pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1793 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['BackendArgs', 'Backend']
18
+
19
+ @pulumi.input_type
20
+ class BackendArgs:
21
+ def __init__(__self__, *,
22
+ subscription_id: pulumi.Input[_builtins.str],
23
+ tenant_id: pulumi.Input[_builtins.str],
24
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
29
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
30
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
31
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ description: Optional[pulumi.Input[_builtins.str]] = None,
33
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
36
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
39
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
40
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
42
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
44
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
46
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
47
+ path: Optional[pulumi.Input[_builtins.str]] = None,
48
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
49
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
50
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
51
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
52
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
53
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None):
54
+ """
55
+ The set of arguments for constructing a Backend resource.
56
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
57
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
60
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
62
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
63
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
64
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
66
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
67
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
68
+ *Available only for Vault Enterprise*
69
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
70
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
71
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
72
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
73
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
74
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
75
+ *Available only for Vault Enterprise*
76
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
77
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
78
+ *Available only for Vault Enterprise*
79
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
80
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
81
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
82
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
83
+ The value should not contain leading or trailing forward slashes.
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
85
+ *Available only for Vault Enterprise*.
86
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
87
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
88
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
89
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
90
+ :param pulumi.Input[_builtins.int] root_password_ttl: Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
91
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
92
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
93
+ *Available only for Vault Enterprise*
94
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
95
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
96
+ *Available only for Vault Enterprise*
97
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
98
+ a rotation when a scheduled token rotation occurs. The default rotation window is
99
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
100
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
101
+ """
102
+ pulumi.set(__self__, "subscription_id", subscription_id)
103
+ pulumi.set(__self__, "tenant_id", tenant_id)
104
+ if allowed_managed_keys is not None:
105
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
106
+ if allowed_response_headers is not None:
107
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
108
+ if audit_non_hmac_request_keys is not None:
109
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
110
+ if audit_non_hmac_response_keys is not None:
111
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
112
+ if client_id is not None:
113
+ pulumi.set(__self__, "client_id", client_id)
114
+ if client_secret is not None:
115
+ pulumi.set(__self__, "client_secret", client_secret)
116
+ if default_lease_ttl_seconds is not None:
117
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
118
+ if delegated_auth_accessors is not None:
119
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
120
+ if description is not None:
121
+ pulumi.set(__self__, "description", description)
122
+ if disable_automated_rotation is not None:
123
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
124
+ if disable_remount is not None:
125
+ pulumi.set(__self__, "disable_remount", disable_remount)
126
+ if environment is not None:
127
+ pulumi.set(__self__, "environment", environment)
128
+ if external_entropy_access is not None:
129
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
130
+ if force_no_cache is not None:
131
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
132
+ if identity_token_audience is not None:
133
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
134
+ if identity_token_key is not None:
135
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
136
+ if identity_token_ttl is not None:
137
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
138
+ if listing_visibility is not None:
139
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
140
+ if local is not None:
141
+ pulumi.set(__self__, "local", local)
142
+ if max_lease_ttl_seconds is not None:
143
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
144
+ if namespace is not None:
145
+ pulumi.set(__self__, "namespace", namespace)
146
+ if options is not None:
147
+ pulumi.set(__self__, "options", options)
148
+ if passthrough_request_headers is not None:
149
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
150
+ if path is not None:
151
+ pulumi.set(__self__, "path", path)
152
+ if plugin_version is not None:
153
+ pulumi.set(__self__, "plugin_version", plugin_version)
154
+ if root_password_ttl is not None:
155
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
156
+ if rotation_period is not None:
157
+ pulumi.set(__self__, "rotation_period", rotation_period)
158
+ if rotation_schedule is not None:
159
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
160
+ if rotation_window is not None:
161
+ pulumi.set(__self__, "rotation_window", rotation_window)
162
+ if seal_wrap is not None:
163
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
164
+
165
+ @_builtins.property
166
+ @pulumi.getter(name="subscriptionId")
167
+ def subscription_id(self) -> pulumi.Input[_builtins.str]:
168
+ """
169
+ The subscription id for the Azure Active Directory.
170
+ """
171
+ return pulumi.get(self, "subscription_id")
172
+
173
+ @subscription_id.setter
174
+ def subscription_id(self, value: pulumi.Input[_builtins.str]):
175
+ pulumi.set(self, "subscription_id", value)
176
+
177
+ @_builtins.property
178
+ @pulumi.getter(name="tenantId")
179
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
180
+ """
181
+ The tenant id for the Azure Active Directory.
182
+ """
183
+ return pulumi.get(self, "tenant_id")
184
+
185
+ @tenant_id.setter
186
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
187
+ pulumi.set(self, "tenant_id", value)
188
+
189
+ @_builtins.property
190
+ @pulumi.getter(name="allowedManagedKeys")
191
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
192
+ """
193
+ List of managed key registry entry names that the mount in question is allowed to access
194
+ """
195
+ return pulumi.get(self, "allowed_managed_keys")
196
+
197
+ @allowed_managed_keys.setter
198
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
199
+ pulumi.set(self, "allowed_managed_keys", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="allowedResponseHeaders")
203
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
204
+ """
205
+ List of headers to allow and pass from the request to the plugin
206
+ """
207
+ return pulumi.get(self, "allowed_response_headers")
208
+
209
+ @allowed_response_headers.setter
210
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
211
+ pulumi.set(self, "allowed_response_headers", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="auditNonHmacRequestKeys")
215
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
218
+ """
219
+ return pulumi.get(self, "audit_non_hmac_request_keys")
220
+
221
+ @audit_non_hmac_request_keys.setter
222
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
223
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="auditNonHmacResponseKeys")
227
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
228
+ """
229
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
230
+ """
231
+ return pulumi.get(self, "audit_non_hmac_response_keys")
232
+
233
+ @audit_non_hmac_response_keys.setter
234
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
235
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="clientId")
239
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
240
+ """
241
+ The OAuth2 client id to connect to Azure.
242
+ """
243
+ return pulumi.get(self, "client_id")
244
+
245
+ @client_id.setter
246
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
247
+ pulumi.set(self, "client_id", value)
248
+
249
+ @_builtins.property
250
+ @pulumi.getter(name="clientSecret")
251
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
252
+ """
253
+ The OAuth2 client secret to connect to Azure.
254
+ """
255
+ return pulumi.get(self, "client_secret")
256
+
257
+ @client_secret.setter
258
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
259
+ pulumi.set(self, "client_secret", value)
260
+
261
+ @_builtins.property
262
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
263
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
264
+ """
265
+ Default lease duration for tokens and secrets in seconds
266
+ """
267
+ return pulumi.get(self, "default_lease_ttl_seconds")
268
+
269
+ @default_lease_ttl_seconds.setter
270
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
271
+ pulumi.set(self, "default_lease_ttl_seconds", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="delegatedAuthAccessors")
275
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
276
+ """
277
+ List of headers to allow and pass from the request to the plugin
278
+ """
279
+ return pulumi.get(self, "delegated_auth_accessors")
280
+
281
+ @delegated_auth_accessors.setter
282
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
283
+ pulumi.set(self, "delegated_auth_accessors", value)
284
+
285
+ @_builtins.property
286
+ @pulumi.getter
287
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
288
+ """
289
+ Human-friendly description of the mount for the backend.
290
+ """
291
+ return pulumi.get(self, "description")
292
+
293
+ @description.setter
294
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
295
+ pulumi.set(self, "description", value)
296
+
297
+ @_builtins.property
298
+ @pulumi.getter(name="disableAutomatedRotation")
299
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
300
+ """
301
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
302
+ *Available only for Vault Enterprise*
303
+ """
304
+ return pulumi.get(self, "disable_automated_rotation")
305
+
306
+ @disable_automated_rotation.setter
307
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
308
+ pulumi.set(self, "disable_automated_rotation", value)
309
+
310
+ @_builtins.property
311
+ @pulumi.getter(name="disableRemount")
312
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
313
+ """
314
+ If set, opts out of mount migration on path updates.
315
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
316
+ """
317
+ return pulumi.get(self, "disable_remount")
318
+
319
+ @disable_remount.setter
320
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
+ pulumi.set(self, "disable_remount", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter
325
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
326
+ """
327
+ The Azure environment.
328
+ """
329
+ return pulumi.get(self, "environment")
330
+
331
+ @environment.setter
332
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
333
+ pulumi.set(self, "environment", value)
334
+
335
+ @_builtins.property
336
+ @pulumi.getter(name="externalEntropyAccess")
337
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
338
+ """
339
+ Enable the secrets engine to access Vault's external entropy source
340
+ """
341
+ return pulumi.get(self, "external_entropy_access")
342
+
343
+ @external_entropy_access.setter
344
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
345
+ pulumi.set(self, "external_entropy_access", value)
346
+
347
+ @_builtins.property
348
+ @pulumi.getter(name="forceNoCache")
349
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
350
+ """
351
+ If set to true, disables caching.
352
+ """
353
+ return pulumi.get(self, "force_no_cache")
354
+
355
+ @force_no_cache.setter
356
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
357
+ pulumi.set(self, "force_no_cache", value)
358
+
359
+ @_builtins.property
360
+ @pulumi.getter(name="identityTokenAudience")
361
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
362
+ """
363
+ The audience claim value. Requires Vault 1.17+.
364
+ *Available only for Vault Enterprise*
365
+ """
366
+ return pulumi.get(self, "identity_token_audience")
367
+
368
+ @identity_token_audience.setter
369
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
370
+ pulumi.set(self, "identity_token_audience", value)
371
+
372
+ @_builtins.property
373
+ @pulumi.getter(name="identityTokenKey")
374
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
375
+ """
376
+ The key to use for signing identity tokens.
377
+ """
378
+ return pulumi.get(self, "identity_token_key")
379
+
380
+ @identity_token_key.setter
381
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
382
+ pulumi.set(self, "identity_token_key", value)
383
+
384
+ @_builtins.property
385
+ @pulumi.getter(name="identityTokenTtl")
386
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
387
+ """
388
+ The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
389
+ *Available only for Vault Enterprise*
390
+ """
391
+ return pulumi.get(self, "identity_token_ttl")
392
+
393
+ @identity_token_ttl.setter
394
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
395
+ pulumi.set(self, "identity_token_ttl", value)
396
+
397
+ @_builtins.property
398
+ @pulumi.getter(name="listingVisibility")
399
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
400
+ """
401
+ Specifies whether to show this mount in the UI-specific listing endpoint
402
+ """
403
+ return pulumi.get(self, "listing_visibility")
404
+
405
+ @listing_visibility.setter
406
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
407
+ pulumi.set(self, "listing_visibility", value)
408
+
409
+ @_builtins.property
410
+ @pulumi.getter
411
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
412
+ """
413
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
414
+ """
415
+ return pulumi.get(self, "local")
416
+
417
+ @local.setter
418
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
419
+ pulumi.set(self, "local", value)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter(name="maxLeaseTtlSeconds")
423
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
424
+ """
425
+ Maximum possible lease duration for tokens and secrets in seconds
426
+ """
427
+ return pulumi.get(self, "max_lease_ttl_seconds")
428
+
429
+ @max_lease_ttl_seconds.setter
430
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
431
+ pulumi.set(self, "max_lease_ttl_seconds", value)
432
+
433
+ @_builtins.property
434
+ @pulumi.getter
435
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
436
+ """
437
+ The namespace to provision the resource in.
438
+ The value should not contain leading or trailing forward slashes.
439
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
440
+ *Available only for Vault Enterprise*.
441
+ """
442
+ return pulumi.get(self, "namespace")
443
+
444
+ @namespace.setter
445
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
446
+ pulumi.set(self, "namespace", value)
447
+
448
+ @_builtins.property
449
+ @pulumi.getter
450
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
451
+ """
452
+ Specifies mount type specific options that are passed to the backend
453
+ """
454
+ return pulumi.get(self, "options")
455
+
456
+ @options.setter
457
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
458
+ pulumi.set(self, "options", value)
459
+
460
+ @_builtins.property
461
+ @pulumi.getter(name="passthroughRequestHeaders")
462
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
463
+ """
464
+ List of headers to allow and pass from the request to the plugin
465
+ """
466
+ return pulumi.get(self, "passthrough_request_headers")
467
+
468
+ @passthrough_request_headers.setter
469
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
470
+ pulumi.set(self, "passthrough_request_headers", value)
471
+
472
+ @_builtins.property
473
+ @pulumi.getter
474
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
475
+ """
476
+ The unique path this backend should be mounted at. Defaults to `azure`.
477
+ """
478
+ return pulumi.get(self, "path")
479
+
480
+ @path.setter
481
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
482
+ pulumi.set(self, "path", value)
483
+
484
+ @_builtins.property
485
+ @pulumi.getter(name="pluginVersion")
486
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
487
+ """
488
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
489
+ """
490
+ return pulumi.get(self, "plugin_version")
491
+
492
+ @plugin_version.setter
493
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
494
+ pulumi.set(self, "plugin_version", value)
495
+
496
+ @_builtins.property
497
+ @pulumi.getter(name="rootPasswordTtl")
498
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
499
+ """
500
+ Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
501
+ """
502
+ return pulumi.get(self, "root_password_ttl")
503
+
504
+ @root_password_ttl.setter
505
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
+ pulumi.set(self, "root_password_ttl", value)
507
+
508
+ @_builtins.property
509
+ @pulumi.getter(name="rotationPeriod")
510
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
511
+ """
512
+ The amount of time in seconds Vault should wait before rotating the root credential.
513
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
514
+ *Available only for Vault Enterprise*
515
+ """
516
+ return pulumi.get(self, "rotation_period")
517
+
518
+ @rotation_period.setter
519
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
520
+ pulumi.set(self, "rotation_period", value)
521
+
522
+ @_builtins.property
523
+ @pulumi.getter(name="rotationSchedule")
524
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
525
+ """
526
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
527
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
528
+ *Available only for Vault Enterprise*
529
+ """
530
+ return pulumi.get(self, "rotation_schedule")
531
+
532
+ @rotation_schedule.setter
533
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
534
+ pulumi.set(self, "rotation_schedule", value)
535
+
536
+ @_builtins.property
537
+ @pulumi.getter(name="rotationWindow")
538
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
539
+ """
540
+ The maximum amount of time in seconds allowed to complete
541
+ a rotation when a scheduled token rotation occurs. The default rotation window is
542
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
543
+ """
544
+ return pulumi.get(self, "rotation_window")
545
+
546
+ @rotation_window.setter
547
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
548
+ pulumi.set(self, "rotation_window", value)
549
+
550
+ @_builtins.property
551
+ @pulumi.getter(name="sealWrap")
552
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
553
+ """
554
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
555
+ """
556
+ return pulumi.get(self, "seal_wrap")
557
+
558
+ @seal_wrap.setter
559
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
560
+ pulumi.set(self, "seal_wrap", value)
561
+
562
+
563
+ @pulumi.input_type
564
+ class _BackendState:
565
+ def __init__(__self__, *,
566
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
567
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
568
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
569
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
571
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
572
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
573
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
574
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
575
+ description: Optional[pulumi.Input[_builtins.str]] = None,
576
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
578
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
579
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
580
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
581
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
582
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
583
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
584
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
585
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
586
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
587
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
589
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
590
+ path: Optional[pulumi.Input[_builtins.str]] = None,
591
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
592
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
593
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
594
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
595
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
596
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
597
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
598
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
599
+ """
600
+ Input properties used for looking up and filtering Backend resources.
601
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
602
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
603
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
604
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
605
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
606
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
607
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
608
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
610
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
611
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
612
+ *Available only for Vault Enterprise*
613
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
614
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
615
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
616
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
617
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
618
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
619
+ *Available only for Vault Enterprise*
620
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
621
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
622
+ *Available only for Vault Enterprise*
623
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
624
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
625
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
626
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
627
+ The value should not contain leading or trailing forward slashes.
628
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
629
+ *Available only for Vault Enterprise*.
630
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
631
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
632
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
633
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
634
+ :param pulumi.Input[_builtins.int] root_password_ttl: Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
635
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
636
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
637
+ *Available only for Vault Enterprise*
638
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
639
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
640
+ *Available only for Vault Enterprise*
641
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
642
+ a rotation when a scheduled token rotation occurs. The default rotation window is
643
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
644
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
645
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
646
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
647
+ """
648
+ if accessor is not None:
649
+ pulumi.set(__self__, "accessor", accessor)
650
+ if allowed_managed_keys is not None:
651
+ pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
652
+ if allowed_response_headers is not None:
653
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
654
+ if audit_non_hmac_request_keys is not None:
655
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
656
+ if audit_non_hmac_response_keys is not None:
657
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
658
+ if client_id is not None:
659
+ pulumi.set(__self__, "client_id", client_id)
660
+ if client_secret is not None:
661
+ pulumi.set(__self__, "client_secret", client_secret)
662
+ if default_lease_ttl_seconds is not None:
663
+ pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
664
+ if delegated_auth_accessors is not None:
665
+ pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
666
+ if description is not None:
667
+ pulumi.set(__self__, "description", description)
668
+ if disable_automated_rotation is not None:
669
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
670
+ if disable_remount is not None:
671
+ pulumi.set(__self__, "disable_remount", disable_remount)
672
+ if environment is not None:
673
+ pulumi.set(__self__, "environment", environment)
674
+ if external_entropy_access is not None:
675
+ pulumi.set(__self__, "external_entropy_access", external_entropy_access)
676
+ if force_no_cache is not None:
677
+ pulumi.set(__self__, "force_no_cache", force_no_cache)
678
+ if identity_token_audience is not None:
679
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
680
+ if identity_token_key is not None:
681
+ pulumi.set(__self__, "identity_token_key", identity_token_key)
682
+ if identity_token_ttl is not None:
683
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
684
+ if listing_visibility is not None:
685
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
686
+ if local is not None:
687
+ pulumi.set(__self__, "local", local)
688
+ if max_lease_ttl_seconds is not None:
689
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
690
+ if namespace is not None:
691
+ pulumi.set(__self__, "namespace", namespace)
692
+ if options is not None:
693
+ pulumi.set(__self__, "options", options)
694
+ if passthrough_request_headers is not None:
695
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
696
+ if path is not None:
697
+ pulumi.set(__self__, "path", path)
698
+ if plugin_version is not None:
699
+ pulumi.set(__self__, "plugin_version", plugin_version)
700
+ if root_password_ttl is not None:
701
+ pulumi.set(__self__, "root_password_ttl", root_password_ttl)
702
+ if rotation_period is not None:
703
+ pulumi.set(__self__, "rotation_period", rotation_period)
704
+ if rotation_schedule is not None:
705
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
706
+ if rotation_window is not None:
707
+ pulumi.set(__self__, "rotation_window", rotation_window)
708
+ if seal_wrap is not None:
709
+ pulumi.set(__self__, "seal_wrap", seal_wrap)
710
+ if subscription_id is not None:
711
+ pulumi.set(__self__, "subscription_id", subscription_id)
712
+ if tenant_id is not None:
713
+ pulumi.set(__self__, "tenant_id", tenant_id)
714
+
715
+ @_builtins.property
716
+ @pulumi.getter
717
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
718
+ """
719
+ Accessor of the mount
720
+ """
721
+ return pulumi.get(self, "accessor")
722
+
723
+ @accessor.setter
724
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
725
+ pulumi.set(self, "accessor", value)
726
+
727
+ @_builtins.property
728
+ @pulumi.getter(name="allowedManagedKeys")
729
+ def allowed_managed_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
730
+ """
731
+ List of managed key registry entry names that the mount in question is allowed to access
732
+ """
733
+ return pulumi.get(self, "allowed_managed_keys")
734
+
735
+ @allowed_managed_keys.setter
736
+ def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
737
+ pulumi.set(self, "allowed_managed_keys", value)
738
+
739
+ @_builtins.property
740
+ @pulumi.getter(name="allowedResponseHeaders")
741
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
742
+ """
743
+ List of headers to allow and pass from the request to the plugin
744
+ """
745
+ return pulumi.get(self, "allowed_response_headers")
746
+
747
+ @allowed_response_headers.setter
748
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
749
+ pulumi.set(self, "allowed_response_headers", value)
750
+
751
+ @_builtins.property
752
+ @pulumi.getter(name="auditNonHmacRequestKeys")
753
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
754
+ """
755
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
756
+ """
757
+ return pulumi.get(self, "audit_non_hmac_request_keys")
758
+
759
+ @audit_non_hmac_request_keys.setter
760
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
761
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
762
+
763
+ @_builtins.property
764
+ @pulumi.getter(name="auditNonHmacResponseKeys")
765
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
766
+ """
767
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
768
+ """
769
+ return pulumi.get(self, "audit_non_hmac_response_keys")
770
+
771
+ @audit_non_hmac_response_keys.setter
772
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
773
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
774
+
775
+ @_builtins.property
776
+ @pulumi.getter(name="clientId")
777
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
778
+ """
779
+ The OAuth2 client id to connect to Azure.
780
+ """
781
+ return pulumi.get(self, "client_id")
782
+
783
+ @client_id.setter
784
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
785
+ pulumi.set(self, "client_id", value)
786
+
787
+ @_builtins.property
788
+ @pulumi.getter(name="clientSecret")
789
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
790
+ """
791
+ The OAuth2 client secret to connect to Azure.
792
+ """
793
+ return pulumi.get(self, "client_secret")
794
+
795
+ @client_secret.setter
796
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
797
+ pulumi.set(self, "client_secret", value)
798
+
799
+ @_builtins.property
800
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
801
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
802
+ """
803
+ Default lease duration for tokens and secrets in seconds
804
+ """
805
+ return pulumi.get(self, "default_lease_ttl_seconds")
806
+
807
+ @default_lease_ttl_seconds.setter
808
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
809
+ pulumi.set(self, "default_lease_ttl_seconds", value)
810
+
811
+ @_builtins.property
812
+ @pulumi.getter(name="delegatedAuthAccessors")
813
+ def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
814
+ """
815
+ List of headers to allow and pass from the request to the plugin
816
+ """
817
+ return pulumi.get(self, "delegated_auth_accessors")
818
+
819
+ @delegated_auth_accessors.setter
820
+ def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
821
+ pulumi.set(self, "delegated_auth_accessors", value)
822
+
823
+ @_builtins.property
824
+ @pulumi.getter
825
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
826
+ """
827
+ Human-friendly description of the mount for the backend.
828
+ """
829
+ return pulumi.get(self, "description")
830
+
831
+ @description.setter
832
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
833
+ pulumi.set(self, "description", value)
834
+
835
+ @_builtins.property
836
+ @pulumi.getter(name="disableAutomatedRotation")
837
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
838
+ """
839
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
840
+ *Available only for Vault Enterprise*
841
+ """
842
+ return pulumi.get(self, "disable_automated_rotation")
843
+
844
+ @disable_automated_rotation.setter
845
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
846
+ pulumi.set(self, "disable_automated_rotation", value)
847
+
848
+ @_builtins.property
849
+ @pulumi.getter(name="disableRemount")
850
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
851
+ """
852
+ If set, opts out of mount migration on path updates.
853
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
854
+ """
855
+ return pulumi.get(self, "disable_remount")
856
+
857
+ @disable_remount.setter
858
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
859
+ pulumi.set(self, "disable_remount", value)
860
+
861
+ @_builtins.property
862
+ @pulumi.getter
863
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
864
+ """
865
+ The Azure environment.
866
+ """
867
+ return pulumi.get(self, "environment")
868
+
869
+ @environment.setter
870
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
871
+ pulumi.set(self, "environment", value)
872
+
873
+ @_builtins.property
874
+ @pulumi.getter(name="externalEntropyAccess")
875
+ def external_entropy_access(self) -> Optional[pulumi.Input[_builtins.bool]]:
876
+ """
877
+ Enable the secrets engine to access Vault's external entropy source
878
+ """
879
+ return pulumi.get(self, "external_entropy_access")
880
+
881
+ @external_entropy_access.setter
882
+ def external_entropy_access(self, value: Optional[pulumi.Input[_builtins.bool]]):
883
+ pulumi.set(self, "external_entropy_access", value)
884
+
885
+ @_builtins.property
886
+ @pulumi.getter(name="forceNoCache")
887
+ def force_no_cache(self) -> Optional[pulumi.Input[_builtins.bool]]:
888
+ """
889
+ If set to true, disables caching.
890
+ """
891
+ return pulumi.get(self, "force_no_cache")
892
+
893
+ @force_no_cache.setter
894
+ def force_no_cache(self, value: Optional[pulumi.Input[_builtins.bool]]):
895
+ pulumi.set(self, "force_no_cache", value)
896
+
897
+ @_builtins.property
898
+ @pulumi.getter(name="identityTokenAudience")
899
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
900
+ """
901
+ The audience claim value. Requires Vault 1.17+.
902
+ *Available only for Vault Enterprise*
903
+ """
904
+ return pulumi.get(self, "identity_token_audience")
905
+
906
+ @identity_token_audience.setter
907
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
908
+ pulumi.set(self, "identity_token_audience", value)
909
+
910
+ @_builtins.property
911
+ @pulumi.getter(name="identityTokenKey")
912
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
913
+ """
914
+ The key to use for signing identity tokens.
915
+ """
916
+ return pulumi.get(self, "identity_token_key")
917
+
918
+ @identity_token_key.setter
919
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
920
+ pulumi.set(self, "identity_token_key", value)
921
+
922
+ @_builtins.property
923
+ @pulumi.getter(name="identityTokenTtl")
924
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
925
+ """
926
+ The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
927
+ *Available only for Vault Enterprise*
928
+ """
929
+ return pulumi.get(self, "identity_token_ttl")
930
+
931
+ @identity_token_ttl.setter
932
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
933
+ pulumi.set(self, "identity_token_ttl", value)
934
+
935
+ @_builtins.property
936
+ @pulumi.getter(name="listingVisibility")
937
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
938
+ """
939
+ Specifies whether to show this mount in the UI-specific listing endpoint
940
+ """
941
+ return pulumi.get(self, "listing_visibility")
942
+
943
+ @listing_visibility.setter
944
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
945
+ pulumi.set(self, "listing_visibility", value)
946
+
947
+ @_builtins.property
948
+ @pulumi.getter
949
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
950
+ """
951
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
952
+ """
953
+ return pulumi.get(self, "local")
954
+
955
+ @local.setter
956
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
957
+ pulumi.set(self, "local", value)
958
+
959
+ @_builtins.property
960
+ @pulumi.getter(name="maxLeaseTtlSeconds")
961
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
962
+ """
963
+ Maximum possible lease duration for tokens and secrets in seconds
964
+ """
965
+ return pulumi.get(self, "max_lease_ttl_seconds")
966
+
967
+ @max_lease_ttl_seconds.setter
968
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
969
+ pulumi.set(self, "max_lease_ttl_seconds", value)
970
+
971
+ @_builtins.property
972
+ @pulumi.getter
973
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
974
+ """
975
+ The namespace to provision the resource in.
976
+ The value should not contain leading or trailing forward slashes.
977
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
978
+ *Available only for Vault Enterprise*.
979
+ """
980
+ return pulumi.get(self, "namespace")
981
+
982
+ @namespace.setter
983
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
984
+ pulumi.set(self, "namespace", value)
985
+
986
+ @_builtins.property
987
+ @pulumi.getter
988
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
989
+ """
990
+ Specifies mount type specific options that are passed to the backend
991
+ """
992
+ return pulumi.get(self, "options")
993
+
994
+ @options.setter
995
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
996
+ pulumi.set(self, "options", value)
997
+
998
+ @_builtins.property
999
+ @pulumi.getter(name="passthroughRequestHeaders")
1000
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
1001
+ """
1002
+ List of headers to allow and pass from the request to the plugin
1003
+ """
1004
+ return pulumi.get(self, "passthrough_request_headers")
1005
+
1006
+ @passthrough_request_headers.setter
1007
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
1008
+ pulumi.set(self, "passthrough_request_headers", value)
1009
+
1010
+ @_builtins.property
1011
+ @pulumi.getter
1012
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
1013
+ """
1014
+ The unique path this backend should be mounted at. Defaults to `azure`.
1015
+ """
1016
+ return pulumi.get(self, "path")
1017
+
1018
+ @path.setter
1019
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
1020
+ pulumi.set(self, "path", value)
1021
+
1022
+ @_builtins.property
1023
+ @pulumi.getter(name="pluginVersion")
1024
+ def plugin_version(self) -> Optional[pulumi.Input[_builtins.str]]:
1025
+ """
1026
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1027
+ """
1028
+ return pulumi.get(self, "plugin_version")
1029
+
1030
+ @plugin_version.setter
1031
+ def plugin_version(self, value: Optional[pulumi.Input[_builtins.str]]):
1032
+ pulumi.set(self, "plugin_version", value)
1033
+
1034
+ @_builtins.property
1035
+ @pulumi.getter(name="rootPasswordTtl")
1036
+ def root_password_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
1037
+ """
1038
+ Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
1039
+ """
1040
+ return pulumi.get(self, "root_password_ttl")
1041
+
1042
+ @root_password_ttl.setter
1043
+ def root_password_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
1044
+ pulumi.set(self, "root_password_ttl", value)
1045
+
1046
+ @_builtins.property
1047
+ @pulumi.getter(name="rotationPeriod")
1048
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
1049
+ """
1050
+ The amount of time in seconds Vault should wait before rotating the root credential.
1051
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1052
+ *Available only for Vault Enterprise*
1053
+ """
1054
+ return pulumi.get(self, "rotation_period")
1055
+
1056
+ @rotation_period.setter
1057
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
1058
+ pulumi.set(self, "rotation_period", value)
1059
+
1060
+ @_builtins.property
1061
+ @pulumi.getter(name="rotationSchedule")
1062
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
1063
+ """
1064
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1065
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1066
+ *Available only for Vault Enterprise*
1067
+ """
1068
+ return pulumi.get(self, "rotation_schedule")
1069
+
1070
+ @rotation_schedule.setter
1071
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
1072
+ pulumi.set(self, "rotation_schedule", value)
1073
+
1074
+ @_builtins.property
1075
+ @pulumi.getter(name="rotationWindow")
1076
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
1077
+ """
1078
+ The maximum amount of time in seconds allowed to complete
1079
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1080
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1081
+ """
1082
+ return pulumi.get(self, "rotation_window")
1083
+
1084
+ @rotation_window.setter
1085
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
1086
+ pulumi.set(self, "rotation_window", value)
1087
+
1088
+ @_builtins.property
1089
+ @pulumi.getter(name="sealWrap")
1090
+ def seal_wrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
1091
+ """
1092
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1093
+ """
1094
+ return pulumi.get(self, "seal_wrap")
1095
+
1096
+ @seal_wrap.setter
1097
+ def seal_wrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
1098
+ pulumi.set(self, "seal_wrap", value)
1099
+
1100
+ @_builtins.property
1101
+ @pulumi.getter(name="subscriptionId")
1102
+ def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
1103
+ """
1104
+ The subscription id for the Azure Active Directory.
1105
+ """
1106
+ return pulumi.get(self, "subscription_id")
1107
+
1108
+ @subscription_id.setter
1109
+ def subscription_id(self, value: Optional[pulumi.Input[_builtins.str]]):
1110
+ pulumi.set(self, "subscription_id", value)
1111
+
1112
+ @_builtins.property
1113
+ @pulumi.getter(name="tenantId")
1114
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
1115
+ """
1116
+ The tenant id for the Azure Active Directory.
1117
+ """
1118
+ return pulumi.get(self, "tenant_id")
1119
+
1120
+ @tenant_id.setter
1121
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
1122
+ pulumi.set(self, "tenant_id", value)
1123
+
1124
+
1125
+ @pulumi.type_token("vault:azure/backend:Backend")
1126
+ class Backend(pulumi.CustomResource):
1127
+ @overload
1128
+ def __init__(__self__,
1129
+ resource_name: str,
1130
+ opts: Optional[pulumi.ResourceOptions] = None,
1131
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1132
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1133
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1134
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1135
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1136
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1137
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1138
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1139
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1140
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1141
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1142
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1143
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1144
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1145
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1146
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1147
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1148
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1149
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1150
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1151
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1152
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1153
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1154
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1155
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1156
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1157
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1158
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1159
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1160
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1161
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1162
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
1163
+ __props__=None):
1164
+ """
1165
+ ## Example Usage
1166
+
1167
+ ###
1168
+
1169
+ You can setup the Azure secrets engine with Workload Identity Federation (WIF) for a secret-less configuration:
1170
+ ```python
1171
+ import pulumi
1172
+ import pulumi_vault as vault
1173
+
1174
+ azure = vault.azure.Backend("azure",
1175
+ subscription_id="11111111-2222-3333-4444-111111111111",
1176
+ tenant_id="11111111-2222-3333-4444-222222222222",
1177
+ client_id="11111111-2222-3333-4444-333333333333",
1178
+ identity_token_audience="<TOKEN_AUDIENCE>",
1179
+ identity_token_ttl="<TOKEN_TTL>",
1180
+ rotation_schedule="0 * * * SAT",
1181
+ rotation_window=3600)
1182
+ ```
1183
+
1184
+ ```python
1185
+ import pulumi
1186
+ import pulumi_vault as vault
1187
+
1188
+ azure = vault.azure.Backend("azure",
1189
+ subscription_id="11111111-2222-3333-4444-111111111111",
1190
+ tenant_id="11111111-2222-3333-4444-222222222222",
1191
+ client_id="11111111-2222-3333-4444-333333333333",
1192
+ client_secret="12345678901234567890",
1193
+ environment="AzurePublicCloud",
1194
+ rotation_schedule="0 * * * SAT",
1195
+ rotation_window=3600)
1196
+ ```
1197
+
1198
+ :param str resource_name: The name of the resource.
1199
+ :param pulumi.ResourceOptions opts: Options for the resource.
1200
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1201
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1202
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1203
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1204
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
1205
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1206
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1207
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1208
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1209
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1210
+ *Available only for Vault Enterprise*
1211
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1212
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1213
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
1214
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1215
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1216
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
1217
+ *Available only for Vault Enterprise*
1218
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1219
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1220
+ *Available only for Vault Enterprise*
1221
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1222
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1223
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1224
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1225
+ The value should not contain leading or trailing forward slashes.
1226
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1227
+ *Available only for Vault Enterprise*.
1228
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1229
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1230
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1231
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1232
+ :param pulumi.Input[_builtins.int] root_password_ttl: Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
1233
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1234
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1235
+ *Available only for Vault Enterprise*
1236
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1237
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1238
+ *Available only for Vault Enterprise*
1239
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1240
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1241
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1242
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1243
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
1244
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
1245
+ """
1246
+ ...
1247
+ @overload
1248
+ def __init__(__self__,
1249
+ resource_name: str,
1250
+ args: BackendArgs,
1251
+ opts: Optional[pulumi.ResourceOptions] = None):
1252
+ """
1253
+ ## Example Usage
1254
+
1255
+ ###
1256
+
1257
+ You can setup the Azure secrets engine with Workload Identity Federation (WIF) for a secret-less configuration:
1258
+ ```python
1259
+ import pulumi
1260
+ import pulumi_vault as vault
1261
+
1262
+ azure = vault.azure.Backend("azure",
1263
+ subscription_id="11111111-2222-3333-4444-111111111111",
1264
+ tenant_id="11111111-2222-3333-4444-222222222222",
1265
+ client_id="11111111-2222-3333-4444-333333333333",
1266
+ identity_token_audience="<TOKEN_AUDIENCE>",
1267
+ identity_token_ttl="<TOKEN_TTL>",
1268
+ rotation_schedule="0 * * * SAT",
1269
+ rotation_window=3600)
1270
+ ```
1271
+
1272
+ ```python
1273
+ import pulumi
1274
+ import pulumi_vault as vault
1275
+
1276
+ azure = vault.azure.Backend("azure",
1277
+ subscription_id="11111111-2222-3333-4444-111111111111",
1278
+ tenant_id="11111111-2222-3333-4444-222222222222",
1279
+ client_id="11111111-2222-3333-4444-333333333333",
1280
+ client_secret="12345678901234567890",
1281
+ environment="AzurePublicCloud",
1282
+ rotation_schedule="0 * * * SAT",
1283
+ rotation_window=3600)
1284
+ ```
1285
+
1286
+ :param str resource_name: The name of the resource.
1287
+ :param BackendArgs args: The arguments to use to populate this resource's properties.
1288
+ :param pulumi.ResourceOptions opts: Options for the resource.
1289
+ """
1290
+ ...
1291
+ def __init__(__self__, resource_name: str, *args, **kwargs):
1292
+ resource_args, opts = _utilities.get_resource_args_opts(BackendArgs, pulumi.ResourceOptions, *args, **kwargs)
1293
+ if resource_args is not None:
1294
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
1295
+ else:
1296
+ __self__._internal_init(resource_name, *args, **kwargs)
1297
+
1298
+ def _internal_init(__self__,
1299
+ resource_name: str,
1300
+ opts: Optional[pulumi.ResourceOptions] = None,
1301
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1302
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1303
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1304
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1305
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1306
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1307
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1308
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1309
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1310
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1311
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1312
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1313
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1314
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1315
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1316
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1317
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1318
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1319
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1320
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1322
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1323
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1324
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1325
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1326
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1327
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1328
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1329
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1330
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1331
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1332
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
1333
+ __props__=None):
1334
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1335
+ if not isinstance(opts, pulumi.ResourceOptions):
1336
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1337
+ if opts.id is None:
1338
+ if __props__ is not None:
1339
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1340
+ __props__ = BackendArgs.__new__(BackendArgs)
1341
+
1342
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1343
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1344
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1345
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1346
+ __props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
1347
+ __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
1348
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1349
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1350
+ __props__.__dict__["description"] = description
1351
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1352
+ __props__.__dict__["disable_remount"] = disable_remount
1353
+ __props__.__dict__["environment"] = environment
1354
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1355
+ __props__.__dict__["force_no_cache"] = force_no_cache
1356
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
1357
+ __props__.__dict__["identity_token_key"] = identity_token_key
1358
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1359
+ __props__.__dict__["listing_visibility"] = listing_visibility
1360
+ __props__.__dict__["local"] = local
1361
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1362
+ __props__.__dict__["namespace"] = namespace
1363
+ __props__.__dict__["options"] = options
1364
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1365
+ __props__.__dict__["path"] = path
1366
+ __props__.__dict__["plugin_version"] = plugin_version
1367
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
1368
+ __props__.__dict__["rotation_period"] = rotation_period
1369
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1370
+ __props__.__dict__["rotation_window"] = rotation_window
1371
+ __props__.__dict__["seal_wrap"] = seal_wrap
1372
+ if subscription_id is None and not opts.urn:
1373
+ raise TypeError("Missing required property 'subscription_id'")
1374
+ __props__.__dict__["subscription_id"] = None if subscription_id is None else pulumi.Output.secret(subscription_id)
1375
+ if tenant_id is None and not opts.urn:
1376
+ raise TypeError("Missing required property 'tenant_id'")
1377
+ __props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
1378
+ __props__.__dict__["accessor"] = None
1379
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "subscriptionId", "tenantId"])
1380
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
1381
+ super(Backend, __self__).__init__(
1382
+ 'vault:azure/backend:Backend',
1383
+ resource_name,
1384
+ __props__,
1385
+ opts)
1386
+
1387
+ @staticmethod
1388
+ def get(resource_name: str,
1389
+ id: pulumi.Input[str],
1390
+ opts: Optional[pulumi.ResourceOptions] = None,
1391
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
1392
+ allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1393
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1394
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1395
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1396
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
1397
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
1398
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1399
+ delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1400
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1401
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1402
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1403
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
1404
+ external_entropy_access: Optional[pulumi.Input[_builtins.bool]] = None,
1405
+ force_no_cache: Optional[pulumi.Input[_builtins.bool]] = None,
1406
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1407
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1408
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1409
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
1410
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1411
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1412
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1413
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
1414
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1415
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1416
+ plugin_version: Optional[pulumi.Input[_builtins.str]] = None,
1417
+ root_password_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1418
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1419
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1420
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1421
+ seal_wrap: Optional[pulumi.Input[_builtins.bool]] = None,
1422
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
1423
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
1424
+ """
1425
+ Get an existing Backend resource's state with the given name, id, and optional extra
1426
+ properties used to qualify the lookup.
1427
+
1428
+ :param str resource_name: The unique name of the resulting resource.
1429
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1430
+ :param pulumi.ResourceOptions opts: Options for the resource.
1431
+ :param pulumi.Input[_builtins.str] accessor: Accessor of the mount
1432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
1433
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1434
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1435
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1436
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
1437
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
1438
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1439
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1440
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
1441
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1442
+ *Available only for Vault Enterprise*
1443
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1444
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1445
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
1446
+ :param pulumi.Input[_builtins.bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
1447
+ :param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
1448
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
1449
+ *Available only for Vault Enterprise*
1450
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens.
1451
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1452
+ *Available only for Vault Enterprise*
1453
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1454
+ :param pulumi.Input[_builtins.bool] local: Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1455
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1456
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1457
+ The value should not contain leading or trailing forward slashes.
1458
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1459
+ *Available only for Vault Enterprise*.
1460
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Specifies mount type specific options that are passed to the backend
1461
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1462
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
1463
+ :param pulumi.Input[_builtins.str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1464
+ :param pulumi.Input[_builtins.int] root_password_ttl: Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
1465
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1466
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1467
+ *Available only for Vault Enterprise*
1468
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1469
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1470
+ *Available only for Vault Enterprise*
1471
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1472
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1473
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1474
+ :param pulumi.Input[_builtins.bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1475
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
1476
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
1477
+ """
1478
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1479
+
1480
+ __props__ = _BackendState.__new__(_BackendState)
1481
+
1482
+ __props__.__dict__["accessor"] = accessor
1483
+ __props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
1484
+ __props__.__dict__["allowed_response_headers"] = allowed_response_headers
1485
+ __props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
1486
+ __props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
1487
+ __props__.__dict__["client_id"] = client_id
1488
+ __props__.__dict__["client_secret"] = client_secret
1489
+ __props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
1490
+ __props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
1491
+ __props__.__dict__["description"] = description
1492
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
1493
+ __props__.__dict__["disable_remount"] = disable_remount
1494
+ __props__.__dict__["environment"] = environment
1495
+ __props__.__dict__["external_entropy_access"] = external_entropy_access
1496
+ __props__.__dict__["force_no_cache"] = force_no_cache
1497
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
1498
+ __props__.__dict__["identity_token_key"] = identity_token_key
1499
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
1500
+ __props__.__dict__["listing_visibility"] = listing_visibility
1501
+ __props__.__dict__["local"] = local
1502
+ __props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
1503
+ __props__.__dict__["namespace"] = namespace
1504
+ __props__.__dict__["options"] = options
1505
+ __props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
1506
+ __props__.__dict__["path"] = path
1507
+ __props__.__dict__["plugin_version"] = plugin_version
1508
+ __props__.__dict__["root_password_ttl"] = root_password_ttl
1509
+ __props__.__dict__["rotation_period"] = rotation_period
1510
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
1511
+ __props__.__dict__["rotation_window"] = rotation_window
1512
+ __props__.__dict__["seal_wrap"] = seal_wrap
1513
+ __props__.__dict__["subscription_id"] = subscription_id
1514
+ __props__.__dict__["tenant_id"] = tenant_id
1515
+ return Backend(resource_name, opts=opts, __props__=__props__)
1516
+
1517
+ @_builtins.property
1518
+ @pulumi.getter
1519
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1520
+ """
1521
+ Accessor of the mount
1522
+ """
1523
+ return pulumi.get(self, "accessor")
1524
+
1525
+ @_builtins.property
1526
+ @pulumi.getter(name="allowedManagedKeys")
1527
+ def allowed_managed_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1528
+ """
1529
+ List of managed key registry entry names that the mount in question is allowed to access
1530
+ """
1531
+ return pulumi.get(self, "allowed_managed_keys")
1532
+
1533
+ @_builtins.property
1534
+ @pulumi.getter(name="allowedResponseHeaders")
1535
+ def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1536
+ """
1537
+ List of headers to allow and pass from the request to the plugin
1538
+ """
1539
+ return pulumi.get(self, "allowed_response_headers")
1540
+
1541
+ @_builtins.property
1542
+ @pulumi.getter(name="auditNonHmacRequestKeys")
1543
+ def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1544
+ """
1545
+ Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1546
+ """
1547
+ return pulumi.get(self, "audit_non_hmac_request_keys")
1548
+
1549
+ @_builtins.property
1550
+ @pulumi.getter(name="auditNonHmacResponseKeys")
1551
+ def audit_non_hmac_response_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
1552
+ """
1553
+ Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1554
+ """
1555
+ return pulumi.get(self, "audit_non_hmac_response_keys")
1556
+
1557
+ @_builtins.property
1558
+ @pulumi.getter(name="clientId")
1559
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
1560
+ """
1561
+ The OAuth2 client id to connect to Azure.
1562
+ """
1563
+ return pulumi.get(self, "client_id")
1564
+
1565
+ @_builtins.property
1566
+ @pulumi.getter(name="clientSecret")
1567
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
1568
+ """
1569
+ The OAuth2 client secret to connect to Azure.
1570
+ """
1571
+ return pulumi.get(self, "client_secret")
1572
+
1573
+ @_builtins.property
1574
+ @pulumi.getter(name="defaultLeaseTtlSeconds")
1575
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1576
+ """
1577
+ Default lease duration for tokens and secrets in seconds
1578
+ """
1579
+ return pulumi.get(self, "default_lease_ttl_seconds")
1580
+
1581
+ @_builtins.property
1582
+ @pulumi.getter(name="delegatedAuthAccessors")
1583
+ def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1584
+ """
1585
+ List of headers to allow and pass from the request to the plugin
1586
+ """
1587
+ return pulumi.get(self, "delegated_auth_accessors")
1588
+
1589
+ @_builtins.property
1590
+ @pulumi.getter
1591
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1592
+ """
1593
+ Human-friendly description of the mount for the backend.
1594
+ """
1595
+ return pulumi.get(self, "description")
1596
+
1597
+ @_builtins.property
1598
+ @pulumi.getter(name="disableAutomatedRotation")
1599
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1600
+ """
1601
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1602
+ *Available only for Vault Enterprise*
1603
+ """
1604
+ return pulumi.get(self, "disable_automated_rotation")
1605
+
1606
+ @_builtins.property
1607
+ @pulumi.getter(name="disableRemount")
1608
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1609
+ """
1610
+ If set, opts out of mount migration on path updates.
1611
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1612
+ """
1613
+ return pulumi.get(self, "disable_remount")
1614
+
1615
+ @_builtins.property
1616
+ @pulumi.getter
1617
+ def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
1618
+ """
1619
+ The Azure environment.
1620
+ """
1621
+ return pulumi.get(self, "environment")
1622
+
1623
+ @_builtins.property
1624
+ @pulumi.getter(name="externalEntropyAccess")
1625
+ def external_entropy_access(self) -> pulumi.Output[Optional[_builtins.bool]]:
1626
+ """
1627
+ Enable the secrets engine to access Vault's external entropy source
1628
+ """
1629
+ return pulumi.get(self, "external_entropy_access")
1630
+
1631
+ @_builtins.property
1632
+ @pulumi.getter(name="forceNoCache")
1633
+ def force_no_cache(self) -> pulumi.Output[_builtins.bool]:
1634
+ """
1635
+ If set to true, disables caching.
1636
+ """
1637
+ return pulumi.get(self, "force_no_cache")
1638
+
1639
+ @_builtins.property
1640
+ @pulumi.getter(name="identityTokenAudience")
1641
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1642
+ """
1643
+ The audience claim value. Requires Vault 1.17+.
1644
+ *Available only for Vault Enterprise*
1645
+ """
1646
+ return pulumi.get(self, "identity_token_audience")
1647
+
1648
+ @_builtins.property
1649
+ @pulumi.getter(name="identityTokenKey")
1650
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1651
+ """
1652
+ The key to use for signing identity tokens.
1653
+ """
1654
+ return pulumi.get(self, "identity_token_key")
1655
+
1656
+ @_builtins.property
1657
+ @pulumi.getter(name="identityTokenTtl")
1658
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
1659
+ """
1660
+ The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1661
+ *Available only for Vault Enterprise*
1662
+ """
1663
+ return pulumi.get(self, "identity_token_ttl")
1664
+
1665
+ @_builtins.property
1666
+ @pulumi.getter(name="listingVisibility")
1667
+ def listing_visibility(self) -> pulumi.Output[Optional[_builtins.str]]:
1668
+ """
1669
+ Specifies whether to show this mount in the UI-specific listing endpoint
1670
+ """
1671
+ return pulumi.get(self, "listing_visibility")
1672
+
1673
+ @_builtins.property
1674
+ @pulumi.getter
1675
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1676
+ """
1677
+ Local mount flag that can be explicitly set to true to enforce local mount in HA environment
1678
+ """
1679
+ return pulumi.get(self, "local")
1680
+
1681
+ @_builtins.property
1682
+ @pulumi.getter(name="maxLeaseTtlSeconds")
1683
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1684
+ """
1685
+ Maximum possible lease duration for tokens and secrets in seconds
1686
+ """
1687
+ return pulumi.get(self, "max_lease_ttl_seconds")
1688
+
1689
+ @_builtins.property
1690
+ @pulumi.getter
1691
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1692
+ """
1693
+ The namespace to provision the resource in.
1694
+ The value should not contain leading or trailing forward slashes.
1695
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1696
+ *Available only for Vault Enterprise*.
1697
+ """
1698
+ return pulumi.get(self, "namespace")
1699
+
1700
+ @_builtins.property
1701
+ @pulumi.getter
1702
+ def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1703
+ """
1704
+ Specifies mount type specific options that are passed to the backend
1705
+ """
1706
+ return pulumi.get(self, "options")
1707
+
1708
+ @_builtins.property
1709
+ @pulumi.getter(name="passthroughRequestHeaders")
1710
+ def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1711
+ """
1712
+ List of headers to allow and pass from the request to the plugin
1713
+ """
1714
+ return pulumi.get(self, "passthrough_request_headers")
1715
+
1716
+ @_builtins.property
1717
+ @pulumi.getter
1718
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1719
+ """
1720
+ The unique path this backend should be mounted at. Defaults to `azure`.
1721
+ """
1722
+ return pulumi.get(self, "path")
1723
+
1724
+ @_builtins.property
1725
+ @pulumi.getter(name="pluginVersion")
1726
+ def plugin_version(self) -> pulumi.Output[Optional[_builtins.str]]:
1727
+ """
1728
+ Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1729
+ """
1730
+ return pulumi.get(self, "plugin_version")
1731
+
1732
+ @_builtins.property
1733
+ @pulumi.getter(name="rootPasswordTtl")
1734
+ def root_password_ttl(self) -> pulumi.Output[_builtins.int]:
1735
+ """
1736
+ Specifies the TTL of the root password when rotate-root generates a new client secret. Requires Vault 1.15+.
1737
+ """
1738
+ return pulumi.get(self, "root_password_ttl")
1739
+
1740
+ @_builtins.property
1741
+ @pulumi.getter(name="rotationPeriod")
1742
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1743
+ """
1744
+ The amount of time in seconds Vault should wait before rotating the root credential.
1745
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1746
+ *Available only for Vault Enterprise*
1747
+ """
1748
+ return pulumi.get(self, "rotation_period")
1749
+
1750
+ @_builtins.property
1751
+ @pulumi.getter(name="rotationSchedule")
1752
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1753
+ """
1754
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1755
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1756
+ *Available only for Vault Enterprise*
1757
+ """
1758
+ return pulumi.get(self, "rotation_schedule")
1759
+
1760
+ @_builtins.property
1761
+ @pulumi.getter(name="rotationWindow")
1762
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1763
+ """
1764
+ The maximum amount of time in seconds allowed to complete
1765
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1766
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
1767
+ """
1768
+ return pulumi.get(self, "rotation_window")
1769
+
1770
+ @_builtins.property
1771
+ @pulumi.getter(name="sealWrap")
1772
+ def seal_wrap(self) -> pulumi.Output[_builtins.bool]:
1773
+ """
1774
+ Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1775
+ """
1776
+ return pulumi.get(self, "seal_wrap")
1777
+
1778
+ @_builtins.property
1779
+ @pulumi.getter(name="subscriptionId")
1780
+ def subscription_id(self) -> pulumi.Output[_builtins.str]:
1781
+ """
1782
+ The subscription id for the Azure Active Directory.
1783
+ """
1784
+ return pulumi.get(self, "subscription_id")
1785
+
1786
+ @_builtins.property
1787
+ @pulumi.getter(name="tenantId")
1788
+ def tenant_id(self) -> pulumi.Output[_builtins.str]:
1789
+ """
1790
+ The tenant id for the Azure Active Directory.
1791
+ """
1792
+ return pulumi.get(self, "tenant_id")
1793
+