pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -25,9 +30,6 @@ class SecretBackendArgs:
|
|
25
30
|
token: Optional[pulumi.Input[str]] = None):
|
26
31
|
"""
|
27
32
|
The set of arguments for constructing a SecretBackend resource.
|
28
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
29
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
30
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
31
33
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
32
34
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
33
35
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -38,7 +40,6 @@ class SecretBackendArgs:
|
|
38
40
|
The value should not contain leading or trailing forward slashes.
|
39
41
|
The `namespace` is always relative to the provider's configured namespace.
|
40
42
|
*Available only for Vault Enterprise*.
|
41
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
42
43
|
"""
|
43
44
|
if address is not None:
|
44
45
|
pulumi.set(__self__, "address", address)
|
@@ -62,9 +63,6 @@ class SecretBackendArgs:
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
65
|
def address(self) -> Optional[pulumi.Input[str]]:
|
65
|
-
"""
|
66
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
67
|
-
"""
|
68
66
|
return pulumi.get(self, "address")
|
69
67
|
|
70
68
|
@address.setter
|
@@ -74,9 +72,6 @@ class SecretBackendArgs:
|
|
74
72
|
@property
|
75
73
|
@pulumi.getter
|
76
74
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
77
|
-
"""
|
78
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
79
|
-
"""
|
80
75
|
return pulumi.get(self, "backend")
|
81
76
|
|
82
77
|
@backend.setter
|
@@ -86,9 +81,6 @@ class SecretBackendArgs:
|
|
86
81
|
@property
|
87
82
|
@pulumi.getter(name="basePath")
|
88
83
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
89
|
-
"""
|
90
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
91
|
-
"""
|
92
84
|
return pulumi.get(self, "base_path")
|
93
85
|
|
94
86
|
@base_path.setter
|
@@ -163,9 +155,6 @@ class SecretBackendArgs:
|
|
163
155
|
@property
|
164
156
|
@pulumi.getter
|
165
157
|
def token(self) -> Optional[pulumi.Input[str]]:
|
166
|
-
"""
|
167
|
-
Specifies the Terraform Cloud access token to use.
|
168
|
-
"""
|
169
158
|
return pulumi.get(self, "token")
|
170
159
|
|
171
160
|
@token.setter
|
@@ -187,9 +176,6 @@ class _SecretBackendState:
|
|
187
176
|
token: Optional[pulumi.Input[str]] = None):
|
188
177
|
"""
|
189
178
|
Input properties used for looking up and filtering SecretBackend resources.
|
190
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
191
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
192
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
193
179
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
194
180
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
195
181
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -200,7 +186,6 @@ class _SecretBackendState:
|
|
200
186
|
The value should not contain leading or trailing forward slashes.
|
201
187
|
The `namespace` is always relative to the provider's configured namespace.
|
202
188
|
*Available only for Vault Enterprise*.
|
203
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
204
189
|
"""
|
205
190
|
if address is not None:
|
206
191
|
pulumi.set(__self__, "address", address)
|
@@ -224,9 +209,6 @@ class _SecretBackendState:
|
|
224
209
|
@property
|
225
210
|
@pulumi.getter
|
226
211
|
def address(self) -> Optional[pulumi.Input[str]]:
|
227
|
-
"""
|
228
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
229
|
-
"""
|
230
212
|
return pulumi.get(self, "address")
|
231
213
|
|
232
214
|
@address.setter
|
@@ -236,9 +218,6 @@ class _SecretBackendState:
|
|
236
218
|
@property
|
237
219
|
@pulumi.getter
|
238
220
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
239
|
-
"""
|
240
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
241
|
-
"""
|
242
221
|
return pulumi.get(self, "backend")
|
243
222
|
|
244
223
|
@backend.setter
|
@@ -248,9 +227,6 @@ class _SecretBackendState:
|
|
248
227
|
@property
|
249
228
|
@pulumi.getter(name="basePath")
|
250
229
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
251
|
-
"""
|
252
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
253
|
-
"""
|
254
230
|
return pulumi.get(self, "base_path")
|
255
231
|
|
256
232
|
@base_path.setter
|
@@ -325,9 +301,6 @@ class _SecretBackendState:
|
|
325
301
|
@property
|
326
302
|
@pulumi.getter
|
327
303
|
def token(self) -> Optional[pulumi.Input[str]]:
|
328
|
-
"""
|
329
|
-
Specifies the Terraform Cloud access token to use.
|
330
|
-
"""
|
331
304
|
return pulumi.get(self, "token")
|
332
305
|
|
333
306
|
@token.setter
|
@@ -353,7 +326,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
353
326
|
"""
|
354
327
|
## Example Usage
|
355
328
|
|
356
|
-
<!--Start PulumiCodeChooser -->
|
357
329
|
```python
|
358
330
|
import pulumi
|
359
331
|
import pulumi_vault as vault
|
@@ -363,7 +335,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
363
335
|
description="Manages the Terraform Cloud backend",
|
364
336
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
365
337
|
```
|
366
|
-
<!--End PulumiCodeChooser -->
|
367
338
|
|
368
339
|
## Import
|
369
340
|
|
@@ -375,9 +346,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
375
346
|
|
376
347
|
:param str resource_name: The name of the resource.
|
377
348
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
378
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
379
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
380
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
381
349
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
382
350
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
383
351
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -388,7 +356,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
388
356
|
The value should not contain leading or trailing forward slashes.
|
389
357
|
The `namespace` is always relative to the provider's configured namespace.
|
390
358
|
*Available only for Vault Enterprise*.
|
391
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
392
359
|
"""
|
393
360
|
...
|
394
361
|
@overload
|
@@ -399,7 +366,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
399
366
|
"""
|
400
367
|
## Example Usage
|
401
368
|
|
402
|
-
<!--Start PulumiCodeChooser -->
|
403
369
|
```python
|
404
370
|
import pulumi
|
405
371
|
import pulumi_vault as vault
|
@@ -409,7 +375,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
409
375
|
description="Manages the Terraform Cloud backend",
|
410
376
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
411
377
|
```
|
412
|
-
<!--End PulumiCodeChooser -->
|
413
378
|
|
414
379
|
## Import
|
415
380
|
|
@@ -489,9 +454,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
489
454
|
:param str resource_name: The unique name of the resulting resource.
|
490
455
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
491
456
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
492
|
-
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
493
|
-
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
494
|
-
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
495
457
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
496
458
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
497
459
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -502,7 +464,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
502
464
|
The value should not contain leading or trailing forward slashes.
|
503
465
|
The `namespace` is always relative to the provider's configured namespace.
|
504
466
|
*Available only for Vault Enterprise*.
|
505
|
-
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
506
467
|
"""
|
507
468
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
508
469
|
|
@@ -522,25 +483,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
522
483
|
@property
|
523
484
|
@pulumi.getter
|
524
485
|
def address(self) -> pulumi.Output[Optional[str]]:
|
525
|
-
"""
|
526
|
-
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
527
|
-
"""
|
528
486
|
return pulumi.get(self, "address")
|
529
487
|
|
530
488
|
@property
|
531
489
|
@pulumi.getter
|
532
490
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
533
|
-
"""
|
534
|
-
Unique name of the Vault Terraform Cloud mount to configure
|
535
|
-
"""
|
536
491
|
return pulumi.get(self, "backend")
|
537
492
|
|
538
493
|
@property
|
539
494
|
@pulumi.getter(name="basePath")
|
540
495
|
def base_path(self) -> pulumi.Output[Optional[str]]:
|
541
|
-
"""
|
542
|
-
Specifies the base path for the Terraform Cloud or Enterprise API.
|
543
|
-
"""
|
544
496
|
return pulumi.get(self, "base_path")
|
545
497
|
|
546
498
|
@property
|
@@ -591,8 +543,5 @@ class SecretBackend(pulumi.CustomResource):
|
|
591
543
|
@property
|
592
544
|
@pulumi.getter
|
593
545
|
def token(self) -> pulumi.Output[Optional[str]]:
|
594
|
-
"""
|
595
|
-
Specifies the Terraform Cloud access token to use.
|
596
|
-
"""
|
597
546
|
return pulumi.get(self, "token")
|
598
547
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -19,11 +24,10 @@ class SecretCredsArgs:
|
|
19
24
|
namespace: Optional[pulumi.Input[str]] = None):
|
20
25
|
"""
|
21
26
|
The set of arguments for constructing a SecretCreds resource.
|
22
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
23
27
|
:param pulumi.Input[str] role: Name of the role.
|
24
28
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
29
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
30
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
31
|
*Available only for Vault Enterprise*.
|
28
32
|
"""
|
29
33
|
pulumi.set(__self__, "backend", backend)
|
@@ -34,9 +38,6 @@ class SecretCredsArgs:
|
|
34
38
|
@property
|
35
39
|
@pulumi.getter
|
36
40
|
def backend(self) -> pulumi.Input[str]:
|
37
|
-
"""
|
38
|
-
Terraform Cloud secret backend to generate tokens from
|
39
|
-
"""
|
40
41
|
return pulumi.get(self, "backend")
|
41
42
|
|
42
43
|
@backend.setter
|
@@ -61,7 +62,7 @@ class SecretCredsArgs:
|
|
61
62
|
"""
|
62
63
|
The namespace to provision the resource in.
|
63
64
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
65
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
66
|
*Available only for Vault Enterprise*.
|
66
67
|
"""
|
67
68
|
return pulumi.get(self, "namespace")
|
@@ -84,12 +85,11 @@ class _SecretCredsState:
|
|
84
85
|
token_id: Optional[pulumi.Input[str]] = None):
|
85
86
|
"""
|
86
87
|
Input properties used for looking up and filtering SecretCreds resources.
|
87
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
88
88
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
89
89
|
Vault lease associated with them.
|
90
90
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
91
91
|
The value should not contain leading or trailing forward slashes.
|
92
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
92
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
93
93
|
*Available only for Vault Enterprise*.
|
94
94
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
95
95
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -119,9 +119,6 @@ class _SecretCredsState:
|
|
119
119
|
@property
|
120
120
|
@pulumi.getter
|
121
121
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
Terraform Cloud secret backend to generate tokens from
|
124
|
-
"""
|
125
122
|
return pulumi.get(self, "backend")
|
126
123
|
|
127
124
|
@backend.setter
|
@@ -147,7 +144,7 @@ class _SecretCredsState:
|
|
147
144
|
"""
|
148
145
|
The namespace to provision the resource in.
|
149
146
|
The value should not contain leading or trailing forward slashes.
|
150
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
151
148
|
*Available only for Vault Enterprise*.
|
152
149
|
"""
|
153
150
|
return pulumi.get(self, "namespace")
|
@@ -231,7 +228,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
231
228
|
"""
|
232
229
|
## Example Usage
|
233
230
|
|
234
|
-
<!--Start PulumiCodeChooser -->
|
235
231
|
```python
|
236
232
|
import pulumi
|
237
233
|
import pulumi_vault as vault
|
@@ -242,20 +238,19 @@ class SecretCreds(pulumi.CustomResource):
|
|
242
238
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
243
239
|
example = vault.terraformcloud.SecretRole("example",
|
244
240
|
backend=test.backend,
|
241
|
+
name="test-role",
|
245
242
|
organization="example-organization-name",
|
246
243
|
team_id="team-ieF4isC...")
|
247
244
|
token = vault.terraformcloud.SecretCreds("token",
|
248
245
|
backend=test.backend,
|
249
246
|
role=example.name)
|
250
247
|
```
|
251
|
-
<!--End PulumiCodeChooser -->
|
252
248
|
|
253
249
|
:param str resource_name: The name of the resource.
|
254
250
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
255
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
256
251
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
257
252
|
The value should not contain leading or trailing forward slashes.
|
258
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
253
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
259
254
|
*Available only for Vault Enterprise*.
|
260
255
|
:param pulumi.Input[str] role: Name of the role.
|
261
256
|
"""
|
@@ -268,7 +263,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
268
263
|
"""
|
269
264
|
## Example Usage
|
270
265
|
|
271
|
-
<!--Start PulumiCodeChooser -->
|
272
266
|
```python
|
273
267
|
import pulumi
|
274
268
|
import pulumi_vault as vault
|
@@ -279,13 +273,13 @@ class SecretCreds(pulumi.CustomResource):
|
|
279
273
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
280
274
|
example = vault.terraformcloud.SecretRole("example",
|
281
275
|
backend=test.backend,
|
276
|
+
name="test-role",
|
282
277
|
organization="example-organization-name",
|
283
278
|
team_id="team-ieF4isC...")
|
284
279
|
token = vault.terraformcloud.SecretCreds("token",
|
285
280
|
backend=test.backend,
|
286
281
|
role=example.name)
|
287
282
|
```
|
288
|
-
<!--End PulumiCodeChooser -->
|
289
283
|
|
290
284
|
:param str resource_name: The name of the resource.
|
291
285
|
:param SecretCredsArgs args: The arguments to use to populate this resource's properties.
|
@@ -353,12 +347,11 @@ class SecretCreds(pulumi.CustomResource):
|
|
353
347
|
:param str resource_name: The unique name of the resulting resource.
|
354
348
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
355
349
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
356
|
-
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
357
350
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
358
351
|
Vault lease associated with them.
|
359
352
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
360
353
|
The value should not contain leading or trailing forward slashes.
|
361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
354
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
362
355
|
*Available only for Vault Enterprise*.
|
363
356
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
364
357
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -385,9 +378,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
385
378
|
@property
|
386
379
|
@pulumi.getter
|
387
380
|
def backend(self) -> pulumi.Output[str]:
|
388
|
-
"""
|
389
|
-
Terraform Cloud secret backend to generate tokens from
|
390
|
-
"""
|
391
381
|
return pulumi.get(self, "backend")
|
392
382
|
|
393
383
|
@property
|
@@ -405,7 +395,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
405
395
|
"""
|
406
396
|
The namespace to provision the resource in.
|
407
397
|
The value should not contain leading or trailing forward slashes.
|
408
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
409
399
|
*Available only for Vault Enterprise*.
|
410
400
|
"""
|
411
401
|
return pulumi.get(self, "namespace")
|