pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -24,17 +29,12 @@ class SecretRoleArgs:
|
|
24
29
|
user_id: Optional[pulumi.Input[str]] = None):
|
25
30
|
"""
|
26
31
|
The set of arguments for constructing a SecretRole resource.
|
27
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
28
32
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
29
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
30
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
34
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
36
|
*Available only for Vault Enterprise*.
|
34
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
35
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
36
37
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
37
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
38
38
|
"""
|
39
39
|
if backend is not None:
|
40
40
|
pulumi.set(__self__, "backend", backend)
|
@@ -56,9 +56,6 @@ class SecretRoleArgs:
|
|
56
56
|
@property
|
57
57
|
@pulumi.getter
|
58
58
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
59
|
-
"""
|
60
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
61
|
-
"""
|
62
59
|
return pulumi.get(self, "backend")
|
63
60
|
|
64
61
|
@backend.setter
|
@@ -80,9 +77,6 @@ class SecretRoleArgs:
|
|
80
77
|
@property
|
81
78
|
@pulumi.getter
|
82
79
|
def name(self) -> Optional[pulumi.Input[str]]:
|
83
|
-
"""
|
84
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
85
|
-
"""
|
86
80
|
return pulumi.get(self, "name")
|
87
81
|
|
88
82
|
@name.setter
|
@@ -95,7 +89,7 @@ class SecretRoleArgs:
|
|
95
89
|
"""
|
96
90
|
The namespace to provision the resource in.
|
97
91
|
The value should not contain leading or trailing forward slashes.
|
98
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
92
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
99
93
|
*Available only for Vault Enterprise*.
|
100
94
|
"""
|
101
95
|
return pulumi.get(self, "namespace")
|
@@ -107,9 +101,6 @@ class SecretRoleArgs:
|
|
107
101
|
@property
|
108
102
|
@pulumi.getter
|
109
103
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
110
|
-
"""
|
111
|
-
Name of the Terraform Cloud or Enterprise organization
|
112
|
-
"""
|
113
104
|
return pulumi.get(self, "organization")
|
114
105
|
|
115
106
|
@organization.setter
|
@@ -119,9 +110,6 @@ class SecretRoleArgs:
|
|
119
110
|
@property
|
120
111
|
@pulumi.getter(name="teamId")
|
121
112
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
124
|
-
"""
|
125
113
|
return pulumi.get(self, "team_id")
|
126
114
|
|
127
115
|
@team_id.setter
|
@@ -143,9 +131,6 @@ class SecretRoleArgs:
|
|
143
131
|
@property
|
144
132
|
@pulumi.getter(name="userId")
|
145
133
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
146
|
-
"""
|
147
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
148
|
-
"""
|
149
134
|
return pulumi.get(self, "user_id")
|
150
135
|
|
151
136
|
@user_id.setter
|
@@ -166,17 +151,12 @@ class _SecretRoleState:
|
|
166
151
|
user_id: Optional[pulumi.Input[str]] = None):
|
167
152
|
"""
|
168
153
|
Input properties used for looking up and filtering SecretRole resources.
|
169
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
170
154
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
171
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
172
155
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
173
156
|
The value should not contain leading or trailing forward slashes.
|
174
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
175
158
|
*Available only for Vault Enterprise*.
|
176
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
177
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
178
159
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
179
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
180
160
|
"""
|
181
161
|
if backend is not None:
|
182
162
|
pulumi.set(__self__, "backend", backend)
|
@@ -198,9 +178,6 @@ class _SecretRoleState:
|
|
198
178
|
@property
|
199
179
|
@pulumi.getter
|
200
180
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
201
|
-
"""
|
202
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
203
|
-
"""
|
204
181
|
return pulumi.get(self, "backend")
|
205
182
|
|
206
183
|
@backend.setter
|
@@ -222,9 +199,6 @@ class _SecretRoleState:
|
|
222
199
|
@property
|
223
200
|
@pulumi.getter
|
224
201
|
def name(self) -> Optional[pulumi.Input[str]]:
|
225
|
-
"""
|
226
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
227
|
-
"""
|
228
202
|
return pulumi.get(self, "name")
|
229
203
|
|
230
204
|
@name.setter
|
@@ -237,7 +211,7 @@ class _SecretRoleState:
|
|
237
211
|
"""
|
238
212
|
The namespace to provision the resource in.
|
239
213
|
The value should not contain leading or trailing forward slashes.
|
240
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
214
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
241
215
|
*Available only for Vault Enterprise*.
|
242
216
|
"""
|
243
217
|
return pulumi.get(self, "namespace")
|
@@ -249,9 +223,6 @@ class _SecretRoleState:
|
|
249
223
|
@property
|
250
224
|
@pulumi.getter
|
251
225
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
252
|
-
"""
|
253
|
-
Name of the Terraform Cloud or Enterprise organization
|
254
|
-
"""
|
255
226
|
return pulumi.get(self, "organization")
|
256
227
|
|
257
228
|
@organization.setter
|
@@ -261,9 +232,6 @@ class _SecretRoleState:
|
|
261
232
|
@property
|
262
233
|
@pulumi.getter(name="teamId")
|
263
234
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
264
|
-
"""
|
265
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
266
|
-
"""
|
267
235
|
return pulumi.get(self, "team_id")
|
268
236
|
|
269
237
|
@team_id.setter
|
@@ -285,9 +253,6 @@ class _SecretRoleState:
|
|
285
253
|
@property
|
286
254
|
@pulumi.getter(name="userId")
|
287
255
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
288
|
-
"""
|
289
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
290
|
-
"""
|
291
256
|
return pulumi.get(self, "user_id")
|
292
257
|
|
293
258
|
@user_id.setter
|
@@ -312,7 +277,6 @@ class SecretRole(pulumi.CustomResource):
|
|
312
277
|
"""
|
313
278
|
## Example Usage
|
314
279
|
|
315
|
-
<!--Start PulumiCodeChooser -->
|
316
280
|
```python
|
317
281
|
import pulumi
|
318
282
|
import pulumi_vault as vault
|
@@ -323,10 +287,10 @@ class SecretRole(pulumi.CustomResource):
|
|
323
287
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
324
288
|
example = vault.terraformcloud.SecretRole("example",
|
325
289
|
backend=test.backend,
|
290
|
+
name="test-role",
|
326
291
|
organization="example-organization-name",
|
327
292
|
team_id="team-ieF4isC...")
|
328
293
|
```
|
329
|
-
<!--End PulumiCodeChooser -->
|
330
294
|
|
331
295
|
## Import
|
332
296
|
|
@@ -338,17 +302,12 @@ class SecretRole(pulumi.CustomResource):
|
|
338
302
|
|
339
303
|
:param str resource_name: The name of the resource.
|
340
304
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
341
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
342
305
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
343
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
344
306
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
345
307
|
The value should not contain leading or trailing forward slashes.
|
346
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
308
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
347
309
|
*Available only for Vault Enterprise*.
|
348
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
349
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
350
310
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
351
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
352
311
|
"""
|
353
312
|
...
|
354
313
|
@overload
|
@@ -359,7 +318,6 @@ class SecretRole(pulumi.CustomResource):
|
|
359
318
|
"""
|
360
319
|
## Example Usage
|
361
320
|
|
362
|
-
<!--Start PulumiCodeChooser -->
|
363
321
|
```python
|
364
322
|
import pulumi
|
365
323
|
import pulumi_vault as vault
|
@@ -370,10 +328,10 @@ class SecretRole(pulumi.CustomResource):
|
|
370
328
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
371
329
|
example = vault.terraformcloud.SecretRole("example",
|
372
330
|
backend=test.backend,
|
331
|
+
name="test-role",
|
373
332
|
organization="example-organization-name",
|
374
333
|
team_id="team-ieF4isC...")
|
375
334
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
335
|
|
378
336
|
## Import
|
379
337
|
|
@@ -448,17 +406,12 @@ class SecretRole(pulumi.CustomResource):
|
|
448
406
|
:param str resource_name: The unique name of the resulting resource.
|
449
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
450
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
451
|
-
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
452
409
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
453
|
-
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
454
410
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
455
411
|
The value should not contain leading or trailing forward slashes.
|
456
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
412
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
457
413
|
*Available only for Vault Enterprise*.
|
458
|
-
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
459
|
-
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
460
414
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
461
|
-
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
462
415
|
"""
|
463
416
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
464
417
|
|
@@ -477,9 +430,6 @@ class SecretRole(pulumi.CustomResource):
|
|
477
430
|
@property
|
478
431
|
@pulumi.getter
|
479
432
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
480
|
-
"""
|
481
|
-
The path of the Terraform Cloud Secret Backend the role belongs to.
|
482
|
-
"""
|
483
433
|
return pulumi.get(self, "backend")
|
484
434
|
|
485
435
|
@property
|
@@ -493,9 +443,6 @@ class SecretRole(pulumi.CustomResource):
|
|
493
443
|
@property
|
494
444
|
@pulumi.getter
|
495
445
|
def name(self) -> pulumi.Output[str]:
|
496
|
-
"""
|
497
|
-
The name of an existing role against which to create this Terraform Cloud credential
|
498
|
-
"""
|
499
446
|
return pulumi.get(self, "name")
|
500
447
|
|
501
448
|
@property
|
@@ -504,7 +451,7 @@ class SecretRole(pulumi.CustomResource):
|
|
504
451
|
"""
|
505
452
|
The namespace to provision the resource in.
|
506
453
|
The value should not contain leading or trailing forward slashes.
|
507
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
454
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
508
455
|
*Available only for Vault Enterprise*.
|
509
456
|
"""
|
510
457
|
return pulumi.get(self, "namespace")
|
@@ -512,17 +459,11 @@ class SecretRole(pulumi.CustomResource):
|
|
512
459
|
@property
|
513
460
|
@pulumi.getter
|
514
461
|
def organization(self) -> pulumi.Output[Optional[str]]:
|
515
|
-
"""
|
516
|
-
Name of the Terraform Cloud or Enterprise organization
|
517
|
-
"""
|
518
462
|
return pulumi.get(self, "organization")
|
519
463
|
|
520
464
|
@property
|
521
465
|
@pulumi.getter(name="teamId")
|
522
466
|
def team_id(self) -> pulumi.Output[Optional[str]]:
|
523
|
-
"""
|
524
|
-
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
525
|
-
"""
|
526
467
|
return pulumi.get(self, "team_id")
|
527
468
|
|
528
469
|
@property
|
@@ -536,8 +477,5 @@ class SecretRole(pulumi.CustomResource):
|
|
536
477
|
@property
|
537
478
|
@pulumi.getter(name="userId")
|
538
479
|
def user_id(self) -> pulumi.Output[Optional[str]]:
|
539
|
-
"""
|
540
|
-
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
541
|
-
"""
|
542
480
|
return pulumi.get(self, "user_id")
|
543
481
|
|
pulumi_vault/token.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TokenArgs', 'Token']
|
@@ -36,7 +41,7 @@ class TokenArgs:
|
|
36
41
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
37
42
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
38
43
|
The value should not contain leading or trailing forward slashes.
|
39
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
44
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
40
45
|
*Available only for Vault Enterprise*.
|
41
46
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
42
47
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -123,7 +128,7 @@ class TokenArgs:
|
|
123
128
|
"""
|
124
129
|
The namespace to provision the resource in.
|
125
130
|
The value should not contain leading or trailing forward slashes.
|
126
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
131
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
127
132
|
*Available only for Vault Enterprise*.
|
128
133
|
"""
|
129
134
|
return pulumi.get(self, "namespace")
|
@@ -298,7 +303,7 @@ class _TokenState:
|
|
298
303
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
299
304
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
300
305
|
The value should not contain leading or trailing forward slashes.
|
301
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
306
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
307
|
*Available only for Vault Enterprise*.
|
303
308
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
304
309
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -433,7 +438,7 @@ class _TokenState:
|
|
433
438
|
"""
|
434
439
|
The namespace to provision the resource in.
|
435
440
|
The value should not contain leading or trailing forward slashes.
|
436
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
441
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
437
442
|
*Available only for Vault Enterprise*.
|
438
443
|
"""
|
439
444
|
return pulumi.get(self, "namespace")
|
@@ -623,26 +628,24 @@ class Token(pulumi.CustomResource):
|
|
623
628
|
"""
|
624
629
|
## Example Usage
|
625
630
|
|
626
|
-
<!--Start PulumiCodeChooser -->
|
627
631
|
```python
|
628
632
|
import pulumi
|
629
633
|
import pulumi_vault as vault
|
630
634
|
|
631
635
|
example = vault.Token("example",
|
632
|
-
|
633
|
-
"purpose": "service-account",
|
634
|
-
},
|
636
|
+
role_name="app",
|
635
637
|
policies=[
|
636
638
|
"policy1",
|
637
639
|
"policy2",
|
638
640
|
],
|
639
|
-
renew_increment=86400,
|
640
|
-
renew_min_lease=43200,
|
641
641
|
renewable=True,
|
642
|
-
|
643
|
-
|
642
|
+
ttl="24h",
|
643
|
+
renew_min_lease=43200,
|
644
|
+
renew_increment=86400,
|
645
|
+
metadata={
|
646
|
+
"purpose": "service-account",
|
647
|
+
})
|
644
648
|
```
|
645
|
-
<!--End PulumiCodeChooser -->
|
646
649
|
|
647
650
|
## Import
|
648
651
|
|
@@ -659,7 +662,7 @@ class Token(pulumi.CustomResource):
|
|
659
662
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
660
663
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
661
664
|
The value should not contain leading or trailing forward slashes.
|
662
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
665
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
663
666
|
*Available only for Vault Enterprise*.
|
664
667
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
665
668
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -682,26 +685,24 @@ class Token(pulumi.CustomResource):
|
|
682
685
|
"""
|
683
686
|
## Example Usage
|
684
687
|
|
685
|
-
<!--Start PulumiCodeChooser -->
|
686
688
|
```python
|
687
689
|
import pulumi
|
688
690
|
import pulumi_vault as vault
|
689
691
|
|
690
692
|
example = vault.Token("example",
|
691
|
-
|
692
|
-
"purpose": "service-account",
|
693
|
-
},
|
693
|
+
role_name="app",
|
694
694
|
policies=[
|
695
695
|
"policy1",
|
696
696
|
"policy2",
|
697
697
|
],
|
698
|
-
renew_increment=86400,
|
699
|
-
renew_min_lease=43200,
|
700
698
|
renewable=True,
|
701
|
-
|
702
|
-
|
699
|
+
ttl="24h",
|
700
|
+
renew_min_lease=43200,
|
701
|
+
renew_increment=86400,
|
702
|
+
metadata={
|
703
|
+
"purpose": "service-account",
|
704
|
+
})
|
703
705
|
```
|
704
|
-
<!--End PulumiCodeChooser -->
|
705
706
|
|
706
707
|
## Import
|
707
708
|
|
@@ -817,7 +818,7 @@ class Token(pulumi.CustomResource):
|
|
817
818
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
818
819
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
819
820
|
The value should not contain leading or trailing forward slashes.
|
820
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
821
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
821
822
|
*Available only for Vault Enterprise*.
|
822
823
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
823
824
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -913,7 +914,7 @@ class Token(pulumi.CustomResource):
|
|
913
914
|
"""
|
914
915
|
The namespace to provision the resource in.
|
915
916
|
The value should not contain leading or trailing forward slashes.
|
916
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
917
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
917
918
|
*Available only for Vault Enterprise*.
|
918
919
|
"""
|
919
920
|
return pulumi.get(self, "namespace")
|