pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,676 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['OciAuthBackendArgs', 'OciAuthBackend']
20
+
21
+ @pulumi.input_type
22
+ class OciAuthBackendArgs:
23
+ def __init__(__self__, *,
24
+ home_tenancy_id: pulumi.Input[_builtins.str],
25
+ description: Optional[pulumi.Input[_builtins.str]] = None,
26
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ path: Optional[pulumi.Input[_builtins.str]] = None,
30
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
31
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
32
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
33
+ tune: Optional[pulumi.Input['OciAuthBackendTuneArgs']] = None):
34
+ """
35
+ The set of arguments for constructing a OciAuthBackend resource.
36
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
37
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
38
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
39
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
45
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
46
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
47
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
48
+ :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
49
+
50
+ The `tune` block is used to tune the auth backend:
51
+ """
52
+ pulumi.set(__self__, "home_tenancy_id", home_tenancy_id)
53
+ if description is not None:
54
+ pulumi.set(__self__, "description", description)
55
+ if disable_automated_rotation is not None:
56
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
57
+ if disable_remount is not None:
58
+ pulumi.set(__self__, "disable_remount", disable_remount)
59
+ if namespace is not None:
60
+ pulumi.set(__self__, "namespace", namespace)
61
+ if path is not None:
62
+ pulumi.set(__self__, "path", path)
63
+ if rotation_period is not None:
64
+ pulumi.set(__self__, "rotation_period", rotation_period)
65
+ if rotation_schedule is not None:
66
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
67
+ if rotation_window is not None:
68
+ pulumi.set(__self__, "rotation_window", rotation_window)
69
+ if tune is not None:
70
+ pulumi.set(__self__, "tune", tune)
71
+
72
+ @_builtins.property
73
+ @pulumi.getter(name="homeTenancyId")
74
+ def home_tenancy_id(self) -> pulumi.Input[_builtins.str]:
75
+ """
76
+ The Tenancy OCID of your OCI account.
77
+ """
78
+ return pulumi.get(self, "home_tenancy_id")
79
+
80
+ @home_tenancy_id.setter
81
+ def home_tenancy_id(self, value: pulumi.Input[_builtins.str]):
82
+ pulumi.set(self, "home_tenancy_id", value)
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
87
+ """
88
+ A description of the auth backend.
89
+ """
90
+ return pulumi.get(self, "description")
91
+
92
+ @description.setter
93
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
94
+ pulumi.set(self, "description", value)
95
+
96
+ @_builtins.property
97
+ @pulumi.getter(name="disableAutomatedRotation")
98
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
99
+ """
100
+ Stops rotation of the root credential until set to false.
101
+ """
102
+ return pulumi.get(self, "disable_automated_rotation")
103
+
104
+ @disable_automated_rotation.setter
105
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
106
+ pulumi.set(self, "disable_automated_rotation", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter(name="disableRemount")
110
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
111
+ """
112
+ If set, opts out of mount migration on path updates.
113
+ """
114
+ return pulumi.get(self, "disable_remount")
115
+
116
+ @disable_remount.setter
117
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
118
+ pulumi.set(self, "disable_remount", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter
122
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
123
+ """
124
+ The namespace to provision the resource in.
125
+ The value should not contain leading or trailing forward slashes.
126
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
127
+ *Available only for Vault Enterprise*.
128
+ """
129
+ return pulumi.get(self, "namespace")
130
+
131
+ @namespace.setter
132
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
133
+ pulumi.set(self, "namespace", value)
134
+
135
+ @_builtins.property
136
+ @pulumi.getter
137
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
138
+ """
139
+ Unique name of the auth backend to configure.
140
+ """
141
+ return pulumi.get(self, "path")
142
+
143
+ @path.setter
144
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
145
+ pulumi.set(self, "path", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter(name="rotationPeriod")
149
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
150
+ """
151
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
152
+ """
153
+ return pulumi.get(self, "rotation_period")
154
+
155
+ @rotation_period.setter
156
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
157
+ pulumi.set(self, "rotation_period", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="rotationSchedule")
161
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
164
+ """
165
+ return pulumi.get(self, "rotation_schedule")
166
+
167
+ @rotation_schedule.setter
168
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
169
+ pulumi.set(self, "rotation_schedule", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="rotationWindow")
173
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
174
+ """
175
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
176
+ """
177
+ return pulumi.get(self, "rotation_window")
178
+
179
+ @rotation_window.setter
180
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
181
+ pulumi.set(self, "rotation_window", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter
185
+ def tune(self) -> Optional[pulumi.Input['OciAuthBackendTuneArgs']]:
186
+ """
187
+ Extra configuration block. Structure is documented below.
188
+
189
+ The `tune` block is used to tune the auth backend:
190
+ """
191
+ return pulumi.get(self, "tune")
192
+
193
+ @tune.setter
194
+ def tune(self, value: Optional[pulumi.Input['OciAuthBackendTuneArgs']]):
195
+ pulumi.set(self, "tune", value)
196
+
197
+
198
+ @pulumi.input_type
199
+ class _OciAuthBackendState:
200
+ def __init__(__self__, *,
201
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
202
+ description: Optional[pulumi.Input[_builtins.str]] = None,
203
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
204
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
205
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
206
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
207
+ path: Optional[pulumi.Input[_builtins.str]] = None,
208
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
209
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
210
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
211
+ tune: Optional[pulumi.Input['OciAuthBackendTuneArgs']] = None):
212
+ """
213
+ Input properties used for looking up and filtering OciAuthBackend resources.
214
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the auth backend
215
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
216
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
217
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
218
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
219
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
220
+ The value should not contain leading or trailing forward slashes.
221
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
222
+ *Available only for Vault Enterprise*.
223
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
224
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
225
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
226
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
227
+ :param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
228
+
229
+ The `tune` block is used to tune the auth backend:
230
+ """
231
+ if accessor is not None:
232
+ pulumi.set(__self__, "accessor", accessor)
233
+ if description is not None:
234
+ pulumi.set(__self__, "description", description)
235
+ if disable_automated_rotation is not None:
236
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
237
+ if disable_remount is not None:
238
+ pulumi.set(__self__, "disable_remount", disable_remount)
239
+ if home_tenancy_id is not None:
240
+ pulumi.set(__self__, "home_tenancy_id", home_tenancy_id)
241
+ if namespace is not None:
242
+ pulumi.set(__self__, "namespace", namespace)
243
+ if path is not None:
244
+ pulumi.set(__self__, "path", path)
245
+ if rotation_period is not None:
246
+ pulumi.set(__self__, "rotation_period", rotation_period)
247
+ if rotation_schedule is not None:
248
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
249
+ if rotation_window is not None:
250
+ pulumi.set(__self__, "rotation_window", rotation_window)
251
+ if tune is not None:
252
+ pulumi.set(__self__, "tune", tune)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter
256
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
257
+ """
258
+ The accessor of the auth backend
259
+ """
260
+ return pulumi.get(self, "accessor")
261
+
262
+ @accessor.setter
263
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
264
+ pulumi.set(self, "accessor", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter
268
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
269
+ """
270
+ A description of the auth backend.
271
+ """
272
+ return pulumi.get(self, "description")
273
+
274
+ @description.setter
275
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
276
+ pulumi.set(self, "description", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="disableAutomatedRotation")
280
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
281
+ """
282
+ Stops rotation of the root credential until set to false.
283
+ """
284
+ return pulumi.get(self, "disable_automated_rotation")
285
+
286
+ @disable_automated_rotation.setter
287
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
+ pulumi.set(self, "disable_automated_rotation", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="disableRemount")
292
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
293
+ """
294
+ If set, opts out of mount migration on path updates.
295
+ """
296
+ return pulumi.get(self, "disable_remount")
297
+
298
+ @disable_remount.setter
299
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
300
+ pulumi.set(self, "disable_remount", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter(name="homeTenancyId")
304
+ def home_tenancy_id(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ The Tenancy OCID of your OCI account.
307
+ """
308
+ return pulumi.get(self, "home_tenancy_id")
309
+
310
+ @home_tenancy_id.setter
311
+ def home_tenancy_id(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "home_tenancy_id", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter
316
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
317
+ """
318
+ The namespace to provision the resource in.
319
+ The value should not contain leading or trailing forward slashes.
320
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
321
+ *Available only for Vault Enterprise*.
322
+ """
323
+ return pulumi.get(self, "namespace")
324
+
325
+ @namespace.setter
326
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
327
+ pulumi.set(self, "namespace", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter
331
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
332
+ """
333
+ Unique name of the auth backend to configure.
334
+ """
335
+ return pulumi.get(self, "path")
336
+
337
+ @path.setter
338
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
339
+ pulumi.set(self, "path", value)
340
+
341
+ @_builtins.property
342
+ @pulumi.getter(name="rotationPeriod")
343
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
344
+ """
345
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
346
+ """
347
+ return pulumi.get(self, "rotation_period")
348
+
349
+ @rotation_period.setter
350
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
351
+ pulumi.set(self, "rotation_period", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter(name="rotationSchedule")
355
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
356
+ """
357
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
358
+ """
359
+ return pulumi.get(self, "rotation_schedule")
360
+
361
+ @rotation_schedule.setter
362
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
363
+ pulumi.set(self, "rotation_schedule", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="rotationWindow")
367
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
368
+ """
369
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
370
+ """
371
+ return pulumi.get(self, "rotation_window")
372
+
373
+ @rotation_window.setter
374
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
375
+ pulumi.set(self, "rotation_window", value)
376
+
377
+ @_builtins.property
378
+ @pulumi.getter
379
+ def tune(self) -> Optional[pulumi.Input['OciAuthBackendTuneArgs']]:
380
+ """
381
+ Extra configuration block. Structure is documented below.
382
+
383
+ The `tune` block is used to tune the auth backend:
384
+ """
385
+ return pulumi.get(self, "tune")
386
+
387
+ @tune.setter
388
+ def tune(self, value: Optional[pulumi.Input['OciAuthBackendTuneArgs']]):
389
+ pulumi.set(self, "tune", value)
390
+
391
+
392
+ @pulumi.type_token("vault:index/ociAuthBackend:OciAuthBackend")
393
+ class OciAuthBackend(pulumi.CustomResource):
394
+ @overload
395
+ def __init__(__self__,
396
+ resource_name: str,
397
+ opts: Optional[pulumi.ResourceOptions] = None,
398
+ description: Optional[pulumi.Input[_builtins.str]] = None,
399
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
400
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
401
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
402
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
403
+ path: Optional[pulumi.Input[_builtins.str]] = None,
404
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
405
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
406
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
407
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None,
408
+ __props__=None):
409
+ """
410
+ ## Example Usage
411
+
412
+ ```python
413
+ import pulumi
414
+ import pulumi_vault as vault
415
+
416
+ example = vault.OciAuthBackend("example",
417
+ path=example_vault_auth_backend["path"],
418
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
419
+ ```
420
+
421
+ ## Import
422
+
423
+ OCI auth backends can be imported using the backend's `path`, e.g.
424
+
425
+ ```sh
426
+ $ pulumi import vault:index/ociAuthBackend:OciAuthBackend example oci
427
+ ```
428
+
429
+ :param str resource_name: The name of the resource.
430
+ :param pulumi.ResourceOptions opts: Options for the resource.
431
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
432
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
433
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
434
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
435
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
436
+ The value should not contain leading or trailing forward slashes.
437
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
438
+ *Available only for Vault Enterprise*.
439
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
440
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
441
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
442
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
443
+ :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
444
+
445
+ The `tune` block is used to tune the auth backend:
446
+ """
447
+ ...
448
+ @overload
449
+ def __init__(__self__,
450
+ resource_name: str,
451
+ args: OciAuthBackendArgs,
452
+ opts: Optional[pulumi.ResourceOptions] = None):
453
+ """
454
+ ## Example Usage
455
+
456
+ ```python
457
+ import pulumi
458
+ import pulumi_vault as vault
459
+
460
+ example = vault.OciAuthBackend("example",
461
+ path=example_vault_auth_backend["path"],
462
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
463
+ ```
464
+
465
+ ## Import
466
+
467
+ OCI auth backends can be imported using the backend's `path`, e.g.
468
+
469
+ ```sh
470
+ $ pulumi import vault:index/ociAuthBackend:OciAuthBackend example oci
471
+ ```
472
+
473
+ :param str resource_name: The name of the resource.
474
+ :param OciAuthBackendArgs args: The arguments to use to populate this resource's properties.
475
+ :param pulumi.ResourceOptions opts: Options for the resource.
476
+ """
477
+ ...
478
+ def __init__(__self__, resource_name: str, *args, **kwargs):
479
+ resource_args, opts = _utilities.get_resource_args_opts(OciAuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
480
+ if resource_args is not None:
481
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
482
+ else:
483
+ __self__._internal_init(resource_name, *args, **kwargs)
484
+
485
+ def _internal_init(__self__,
486
+ resource_name: str,
487
+ opts: Optional[pulumi.ResourceOptions] = None,
488
+ description: Optional[pulumi.Input[_builtins.str]] = None,
489
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
490
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
492
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
493
+ path: Optional[pulumi.Input[_builtins.str]] = None,
494
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
495
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
496
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
497
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None,
498
+ __props__=None):
499
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
500
+ if not isinstance(opts, pulumi.ResourceOptions):
501
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
502
+ if opts.id is None:
503
+ if __props__ is not None:
504
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
505
+ __props__ = OciAuthBackendArgs.__new__(OciAuthBackendArgs)
506
+
507
+ __props__.__dict__["description"] = description
508
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
509
+ __props__.__dict__["disable_remount"] = disable_remount
510
+ if home_tenancy_id is None and not opts.urn:
511
+ raise TypeError("Missing required property 'home_tenancy_id'")
512
+ __props__.__dict__["home_tenancy_id"] = None if home_tenancy_id is None else pulumi.Output.secret(home_tenancy_id)
513
+ __props__.__dict__["namespace"] = namespace
514
+ __props__.__dict__["path"] = path
515
+ __props__.__dict__["rotation_period"] = rotation_period
516
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
517
+ __props__.__dict__["rotation_window"] = rotation_window
518
+ __props__.__dict__["tune"] = tune
519
+ __props__.__dict__["accessor"] = None
520
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["homeTenancyId"])
521
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
522
+ super(OciAuthBackend, __self__).__init__(
523
+ 'vault:index/ociAuthBackend:OciAuthBackend',
524
+ resource_name,
525
+ __props__,
526
+ opts)
527
+
528
+ @staticmethod
529
+ def get(resource_name: str,
530
+ id: pulumi.Input[str],
531
+ opts: Optional[pulumi.ResourceOptions] = None,
532
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
533
+ description: Optional[pulumi.Input[_builtins.str]] = None,
534
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
535
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
536
+ home_tenancy_id: Optional[pulumi.Input[_builtins.str]] = None,
537
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
538
+ path: Optional[pulumi.Input[_builtins.str]] = None,
539
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
540
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
541
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
542
+ tune: Optional[pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']]] = None) -> 'OciAuthBackend':
543
+ """
544
+ Get an existing OciAuthBackend resource's state with the given name, id, and optional extra
545
+ properties used to qualify the lookup.
546
+
547
+ :param str resource_name: The unique name of the resulting resource.
548
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
549
+ :param pulumi.ResourceOptions opts: Options for the resource.
550
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the auth backend
551
+ :param pulumi.Input[_builtins.str] description: A description of the auth backend.
552
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Stops rotation of the root credential until set to false.
553
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
554
+ :param pulumi.Input[_builtins.str] home_tenancy_id: The Tenancy OCID of your OCI account.
555
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
556
+ The value should not contain leading or trailing forward slashes.
557
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
558
+ *Available only for Vault Enterprise*.
559
+ :param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
560
+ :param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
561
+ :param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
562
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
563
+ :param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
564
+
565
+ The `tune` block is used to tune the auth backend:
566
+ """
567
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
568
+
569
+ __props__ = _OciAuthBackendState.__new__(_OciAuthBackendState)
570
+
571
+ __props__.__dict__["accessor"] = accessor
572
+ __props__.__dict__["description"] = description
573
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
574
+ __props__.__dict__["disable_remount"] = disable_remount
575
+ __props__.__dict__["home_tenancy_id"] = home_tenancy_id
576
+ __props__.__dict__["namespace"] = namespace
577
+ __props__.__dict__["path"] = path
578
+ __props__.__dict__["rotation_period"] = rotation_period
579
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
580
+ __props__.__dict__["rotation_window"] = rotation_window
581
+ __props__.__dict__["tune"] = tune
582
+ return OciAuthBackend(resource_name, opts=opts, __props__=__props__)
583
+
584
+ @_builtins.property
585
+ @pulumi.getter
586
+ def accessor(self) -> pulumi.Output[_builtins.str]:
587
+ """
588
+ The accessor of the auth backend
589
+ """
590
+ return pulumi.get(self, "accessor")
591
+
592
+ @_builtins.property
593
+ @pulumi.getter
594
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
595
+ """
596
+ A description of the auth backend.
597
+ """
598
+ return pulumi.get(self, "description")
599
+
600
+ @_builtins.property
601
+ @pulumi.getter(name="disableAutomatedRotation")
602
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
603
+ """
604
+ Stops rotation of the root credential until set to false.
605
+ """
606
+ return pulumi.get(self, "disable_automated_rotation")
607
+
608
+ @_builtins.property
609
+ @pulumi.getter(name="disableRemount")
610
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
611
+ """
612
+ If set, opts out of mount migration on path updates.
613
+ """
614
+ return pulumi.get(self, "disable_remount")
615
+
616
+ @_builtins.property
617
+ @pulumi.getter(name="homeTenancyId")
618
+ def home_tenancy_id(self) -> pulumi.Output[_builtins.str]:
619
+ """
620
+ The Tenancy OCID of your OCI account.
621
+ """
622
+ return pulumi.get(self, "home_tenancy_id")
623
+
624
+ @_builtins.property
625
+ @pulumi.getter
626
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
627
+ """
628
+ The namespace to provision the resource in.
629
+ The value should not contain leading or trailing forward slashes.
630
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
631
+ *Available only for Vault Enterprise*.
632
+ """
633
+ return pulumi.get(self, "namespace")
634
+
635
+ @_builtins.property
636
+ @pulumi.getter
637
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
638
+ """
639
+ Unique name of the auth backend to configure.
640
+ """
641
+ return pulumi.get(self, "path")
642
+
643
+ @_builtins.property
644
+ @pulumi.getter(name="rotationPeriod")
645
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
646
+ """
647
+ The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
648
+ """
649
+ return pulumi.get(self, "rotation_period")
650
+
651
+ @_builtins.property
652
+ @pulumi.getter(name="rotationSchedule")
653
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
654
+ """
655
+ The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
656
+ """
657
+ return pulumi.get(self, "rotation_schedule")
658
+
659
+ @_builtins.property
660
+ @pulumi.getter(name="rotationWindow")
661
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
662
+ """
663
+ The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
664
+ """
665
+ return pulumi.get(self, "rotation_window")
666
+
667
+ @_builtins.property
668
+ @pulumi.getter
669
+ def tune(self) -> pulumi.Output['outputs.OciAuthBackendTune']:
670
+ """
671
+ Extra configuration block. Structure is documented below.
672
+
673
+ The `tune` block is used to tune the auth backend:
674
+ """
675
+ return pulumi.get(self, "tune")
676
+