pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,736 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination']
18
+
19
+ @pulumi.input_type
20
+ class SyncAzureDestinationArgs:
21
+ def __init__(__self__, *,
22
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
23
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
24
+ cloud: Optional[pulumi.Input[_builtins.str]] = None,
25
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
27
+ key_vault_uri: Optional[pulumi.Input[_builtins.str]] = None,
28
+ name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
31
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
32
+ """
33
+ The set of arguments for constructing a SyncAzureDestination resource.
34
+ :param pulumi.Input[_builtins.str] client_id: Client ID of an Azure app registration.
35
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
36
+ variable.
37
+ :param pulumi.Input[_builtins.str] client_secret: Client Secret of an Azure app registration.
38
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
39
+ variable.
40
+ :param pulumi.Input[_builtins.str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
41
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
42
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
43
+ at the destination. Supports `secret-path` and `secret-key`.
44
+ :param pulumi.Input[_builtins.str] key_vault_uri: URI of an existing Azure Key Vault instance.
45
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
46
+ variable.
47
+ :param pulumi.Input[_builtins.str] name: Unique name of the Azure destination.
48
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
49
+ The value should not contain leading or trailing forward slashes.
50
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
52
+ Supports a subset of the Go Template syntax.
53
+ :param pulumi.Input[_builtins.str] tenant_id: ID of the target Azure tenant.
54
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
55
+ variable.
56
+ """
57
+ if client_id is not None:
58
+ pulumi.set(__self__, "client_id", client_id)
59
+ if client_secret is not None:
60
+ pulumi.set(__self__, "client_secret", client_secret)
61
+ if cloud is not None:
62
+ pulumi.set(__self__, "cloud", cloud)
63
+ if custom_tags is not None:
64
+ pulumi.set(__self__, "custom_tags", custom_tags)
65
+ if granularity is not None:
66
+ pulumi.set(__self__, "granularity", granularity)
67
+ if key_vault_uri is not None:
68
+ pulumi.set(__self__, "key_vault_uri", key_vault_uri)
69
+ if name is not None:
70
+ pulumi.set(__self__, "name", name)
71
+ if namespace is not None:
72
+ pulumi.set(__self__, "namespace", namespace)
73
+ if secret_name_template is not None:
74
+ pulumi.set(__self__, "secret_name_template", secret_name_template)
75
+ if tenant_id is not None:
76
+ pulumi.set(__self__, "tenant_id", tenant_id)
77
+
78
+ @_builtins.property
79
+ @pulumi.getter(name="clientId")
80
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
81
+ """
82
+ Client ID of an Azure app registration.
83
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
84
+ variable.
85
+ """
86
+ return pulumi.get(self, "client_id")
87
+
88
+ @client_id.setter
89
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
90
+ pulumi.set(self, "client_id", value)
91
+
92
+ @_builtins.property
93
+ @pulumi.getter(name="clientSecret")
94
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
95
+ """
96
+ Client Secret of an Azure app registration.
97
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
98
+ variable.
99
+ """
100
+ return pulumi.get(self, "client_secret")
101
+
102
+ @client_secret.setter
103
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
104
+ pulumi.set(self, "client_secret", value)
105
+
106
+ @_builtins.property
107
+ @pulumi.getter
108
+ def cloud(self) -> Optional[pulumi.Input[_builtins.str]]:
109
+ """
110
+ Specifies a cloud for the client. The default is Azure Public Cloud.
111
+ """
112
+ return pulumi.get(self, "cloud")
113
+
114
+ @cloud.setter
115
+ def cloud(self, value: Optional[pulumi.Input[_builtins.str]]):
116
+ pulumi.set(self, "cloud", value)
117
+
118
+ @_builtins.property
119
+ @pulumi.getter(name="customTags")
120
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
121
+ """
122
+ Custom tags to set on the secret managed at the destination.
123
+ """
124
+ return pulumi.get(self, "custom_tags")
125
+
126
+ @custom_tags.setter
127
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
128
+ pulumi.set(self, "custom_tags", value)
129
+
130
+ @_builtins.property
131
+ @pulumi.getter
132
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
133
+ """
134
+ Determines what level of information is synced as a distinct resource
135
+ at the destination. Supports `secret-path` and `secret-key`.
136
+ """
137
+ return pulumi.get(self, "granularity")
138
+
139
+ @granularity.setter
140
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
141
+ pulumi.set(self, "granularity", value)
142
+
143
+ @_builtins.property
144
+ @pulumi.getter(name="keyVaultUri")
145
+ def key_vault_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
146
+ """
147
+ URI of an existing Azure Key Vault instance.
148
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
149
+ variable.
150
+ """
151
+ return pulumi.get(self, "key_vault_uri")
152
+
153
+ @key_vault_uri.setter
154
+ def key_vault_uri(self, value: Optional[pulumi.Input[_builtins.str]]):
155
+ pulumi.set(self, "key_vault_uri", value)
156
+
157
+ @_builtins.property
158
+ @pulumi.getter
159
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
160
+ """
161
+ Unique name of the Azure destination.
162
+ """
163
+ return pulumi.get(self, "name")
164
+
165
+ @name.setter
166
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
167
+ pulumi.set(self, "name", value)
168
+
169
+ @_builtins.property
170
+ @pulumi.getter
171
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
172
+ """
173
+ The namespace to provision the resource in.
174
+ The value should not contain leading or trailing forward slashes.
175
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
176
+ """
177
+ return pulumi.get(self, "namespace")
178
+
179
+ @namespace.setter
180
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
181
+ pulumi.set(self, "namespace", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter(name="secretNameTemplate")
185
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
186
+ """
187
+ Template describing how to generate external secret names.
188
+ Supports a subset of the Go Template syntax.
189
+ """
190
+ return pulumi.get(self, "secret_name_template")
191
+
192
+ @secret_name_template.setter
193
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
194
+ pulumi.set(self, "secret_name_template", value)
195
+
196
+ @_builtins.property
197
+ @pulumi.getter(name="tenantId")
198
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
199
+ """
200
+ ID of the target Azure tenant.
201
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
202
+ variable.
203
+ """
204
+ return pulumi.get(self, "tenant_id")
205
+
206
+ @tenant_id.setter
207
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
208
+ pulumi.set(self, "tenant_id", value)
209
+
210
+
211
+ @pulumi.input_type
212
+ class _SyncAzureDestinationState:
213
+ def __init__(__self__, *,
214
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
215
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
216
+ cloud: Optional[pulumi.Input[_builtins.str]] = None,
217
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
218
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
219
+ key_vault_uri: Optional[pulumi.Input[_builtins.str]] = None,
220
+ name: Optional[pulumi.Input[_builtins.str]] = None,
221
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
222
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
223
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
224
+ type: Optional[pulumi.Input[_builtins.str]] = None):
225
+ """
226
+ Input properties used for looking up and filtering SyncAzureDestination resources.
227
+ :param pulumi.Input[_builtins.str] client_id: Client ID of an Azure app registration.
228
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
229
+ variable.
230
+ :param pulumi.Input[_builtins.str] client_secret: Client Secret of an Azure app registration.
231
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
232
+ variable.
233
+ :param pulumi.Input[_builtins.str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
234
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
235
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
236
+ at the destination. Supports `secret-path` and `secret-key`.
237
+ :param pulumi.Input[_builtins.str] key_vault_uri: URI of an existing Azure Key Vault instance.
238
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
239
+ variable.
240
+ :param pulumi.Input[_builtins.str] name: Unique name of the Azure destination.
241
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
242
+ The value should not contain leading or trailing forward slashes.
243
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
244
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
245
+ Supports a subset of the Go Template syntax.
246
+ :param pulumi.Input[_builtins.str] tenant_id: ID of the target Azure tenant.
247
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
248
+ variable.
249
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`azure-kv`).
250
+ """
251
+ if client_id is not None:
252
+ pulumi.set(__self__, "client_id", client_id)
253
+ if client_secret is not None:
254
+ pulumi.set(__self__, "client_secret", client_secret)
255
+ if cloud is not None:
256
+ pulumi.set(__self__, "cloud", cloud)
257
+ if custom_tags is not None:
258
+ pulumi.set(__self__, "custom_tags", custom_tags)
259
+ if granularity is not None:
260
+ pulumi.set(__self__, "granularity", granularity)
261
+ if key_vault_uri is not None:
262
+ pulumi.set(__self__, "key_vault_uri", key_vault_uri)
263
+ if name is not None:
264
+ pulumi.set(__self__, "name", name)
265
+ if namespace is not None:
266
+ pulumi.set(__self__, "namespace", namespace)
267
+ if secret_name_template is not None:
268
+ pulumi.set(__self__, "secret_name_template", secret_name_template)
269
+ if tenant_id is not None:
270
+ pulumi.set(__self__, "tenant_id", tenant_id)
271
+ if type is not None:
272
+ pulumi.set(__self__, "type", type)
273
+
274
+ @_builtins.property
275
+ @pulumi.getter(name="clientId")
276
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
277
+ """
278
+ Client ID of an Azure app registration.
279
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
280
+ variable.
281
+ """
282
+ return pulumi.get(self, "client_id")
283
+
284
+ @client_id.setter
285
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
286
+ pulumi.set(self, "client_id", value)
287
+
288
+ @_builtins.property
289
+ @pulumi.getter(name="clientSecret")
290
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
291
+ """
292
+ Client Secret of an Azure app registration.
293
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
294
+ variable.
295
+ """
296
+ return pulumi.get(self, "client_secret")
297
+
298
+ @client_secret.setter
299
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
300
+ pulumi.set(self, "client_secret", value)
301
+
302
+ @_builtins.property
303
+ @pulumi.getter
304
+ def cloud(self) -> Optional[pulumi.Input[_builtins.str]]:
305
+ """
306
+ Specifies a cloud for the client. The default is Azure Public Cloud.
307
+ """
308
+ return pulumi.get(self, "cloud")
309
+
310
+ @cloud.setter
311
+ def cloud(self, value: Optional[pulumi.Input[_builtins.str]]):
312
+ pulumi.set(self, "cloud", value)
313
+
314
+ @_builtins.property
315
+ @pulumi.getter(name="customTags")
316
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
317
+ """
318
+ Custom tags to set on the secret managed at the destination.
319
+ """
320
+ return pulumi.get(self, "custom_tags")
321
+
322
+ @custom_tags.setter
323
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
324
+ pulumi.set(self, "custom_tags", value)
325
+
326
+ @_builtins.property
327
+ @pulumi.getter
328
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
329
+ """
330
+ Determines what level of information is synced as a distinct resource
331
+ at the destination. Supports `secret-path` and `secret-key`.
332
+ """
333
+ return pulumi.get(self, "granularity")
334
+
335
+ @granularity.setter
336
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
337
+ pulumi.set(self, "granularity", value)
338
+
339
+ @_builtins.property
340
+ @pulumi.getter(name="keyVaultUri")
341
+ def key_vault_uri(self) -> Optional[pulumi.Input[_builtins.str]]:
342
+ """
343
+ URI of an existing Azure Key Vault instance.
344
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
345
+ variable.
346
+ """
347
+ return pulumi.get(self, "key_vault_uri")
348
+
349
+ @key_vault_uri.setter
350
+ def key_vault_uri(self, value: Optional[pulumi.Input[_builtins.str]]):
351
+ pulumi.set(self, "key_vault_uri", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
356
+ """
357
+ Unique name of the Azure destination.
358
+ """
359
+ return pulumi.get(self, "name")
360
+
361
+ @name.setter
362
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
363
+ pulumi.set(self, "name", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter
367
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
368
+ """
369
+ The namespace to provision the resource in.
370
+ The value should not contain leading or trailing forward slashes.
371
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
372
+ """
373
+ return pulumi.get(self, "namespace")
374
+
375
+ @namespace.setter
376
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
377
+ pulumi.set(self, "namespace", value)
378
+
379
+ @_builtins.property
380
+ @pulumi.getter(name="secretNameTemplate")
381
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
382
+ """
383
+ Template describing how to generate external secret names.
384
+ Supports a subset of the Go Template syntax.
385
+ """
386
+ return pulumi.get(self, "secret_name_template")
387
+
388
+ @secret_name_template.setter
389
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
390
+ pulumi.set(self, "secret_name_template", value)
391
+
392
+ @_builtins.property
393
+ @pulumi.getter(name="tenantId")
394
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
395
+ """
396
+ ID of the target Azure tenant.
397
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
398
+ variable.
399
+ """
400
+ return pulumi.get(self, "tenant_id")
401
+
402
+ @tenant_id.setter
403
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
404
+ pulumi.set(self, "tenant_id", value)
405
+
406
+ @_builtins.property
407
+ @pulumi.getter
408
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
409
+ """
410
+ The type of the secrets destination (`azure-kv`).
411
+ """
412
+ return pulumi.get(self, "type")
413
+
414
+ @type.setter
415
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
416
+ pulumi.set(self, "type", value)
417
+
418
+
419
+ @pulumi.type_token("vault:secrets/syncAzureDestination:SyncAzureDestination")
420
+ class SyncAzureDestination(pulumi.CustomResource):
421
+ @overload
422
+ def __init__(__self__,
423
+ resource_name: str,
424
+ opts: Optional[pulumi.ResourceOptions] = None,
425
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
426
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
427
+ cloud: Optional[pulumi.Input[_builtins.str]] = None,
428
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
429
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
430
+ key_vault_uri: Optional[pulumi.Input[_builtins.str]] = None,
431
+ name: Optional[pulumi.Input[_builtins.str]] = None,
432
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
433
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
434
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
435
+ __props__=None):
436
+ """
437
+ ## Example Usage
438
+
439
+ ```python
440
+ import pulumi
441
+ import pulumi_vault as vault
442
+
443
+ az = vault.secrets.SyncAzureDestination("az",
444
+ name="az-dest",
445
+ key_vault_uri=key_vault_uri,
446
+ client_id=client_id,
447
+ client_secret=client_secret,
448
+ tenant_id=tenant_id,
449
+ secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
450
+ custom_tags={
451
+ "foo": "bar",
452
+ })
453
+ ```
454
+
455
+ ## Import
456
+
457
+ Azure Secrets sync destinations can be imported using the `name`, e.g.
458
+
459
+ ```sh
460
+ $ pulumi import vault:secrets/syncAzureDestination:SyncAzureDestination az az-dest
461
+ ```
462
+
463
+ :param str resource_name: The name of the resource.
464
+ :param pulumi.ResourceOptions opts: Options for the resource.
465
+ :param pulumi.Input[_builtins.str] client_id: Client ID of an Azure app registration.
466
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
467
+ variable.
468
+ :param pulumi.Input[_builtins.str] client_secret: Client Secret of an Azure app registration.
469
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
470
+ variable.
471
+ :param pulumi.Input[_builtins.str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
472
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
473
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
474
+ at the destination. Supports `secret-path` and `secret-key`.
475
+ :param pulumi.Input[_builtins.str] key_vault_uri: URI of an existing Azure Key Vault instance.
476
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
477
+ variable.
478
+ :param pulumi.Input[_builtins.str] name: Unique name of the Azure destination.
479
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
480
+ The value should not contain leading or trailing forward slashes.
481
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
482
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
483
+ Supports a subset of the Go Template syntax.
484
+ :param pulumi.Input[_builtins.str] tenant_id: ID of the target Azure tenant.
485
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
486
+ variable.
487
+ """
488
+ ...
489
+ @overload
490
+ def __init__(__self__,
491
+ resource_name: str,
492
+ args: Optional[SyncAzureDestinationArgs] = None,
493
+ opts: Optional[pulumi.ResourceOptions] = None):
494
+ """
495
+ ## Example Usage
496
+
497
+ ```python
498
+ import pulumi
499
+ import pulumi_vault as vault
500
+
501
+ az = vault.secrets.SyncAzureDestination("az",
502
+ name="az-dest",
503
+ key_vault_uri=key_vault_uri,
504
+ client_id=client_id,
505
+ client_secret=client_secret,
506
+ tenant_id=tenant_id,
507
+ secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
508
+ custom_tags={
509
+ "foo": "bar",
510
+ })
511
+ ```
512
+
513
+ ## Import
514
+
515
+ Azure Secrets sync destinations can be imported using the `name`, e.g.
516
+
517
+ ```sh
518
+ $ pulumi import vault:secrets/syncAzureDestination:SyncAzureDestination az az-dest
519
+ ```
520
+
521
+ :param str resource_name: The name of the resource.
522
+ :param SyncAzureDestinationArgs args: The arguments to use to populate this resource's properties.
523
+ :param pulumi.ResourceOptions opts: Options for the resource.
524
+ """
525
+ ...
526
+ def __init__(__self__, resource_name: str, *args, **kwargs):
527
+ resource_args, opts = _utilities.get_resource_args_opts(SyncAzureDestinationArgs, pulumi.ResourceOptions, *args, **kwargs)
528
+ if resource_args is not None:
529
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
530
+ else:
531
+ __self__._internal_init(resource_name, *args, **kwargs)
532
+
533
+ def _internal_init(__self__,
534
+ resource_name: str,
535
+ opts: Optional[pulumi.ResourceOptions] = None,
536
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
537
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
538
+ cloud: Optional[pulumi.Input[_builtins.str]] = None,
539
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
540
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
541
+ key_vault_uri: Optional[pulumi.Input[_builtins.str]] = None,
542
+ name: Optional[pulumi.Input[_builtins.str]] = None,
543
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
544
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
545
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
546
+ __props__=None):
547
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
548
+ if not isinstance(opts, pulumi.ResourceOptions):
549
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
550
+ if opts.id is None:
551
+ if __props__ is not None:
552
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
553
+ __props__ = SyncAzureDestinationArgs.__new__(SyncAzureDestinationArgs)
554
+
555
+ __props__.__dict__["client_id"] = client_id
556
+ __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
557
+ __props__.__dict__["cloud"] = cloud
558
+ __props__.__dict__["custom_tags"] = custom_tags
559
+ __props__.__dict__["granularity"] = granularity
560
+ __props__.__dict__["key_vault_uri"] = key_vault_uri
561
+ __props__.__dict__["name"] = name
562
+ __props__.__dict__["namespace"] = namespace
563
+ __props__.__dict__["secret_name_template"] = secret_name_template
564
+ __props__.__dict__["tenant_id"] = tenant_id
565
+ __props__.__dict__["type"] = None
566
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientSecret"])
567
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
568
+ super(SyncAzureDestination, __self__).__init__(
569
+ 'vault:secrets/syncAzureDestination:SyncAzureDestination',
570
+ resource_name,
571
+ __props__,
572
+ opts)
573
+
574
+ @staticmethod
575
+ def get(resource_name: str,
576
+ id: pulumi.Input[str],
577
+ opts: Optional[pulumi.ResourceOptions] = None,
578
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
579
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
580
+ cloud: Optional[pulumi.Input[_builtins.str]] = None,
581
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
582
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
583
+ key_vault_uri: Optional[pulumi.Input[_builtins.str]] = None,
584
+ name: Optional[pulumi.Input[_builtins.str]] = None,
585
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
586
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
587
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
588
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncAzureDestination':
589
+ """
590
+ Get an existing SyncAzureDestination resource's state with the given name, id, and optional extra
591
+ properties used to qualify the lookup.
592
+
593
+ :param str resource_name: The unique name of the resulting resource.
594
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
595
+ :param pulumi.ResourceOptions opts: Options for the resource.
596
+ :param pulumi.Input[_builtins.str] client_id: Client ID of an Azure app registration.
597
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
598
+ variable.
599
+ :param pulumi.Input[_builtins.str] client_secret: Client Secret of an Azure app registration.
600
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
601
+ variable.
602
+ :param pulumi.Input[_builtins.str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
603
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
604
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
605
+ at the destination. Supports `secret-path` and `secret-key`.
606
+ :param pulumi.Input[_builtins.str] key_vault_uri: URI of an existing Azure Key Vault instance.
607
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
608
+ variable.
609
+ :param pulumi.Input[_builtins.str] name: Unique name of the Azure destination.
610
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
611
+ The value should not contain leading or trailing forward slashes.
612
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
613
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
614
+ Supports a subset of the Go Template syntax.
615
+ :param pulumi.Input[_builtins.str] tenant_id: ID of the target Azure tenant.
616
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
617
+ variable.
618
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`azure-kv`).
619
+ """
620
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
621
+
622
+ __props__ = _SyncAzureDestinationState.__new__(_SyncAzureDestinationState)
623
+
624
+ __props__.__dict__["client_id"] = client_id
625
+ __props__.__dict__["client_secret"] = client_secret
626
+ __props__.__dict__["cloud"] = cloud
627
+ __props__.__dict__["custom_tags"] = custom_tags
628
+ __props__.__dict__["granularity"] = granularity
629
+ __props__.__dict__["key_vault_uri"] = key_vault_uri
630
+ __props__.__dict__["name"] = name
631
+ __props__.__dict__["namespace"] = namespace
632
+ __props__.__dict__["secret_name_template"] = secret_name_template
633
+ __props__.__dict__["tenant_id"] = tenant_id
634
+ __props__.__dict__["type"] = type
635
+ return SyncAzureDestination(resource_name, opts=opts, __props__=__props__)
636
+
637
+ @_builtins.property
638
+ @pulumi.getter(name="clientId")
639
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
640
+ """
641
+ Client ID of an Azure app registration.
642
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_ID` environment
643
+ variable.
644
+ """
645
+ return pulumi.get(self, "client_id")
646
+
647
+ @_builtins.property
648
+ @pulumi.getter(name="clientSecret")
649
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
650
+ """
651
+ Client Secret of an Azure app registration.
652
+ Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
653
+ variable.
654
+ """
655
+ return pulumi.get(self, "client_secret")
656
+
657
+ @_builtins.property
658
+ @pulumi.getter
659
+ def cloud(self) -> pulumi.Output[Optional[_builtins.str]]:
660
+ """
661
+ Specifies a cloud for the client. The default is Azure Public Cloud.
662
+ """
663
+ return pulumi.get(self, "cloud")
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="customTags")
667
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
668
+ """
669
+ Custom tags to set on the secret managed at the destination.
670
+ """
671
+ return pulumi.get(self, "custom_tags")
672
+
673
+ @_builtins.property
674
+ @pulumi.getter
675
+ def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
676
+ """
677
+ Determines what level of information is synced as a distinct resource
678
+ at the destination. Supports `secret-path` and `secret-key`.
679
+ """
680
+ return pulumi.get(self, "granularity")
681
+
682
+ @_builtins.property
683
+ @pulumi.getter(name="keyVaultUri")
684
+ def key_vault_uri(self) -> pulumi.Output[Optional[_builtins.str]]:
685
+ """
686
+ URI of an existing Azure Key Vault instance.
687
+ Can be omitted and directly provided to Vault using the `KEY_VAULT_URI` environment
688
+ variable.
689
+ """
690
+ return pulumi.get(self, "key_vault_uri")
691
+
692
+ @_builtins.property
693
+ @pulumi.getter
694
+ def name(self) -> pulumi.Output[_builtins.str]:
695
+ """
696
+ Unique name of the Azure destination.
697
+ """
698
+ return pulumi.get(self, "name")
699
+
700
+ @_builtins.property
701
+ @pulumi.getter
702
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
703
+ """
704
+ The namespace to provision the resource in.
705
+ The value should not contain leading or trailing forward slashes.
706
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
707
+ """
708
+ return pulumi.get(self, "namespace")
709
+
710
+ @_builtins.property
711
+ @pulumi.getter(name="secretNameTemplate")
712
+ def secret_name_template(self) -> pulumi.Output[_builtins.str]:
713
+ """
714
+ Template describing how to generate external secret names.
715
+ Supports a subset of the Go Template syntax.
716
+ """
717
+ return pulumi.get(self, "secret_name_template")
718
+
719
+ @_builtins.property
720
+ @pulumi.getter(name="tenantId")
721
+ def tenant_id(self) -> pulumi.Output[Optional[_builtins.str]]:
722
+ """
723
+ ID of the target Azure tenant.
724
+ Can be omitted and directly provided to Vault using the `AZURE_TENANT_ID` environment
725
+ variable.
726
+ """
727
+ return pulumi.get(self, "tenant_id")
728
+
729
+ @_builtins.property
730
+ @pulumi.getter
731
+ def type(self) -> pulumi.Output[_builtins.str]:
732
+ """
733
+ The type of the secrets destination (`azure-kv`).
734
+ """
735
+ return pulumi.get(self, "type")
736
+