pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretLibraryArgs', 'SecretLibrary']
|
@@ -33,7 +38,7 @@ class SecretLibraryArgs:
|
|
33
38
|
Must be unique within the backend.
|
34
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
40
|
The value should not contain leading or trailing forward slashes.
|
36
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
41
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
42
|
*Available only for Vault Enterprise*.
|
38
43
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
39
44
|
ttl if not provided.
|
@@ -120,7 +125,7 @@ class SecretLibraryArgs:
|
|
120
125
|
"""
|
121
126
|
The namespace to provision the resource in.
|
122
127
|
The value should not contain leading or trailing forward slashes.
|
123
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
128
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
124
129
|
*Available only for Vault Enterprise*.
|
125
130
|
"""
|
126
131
|
return pulumi.get(self, "namespace")
|
@@ -164,7 +169,7 @@ class _SecretLibraryState:
|
|
164
169
|
Must be unique within the backend.
|
165
170
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
166
171
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
172
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
173
|
*Available only for Vault Enterprise*.
|
169
174
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
170
175
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -242,7 +247,7 @@ class _SecretLibraryState:
|
|
242
247
|
"""
|
243
248
|
The namespace to provision the resource in.
|
244
249
|
The value should not contain leading or trailing forward slashes.
|
245
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
250
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
246
251
|
*Available only for Vault Enterprise*.
|
247
252
|
"""
|
248
253
|
return pulumi.get(self, "namespace")
|
@@ -293,7 +298,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
293
298
|
"""
|
294
299
|
## Example Usage
|
295
300
|
|
296
|
-
<!--Start PulumiCodeChooser -->
|
297
301
|
```python
|
298
302
|
import pulumi
|
299
303
|
import pulumi_vault as vault
|
@@ -307,6 +311,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
307
311
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
308
312
|
qa = vault.ad.SecretLibrary("qa",
|
309
313
|
backend=config.backend,
|
314
|
+
name="qa",
|
310
315
|
service_account_names=[
|
311
316
|
"Bob",
|
312
317
|
"Mary",
|
@@ -315,7 +320,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
315
320
|
disable_check_in_enforcement=True,
|
316
321
|
max_ttl=120)
|
317
322
|
```
|
318
|
-
<!--End PulumiCodeChooser -->
|
319
323
|
|
320
324
|
## Import
|
321
325
|
|
@@ -336,7 +340,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
336
340
|
Must be unique within the backend.
|
337
341
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
338
342
|
The value should not contain leading or trailing forward slashes.
|
339
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
343
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
340
344
|
*Available only for Vault Enterprise*.
|
341
345
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
342
346
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -351,7 +355,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
351
355
|
"""
|
352
356
|
## Example Usage
|
353
357
|
|
354
|
-
<!--Start PulumiCodeChooser -->
|
355
358
|
```python
|
356
359
|
import pulumi
|
357
360
|
import pulumi_vault as vault
|
@@ -365,6 +368,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
365
368
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
366
369
|
qa = vault.ad.SecretLibrary("qa",
|
367
370
|
backend=config.backend,
|
371
|
+
name="qa",
|
368
372
|
service_account_names=[
|
369
373
|
"Bob",
|
370
374
|
"Mary",
|
@@ -373,7 +377,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
373
377
|
disable_check_in_enforcement=True,
|
374
378
|
max_ttl=120)
|
375
379
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
380
|
|
378
381
|
## Import
|
379
382
|
|
@@ -458,7 +461,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
458
461
|
Must be unique within the backend.
|
459
462
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
460
463
|
The value should not contain leading or trailing forward slashes.
|
461
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
464
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
462
465
|
*Available only for Vault Enterprise*.
|
463
466
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
464
467
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -518,7 +521,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
518
521
|
"""
|
519
522
|
The namespace to provision the resource in.
|
520
523
|
The value should not contain leading or trailing forward slashes.
|
521
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
524
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
522
525
|
*Available only for Vault Enterprise*.
|
523
526
|
"""
|
524
527
|
return pulumi.get(self, "namespace")
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -29,7 +34,7 @@ class SecretRoleArgs:
|
|
29
34
|
account mapped to this role.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
35
40
|
ttl if not provided.
|
@@ -87,7 +92,7 @@ class SecretRoleArgs:
|
|
87
92
|
"""
|
88
93
|
The namespace to provision the resource in.
|
89
94
|
The value should not contain leading or trailing forward slashes.
|
90
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
95
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
91
96
|
*Available only for Vault Enterprise*.
|
92
97
|
"""
|
93
98
|
return pulumi.get(self, "namespace")
|
@@ -127,7 +132,7 @@ class _SecretRoleState:
|
|
127
132
|
:param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
128
133
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
129
134
|
The value should not contain leading or trailing forward slashes.
|
130
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
135
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
131
136
|
*Available only for Vault Enterprise*.
|
132
137
|
:param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
|
133
138
|
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
@@ -183,7 +188,7 @@ class _SecretRoleState:
|
|
183
188
|
"""
|
184
189
|
The namespace to provision the resource in.
|
185
190
|
The value should not contain leading or trailing forward slashes.
|
186
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
191
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
187
192
|
*Available only for Vault Enterprise*.
|
188
193
|
"""
|
189
194
|
return pulumi.get(self, "namespace")
|
@@ -258,7 +263,6 @@ class SecretRole(pulumi.CustomResource):
|
|
258
263
|
"""
|
259
264
|
## Example Usage
|
260
265
|
|
261
|
-
<!--Start PulumiCodeChooser -->
|
262
266
|
```python
|
263
267
|
import pulumi
|
264
268
|
import pulumi_vault as vault
|
@@ -276,7 +280,6 @@ class SecretRole(pulumi.CustomResource):
|
|
276
280
|
service_account_name="Bob",
|
277
281
|
ttl=60)
|
278
282
|
```
|
279
|
-
<!--End PulumiCodeChooser -->
|
280
283
|
|
281
284
|
## Import
|
282
285
|
|
@@ -292,7 +295,7 @@ class SecretRole(pulumi.CustomResource):
|
|
292
295
|
with no leading or trailing `/`s.
|
293
296
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
294
297
|
The value should not contain leading or trailing forward slashes.
|
295
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
298
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
296
299
|
*Available only for Vault Enterprise*.
|
297
300
|
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
298
301
|
Must be unique within the backend.
|
@@ -310,7 +313,6 @@ class SecretRole(pulumi.CustomResource):
|
|
310
313
|
"""
|
311
314
|
## Example Usage
|
312
315
|
|
313
|
-
<!--Start PulumiCodeChooser -->
|
314
316
|
```python
|
315
317
|
import pulumi
|
316
318
|
import pulumi_vault as vault
|
@@ -328,7 +330,6 @@ class SecretRole(pulumi.CustomResource):
|
|
328
330
|
service_account_name="Bob",
|
329
331
|
ttl=60)
|
330
332
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
333
|
|
333
334
|
## Import
|
334
335
|
|
@@ -409,7 +410,7 @@ class SecretRole(pulumi.CustomResource):
|
|
409
410
|
:param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
410
411
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
411
412
|
The value should not contain leading or trailing forward slashes.
|
412
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
413
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
413
414
|
*Available only for Vault Enterprise*.
|
414
415
|
:param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
|
415
416
|
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
@@ -455,7 +456,7 @@ class SecretRole(pulumi.CustomResource):
|
|
455
456
|
"""
|
456
457
|
The namespace to provision the resource in.
|
457
458
|
The value should not contain leading or trailing forward slashes.
|
458
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
459
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
459
460
|
*Available only for Vault Enterprise*.
|
460
461
|
"""
|
461
462
|
return pulumi.get(self, "namespace")
|