|
|
813
|
-
@property
|
812
|
+
@_builtins.property
|
814
813
|
@pulumi.getter
|
815
|
-
def backend(self) -> pulumi.Output[Optional[
|
814
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
816
815
|
"""
|
817
816
|
The path the Azure auth backend being configured was
|
818
817
|
mounted at. Defaults to `azure`.
|
819
818
|
"""
|
820
819
|
return pulumi.get(self, "backend")
|
821
820
|
|
822
|
-
@property
|
821
|
+
@_builtins.property
|
823
822
|
@pulumi.getter(name="clientId")
|
824
|
-
def client_id(self) -> pulumi.Output[Optional[
|
823
|
+
def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
825
824
|
"""
|
826
825
|
The client id for credentials to query the Azure APIs.
|
827
826
|
Currently read permissions to query compute resources are required.
|
828
827
|
"""
|
829
828
|
return pulumi.get(self, "client_id")
|
830
829
|
|
831
|
-
@property
|
830
|
+
@_builtins.property
|
832
831
|
@pulumi.getter(name="clientSecret")
|
833
|
-
def client_secret(self) -> pulumi.Output[Optional[
|
832
|
+
def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
|
834
833
|
"""
|
835
834
|
The client secret for credentials to query the
|
836
835
|
Azure APIs.
|
837
836
|
"""
|
838
837
|
return pulumi.get(self, "client_secret")
|
839
838
|
|
840
|
-
@property
|
839
|
+
@_builtins.property
|
841
840
|
@pulumi.getter(name="disableAutomatedRotation")
|
842
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
841
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
843
842
|
"""
|
844
843
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
845
844
|
*Available only for Vault Enterprise*
|
846
845
|
"""
|
847
846
|
return pulumi.get(self, "disable_automated_rotation")
|
848
847
|
|
849
|
-
@property
|
848
|
+
@_builtins.property
|
850
849
|
@pulumi.getter
|
851
|
-
def environment(self) -> pulumi.Output[Optional[
|
850
|
+
def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
|
852
851
|
"""
|
853
852
|
The Azure cloud environment. Valid values:
|
854
853
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
@@ -856,26 +855,26 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
856
855
|
"""
|
857
856
|
return pulumi.get(self, "environment")
|
858
857
|
|
859
|
-
@property
|
858
|
+
@_builtins.property
|
860
859
|
@pulumi.getter(name="identityTokenAudience")
|
861
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[
|
860
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
862
861
|
"""
|
863
862
|
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
864
863
|
*Available only for Vault Enterprise*
|
865
864
|
"""
|
866
865
|
return pulumi.get(self, "identity_token_audience")
|
867
866
|
|
868
|
-
@property
|
867
|
+
@_builtins.property
|
869
868
|
@pulumi.getter(name="identityTokenTtl")
|
870
|
-
def identity_token_ttl(self) -> pulumi.Output[
|
869
|
+
def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
871
870
|
"""
|
872
871
|
The TTL of generated identity tokens in seconds.
|
873
872
|
"""
|
874
873
|
return pulumi.get(self, "identity_token_ttl")
|
875
874
|
|
876
|
-
@property
|
875
|
+
@_builtins.property
|
877
876
|
@pulumi.getter
|
878
|
-
def namespace(self) -> pulumi.Output[Optional[
|
877
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
879
878
|
"""
|
880
879
|
The namespace to provision the resource in.
|
881
880
|
The value should not contain leading or trailing forward slashes.
|
@@ -884,18 +883,18 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
884
883
|
"""
|
885
884
|
return pulumi.get(self, "namespace")
|
886
885
|
|
887
|
-
@property
|
886
|
+
@_builtins.property
|
888
887
|
@pulumi.getter
|
889
|
-
def resource(self) -> pulumi.Output[
|
888
|
+
def resource(self) -> pulumi.Output[_builtins.str]:
|
890
889
|
"""
|
891
890
|
The configured URL for the application registered in
|
892
891
|
Azure Active Directory.
|
893
892
|
"""
|
894
893
|
return pulumi.get(self, "resource")
|
895
894
|
|
896
|
-
@property
|
895
|
+
@_builtins.property
|
897
896
|
@pulumi.getter(name="rotationPeriod")
|
898
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
897
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
899
898
|
"""
|
900
899
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
901
900
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -903,9 +902,9 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
903
902
|
"""
|
904
903
|
return pulumi.get(self, "rotation_period")
|
905
904
|
|
906
|
-
@property
|
905
|
+
@_builtins.property
|
907
906
|
@pulumi.getter(name="rotationSchedule")
|
908
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
907
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
909
908
|
"""
|
910
909
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
911
910
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -913,9 +912,9 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
913
912
|
"""
|
914
913
|
return pulumi.get(self, "rotation_schedule")
|
915
914
|
|
916
|
-
@property
|
915
|
+
@_builtins.property
|
917
916
|
@pulumi.getter(name="rotationWindow")
|
918
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
917
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
919
918
|
"""
|
920
919
|
The maximum amount of time in seconds allowed to complete
|
921
920
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -924,9 +923,9 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
924
923
|
"""
|
925
924
|
return pulumi.get(self, "rotation_window")
|
926
925
|
|
927
|
-
@property
|
926
|
+
@_builtins.property
|
928
927
|
@pulumi.getter(name="tenantId")
|
929
|
-
def tenant_id(self) -> pulumi.Output[
|
928
|
+
def tenant_id(self) -> pulumi.Output[_builtins.str]:
|
930
929
|
"""
|
931
930
|
The tenant id for the Azure Active Directory
|
932
931
|
organization.
|