pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1096 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class AuthBackendConfigArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
resource: pulumi.Input[_builtins.str],
|
|
23
|
+
tenant_id: pulumi.Input[_builtins.str],
|
|
24
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
28
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
31
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
32
|
+
max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
33
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
35
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
36
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
37
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
|
|
38
|
+
"""
|
|
39
|
+
The set of arguments for constructing a AuthBackendConfig resource.
|
|
40
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
|
41
|
+
Azure Active Directory.
|
|
42
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
|
43
|
+
organization.
|
|
44
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
|
45
|
+
mounted at. Defaults to `azure`.
|
|
46
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
|
47
|
+
Currently read permissions to query compute resources are required.
|
|
48
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
|
49
|
+
Azure APIs.
|
|
50
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
51
|
+
*Available only for Vault Enterprise*
|
|
52
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
|
53
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
54
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
55
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
56
|
+
*Available only for Vault Enterprise*
|
|
57
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
|
58
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
|
|
59
|
+
Defaults to `3`.
|
|
60
|
+
:param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
|
|
61
|
+
Defaults to `60`.
|
|
62
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
63
|
+
The value should not contain leading or trailing forward slashes.
|
|
64
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
65
|
+
*Available only for Vault Enterprise*.
|
|
66
|
+
:param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
|
|
67
|
+
Defaults to `4`.
|
|
68
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
69
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
70
|
+
*Available only for Vault Enterprise*
|
|
71
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
72
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
73
|
+
*Available only for Vault Enterprise*
|
|
74
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
75
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
76
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
77
|
+
*Available only for Vault Enterprise*
|
|
78
|
+
"""
|
|
79
|
+
pulumi.set(__self__, "resource", resource)
|
|
80
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
81
|
+
if backend is not None:
|
|
82
|
+
pulumi.set(__self__, "backend", backend)
|
|
83
|
+
if client_id is not None:
|
|
84
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
85
|
+
if client_secret is not None:
|
|
86
|
+
pulumi.set(__self__, "client_secret", client_secret)
|
|
87
|
+
if disable_automated_rotation is not None:
|
|
88
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
|
89
|
+
if environment is not None:
|
|
90
|
+
pulumi.set(__self__, "environment", environment)
|
|
91
|
+
if identity_token_audience is not None:
|
|
92
|
+
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
|
93
|
+
if identity_token_ttl is not None:
|
|
94
|
+
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
|
95
|
+
if max_retries is not None:
|
|
96
|
+
pulumi.set(__self__, "max_retries", max_retries)
|
|
97
|
+
if max_retry_delay is not None:
|
|
98
|
+
pulumi.set(__self__, "max_retry_delay", max_retry_delay)
|
|
99
|
+
if namespace is not None:
|
|
100
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
101
|
+
if retry_delay is not None:
|
|
102
|
+
pulumi.set(__self__, "retry_delay", retry_delay)
|
|
103
|
+
if rotation_period is not None:
|
|
104
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
105
|
+
if rotation_schedule is not None:
|
|
106
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
107
|
+
if rotation_window is not None:
|
|
108
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
109
|
+
|
|
110
|
+
@_builtins.property
|
|
111
|
+
@pulumi.getter
|
|
112
|
+
def resource(self) -> pulumi.Input[_builtins.str]:
|
|
113
|
+
"""
|
|
114
|
+
The configured URL for the application registered in
|
|
115
|
+
Azure Active Directory.
|
|
116
|
+
"""
|
|
117
|
+
return pulumi.get(self, "resource")
|
|
118
|
+
|
|
119
|
+
@resource.setter
|
|
120
|
+
def resource(self, value: pulumi.Input[_builtins.str]):
|
|
121
|
+
pulumi.set(self, "resource", value)
|
|
122
|
+
|
|
123
|
+
@_builtins.property
|
|
124
|
+
@pulumi.getter(name="tenantId")
|
|
125
|
+
def tenant_id(self) -> pulumi.Input[_builtins.str]:
|
|
126
|
+
"""
|
|
127
|
+
The tenant id for the Azure Active Directory
|
|
128
|
+
organization.
|
|
129
|
+
"""
|
|
130
|
+
return pulumi.get(self, "tenant_id")
|
|
131
|
+
|
|
132
|
+
@tenant_id.setter
|
|
133
|
+
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
|
134
|
+
pulumi.set(self, "tenant_id", value)
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter
|
|
138
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
139
|
+
"""
|
|
140
|
+
The path the Azure auth backend being configured was
|
|
141
|
+
mounted at. Defaults to `azure`.
|
|
142
|
+
"""
|
|
143
|
+
return pulumi.get(self, "backend")
|
|
144
|
+
|
|
145
|
+
@backend.setter
|
|
146
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
147
|
+
pulumi.set(self, "backend", value)
|
|
148
|
+
|
|
149
|
+
@_builtins.property
|
|
150
|
+
@pulumi.getter(name="clientId")
|
|
151
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
152
|
+
"""
|
|
153
|
+
The client id for credentials to query the Azure APIs.
|
|
154
|
+
Currently read permissions to query compute resources are required.
|
|
155
|
+
"""
|
|
156
|
+
return pulumi.get(self, "client_id")
|
|
157
|
+
|
|
158
|
+
@client_id.setter
|
|
159
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
160
|
+
pulumi.set(self, "client_id", value)
|
|
161
|
+
|
|
162
|
+
@_builtins.property
|
|
163
|
+
@pulumi.getter(name="clientSecret")
|
|
164
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
165
|
+
"""
|
|
166
|
+
The client secret for credentials to query the
|
|
167
|
+
Azure APIs.
|
|
168
|
+
"""
|
|
169
|
+
return pulumi.get(self, "client_secret")
|
|
170
|
+
|
|
171
|
+
@client_secret.setter
|
|
172
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
173
|
+
pulumi.set(self, "client_secret", value)
|
|
174
|
+
|
|
175
|
+
@_builtins.property
|
|
176
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
177
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
178
|
+
"""
|
|
179
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
180
|
+
*Available only for Vault Enterprise*
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
183
|
+
|
|
184
|
+
@disable_automated_rotation.setter
|
|
185
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
186
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
|
187
|
+
|
|
188
|
+
@_builtins.property
|
|
189
|
+
@pulumi.getter
|
|
190
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
191
|
+
"""
|
|
192
|
+
The Azure cloud environment. Valid values:
|
|
193
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
194
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
195
|
+
"""
|
|
196
|
+
return pulumi.get(self, "environment")
|
|
197
|
+
|
|
198
|
+
@environment.setter
|
|
199
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
200
|
+
pulumi.set(self, "environment", value)
|
|
201
|
+
|
|
202
|
+
@_builtins.property
|
|
203
|
+
@pulumi.getter(name="identityTokenAudience")
|
|
204
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
205
|
+
"""
|
|
206
|
+
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
207
|
+
*Available only for Vault Enterprise*
|
|
208
|
+
"""
|
|
209
|
+
return pulumi.get(self, "identity_token_audience")
|
|
210
|
+
|
|
211
|
+
@identity_token_audience.setter
|
|
212
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
213
|
+
pulumi.set(self, "identity_token_audience", value)
|
|
214
|
+
|
|
215
|
+
@_builtins.property
|
|
216
|
+
@pulumi.getter(name="identityTokenTtl")
|
|
217
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
218
|
+
"""
|
|
219
|
+
The TTL of generated identity tokens in seconds.
|
|
220
|
+
"""
|
|
221
|
+
return pulumi.get(self, "identity_token_ttl")
|
|
222
|
+
|
|
223
|
+
@identity_token_ttl.setter
|
|
224
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
225
|
+
pulumi.set(self, "identity_token_ttl", value)
|
|
226
|
+
|
|
227
|
+
@_builtins.property
|
|
228
|
+
@pulumi.getter(name="maxRetries")
|
|
229
|
+
def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
230
|
+
"""
|
|
231
|
+
Maximum number of retries for Azure API requests.
|
|
232
|
+
Defaults to `3`.
|
|
233
|
+
"""
|
|
234
|
+
return pulumi.get(self, "max_retries")
|
|
235
|
+
|
|
236
|
+
@max_retries.setter
|
|
237
|
+
def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
238
|
+
pulumi.set(self, "max_retries", value)
|
|
239
|
+
|
|
240
|
+
@_builtins.property
|
|
241
|
+
@pulumi.getter(name="maxRetryDelay")
|
|
242
|
+
def max_retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
243
|
+
"""
|
|
244
|
+
The maximum delay in seconds between retries for Azure API requests.
|
|
245
|
+
Defaults to `60`.
|
|
246
|
+
"""
|
|
247
|
+
return pulumi.get(self, "max_retry_delay")
|
|
248
|
+
|
|
249
|
+
@max_retry_delay.setter
|
|
250
|
+
def max_retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
251
|
+
pulumi.set(self, "max_retry_delay", value)
|
|
252
|
+
|
|
253
|
+
@_builtins.property
|
|
254
|
+
@pulumi.getter
|
|
255
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
256
|
+
"""
|
|
257
|
+
The namespace to provision the resource in.
|
|
258
|
+
The value should not contain leading or trailing forward slashes.
|
|
259
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
260
|
+
*Available only for Vault Enterprise*.
|
|
261
|
+
"""
|
|
262
|
+
return pulumi.get(self, "namespace")
|
|
263
|
+
|
|
264
|
+
@namespace.setter
|
|
265
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
266
|
+
pulumi.set(self, "namespace", value)
|
|
267
|
+
|
|
268
|
+
@_builtins.property
|
|
269
|
+
@pulumi.getter(name="retryDelay")
|
|
270
|
+
def retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
271
|
+
"""
|
|
272
|
+
The initial delay in seconds between retries for Azure API requests.
|
|
273
|
+
Defaults to `4`.
|
|
274
|
+
"""
|
|
275
|
+
return pulumi.get(self, "retry_delay")
|
|
276
|
+
|
|
277
|
+
@retry_delay.setter
|
|
278
|
+
def retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
279
|
+
pulumi.set(self, "retry_delay", value)
|
|
280
|
+
|
|
281
|
+
@_builtins.property
|
|
282
|
+
@pulumi.getter(name="rotationPeriod")
|
|
283
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
284
|
+
"""
|
|
285
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
286
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
287
|
+
*Available only for Vault Enterprise*
|
|
288
|
+
"""
|
|
289
|
+
return pulumi.get(self, "rotation_period")
|
|
290
|
+
|
|
291
|
+
@rotation_period.setter
|
|
292
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
293
|
+
pulumi.set(self, "rotation_period", value)
|
|
294
|
+
|
|
295
|
+
@_builtins.property
|
|
296
|
+
@pulumi.getter(name="rotationSchedule")
|
|
297
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
298
|
+
"""
|
|
299
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
300
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
301
|
+
*Available only for Vault Enterprise*
|
|
302
|
+
"""
|
|
303
|
+
return pulumi.get(self, "rotation_schedule")
|
|
304
|
+
|
|
305
|
+
@rotation_schedule.setter
|
|
306
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
307
|
+
pulumi.set(self, "rotation_schedule", value)
|
|
308
|
+
|
|
309
|
+
@_builtins.property
|
|
310
|
+
@pulumi.getter(name="rotationWindow")
|
|
311
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
312
|
+
"""
|
|
313
|
+
The maximum amount of time in seconds allowed to complete
|
|
314
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
315
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
316
|
+
*Available only for Vault Enterprise*
|
|
317
|
+
"""
|
|
318
|
+
return pulumi.get(self, "rotation_window")
|
|
319
|
+
|
|
320
|
+
@rotation_window.setter
|
|
321
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
322
|
+
pulumi.set(self, "rotation_window", value)
|
|
323
|
+
|
|
324
|
+
|
|
325
|
+
@pulumi.input_type
|
|
326
|
+
class _AuthBackendConfigState:
|
|
327
|
+
def __init__(__self__, *,
|
|
328
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
329
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
330
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
331
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
332
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
333
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
334
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
335
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
336
|
+
max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
337
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
338
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
|
339
|
+
retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
340
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
341
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
342
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
343
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
|
|
344
|
+
"""
|
|
345
|
+
Input properties used for looking up and filtering AuthBackendConfig resources.
|
|
346
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
|
347
|
+
mounted at. Defaults to `azure`.
|
|
348
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
|
349
|
+
Currently read permissions to query compute resources are required.
|
|
350
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
|
351
|
+
Azure APIs.
|
|
352
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
353
|
+
*Available only for Vault Enterprise*
|
|
354
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
|
355
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
356
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
357
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
358
|
+
*Available only for Vault Enterprise*
|
|
359
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
|
360
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
|
|
361
|
+
Defaults to `3`.
|
|
362
|
+
:param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
|
|
363
|
+
Defaults to `60`.
|
|
364
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
365
|
+
The value should not contain leading or trailing forward slashes.
|
|
366
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
367
|
+
*Available only for Vault Enterprise*.
|
|
368
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
|
369
|
+
Azure Active Directory.
|
|
370
|
+
:param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
|
|
371
|
+
Defaults to `4`.
|
|
372
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
373
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
374
|
+
*Available only for Vault Enterprise*
|
|
375
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
376
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
377
|
+
*Available only for Vault Enterprise*
|
|
378
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
379
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
380
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
381
|
+
*Available only for Vault Enterprise*
|
|
382
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
|
383
|
+
organization.
|
|
384
|
+
"""
|
|
385
|
+
if backend is not None:
|
|
386
|
+
pulumi.set(__self__, "backend", backend)
|
|
387
|
+
if client_id is not None:
|
|
388
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
389
|
+
if client_secret is not None:
|
|
390
|
+
pulumi.set(__self__, "client_secret", client_secret)
|
|
391
|
+
if disable_automated_rotation is not None:
|
|
392
|
+
pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
|
|
393
|
+
if environment is not None:
|
|
394
|
+
pulumi.set(__self__, "environment", environment)
|
|
395
|
+
if identity_token_audience is not None:
|
|
396
|
+
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
|
397
|
+
if identity_token_ttl is not None:
|
|
398
|
+
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
|
399
|
+
if max_retries is not None:
|
|
400
|
+
pulumi.set(__self__, "max_retries", max_retries)
|
|
401
|
+
if max_retry_delay is not None:
|
|
402
|
+
pulumi.set(__self__, "max_retry_delay", max_retry_delay)
|
|
403
|
+
if namespace is not None:
|
|
404
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
405
|
+
if resource is not None:
|
|
406
|
+
pulumi.set(__self__, "resource", resource)
|
|
407
|
+
if retry_delay is not None:
|
|
408
|
+
pulumi.set(__self__, "retry_delay", retry_delay)
|
|
409
|
+
if rotation_period is not None:
|
|
410
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
411
|
+
if rotation_schedule is not None:
|
|
412
|
+
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
413
|
+
if rotation_window is not None:
|
|
414
|
+
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
415
|
+
if tenant_id is not None:
|
|
416
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
417
|
+
|
|
418
|
+
@_builtins.property
|
|
419
|
+
@pulumi.getter
|
|
420
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
421
|
+
"""
|
|
422
|
+
The path the Azure auth backend being configured was
|
|
423
|
+
mounted at. Defaults to `azure`.
|
|
424
|
+
"""
|
|
425
|
+
return pulumi.get(self, "backend")
|
|
426
|
+
|
|
427
|
+
@backend.setter
|
|
428
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
429
|
+
pulumi.set(self, "backend", value)
|
|
430
|
+
|
|
431
|
+
@_builtins.property
|
|
432
|
+
@pulumi.getter(name="clientId")
|
|
433
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
434
|
+
"""
|
|
435
|
+
The client id for credentials to query the Azure APIs.
|
|
436
|
+
Currently read permissions to query compute resources are required.
|
|
437
|
+
"""
|
|
438
|
+
return pulumi.get(self, "client_id")
|
|
439
|
+
|
|
440
|
+
@client_id.setter
|
|
441
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
442
|
+
pulumi.set(self, "client_id", value)
|
|
443
|
+
|
|
444
|
+
@_builtins.property
|
|
445
|
+
@pulumi.getter(name="clientSecret")
|
|
446
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
447
|
+
"""
|
|
448
|
+
The client secret for credentials to query the
|
|
449
|
+
Azure APIs.
|
|
450
|
+
"""
|
|
451
|
+
return pulumi.get(self, "client_secret")
|
|
452
|
+
|
|
453
|
+
@client_secret.setter
|
|
454
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
455
|
+
pulumi.set(self, "client_secret", value)
|
|
456
|
+
|
|
457
|
+
@_builtins.property
|
|
458
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
459
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
460
|
+
"""
|
|
461
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
462
|
+
*Available only for Vault Enterprise*
|
|
463
|
+
"""
|
|
464
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
465
|
+
|
|
466
|
+
@disable_automated_rotation.setter
|
|
467
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
468
|
+
pulumi.set(self, "disable_automated_rotation", value)
|
|
469
|
+
|
|
470
|
+
@_builtins.property
|
|
471
|
+
@pulumi.getter
|
|
472
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
473
|
+
"""
|
|
474
|
+
The Azure cloud environment. Valid values:
|
|
475
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
476
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
477
|
+
"""
|
|
478
|
+
return pulumi.get(self, "environment")
|
|
479
|
+
|
|
480
|
+
@environment.setter
|
|
481
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
482
|
+
pulumi.set(self, "environment", value)
|
|
483
|
+
|
|
484
|
+
@_builtins.property
|
|
485
|
+
@pulumi.getter(name="identityTokenAudience")
|
|
486
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
487
|
+
"""
|
|
488
|
+
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
489
|
+
*Available only for Vault Enterprise*
|
|
490
|
+
"""
|
|
491
|
+
return pulumi.get(self, "identity_token_audience")
|
|
492
|
+
|
|
493
|
+
@identity_token_audience.setter
|
|
494
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
495
|
+
pulumi.set(self, "identity_token_audience", value)
|
|
496
|
+
|
|
497
|
+
@_builtins.property
|
|
498
|
+
@pulumi.getter(name="identityTokenTtl")
|
|
499
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
500
|
+
"""
|
|
501
|
+
The TTL of generated identity tokens in seconds.
|
|
502
|
+
"""
|
|
503
|
+
return pulumi.get(self, "identity_token_ttl")
|
|
504
|
+
|
|
505
|
+
@identity_token_ttl.setter
|
|
506
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
507
|
+
pulumi.set(self, "identity_token_ttl", value)
|
|
508
|
+
|
|
509
|
+
@_builtins.property
|
|
510
|
+
@pulumi.getter(name="maxRetries")
|
|
511
|
+
def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
512
|
+
"""
|
|
513
|
+
Maximum number of retries for Azure API requests.
|
|
514
|
+
Defaults to `3`.
|
|
515
|
+
"""
|
|
516
|
+
return pulumi.get(self, "max_retries")
|
|
517
|
+
|
|
518
|
+
@max_retries.setter
|
|
519
|
+
def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
520
|
+
pulumi.set(self, "max_retries", value)
|
|
521
|
+
|
|
522
|
+
@_builtins.property
|
|
523
|
+
@pulumi.getter(name="maxRetryDelay")
|
|
524
|
+
def max_retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
525
|
+
"""
|
|
526
|
+
The maximum delay in seconds between retries for Azure API requests.
|
|
527
|
+
Defaults to `60`.
|
|
528
|
+
"""
|
|
529
|
+
return pulumi.get(self, "max_retry_delay")
|
|
530
|
+
|
|
531
|
+
@max_retry_delay.setter
|
|
532
|
+
def max_retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
533
|
+
pulumi.set(self, "max_retry_delay", value)
|
|
534
|
+
|
|
535
|
+
@_builtins.property
|
|
536
|
+
@pulumi.getter
|
|
537
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
538
|
+
"""
|
|
539
|
+
The namespace to provision the resource in.
|
|
540
|
+
The value should not contain leading or trailing forward slashes.
|
|
541
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
542
|
+
*Available only for Vault Enterprise*.
|
|
543
|
+
"""
|
|
544
|
+
return pulumi.get(self, "namespace")
|
|
545
|
+
|
|
546
|
+
@namespace.setter
|
|
547
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
548
|
+
pulumi.set(self, "namespace", value)
|
|
549
|
+
|
|
550
|
+
@_builtins.property
|
|
551
|
+
@pulumi.getter
|
|
552
|
+
def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
553
|
+
"""
|
|
554
|
+
The configured URL for the application registered in
|
|
555
|
+
Azure Active Directory.
|
|
556
|
+
"""
|
|
557
|
+
return pulumi.get(self, "resource")
|
|
558
|
+
|
|
559
|
+
@resource.setter
|
|
560
|
+
def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
561
|
+
pulumi.set(self, "resource", value)
|
|
562
|
+
|
|
563
|
+
@_builtins.property
|
|
564
|
+
@pulumi.getter(name="retryDelay")
|
|
565
|
+
def retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
566
|
+
"""
|
|
567
|
+
The initial delay in seconds between retries for Azure API requests.
|
|
568
|
+
Defaults to `4`.
|
|
569
|
+
"""
|
|
570
|
+
return pulumi.get(self, "retry_delay")
|
|
571
|
+
|
|
572
|
+
@retry_delay.setter
|
|
573
|
+
def retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
574
|
+
pulumi.set(self, "retry_delay", value)
|
|
575
|
+
|
|
576
|
+
@_builtins.property
|
|
577
|
+
@pulumi.getter(name="rotationPeriod")
|
|
578
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
579
|
+
"""
|
|
580
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
581
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
582
|
+
*Available only for Vault Enterprise*
|
|
583
|
+
"""
|
|
584
|
+
return pulumi.get(self, "rotation_period")
|
|
585
|
+
|
|
586
|
+
@rotation_period.setter
|
|
587
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
588
|
+
pulumi.set(self, "rotation_period", value)
|
|
589
|
+
|
|
590
|
+
@_builtins.property
|
|
591
|
+
@pulumi.getter(name="rotationSchedule")
|
|
592
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
593
|
+
"""
|
|
594
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
595
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
596
|
+
*Available only for Vault Enterprise*
|
|
597
|
+
"""
|
|
598
|
+
return pulumi.get(self, "rotation_schedule")
|
|
599
|
+
|
|
600
|
+
@rotation_schedule.setter
|
|
601
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
602
|
+
pulumi.set(self, "rotation_schedule", value)
|
|
603
|
+
|
|
604
|
+
@_builtins.property
|
|
605
|
+
@pulumi.getter(name="rotationWindow")
|
|
606
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
607
|
+
"""
|
|
608
|
+
The maximum amount of time in seconds allowed to complete
|
|
609
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
610
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
611
|
+
*Available only for Vault Enterprise*
|
|
612
|
+
"""
|
|
613
|
+
return pulumi.get(self, "rotation_window")
|
|
614
|
+
|
|
615
|
+
@rotation_window.setter
|
|
616
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
617
|
+
pulumi.set(self, "rotation_window", value)
|
|
618
|
+
|
|
619
|
+
@_builtins.property
|
|
620
|
+
@pulumi.getter(name="tenantId")
|
|
621
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
622
|
+
"""
|
|
623
|
+
The tenant id for the Azure Active Directory
|
|
624
|
+
organization.
|
|
625
|
+
"""
|
|
626
|
+
return pulumi.get(self, "tenant_id")
|
|
627
|
+
|
|
628
|
+
@tenant_id.setter
|
|
629
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
630
|
+
pulumi.set(self, "tenant_id", value)
|
|
631
|
+
|
|
632
|
+
|
|
633
|
+
@pulumi.type_token("vault:azure/authBackendConfig:AuthBackendConfig")
|
|
634
|
+
class AuthBackendConfig(pulumi.CustomResource):
|
|
635
|
+
@overload
|
|
636
|
+
def __init__(__self__,
|
|
637
|
+
resource_name: str,
|
|
638
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
639
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
640
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
641
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
642
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
643
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
644
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
645
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
646
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
647
|
+
max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
648
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
649
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
|
650
|
+
retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
651
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
652
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
653
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
654
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
655
|
+
__props__=None):
|
|
656
|
+
"""
|
|
657
|
+
## Example Usage
|
|
658
|
+
|
|
659
|
+
You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
|
|
660
|
+
```python
|
|
661
|
+
import pulumi
|
|
662
|
+
import pulumi_vault as vault
|
|
663
|
+
|
|
664
|
+
example = vault.AuthBackend("example",
|
|
665
|
+
type="azure",
|
|
666
|
+
identity_token_key="example-key")
|
|
667
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
|
668
|
+
backend=example.path,
|
|
669
|
+
tenant_id="11111111-2222-3333-4444-555555555555",
|
|
670
|
+
client_id="11111111-2222-3333-4444-555555555555",
|
|
671
|
+
identity_token_audience="<TOKEN_AUDIENCE>",
|
|
672
|
+
identity_token_ttl="<TOKEN_TTL>",
|
|
673
|
+
rotation_schedule="0 * * * SAT",
|
|
674
|
+
rotation_window=3600)
|
|
675
|
+
```
|
|
676
|
+
|
|
677
|
+
```python
|
|
678
|
+
import pulumi
|
|
679
|
+
import pulumi_vault as vault
|
|
680
|
+
|
|
681
|
+
example = vault.AuthBackend("example", type="azure")
|
|
682
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
|
683
|
+
backend=example.path,
|
|
684
|
+
tenant_id="11111111-2222-3333-4444-555555555555",
|
|
685
|
+
client_id="11111111-2222-3333-4444-555555555555",
|
|
686
|
+
client_secret="01234567890123456789",
|
|
687
|
+
resource="https://vault.hashicorp.com",
|
|
688
|
+
rotation_schedule="0 * * * SAT",
|
|
689
|
+
rotation_window=3600)
|
|
690
|
+
```
|
|
691
|
+
|
|
692
|
+
## Import
|
|
693
|
+
|
|
694
|
+
Azure auth backends can be imported using `auth/`, the `backend` path, and `/config` e.g.
|
|
695
|
+
|
|
696
|
+
```sh
|
|
697
|
+
$ pulumi import vault:azure/authBackendConfig:AuthBackendConfig example auth/azure/config
|
|
698
|
+
```
|
|
699
|
+
|
|
700
|
+
:param str resource_name: The name of the resource.
|
|
701
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
702
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
|
703
|
+
mounted at. Defaults to `azure`.
|
|
704
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
|
705
|
+
Currently read permissions to query compute resources are required.
|
|
706
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
|
707
|
+
Azure APIs.
|
|
708
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
709
|
+
*Available only for Vault Enterprise*
|
|
710
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
|
711
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
712
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
713
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
714
|
+
*Available only for Vault Enterprise*
|
|
715
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
|
716
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
|
|
717
|
+
Defaults to `3`.
|
|
718
|
+
:param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
|
|
719
|
+
Defaults to `60`.
|
|
720
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
721
|
+
The value should not contain leading or trailing forward slashes.
|
|
722
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
723
|
+
*Available only for Vault Enterprise*.
|
|
724
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
|
725
|
+
Azure Active Directory.
|
|
726
|
+
:param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
|
|
727
|
+
Defaults to `4`.
|
|
728
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
729
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
730
|
+
*Available only for Vault Enterprise*
|
|
731
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
732
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
733
|
+
*Available only for Vault Enterprise*
|
|
734
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
735
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
736
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
737
|
+
*Available only for Vault Enterprise*
|
|
738
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
|
739
|
+
organization.
|
|
740
|
+
"""
|
|
741
|
+
...
|
|
742
|
+
@overload
|
|
743
|
+
def __init__(__self__,
|
|
744
|
+
resource_name: str,
|
|
745
|
+
args: AuthBackendConfigArgs,
|
|
746
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
747
|
+
"""
|
|
748
|
+
## Example Usage
|
|
749
|
+
|
|
750
|
+
You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
|
|
751
|
+
```python
|
|
752
|
+
import pulumi
|
|
753
|
+
import pulumi_vault as vault
|
|
754
|
+
|
|
755
|
+
example = vault.AuthBackend("example",
|
|
756
|
+
type="azure",
|
|
757
|
+
identity_token_key="example-key")
|
|
758
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
|
759
|
+
backend=example.path,
|
|
760
|
+
tenant_id="11111111-2222-3333-4444-555555555555",
|
|
761
|
+
client_id="11111111-2222-3333-4444-555555555555",
|
|
762
|
+
identity_token_audience="<TOKEN_AUDIENCE>",
|
|
763
|
+
identity_token_ttl="<TOKEN_TTL>",
|
|
764
|
+
rotation_schedule="0 * * * SAT",
|
|
765
|
+
rotation_window=3600)
|
|
766
|
+
```
|
|
767
|
+
|
|
768
|
+
```python
|
|
769
|
+
import pulumi
|
|
770
|
+
import pulumi_vault as vault
|
|
771
|
+
|
|
772
|
+
example = vault.AuthBackend("example", type="azure")
|
|
773
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
|
774
|
+
backend=example.path,
|
|
775
|
+
tenant_id="11111111-2222-3333-4444-555555555555",
|
|
776
|
+
client_id="11111111-2222-3333-4444-555555555555",
|
|
777
|
+
client_secret="01234567890123456789",
|
|
778
|
+
resource="https://vault.hashicorp.com",
|
|
779
|
+
rotation_schedule="0 * * * SAT",
|
|
780
|
+
rotation_window=3600)
|
|
781
|
+
```
|
|
782
|
+
|
|
783
|
+
## Import
|
|
784
|
+
|
|
785
|
+
Azure auth backends can be imported using `auth/`, the `backend` path, and `/config` e.g.
|
|
786
|
+
|
|
787
|
+
```sh
|
|
788
|
+
$ pulumi import vault:azure/authBackendConfig:AuthBackendConfig example auth/azure/config
|
|
789
|
+
```
|
|
790
|
+
|
|
791
|
+
:param str resource_name: The name of the resource.
|
|
792
|
+
:param AuthBackendConfigArgs args: The arguments to use to populate this resource's properties.
|
|
793
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
794
|
+
"""
|
|
795
|
+
...
|
|
796
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
797
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
798
|
+
if resource_args is not None:
|
|
799
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
800
|
+
else:
|
|
801
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
802
|
+
|
|
803
|
+
def _internal_init(__self__,
|
|
804
|
+
resource_name: str,
|
|
805
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
806
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
807
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
808
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
809
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
810
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
811
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
812
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
813
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
814
|
+
max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
815
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
816
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
|
817
|
+
retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
818
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
819
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
820
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
821
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
822
|
+
__props__=None):
|
|
823
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
824
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
825
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
826
|
+
if opts.id is None:
|
|
827
|
+
if __props__ is not None:
|
|
828
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
829
|
+
__props__ = AuthBackendConfigArgs.__new__(AuthBackendConfigArgs)
|
|
830
|
+
|
|
831
|
+
__props__.__dict__["backend"] = backend
|
|
832
|
+
__props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
|
|
833
|
+
__props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
|
|
834
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
|
835
|
+
__props__.__dict__["environment"] = environment
|
|
836
|
+
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
|
837
|
+
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
|
838
|
+
__props__.__dict__["max_retries"] = max_retries
|
|
839
|
+
__props__.__dict__["max_retry_delay"] = max_retry_delay
|
|
840
|
+
__props__.__dict__["namespace"] = namespace
|
|
841
|
+
if resource is None and not opts.urn:
|
|
842
|
+
raise TypeError("Missing required property 'resource'")
|
|
843
|
+
__props__.__dict__["resource"] = resource
|
|
844
|
+
__props__.__dict__["retry_delay"] = retry_delay
|
|
845
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
846
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
847
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
|
848
|
+
if tenant_id is None and not opts.urn:
|
|
849
|
+
raise TypeError("Missing required property 'tenant_id'")
|
|
850
|
+
__props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
|
|
851
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "tenantId"])
|
|
852
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
853
|
+
super(AuthBackendConfig, __self__).__init__(
|
|
854
|
+
'vault:azure/authBackendConfig:AuthBackendConfig',
|
|
855
|
+
resource_name,
|
|
856
|
+
__props__,
|
|
857
|
+
opts)
|
|
858
|
+
|
|
859
|
+
@staticmethod
|
|
860
|
+
def get(resource_name: str,
|
|
861
|
+
id: pulumi.Input[str],
|
|
862
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
863
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
864
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
865
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
866
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
867
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
868
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
869
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
870
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
871
|
+
max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
872
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
873
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
|
874
|
+
retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
|
|
875
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
876
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
877
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
878
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfig':
|
|
879
|
+
"""
|
|
880
|
+
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
|
881
|
+
properties used to qualify the lookup.
|
|
882
|
+
|
|
883
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
884
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
885
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
886
|
+
:param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
|
|
887
|
+
mounted at. Defaults to `azure`.
|
|
888
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
|
|
889
|
+
Currently read permissions to query compute resources are required.
|
|
890
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
|
|
891
|
+
Azure APIs.
|
|
892
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
893
|
+
*Available only for Vault Enterprise*
|
|
894
|
+
:param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
|
|
895
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
896
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
897
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
898
|
+
*Available only for Vault Enterprise*
|
|
899
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
|
900
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
|
|
901
|
+
Defaults to `3`.
|
|
902
|
+
:param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
|
|
903
|
+
Defaults to `60`.
|
|
904
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
905
|
+
The value should not contain leading or trailing forward slashes.
|
|
906
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
907
|
+
*Available only for Vault Enterprise*.
|
|
908
|
+
:param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
|
|
909
|
+
Azure Active Directory.
|
|
910
|
+
:param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
|
|
911
|
+
Defaults to `4`.
|
|
912
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
|
913
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
914
|
+
*Available only for Vault Enterprise*
|
|
915
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
916
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
917
|
+
*Available only for Vault Enterprise*
|
|
918
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
919
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
920
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
921
|
+
*Available only for Vault Enterprise*
|
|
922
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
|
|
923
|
+
organization.
|
|
924
|
+
"""
|
|
925
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
926
|
+
|
|
927
|
+
__props__ = _AuthBackendConfigState.__new__(_AuthBackendConfigState)
|
|
928
|
+
|
|
929
|
+
__props__.__dict__["backend"] = backend
|
|
930
|
+
__props__.__dict__["client_id"] = client_id
|
|
931
|
+
__props__.__dict__["client_secret"] = client_secret
|
|
932
|
+
__props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
|
|
933
|
+
__props__.__dict__["environment"] = environment
|
|
934
|
+
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
|
935
|
+
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
|
936
|
+
__props__.__dict__["max_retries"] = max_retries
|
|
937
|
+
__props__.__dict__["max_retry_delay"] = max_retry_delay
|
|
938
|
+
__props__.__dict__["namespace"] = namespace
|
|
939
|
+
__props__.__dict__["resource"] = resource
|
|
940
|
+
__props__.__dict__["retry_delay"] = retry_delay
|
|
941
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
942
|
+
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
943
|
+
__props__.__dict__["rotation_window"] = rotation_window
|
|
944
|
+
__props__.__dict__["tenant_id"] = tenant_id
|
|
945
|
+
return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
|
|
946
|
+
|
|
947
|
+
@_builtins.property
|
|
948
|
+
@pulumi.getter
|
|
949
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
950
|
+
"""
|
|
951
|
+
The path the Azure auth backend being configured was
|
|
952
|
+
mounted at. Defaults to `azure`.
|
|
953
|
+
"""
|
|
954
|
+
return pulumi.get(self, "backend")
|
|
955
|
+
|
|
956
|
+
@_builtins.property
|
|
957
|
+
@pulumi.getter(name="clientId")
|
|
958
|
+
def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
959
|
+
"""
|
|
960
|
+
The client id for credentials to query the Azure APIs.
|
|
961
|
+
Currently read permissions to query compute resources are required.
|
|
962
|
+
"""
|
|
963
|
+
return pulumi.get(self, "client_id")
|
|
964
|
+
|
|
965
|
+
@_builtins.property
|
|
966
|
+
@pulumi.getter(name="clientSecret")
|
|
967
|
+
def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
968
|
+
"""
|
|
969
|
+
The client secret for credentials to query the
|
|
970
|
+
Azure APIs.
|
|
971
|
+
"""
|
|
972
|
+
return pulumi.get(self, "client_secret")
|
|
973
|
+
|
|
974
|
+
@_builtins.property
|
|
975
|
+
@pulumi.getter(name="disableAutomatedRotation")
|
|
976
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
977
|
+
"""
|
|
978
|
+
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
|
979
|
+
*Available only for Vault Enterprise*
|
|
980
|
+
"""
|
|
981
|
+
return pulumi.get(self, "disable_automated_rotation")
|
|
982
|
+
|
|
983
|
+
@_builtins.property
|
|
984
|
+
@pulumi.getter
|
|
985
|
+
def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
986
|
+
"""
|
|
987
|
+
The Azure cloud environment. Valid values:
|
|
988
|
+
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
|
989
|
+
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
|
990
|
+
"""
|
|
991
|
+
return pulumi.get(self, "environment")
|
|
992
|
+
|
|
993
|
+
@_builtins.property
|
|
994
|
+
@pulumi.getter(name="identityTokenAudience")
|
|
995
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
996
|
+
"""
|
|
997
|
+
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
|
998
|
+
*Available only for Vault Enterprise*
|
|
999
|
+
"""
|
|
1000
|
+
return pulumi.get(self, "identity_token_audience")
|
|
1001
|
+
|
|
1002
|
+
@_builtins.property
|
|
1003
|
+
@pulumi.getter(name="identityTokenTtl")
|
|
1004
|
+
def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
|
1005
|
+
"""
|
|
1006
|
+
The TTL of generated identity tokens in seconds.
|
|
1007
|
+
"""
|
|
1008
|
+
return pulumi.get(self, "identity_token_ttl")
|
|
1009
|
+
|
|
1010
|
+
@_builtins.property
|
|
1011
|
+
@pulumi.getter(name="maxRetries")
|
|
1012
|
+
def max_retries(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1013
|
+
"""
|
|
1014
|
+
Maximum number of retries for Azure API requests.
|
|
1015
|
+
Defaults to `3`.
|
|
1016
|
+
"""
|
|
1017
|
+
return pulumi.get(self, "max_retries")
|
|
1018
|
+
|
|
1019
|
+
@_builtins.property
|
|
1020
|
+
@pulumi.getter(name="maxRetryDelay")
|
|
1021
|
+
def max_retry_delay(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1022
|
+
"""
|
|
1023
|
+
The maximum delay in seconds between retries for Azure API requests.
|
|
1024
|
+
Defaults to `60`.
|
|
1025
|
+
"""
|
|
1026
|
+
return pulumi.get(self, "max_retry_delay")
|
|
1027
|
+
|
|
1028
|
+
@_builtins.property
|
|
1029
|
+
@pulumi.getter
|
|
1030
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1031
|
+
"""
|
|
1032
|
+
The namespace to provision the resource in.
|
|
1033
|
+
The value should not contain leading or trailing forward slashes.
|
|
1034
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1035
|
+
*Available only for Vault Enterprise*.
|
|
1036
|
+
"""
|
|
1037
|
+
return pulumi.get(self, "namespace")
|
|
1038
|
+
|
|
1039
|
+
@_builtins.property
|
|
1040
|
+
@pulumi.getter
|
|
1041
|
+
def resource(self) -> pulumi.Output[_builtins.str]:
|
|
1042
|
+
"""
|
|
1043
|
+
The configured URL for the application registered in
|
|
1044
|
+
Azure Active Directory.
|
|
1045
|
+
"""
|
|
1046
|
+
return pulumi.get(self, "resource")
|
|
1047
|
+
|
|
1048
|
+
@_builtins.property
|
|
1049
|
+
@pulumi.getter(name="retryDelay")
|
|
1050
|
+
def retry_delay(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1051
|
+
"""
|
|
1052
|
+
The initial delay in seconds between retries for Azure API requests.
|
|
1053
|
+
Defaults to `4`.
|
|
1054
|
+
"""
|
|
1055
|
+
return pulumi.get(self, "retry_delay")
|
|
1056
|
+
|
|
1057
|
+
@_builtins.property
|
|
1058
|
+
@pulumi.getter(name="rotationPeriod")
|
|
1059
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1060
|
+
"""
|
|
1061
|
+
The amount of time in seconds Vault should wait before rotating the root credential.
|
|
1062
|
+
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
|
1063
|
+
*Available only for Vault Enterprise*
|
|
1064
|
+
"""
|
|
1065
|
+
return pulumi.get(self, "rotation_period")
|
|
1066
|
+
|
|
1067
|
+
@_builtins.property
|
|
1068
|
+
@pulumi.getter(name="rotationSchedule")
|
|
1069
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1070
|
+
"""
|
|
1071
|
+
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
|
1072
|
+
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
|
1073
|
+
*Available only for Vault Enterprise*
|
|
1074
|
+
"""
|
|
1075
|
+
return pulumi.get(self, "rotation_schedule")
|
|
1076
|
+
|
|
1077
|
+
@_builtins.property
|
|
1078
|
+
@pulumi.getter(name="rotationWindow")
|
|
1079
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1080
|
+
"""
|
|
1081
|
+
The maximum amount of time in seconds allowed to complete
|
|
1082
|
+
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
1083
|
+
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
1084
|
+
*Available only for Vault Enterprise*
|
|
1085
|
+
"""
|
|
1086
|
+
return pulumi.get(self, "rotation_window")
|
|
1087
|
+
|
|
1088
|
+
@_builtins.property
|
|
1089
|
+
@pulumi.getter(name="tenantId")
|
|
1090
|
+
def tenant_id(self) -> pulumi.Output[_builtins.str]:
|
|
1091
|
+
"""
|
|
1092
|
+
The tenant id for the Azure Active Directory
|
|
1093
|
+
organization.
|
|
1094
|
+
"""
|
|
1095
|
+
return pulumi.get(self, "tenant_id")
|
|
1096
|
+
|