pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,474 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['OidcKeyArgs', 'OidcKey']
18
+
19
+ @pulumi.input_type
20
+ class OidcKeyArgs:
21
+ def __init__(__self__, *,
22
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
27
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
28
+ """
29
+ The set of arguments for constructing a OidcKey resource.
30
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
31
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
32
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
33
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
34
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
+ The value should not contain leading or trailing forward slashes.
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
+ *Available only for Vault Enterprise*.
39
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
40
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
41
+ available for verification after being rotated in seconds.
42
+ """
43
+ if algorithm is not None:
44
+ pulumi.set(__self__, "algorithm", algorithm)
45
+ if allowed_client_ids is not None:
46
+ pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
47
+ if name is not None:
48
+ pulumi.set(__self__, "name", name)
49
+ if namespace is not None:
50
+ pulumi.set(__self__, "namespace", namespace)
51
+ if rotation_period is not None:
52
+ pulumi.set(__self__, "rotation_period", rotation_period)
53
+ if verification_ttl is not None:
54
+ pulumi.set(__self__, "verification_ttl", verification_ttl)
55
+
56
+ @_builtins.property
57
+ @pulumi.getter
58
+ def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
59
+ """
60
+ Signing algorithm to use. Signing algorithm to use.
61
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
62
+ """
63
+ return pulumi.get(self, "algorithm")
64
+
65
+ @algorithm.setter
66
+ def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
67
+ pulumi.set(self, "algorithm", value)
68
+
69
+ @_builtins.property
70
+ @pulumi.getter(name="allowedClientIds")
71
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
72
+ """
73
+ Array of role client ID allowed to use this key for signing. If
74
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
75
+ """
76
+ return pulumi.get(self, "allowed_client_ids")
77
+
78
+ @allowed_client_ids.setter
79
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
80
+ pulumi.set(self, "allowed_client_ids", value)
81
+
82
+ @_builtins.property
83
+ @pulumi.getter
84
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
85
+ """
86
+ Name of the OIDC Key to create.
87
+ """
88
+ return pulumi.get(self, "name")
89
+
90
+ @name.setter
91
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
92
+ pulumi.set(self, "name", value)
93
+
94
+ @_builtins.property
95
+ @pulumi.getter
96
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
97
+ """
98
+ The namespace to provision the resource in.
99
+ The value should not contain leading or trailing forward slashes.
100
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
101
+ *Available only for Vault Enterprise*.
102
+ """
103
+ return pulumi.get(self, "namespace")
104
+
105
+ @namespace.setter
106
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
107
+ pulumi.set(self, "namespace", value)
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="rotationPeriod")
111
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
112
+ """
113
+ How often to generate a new signing key in number of seconds
114
+ """
115
+ return pulumi.get(self, "rotation_period")
116
+
117
+ @rotation_period.setter
118
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
119
+ pulumi.set(self, "rotation_period", value)
120
+
121
+ @_builtins.property
122
+ @pulumi.getter(name="verificationTtl")
123
+ def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
124
+ """
125
+ "Controls how long the public portion of a signing key will be
126
+ available for verification after being rotated in seconds.
127
+ """
128
+ return pulumi.get(self, "verification_ttl")
129
+
130
+ @verification_ttl.setter
131
+ def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
132
+ pulumi.set(self, "verification_ttl", value)
133
+
134
+
135
+ @pulumi.input_type
136
+ class _OidcKeyState:
137
+ def __init__(__self__, *,
138
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
139
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
140
+ name: Optional[pulumi.Input[_builtins.str]] = None,
141
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
142
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
143
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
144
+ """
145
+ Input properties used for looking up and filtering OidcKey resources.
146
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
147
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
148
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
149
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
150
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
151
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
152
+ The value should not contain leading or trailing forward slashes.
153
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
154
+ *Available only for Vault Enterprise*.
155
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
156
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
157
+ available for verification after being rotated in seconds.
158
+ """
159
+ if algorithm is not None:
160
+ pulumi.set(__self__, "algorithm", algorithm)
161
+ if allowed_client_ids is not None:
162
+ pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
163
+ if name is not None:
164
+ pulumi.set(__self__, "name", name)
165
+ if namespace is not None:
166
+ pulumi.set(__self__, "namespace", namespace)
167
+ if rotation_period is not None:
168
+ pulumi.set(__self__, "rotation_period", rotation_period)
169
+ if verification_ttl is not None:
170
+ pulumi.set(__self__, "verification_ttl", verification_ttl)
171
+
172
+ @_builtins.property
173
+ @pulumi.getter
174
+ def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
175
+ """
176
+ Signing algorithm to use. Signing algorithm to use.
177
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
178
+ """
179
+ return pulumi.get(self, "algorithm")
180
+
181
+ @algorithm.setter
182
+ def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
183
+ pulumi.set(self, "algorithm", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="allowedClientIds")
187
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
188
+ """
189
+ Array of role client ID allowed to use this key for signing. If
190
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
191
+ """
192
+ return pulumi.get(self, "allowed_client_ids")
193
+
194
+ @allowed_client_ids.setter
195
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
196
+ pulumi.set(self, "allowed_client_ids", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter
200
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
201
+ """
202
+ Name of the OIDC Key to create.
203
+ """
204
+ return pulumi.get(self, "name")
205
+
206
+ @name.setter
207
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
208
+ pulumi.set(self, "name", value)
209
+
210
+ @_builtins.property
211
+ @pulumi.getter
212
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
213
+ """
214
+ The namespace to provision the resource in.
215
+ The value should not contain leading or trailing forward slashes.
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
+ *Available only for Vault Enterprise*.
218
+ """
219
+ return pulumi.get(self, "namespace")
220
+
221
+ @namespace.setter
222
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
223
+ pulumi.set(self, "namespace", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="rotationPeriod")
227
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
228
+ """
229
+ How often to generate a new signing key in number of seconds
230
+ """
231
+ return pulumi.get(self, "rotation_period")
232
+
233
+ @rotation_period.setter
234
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
235
+ pulumi.set(self, "rotation_period", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="verificationTtl")
239
+ def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
240
+ """
241
+ "Controls how long the public portion of a signing key will be
242
+ available for verification after being rotated in seconds.
243
+ """
244
+ return pulumi.get(self, "verification_ttl")
245
+
246
+ @verification_ttl.setter
247
+ def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
248
+ pulumi.set(self, "verification_ttl", value)
249
+
250
+
251
+ @pulumi.type_token("vault:identity/oidcKey:OidcKey")
252
+ class OidcKey(pulumi.CustomResource):
253
+ @overload
254
+ def __init__(__self__,
255
+ resource_name: str,
256
+ opts: Optional[pulumi.ResourceOptions] = None,
257
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
258
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
259
+ name: Optional[pulumi.Input[_builtins.str]] = None,
260
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
261
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
262
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
263
+ __props__=None):
264
+ """
265
+ ## Example Usage
266
+
267
+ ```python
268
+ import pulumi
269
+ import pulumi_vault as vault
270
+
271
+ key = vault.identity.OidcKey("key",
272
+ name="key",
273
+ algorithm="RS256")
274
+ role = vault.identity.OidcRole("role",
275
+ name="role",
276
+ key=key.name)
277
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
278
+ key_name=key.name,
279
+ allowed_client_id=role.client_id)
280
+ ```
281
+
282
+ ## Import
283
+
284
+ The key can be imported with the key name, for example:
285
+
286
+ ```sh
287
+ $ pulumi import vault:identity/oidcKey:OidcKey key key
288
+ ```
289
+
290
+ :param str resource_name: The name of the resource.
291
+ :param pulumi.ResourceOptions opts: Options for the resource.
292
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
293
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
294
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
295
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
296
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
297
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
298
+ The value should not contain leading or trailing forward slashes.
299
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
300
+ *Available only for Vault Enterprise*.
301
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
302
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
303
+ available for verification after being rotated in seconds.
304
+ """
305
+ ...
306
+ @overload
307
+ def __init__(__self__,
308
+ resource_name: str,
309
+ args: Optional[OidcKeyArgs] = None,
310
+ opts: Optional[pulumi.ResourceOptions] = None):
311
+ """
312
+ ## Example Usage
313
+
314
+ ```python
315
+ import pulumi
316
+ import pulumi_vault as vault
317
+
318
+ key = vault.identity.OidcKey("key",
319
+ name="key",
320
+ algorithm="RS256")
321
+ role = vault.identity.OidcRole("role",
322
+ name="role",
323
+ key=key.name)
324
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
325
+ key_name=key.name,
326
+ allowed_client_id=role.client_id)
327
+ ```
328
+
329
+ ## Import
330
+
331
+ The key can be imported with the key name, for example:
332
+
333
+ ```sh
334
+ $ pulumi import vault:identity/oidcKey:OidcKey key key
335
+ ```
336
+
337
+ :param str resource_name: The name of the resource.
338
+ :param OidcKeyArgs args: The arguments to use to populate this resource's properties.
339
+ :param pulumi.ResourceOptions opts: Options for the resource.
340
+ """
341
+ ...
342
+ def __init__(__self__, resource_name: str, *args, **kwargs):
343
+ resource_args, opts = _utilities.get_resource_args_opts(OidcKeyArgs, pulumi.ResourceOptions, *args, **kwargs)
344
+ if resource_args is not None:
345
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
346
+ else:
347
+ __self__._internal_init(resource_name, *args, **kwargs)
348
+
349
+ def _internal_init(__self__,
350
+ resource_name: str,
351
+ opts: Optional[pulumi.ResourceOptions] = None,
352
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
353
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
354
+ name: Optional[pulumi.Input[_builtins.str]] = None,
355
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
356
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
357
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
358
+ __props__=None):
359
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
360
+ if not isinstance(opts, pulumi.ResourceOptions):
361
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
362
+ if opts.id is None:
363
+ if __props__ is not None:
364
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
365
+ __props__ = OidcKeyArgs.__new__(OidcKeyArgs)
366
+
367
+ __props__.__dict__["algorithm"] = algorithm
368
+ __props__.__dict__["allowed_client_ids"] = allowed_client_ids
369
+ __props__.__dict__["name"] = name
370
+ __props__.__dict__["namespace"] = namespace
371
+ __props__.__dict__["rotation_period"] = rotation_period
372
+ __props__.__dict__["verification_ttl"] = verification_ttl
373
+ super(OidcKey, __self__).__init__(
374
+ 'vault:identity/oidcKey:OidcKey',
375
+ resource_name,
376
+ __props__,
377
+ opts)
378
+
379
+ @staticmethod
380
+ def get(resource_name: str,
381
+ id: pulumi.Input[str],
382
+ opts: Optional[pulumi.ResourceOptions] = None,
383
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
384
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ name: Optional[pulumi.Input[_builtins.str]] = None,
386
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
387
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
388
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcKey':
389
+ """
390
+ Get an existing OidcKey resource's state with the given name, id, and optional extra
391
+ properties used to qualify the lookup.
392
+
393
+ :param str resource_name: The unique name of the resulting resource.
394
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
395
+ :param pulumi.ResourceOptions opts: Options for the resource.
396
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
397
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
398
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
399
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
400
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
401
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
402
+ The value should not contain leading or trailing forward slashes.
403
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
404
+ *Available only for Vault Enterprise*.
405
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
406
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
407
+ available for verification after being rotated in seconds.
408
+ """
409
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
410
+
411
+ __props__ = _OidcKeyState.__new__(_OidcKeyState)
412
+
413
+ __props__.__dict__["algorithm"] = algorithm
414
+ __props__.__dict__["allowed_client_ids"] = allowed_client_ids
415
+ __props__.__dict__["name"] = name
416
+ __props__.__dict__["namespace"] = namespace
417
+ __props__.__dict__["rotation_period"] = rotation_period
418
+ __props__.__dict__["verification_ttl"] = verification_ttl
419
+ return OidcKey(resource_name, opts=opts, __props__=__props__)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter
423
+ def algorithm(self) -> pulumi.Output[Optional[_builtins.str]]:
424
+ """
425
+ Signing algorithm to use. Signing algorithm to use.
426
+ Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
427
+ """
428
+ return pulumi.get(self, "algorithm")
429
+
430
+ @_builtins.property
431
+ @pulumi.getter(name="allowedClientIds")
432
+ def allowed_client_ids(self) -> pulumi.Output[Sequence[_builtins.str]]:
433
+ """
434
+ Array of role client ID allowed to use this key for signing. If
435
+ empty, no roles are allowed. If `["*"]`, all roles are allowed.
436
+ """
437
+ return pulumi.get(self, "allowed_client_ids")
438
+
439
+ @_builtins.property
440
+ @pulumi.getter
441
+ def name(self) -> pulumi.Output[_builtins.str]:
442
+ """
443
+ Name of the OIDC Key to create.
444
+ """
445
+ return pulumi.get(self, "name")
446
+
447
+ @_builtins.property
448
+ @pulumi.getter
449
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
450
+ """
451
+ The namespace to provision the resource in.
452
+ The value should not contain leading or trailing forward slashes.
453
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
454
+ *Available only for Vault Enterprise*.
455
+ """
456
+ return pulumi.get(self, "namespace")
457
+
458
+ @_builtins.property
459
+ @pulumi.getter(name="rotationPeriod")
460
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
461
+ """
462
+ How often to generate a new signing key in number of seconds
463
+ """
464
+ return pulumi.get(self, "rotation_period")
465
+
466
+ @_builtins.property
467
+ @pulumi.getter(name="verificationTtl")
468
+ def verification_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
469
+ """
470
+ "Controls how long the public portion of a signing key will be
471
+ available for verification after being rotated in seconds.
472
+ """
473
+ return pulumi.get(self, "verification_ttl")
474
+