pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -25,9 +30,6 @@ class SecretBackendArgs:
|
|
25
30
|
token: Optional[pulumi.Input[str]] = None):
|
26
31
|
"""
|
27
32
|
The set of arguments for constructing a SecretBackend resource.
|
28
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
29
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
30
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
31
33
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
32
34
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
33
35
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -38,7 +40,6 @@ class SecretBackendArgs:
|
|
38
40
|
The value should not contain leading or trailing forward slashes.
|
39
41
|
The `namespace` is always relative to the provider's configured namespace.
|
40
42
|
*Available only for Vault Enterprise*.
|
41
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
42
43
|
"""
|
43
44
|
if address is not None:
|
44
45
|
pulumi.set(__self__, "address", address)
|
@@ -62,9 +63,6 @@ class SecretBackendArgs:
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
65
|
def address(self) -> Optional[pulumi.Input[str]]:
|
65
|
-
"""
|
66
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
67
|
-
"""
|
68
66
|
return pulumi.get(self, "address")
|
69
67
|
|
70
68
|
@address.setter
|
@@ -74,9 +72,6 @@ class SecretBackendArgs:
|
|
74
72
|
@property
|
75
73
|
@pulumi.getter
|
76
74
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
77
|
-
"""
|
78
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
79
|
-
"""
|
80
75
|
return pulumi.get(self, "backend")
|
81
76
|
|
82
77
|
@backend.setter
|
@@ -86,9 +81,6 @@ class SecretBackendArgs:
|
|
86
81
|
@property
|
87
82
|
@pulumi.getter(name="basePath")
|
88
83
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
89
|
-
"""
|
90
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
91
|
-
"""
|
92
84
|
return pulumi.get(self, "base_path")
|
93
85
|
|
94
86
|
@base_path.setter
|
@@ -163,9 +155,6 @@ class SecretBackendArgs:
|
|
163
155
|
@property
|
164
156
|
@pulumi.getter
|
165
157
|
def token(self) -> Optional[pulumi.Input[str]]:
|
166
|
-
"""
|
167
|
-
Specifies the Terraform Cloud access token to use.
|
168
|
-
"""
|
169
158
|
return pulumi.get(self, "token")
|
170
159
|
|
171
160
|
@token.setter
|
@@ -187,9 +176,6 @@ class _SecretBackendState:
|
|
187
176
|
token: Optional[pulumi.Input[str]] = None):
|
188
177
|
"""
|
189
178
|
Input properties used for looking up and filtering SecretBackend resources.
|
190
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
191
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
192
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
193
179
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
194
180
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
195
181
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -200,7 +186,6 @@ class _SecretBackendState:
|
|
200
186
|
The value should not contain leading or trailing forward slashes.
|
201
187
|
The `namespace` is always relative to the provider's configured namespace.
|
202
188
|
*Available only for Vault Enterprise*.
|
203
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
204
189
|
"""
|
205
190
|
if address is not None:
|
206
191
|
pulumi.set(__self__, "address", address)
|
@@ -224,9 +209,6 @@ class _SecretBackendState:
|
|
224
209
|
@property
|
225
210
|
@pulumi.getter
|
226
211
|
def address(self) -> Optional[pulumi.Input[str]]:
|
227
|
-
"""
|
228
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
229
|
-
"""
|
230
212
|
return pulumi.get(self, "address")
|
231
213
|
|
232
214
|
@address.setter
|
@@ -236,9 +218,6 @@ class _SecretBackendState:
|
|
236
218
|
@property
|
237
219
|
@pulumi.getter
|
238
220
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
239
|
-
"""
|
240
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
241
|
-
"""
|
242
221
|
return pulumi.get(self, "backend")
|
243
222
|
|
244
223
|
@backend.setter
|
@@ -248,9 +227,6 @@ class _SecretBackendState:
|
|
248
227
|
@property
|
249
228
|
@pulumi.getter(name="basePath")
|
250
229
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
251
|
-
"""
|
252
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
253
|
-
"""
|
254
230
|
return pulumi.get(self, "base_path")
|
255
231
|
|
256
232
|
@base_path.setter
|
@@ -325,9 +301,6 @@ class _SecretBackendState:
|
|
325
301
|
@property
|
326
302
|
@pulumi.getter
|
327
303
|
def token(self) -> Optional[pulumi.Input[str]]:
|
328
|
-
"""
|
329
|
-
Specifies the Terraform Cloud access token to use.
|
330
|
-
"""
|
331
304
|
return pulumi.get(self, "token")
|
332
305
|
|
333
306
|
@token.setter
|
@@ -368,14 +341,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
368
341
|
Terraform Cloud secret backends can be imported using the `backend`, e.g.
|
369
342
|
|
370
343
|
```sh
|
371
|
-
|
344
|
+
$ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
|
372
345
|
```
|
373
346
|
|
374
347
|
:param str resource_name: The name of the resource.
|
375
348
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
376
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
377
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
378
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
379
349
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
380
350
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
381
351
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -386,7 +356,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
386
356
|
The value should not contain leading or trailing forward slashes.
|
387
357
|
The `namespace` is always relative to the provider's configured namespace.
|
388
358
|
*Available only for Vault Enterprise*.
|
389
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
390
359
|
"""
|
391
360
|
...
|
392
361
|
@overload
|
@@ -412,7 +381,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
412
381
|
Terraform Cloud secret backends can be imported using the `backend`, e.g.
|
413
382
|
|
414
383
|
```sh
|
415
|
-
|
384
|
+
$ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
|
416
385
|
```
|
417
386
|
|
418
387
|
:param str resource_name: The name of the resource.
|
@@ -485,9 +454,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
485
454
|
:param str resource_name: The unique name of the resulting resource.
|
486
455
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
487
456
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
488
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
489
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
490
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
491
457
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
492
458
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
493
459
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -498,7 +464,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
498
464
|
The value should not contain leading or trailing forward slashes.
|
499
465
|
The `namespace` is always relative to the provider's configured namespace.
|
500
466
|
*Available only for Vault Enterprise*.
|
501
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
502
467
|
"""
|
503
468
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
504
469
|
|
@@ -518,25 +483,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
518
483
|
@property
|
519
484
|
@pulumi.getter
|
520
485
|
def address(self) -> pulumi.Output[Optional[str]]:
|
521
|
-
"""
|
522
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
523
|
-
"""
|
524
486
|
return pulumi.get(self, "address")
|
525
487
|
|
526
488
|
@property
|
527
489
|
@pulumi.getter
|
528
490
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
529
|
-
"""
|
530
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
531
|
-
"""
|
532
491
|
return pulumi.get(self, "backend")
|
533
492
|
|
534
493
|
@property
|
535
494
|
@pulumi.getter(name="basePath")
|
536
495
|
def base_path(self) -> pulumi.Output[Optional[str]]:
|
537
|
-
"""
|
538
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
539
|
-
"""
|
540
496
|
return pulumi.get(self, "base_path")
|
541
497
|
|
542
498
|
@property
|
@@ -587,8 +543,5 @@ class SecretBackend(pulumi.CustomResource):
|
|
587
543
|
@property
|
588
544
|
@pulumi.getter
|
589
545
|
def token(self) -> pulumi.Output[Optional[str]]:
|
590
|
-
"""
|
591
|
-
Specifies the Terraform Cloud access token to use.
|
592
|
-
"""
|
593
546
|
return pulumi.get(self, "token")
|
594
547
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -19,11 +24,10 @@ class SecretCredsArgs:
|
|
19
24
|
namespace: Optional[pulumi.Input[str]] = None):
|
20
25
|
"""
|
21
26
|
The set of arguments for constructing a SecretCreds resource.
|
22
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
23
27
|
:param pulumi.Input[str] role: Name of the role.
|
24
28
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
29
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
30
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
31
|
*Available only for Vault Enterprise*.
|
28
32
|
"""
|
29
33
|
pulumi.set(__self__, "backend", backend)
|
@@ -34,9 +38,6 @@ class SecretCredsArgs:
|
|
34
38
|
@property
|
35
39
|
@pulumi.getter
|
36
40
|
def backend(self) -> pulumi.Input[str]:
|
37
|
-
"""
|
38
|
-
Terraform Cloud secret backend to generate tokens from
|
39
|
-
"""
|
40
41
|
return pulumi.get(self, "backend")
|
41
42
|
|
42
43
|
@backend.setter
|
@@ -61,7 +62,7 @@ class SecretCredsArgs:
|
|
61
62
|
"""
|
62
63
|
The namespace to provision the resource in.
|
63
64
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
65
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
66
|
*Available only for Vault Enterprise*.
|
66
67
|
"""
|
67
68
|
return pulumi.get(self, "namespace")
|
@@ -84,12 +85,11 @@ class _SecretCredsState:
|
|
84
85
|
token_id: Optional[pulumi.Input[str]] = None):
|
85
86
|
"""
|
86
87
|
Input properties used for looking up and filtering SecretCreds resources.
|
87
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
88
88
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
89
89
|
Vault lease associated with them.
|
90
90
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
91
91
|
The value should not contain leading or trailing forward slashes.
|
92
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
92
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
93
93
|
*Available only for Vault Enterprise*.
|
94
94
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
95
95
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -119,9 +119,6 @@ class _SecretCredsState:
|
|
119
119
|
@property
|
120
120
|
@pulumi.getter
|
121
121
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
Terraform Cloud secret backend to generate tokens from
|
124
|
-
"""
|
125
122
|
return pulumi.get(self, "backend")
|
126
123
|
|
127
124
|
@backend.setter
|
@@ -147,7 +144,7 @@ class _SecretCredsState:
|
|
147
144
|
"""
|
148
145
|
The namespace to provision the resource in.
|
149
146
|
The value should not contain leading or trailing forward slashes.
|
150
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
151
148
|
*Available only for Vault Enterprise*.
|
152
149
|
"""
|
153
150
|
return pulumi.get(self, "namespace")
|
@@ -241,6 +238,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
241
238
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
242
239
|
example = vault.terraformcloud.SecretRole("example",
|
243
240
|
backend=test.backend,
|
241
|
+
name="test-role",
|
244
242
|
organization="example-organization-name",
|
245
243
|
team_id="team-ieF4isC...")
|
246
244
|
token = vault.terraformcloud.SecretCreds("token",
|
@@ -250,10 +248,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
250
248
|
|
251
249
|
:param str resource_name: The name of the resource.
|
252
250
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
253
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
254
251
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
255
252
|
The value should not contain leading or trailing forward slashes.
|
256
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
253
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
257
254
|
*Available only for Vault Enterprise*.
|
258
255
|
:param pulumi.Input[str] role: Name of the role.
|
259
256
|
"""
|
@@ -276,6 +273,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
276
273
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
277
274
|
example = vault.terraformcloud.SecretRole("example",
|
278
275
|
backend=test.backend,
|
276
|
+
name="test-role",
|
279
277
|
organization="example-organization-name",
|
280
278
|
team_id="team-ieF4isC...")
|
281
279
|
token = vault.terraformcloud.SecretCreds("token",
|
@@ -349,12 +347,11 @@ class SecretCreds(pulumi.CustomResource):
|
|
349
347
|
:param str resource_name: The unique name of the resulting resource.
|
350
348
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
351
349
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
352
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
353
350
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
354
351
|
Vault lease associated with them.
|
355
352
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
356
353
|
The value should not contain leading or trailing forward slashes.
|
357
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
354
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
358
355
|
*Available only for Vault Enterprise*.
|
359
356
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
360
357
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -381,9 +378,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
381
378
|
@property
|
382
379
|
@pulumi.getter
|
383
380
|
def backend(self) -> pulumi.Output[str]:
|
384
|
-
"""
|
385
|
-
Terraform Cloud secret backend to generate tokens from
|
386
|
-
"""
|
387
381
|
return pulumi.get(self, "backend")
|
388
382
|
|
389
383
|
@property
|
@@ -401,7 +395,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
401
395
|
"""
|
402
396
|
The namespace to provision the resource in.
|
403
397
|
The value should not contain leading or trailing forward slashes.
|
404
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
405
399
|
*Available only for Vault Enterprise*.
|
406
400
|
"""
|
407
401
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -24,17 +29,12 @@ class SecretRoleArgs:
|
|
24
29
|
user_id: Optional[pulumi.Input[str]] = None):
|
25
30
|
"""
|
26
31
|
The set of arguments for constructing a SecretRole resource.
|
27
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
28
32
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
29
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
30
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
34
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
36
|
*Available only for Vault Enterprise*.
|
34
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
35
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
36
37
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
37
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
38
38
|
"""
|
39
39
|
if backend is not None:
|
40
40
|
pulumi.set(__self__, "backend", backend)
|
@@ -56,9 +56,6 @@ class SecretRoleArgs:
|
|
56
56
|
@property
|
57
57
|
@pulumi.getter
|
58
58
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
59
|
-
"""
|
60
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
61
|
-
"""
|
62
59
|
return pulumi.get(self, "backend")
|
63
60
|
|
64
61
|
@backend.setter
|
@@ -80,9 +77,6 @@ class SecretRoleArgs:
|
|
80
77
|
@property
|
81
78
|
@pulumi.getter
|
82
79
|
def name(self) -> Optional[pulumi.Input[str]]:
|
83
|
-
"""
|
84
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
85
|
-
"""
|
86
80
|
return pulumi.get(self, "name")
|
87
81
|
|
88
82
|
@name.setter
|
@@ -95,7 +89,7 @@ class SecretRoleArgs:
|
|
95
89
|
"""
|
96
90
|
The namespace to provision the resource in.
|
97
91
|
The value should not contain leading or trailing forward slashes.
|
98
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
92
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
99
93
|
*Available only for Vault Enterprise*.
|
100
94
|
"""
|
101
95
|
return pulumi.get(self, "namespace")
|
@@ -107,9 +101,6 @@ class SecretRoleArgs:
|
|
107
101
|
@property
|
108
102
|
@pulumi.getter
|
109
103
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
110
|
-
"""
|
111
|
-
Name of the Terraform Cloud or Enterprise organization
|
112
|
-
"""
|
113
104
|
return pulumi.get(self, "organization")
|
114
105
|
|
115
106
|
@organization.setter
|
@@ -119,9 +110,6 @@ class SecretRoleArgs:
|
|
119
110
|
@property
|
120
111
|
@pulumi.getter(name="teamId")
|
121
112
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
124
|
-
"""
|
125
113
|
return pulumi.get(self, "team_id")
|
126
114
|
|
127
115
|
@team_id.setter
|
@@ -143,9 +131,6 @@ class SecretRoleArgs:
|
|
143
131
|
@property
|
144
132
|
@pulumi.getter(name="userId")
|
145
133
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
146
|
-
"""
|
147
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
148
|
-
"""
|
149
134
|
return pulumi.get(self, "user_id")
|
150
135
|
|
151
136
|
@user_id.setter
|
@@ -166,17 +151,12 @@ class _SecretRoleState:
|
|
166
151
|
user_id: Optional[pulumi.Input[str]] = None):
|
167
152
|
"""
|
168
153
|
Input properties used for looking up and filtering SecretRole resources.
|
169
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
170
154
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
171
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
172
155
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
173
156
|
The value should not contain leading or trailing forward slashes.
|
174
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
175
158
|
*Available only for Vault Enterprise*.
|
176
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
177
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
178
159
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
179
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
180
160
|
"""
|
181
161
|
if backend is not None:
|
182
162
|
pulumi.set(__self__, "backend", backend)
|
@@ -198,9 +178,6 @@ class _SecretRoleState:
|
|
198
178
|
@property
|
199
179
|
@pulumi.getter
|
200
180
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
201
|
-
"""
|
202
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
203
|
-
"""
|
204
181
|
return pulumi.get(self, "backend")
|
205
182
|
|
206
183
|
@backend.setter
|
@@ -222,9 +199,6 @@ class _SecretRoleState:
|
|
222
199
|
@property
|
223
200
|
@pulumi.getter
|
224
201
|
def name(self) -> Optional[pulumi.Input[str]]:
|
225
|
-
"""
|
226
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
227
|
-
"""
|
228
202
|
return pulumi.get(self, "name")
|
229
203
|
|
230
204
|
@name.setter
|
@@ -237,7 +211,7 @@ class _SecretRoleState:
|
|
237
211
|
"""
|
238
212
|
The namespace to provision the resource in.
|
239
213
|
The value should not contain leading or trailing forward slashes.
|
240
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
214
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
241
215
|
*Available only for Vault Enterprise*.
|
242
216
|
"""
|
243
217
|
return pulumi.get(self, "namespace")
|
@@ -249,9 +223,6 @@ class _SecretRoleState:
|
|
249
223
|
@property
|
250
224
|
@pulumi.getter
|
251
225
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
252
|
-
"""
|
253
|
-
Name of the Terraform Cloud or Enterprise organization
|
254
|
-
"""
|
255
226
|
return pulumi.get(self, "organization")
|
256
227
|
|
257
228
|
@organization.setter
|
@@ -261,9 +232,6 @@ class _SecretRoleState:
|
|
261
232
|
@property
|
262
233
|
@pulumi.getter(name="teamId")
|
263
234
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
264
|
-
"""
|
265
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
266
|
-
"""
|
267
235
|
return pulumi.get(self, "team_id")
|
268
236
|
|
269
237
|
@team_id.setter
|
@@ -285,9 +253,6 @@ class _SecretRoleState:
|
|
285
253
|
@property
|
286
254
|
@pulumi.getter(name="userId")
|
287
255
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
288
|
-
"""
|
289
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
290
|
-
"""
|
291
256
|
return pulumi.get(self, "user_id")
|
292
257
|
|
293
258
|
@user_id.setter
|
@@ -322,6 +287,7 @@ class SecretRole(pulumi.CustomResource):
|
|
322
287
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
323
288
|
example = vault.terraformcloud.SecretRole("example",
|
324
289
|
backend=test.backend,
|
290
|
+
name="test-role",
|
325
291
|
organization="example-organization-name",
|
326
292
|
team_id="team-ieF4isC...")
|
327
293
|
```
|
@@ -331,22 +297,17 @@ class SecretRole(pulumi.CustomResource):
|
|
331
297
|
Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
|
332
298
|
|
333
299
|
```sh
|
334
|
-
|
300
|
+
$ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
|
335
301
|
```
|
336
302
|
|
337
303
|
:param str resource_name: The name of the resource.
|
338
304
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
339
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
340
305
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
341
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
342
306
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
307
|
The value should not contain leading or trailing forward slashes.
|
344
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
308
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
309
|
*Available only for Vault Enterprise*.
|
346
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
347
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
348
310
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
349
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
350
311
|
"""
|
351
312
|
...
|
352
313
|
@overload
|
@@ -367,6 +328,7 @@ class SecretRole(pulumi.CustomResource):
|
|
367
328
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
368
329
|
example = vault.terraformcloud.SecretRole("example",
|
369
330
|
backend=test.backend,
|
331
|
+
name="test-role",
|
370
332
|
organization="example-organization-name",
|
371
333
|
team_id="team-ieF4isC...")
|
372
334
|
```
|
@@ -376,7 +338,7 @@ class SecretRole(pulumi.CustomResource):
|
|
376
338
|
Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
|
377
339
|
|
378
340
|
```sh
|
379
|
-
|
341
|
+
$ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
|
380
342
|
```
|
381
343
|
|
382
344
|
:param str resource_name: The name of the resource.
|
@@ -444,17 +406,12 @@ class SecretRole(pulumi.CustomResource):
|
|
444
406
|
:param str resource_name: The unique name of the resulting resource.
|
445
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
446
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
447
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
448
409
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
449
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
450
410
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
451
411
|
The value should not contain leading or trailing forward slashes.
|
452
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
412
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
453
413
|
*Available only for Vault Enterprise*.
|
454
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
455
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
456
414
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
457
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
458
415
|
"""
|
459
416
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
460
417
|
|
@@ -473,9 +430,6 @@ class SecretRole(pulumi.CustomResource):
|
|
473
430
|
@property
|
474
431
|
@pulumi.getter
|
475
432
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
476
|
-
"""
|
477
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
478
|
-
"""
|
479
433
|
return pulumi.get(self, "backend")
|
480
434
|
|
481
435
|
@property
|
@@ -489,9 +443,6 @@ class SecretRole(pulumi.CustomResource):
|
|
489
443
|
@property
|
490
444
|
@pulumi.getter
|
491
445
|
def name(self) -> pulumi.Output[str]:
|
492
|
-
"""
|
493
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
494
|
-
"""
|
495
446
|
return pulumi.get(self, "name")
|
496
447
|
|
497
448
|
@property
|
@@ -500,7 +451,7 @@ class SecretRole(pulumi.CustomResource):
|
|
500
451
|
"""
|
501
452
|
The namespace to provision the resource in.
|
502
453
|
The value should not contain leading or trailing forward slashes.
|
503
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
454
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
504
455
|
*Available only for Vault Enterprise*.
|
505
456
|
"""
|
506
457
|
return pulumi.get(self, "namespace")
|
@@ -508,17 +459,11 @@ class SecretRole(pulumi.CustomResource):
|
|
508
459
|
@property
|
509
460
|
@pulumi.getter
|
510
461
|
def organization(self) -> pulumi.Output[Optional[str]]:
|
511
|
-
"""
|
512
|
-
Name of the Terraform Cloud or Enterprise organization
|
513
|
-
"""
|
514
462
|
return pulumi.get(self, "organization")
|
515
463
|
|
516
464
|
@property
|
517
465
|
@pulumi.getter(name="teamId")
|
518
466
|
def team_id(self) -> pulumi.Output[Optional[str]]:
|
519
|
-
"""
|
520
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
521
|
-
"""
|
522
467
|
return pulumi.get(self, "team_id")
|
523
468
|
|
524
469
|
@property
|
@@ -532,8 +477,5 @@ class SecretRole(pulumi.CustomResource):
|
|
532
477
|
@property
|
533
478
|
@pulumi.getter(name="userId")
|
534
479
|
def user_id(self) -> pulumi.Output[Optional[str]]:
|
535
|
-
"""
|
536
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
537
|
-
"""
|
538
480
|
return pulumi.get(self, "user_id")
|
539
481
|
|