pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,667 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['OidcClientArgs', 'OidcClient']
18
+
19
+ @pulumi.input_type
20
+ class OidcClientArgs:
21
+ def __init__(__self__, *,
22
+ access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
23
+ assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ client_type: Optional[pulumi.Input[_builtins.str]] = None,
25
+ id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
26
+ key: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
30
+ """
31
+ The set of arguments for constructing a OidcClient resource.
32
+ :param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
33
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
34
+ :param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
35
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
36
+ :param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
37
+ The value should be less than the `verification_ttl` on the key.
38
+ :param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
39
+ This cannot be modified after creation. If not provided, the `default`
40
+ key is used.
41
+ :param pulumi.Input[_builtins.str] name: The name of the client.
42
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
43
+ The value should not contain leading or trailing forward slashes.
44
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
+ *Available only for Vault Enterprise*.
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
47
+ One of these values must exactly match the `redirect_uri` parameter value
48
+ used in each authentication request.
49
+ """
50
+ if access_token_ttl is not None:
51
+ pulumi.set(__self__, "access_token_ttl", access_token_ttl)
52
+ if assignments is not None:
53
+ pulumi.set(__self__, "assignments", assignments)
54
+ if client_type is not None:
55
+ pulumi.set(__self__, "client_type", client_type)
56
+ if id_token_ttl is not None:
57
+ pulumi.set(__self__, "id_token_ttl", id_token_ttl)
58
+ if key is not None:
59
+ pulumi.set(__self__, "key", key)
60
+ if name is not None:
61
+ pulumi.set(__self__, "name", name)
62
+ if namespace is not None:
63
+ pulumi.set(__self__, "namespace", namespace)
64
+ if redirect_uris is not None:
65
+ pulumi.set(__self__, "redirect_uris", redirect_uris)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter(name="accessTokenTtl")
69
+ def access_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
70
+ """
71
+ The time-to-live for access tokens obtained by the client.
72
+ """
73
+ return pulumi.get(self, "access_token_ttl")
74
+
75
+ @access_token_ttl.setter
76
+ def access_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
77
+ pulumi.set(self, "access_token_ttl", value)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter
81
+ def assignments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
82
+ """
83
+ A list of assignment resources associated with the client.
84
+ """
85
+ return pulumi.get(self, "assignments")
86
+
87
+ @assignments.setter
88
+ def assignments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
89
+ pulumi.set(self, "assignments", value)
90
+
91
+ @_builtins.property
92
+ @pulumi.getter(name="clientType")
93
+ def client_type(self) -> Optional[pulumi.Input[_builtins.str]]:
94
+ """
95
+ The client type based on its ability to maintain confidentiality of credentials.
96
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
97
+ """
98
+ return pulumi.get(self, "client_type")
99
+
100
+ @client_type.setter
101
+ def client_type(self, value: Optional[pulumi.Input[_builtins.str]]):
102
+ pulumi.set(self, "client_type", value)
103
+
104
+ @_builtins.property
105
+ @pulumi.getter(name="idTokenTtl")
106
+ def id_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
107
+ """
108
+ The time-to-live for ID tokens obtained by the client.
109
+ The value should be less than the `verification_ttl` on the key.
110
+ """
111
+ return pulumi.get(self, "id_token_ttl")
112
+
113
+ @id_token_ttl.setter
114
+ def id_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
115
+ pulumi.set(self, "id_token_ttl", value)
116
+
117
+ @_builtins.property
118
+ @pulumi.getter
119
+ def key(self) -> Optional[pulumi.Input[_builtins.str]]:
120
+ """
121
+ A reference to a named key resource in Vault.
122
+ This cannot be modified after creation. If not provided, the `default`
123
+ key is used.
124
+ """
125
+ return pulumi.get(self, "key")
126
+
127
+ @key.setter
128
+ def key(self, value: Optional[pulumi.Input[_builtins.str]]):
129
+ pulumi.set(self, "key", value)
130
+
131
+ @_builtins.property
132
+ @pulumi.getter
133
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
134
+ """
135
+ The name of the client.
136
+ """
137
+ return pulumi.get(self, "name")
138
+
139
+ @name.setter
140
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
141
+ pulumi.set(self, "name", value)
142
+
143
+ @_builtins.property
144
+ @pulumi.getter
145
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
146
+ """
147
+ The namespace to provision the resource in.
148
+ The value should not contain leading or trailing forward slashes.
149
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
150
+ *Available only for Vault Enterprise*.
151
+ """
152
+ return pulumi.get(self, "namespace")
153
+
154
+ @namespace.setter
155
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
156
+ pulumi.set(self, "namespace", value)
157
+
158
+ @_builtins.property
159
+ @pulumi.getter(name="redirectUris")
160
+ def redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
161
+ """
162
+ Redirection URI values used by the client.
163
+ One of these values must exactly match the `redirect_uri` parameter value
164
+ used in each authentication request.
165
+ """
166
+ return pulumi.get(self, "redirect_uris")
167
+
168
+ @redirect_uris.setter
169
+ def redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
170
+ pulumi.set(self, "redirect_uris", value)
171
+
172
+
173
+ @pulumi.input_type
174
+ class _OidcClientState:
175
+ def __init__(__self__, *,
176
+ access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
177
+ assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
178
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
179
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
180
+ client_type: Optional[pulumi.Input[_builtins.str]] = None,
181
+ id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
182
+ key: Optional[pulumi.Input[_builtins.str]] = None,
183
+ name: Optional[pulumi.Input[_builtins.str]] = None,
184
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
185
+ redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
186
+ """
187
+ Input properties used for looking up and filtering OidcClient resources.
188
+ :param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
189
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
190
+ :param pulumi.Input[_builtins.str] client_id: The Client ID returned by Vault.
191
+ :param pulumi.Input[_builtins.str] client_secret: The Client Secret Key returned by Vault.
192
+ For public OpenID Clients `client_secret` is set to an empty string `""`
193
+ :param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
194
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
195
+ :param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
196
+ The value should be less than the `verification_ttl` on the key.
197
+ :param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
198
+ This cannot be modified after creation. If not provided, the `default`
199
+ key is used.
200
+ :param pulumi.Input[_builtins.str] name: The name of the client.
201
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
202
+ The value should not contain leading or trailing forward slashes.
203
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
204
+ *Available only for Vault Enterprise*.
205
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
206
+ One of these values must exactly match the `redirect_uri` parameter value
207
+ used in each authentication request.
208
+ """
209
+ if access_token_ttl is not None:
210
+ pulumi.set(__self__, "access_token_ttl", access_token_ttl)
211
+ if assignments is not None:
212
+ pulumi.set(__self__, "assignments", assignments)
213
+ if client_id is not None:
214
+ pulumi.set(__self__, "client_id", client_id)
215
+ if client_secret is not None:
216
+ pulumi.set(__self__, "client_secret", client_secret)
217
+ if client_type is not None:
218
+ pulumi.set(__self__, "client_type", client_type)
219
+ if id_token_ttl is not None:
220
+ pulumi.set(__self__, "id_token_ttl", id_token_ttl)
221
+ if key is not None:
222
+ pulumi.set(__self__, "key", key)
223
+ if name is not None:
224
+ pulumi.set(__self__, "name", name)
225
+ if namespace is not None:
226
+ pulumi.set(__self__, "namespace", namespace)
227
+ if redirect_uris is not None:
228
+ pulumi.set(__self__, "redirect_uris", redirect_uris)
229
+
230
+ @_builtins.property
231
+ @pulumi.getter(name="accessTokenTtl")
232
+ def access_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
233
+ """
234
+ The time-to-live for access tokens obtained by the client.
235
+ """
236
+ return pulumi.get(self, "access_token_ttl")
237
+
238
+ @access_token_ttl.setter
239
+ def access_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
240
+ pulumi.set(self, "access_token_ttl", value)
241
+
242
+ @_builtins.property
243
+ @pulumi.getter
244
+ def assignments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
245
+ """
246
+ A list of assignment resources associated with the client.
247
+ """
248
+ return pulumi.get(self, "assignments")
249
+
250
+ @assignments.setter
251
+ def assignments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
252
+ pulumi.set(self, "assignments", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter(name="clientId")
256
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
257
+ """
258
+ The Client ID returned by Vault.
259
+ """
260
+ return pulumi.get(self, "client_id")
261
+
262
+ @client_id.setter
263
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
264
+ pulumi.set(self, "client_id", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter(name="clientSecret")
268
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
269
+ """
270
+ The Client Secret Key returned by Vault.
271
+ For public OpenID Clients `client_secret` is set to an empty string `""`
272
+ """
273
+ return pulumi.get(self, "client_secret")
274
+
275
+ @client_secret.setter
276
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
277
+ pulumi.set(self, "client_secret", value)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter(name="clientType")
281
+ def client_type(self) -> Optional[pulumi.Input[_builtins.str]]:
282
+ """
283
+ The client type based on its ability to maintain confidentiality of credentials.
284
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
285
+ """
286
+ return pulumi.get(self, "client_type")
287
+
288
+ @client_type.setter
289
+ def client_type(self, value: Optional[pulumi.Input[_builtins.str]]):
290
+ pulumi.set(self, "client_type", value)
291
+
292
+ @_builtins.property
293
+ @pulumi.getter(name="idTokenTtl")
294
+ def id_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
295
+ """
296
+ The time-to-live for ID tokens obtained by the client.
297
+ The value should be less than the `verification_ttl` on the key.
298
+ """
299
+ return pulumi.get(self, "id_token_ttl")
300
+
301
+ @id_token_ttl.setter
302
+ def id_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
303
+ pulumi.set(self, "id_token_ttl", value)
304
+
305
+ @_builtins.property
306
+ @pulumi.getter
307
+ def key(self) -> Optional[pulumi.Input[_builtins.str]]:
308
+ """
309
+ A reference to a named key resource in Vault.
310
+ This cannot be modified after creation. If not provided, the `default`
311
+ key is used.
312
+ """
313
+ return pulumi.get(self, "key")
314
+
315
+ @key.setter
316
+ def key(self, value: Optional[pulumi.Input[_builtins.str]]):
317
+ pulumi.set(self, "key", value)
318
+
319
+ @_builtins.property
320
+ @pulumi.getter
321
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
322
+ """
323
+ The name of the client.
324
+ """
325
+ return pulumi.get(self, "name")
326
+
327
+ @name.setter
328
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
329
+ pulumi.set(self, "name", value)
330
+
331
+ @_builtins.property
332
+ @pulumi.getter
333
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
334
+ """
335
+ The namespace to provision the resource in.
336
+ The value should not contain leading or trailing forward slashes.
337
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
+ *Available only for Vault Enterprise*.
339
+ """
340
+ return pulumi.get(self, "namespace")
341
+
342
+ @namespace.setter
343
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
344
+ pulumi.set(self, "namespace", value)
345
+
346
+ @_builtins.property
347
+ @pulumi.getter(name="redirectUris")
348
+ def redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
349
+ """
350
+ Redirection URI values used by the client.
351
+ One of these values must exactly match the `redirect_uri` parameter value
352
+ used in each authentication request.
353
+ """
354
+ return pulumi.get(self, "redirect_uris")
355
+
356
+ @redirect_uris.setter
357
+ def redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
358
+ pulumi.set(self, "redirect_uris", value)
359
+
360
+
361
+ @pulumi.type_token("vault:identity/oidcClient:OidcClient")
362
+ class OidcClient(pulumi.CustomResource):
363
+ @overload
364
+ def __init__(__self__,
365
+ resource_name: str,
366
+ opts: Optional[pulumi.ResourceOptions] = None,
367
+ access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
368
+ assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
369
+ client_type: Optional[pulumi.Input[_builtins.str]] = None,
370
+ id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
371
+ key: Optional[pulumi.Input[_builtins.str]] = None,
372
+ name: Optional[pulumi.Input[_builtins.str]] = None,
373
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
374
+ redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ __props__=None):
376
+ """
377
+ Manages OIDC Clients in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
378
+ for more information.
379
+
380
+ ## Example Usage
381
+
382
+ ```python
383
+ import pulumi
384
+ import pulumi_vault as vault
385
+
386
+ test = vault.identity.OidcAssignment("test",
387
+ name="my-assignment",
388
+ entity_ids=["ascbascas-2231a-sdfaa"],
389
+ group_ids=["sajkdsad-32414-sfsada"])
390
+ test_oidc_client = vault.identity.OidcClient("test",
391
+ name="my-app",
392
+ redirect_uris=[
393
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
394
+ "http://127.0.0.1:8251/callback",
395
+ "http://127.0.0.1:8080/callback",
396
+ ],
397
+ assignments=[test.name],
398
+ id_token_ttl=2400,
399
+ access_token_ttl=7200)
400
+ ```
401
+
402
+ ## Import
403
+
404
+ OIDC Clients can be imported using the `name`, e.g.
405
+
406
+ ```sh
407
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
408
+ ```
409
+
410
+ :param str resource_name: The name of the resource.
411
+ :param pulumi.ResourceOptions opts: Options for the resource.
412
+ :param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
413
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
414
+ :param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
415
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
416
+ :param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
417
+ The value should be less than the `verification_ttl` on the key.
418
+ :param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
419
+ This cannot be modified after creation. If not provided, the `default`
420
+ key is used.
421
+ :param pulumi.Input[_builtins.str] name: The name of the client.
422
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
423
+ The value should not contain leading or trailing forward slashes.
424
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
425
+ *Available only for Vault Enterprise*.
426
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
427
+ One of these values must exactly match the `redirect_uri` parameter value
428
+ used in each authentication request.
429
+ """
430
+ ...
431
+ @overload
432
+ def __init__(__self__,
433
+ resource_name: str,
434
+ args: Optional[OidcClientArgs] = None,
435
+ opts: Optional[pulumi.ResourceOptions] = None):
436
+ """
437
+ Manages OIDC Clients in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
438
+ for more information.
439
+
440
+ ## Example Usage
441
+
442
+ ```python
443
+ import pulumi
444
+ import pulumi_vault as vault
445
+
446
+ test = vault.identity.OidcAssignment("test",
447
+ name="my-assignment",
448
+ entity_ids=["ascbascas-2231a-sdfaa"],
449
+ group_ids=["sajkdsad-32414-sfsada"])
450
+ test_oidc_client = vault.identity.OidcClient("test",
451
+ name="my-app",
452
+ redirect_uris=[
453
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
454
+ "http://127.0.0.1:8251/callback",
455
+ "http://127.0.0.1:8080/callback",
456
+ ],
457
+ assignments=[test.name],
458
+ id_token_ttl=2400,
459
+ access_token_ttl=7200)
460
+ ```
461
+
462
+ ## Import
463
+
464
+ OIDC Clients can be imported using the `name`, e.g.
465
+
466
+ ```sh
467
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
468
+ ```
469
+
470
+ :param str resource_name: The name of the resource.
471
+ :param OidcClientArgs args: The arguments to use to populate this resource's properties.
472
+ :param pulumi.ResourceOptions opts: Options for the resource.
473
+ """
474
+ ...
475
+ def __init__(__self__, resource_name: str, *args, **kwargs):
476
+ resource_args, opts = _utilities.get_resource_args_opts(OidcClientArgs, pulumi.ResourceOptions, *args, **kwargs)
477
+ if resource_args is not None:
478
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
479
+ else:
480
+ __self__._internal_init(resource_name, *args, **kwargs)
481
+
482
+ def _internal_init(__self__,
483
+ resource_name: str,
484
+ opts: Optional[pulumi.ResourceOptions] = None,
485
+ access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
486
+ assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
487
+ client_type: Optional[pulumi.Input[_builtins.str]] = None,
488
+ id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
489
+ key: Optional[pulumi.Input[_builtins.str]] = None,
490
+ name: Optional[pulumi.Input[_builtins.str]] = None,
491
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
492
+ redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
493
+ __props__=None):
494
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
495
+ if not isinstance(opts, pulumi.ResourceOptions):
496
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
497
+ if opts.id is None:
498
+ if __props__ is not None:
499
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
500
+ __props__ = OidcClientArgs.__new__(OidcClientArgs)
501
+
502
+ __props__.__dict__["access_token_ttl"] = access_token_ttl
503
+ __props__.__dict__["assignments"] = assignments
504
+ __props__.__dict__["client_type"] = client_type
505
+ __props__.__dict__["id_token_ttl"] = id_token_ttl
506
+ __props__.__dict__["key"] = key
507
+ __props__.__dict__["name"] = name
508
+ __props__.__dict__["namespace"] = namespace
509
+ __props__.__dict__["redirect_uris"] = redirect_uris
510
+ __props__.__dict__["client_id"] = None
511
+ __props__.__dict__["client_secret"] = None
512
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientSecret"])
513
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
514
+ super(OidcClient, __self__).__init__(
515
+ 'vault:identity/oidcClient:OidcClient',
516
+ resource_name,
517
+ __props__,
518
+ opts)
519
+
520
+ @staticmethod
521
+ def get(resource_name: str,
522
+ id: pulumi.Input[str],
523
+ opts: Optional[pulumi.ResourceOptions] = None,
524
+ access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
525
+ assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
526
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
527
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
528
+ client_type: Optional[pulumi.Input[_builtins.str]] = None,
529
+ id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
530
+ key: Optional[pulumi.Input[_builtins.str]] = None,
531
+ name: Optional[pulumi.Input[_builtins.str]] = None,
532
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
533
+ redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'OidcClient':
534
+ """
535
+ Get an existing OidcClient resource's state with the given name, id, and optional extra
536
+ properties used to qualify the lookup.
537
+
538
+ :param str resource_name: The unique name of the resulting resource.
539
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
540
+ :param pulumi.ResourceOptions opts: Options for the resource.
541
+ :param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
542
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
543
+ :param pulumi.Input[_builtins.str] client_id: The Client ID returned by Vault.
544
+ :param pulumi.Input[_builtins.str] client_secret: The Client Secret Key returned by Vault.
545
+ For public OpenID Clients `client_secret` is set to an empty string `""`
546
+ :param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
547
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
548
+ :param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
549
+ The value should be less than the `verification_ttl` on the key.
550
+ :param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
551
+ This cannot be modified after creation. If not provided, the `default`
552
+ key is used.
553
+ :param pulumi.Input[_builtins.str] name: The name of the client.
554
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
555
+ The value should not contain leading or trailing forward slashes.
556
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
557
+ *Available only for Vault Enterprise*.
558
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
559
+ One of these values must exactly match the `redirect_uri` parameter value
560
+ used in each authentication request.
561
+ """
562
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
563
+
564
+ __props__ = _OidcClientState.__new__(_OidcClientState)
565
+
566
+ __props__.__dict__["access_token_ttl"] = access_token_ttl
567
+ __props__.__dict__["assignments"] = assignments
568
+ __props__.__dict__["client_id"] = client_id
569
+ __props__.__dict__["client_secret"] = client_secret
570
+ __props__.__dict__["client_type"] = client_type
571
+ __props__.__dict__["id_token_ttl"] = id_token_ttl
572
+ __props__.__dict__["key"] = key
573
+ __props__.__dict__["name"] = name
574
+ __props__.__dict__["namespace"] = namespace
575
+ __props__.__dict__["redirect_uris"] = redirect_uris
576
+ return OidcClient(resource_name, opts=opts, __props__=__props__)
577
+
578
+ @_builtins.property
579
+ @pulumi.getter(name="accessTokenTtl")
580
+ def access_token_ttl(self) -> pulumi.Output[_builtins.int]:
581
+ """
582
+ The time-to-live for access tokens obtained by the client.
583
+ """
584
+ return pulumi.get(self, "access_token_ttl")
585
+
586
+ @_builtins.property
587
+ @pulumi.getter
588
+ def assignments(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
589
+ """
590
+ A list of assignment resources associated with the client.
591
+ """
592
+ return pulumi.get(self, "assignments")
593
+
594
+ @_builtins.property
595
+ @pulumi.getter(name="clientId")
596
+ def client_id(self) -> pulumi.Output[_builtins.str]:
597
+ """
598
+ The Client ID returned by Vault.
599
+ """
600
+ return pulumi.get(self, "client_id")
601
+
602
+ @_builtins.property
603
+ @pulumi.getter(name="clientSecret")
604
+ def client_secret(self) -> pulumi.Output[_builtins.str]:
605
+ """
606
+ The Client Secret Key returned by Vault.
607
+ For public OpenID Clients `client_secret` is set to an empty string `""`
608
+ """
609
+ return pulumi.get(self, "client_secret")
610
+
611
+ @_builtins.property
612
+ @pulumi.getter(name="clientType")
613
+ def client_type(self) -> pulumi.Output[_builtins.str]:
614
+ """
615
+ The client type based on its ability to maintain confidentiality of credentials.
616
+ The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
617
+ """
618
+ return pulumi.get(self, "client_type")
619
+
620
+ @_builtins.property
621
+ @pulumi.getter(name="idTokenTtl")
622
+ def id_token_ttl(self) -> pulumi.Output[_builtins.int]:
623
+ """
624
+ The time-to-live for ID tokens obtained by the client.
625
+ The value should be less than the `verification_ttl` on the key.
626
+ """
627
+ return pulumi.get(self, "id_token_ttl")
628
+
629
+ @_builtins.property
630
+ @pulumi.getter
631
+ def key(self) -> pulumi.Output[_builtins.str]:
632
+ """
633
+ A reference to a named key resource in Vault.
634
+ This cannot be modified after creation. If not provided, the `default`
635
+ key is used.
636
+ """
637
+ return pulumi.get(self, "key")
638
+
639
+ @_builtins.property
640
+ @pulumi.getter
641
+ def name(self) -> pulumi.Output[_builtins.str]:
642
+ """
643
+ The name of the client.
644
+ """
645
+ return pulumi.get(self, "name")
646
+
647
+ @_builtins.property
648
+ @pulumi.getter
649
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
650
+ """
651
+ The namespace to provision the resource in.
652
+ The value should not contain leading or trailing forward slashes.
653
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
654
+ *Available only for Vault Enterprise*.
655
+ """
656
+ return pulumi.get(self, "namespace")
657
+
658
+ @_builtins.property
659
+ @pulumi.getter(name="redirectUris")
660
+ def redirect_uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
661
+ """
662
+ Redirection URI values used by the client.
663
+ One of these values must exactly match the `redirect_uri` parameter value
664
+ used in each authentication request.
665
+ """
666
+ return pulumi.get(self, "redirect_uris")
667
+