pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +24 -0
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/ad/secret_backend.py +7 -138
- pulumi_vault/ad/secret_library.py +7 -7
- pulumi_vault/ad/secret_role.py +7 -7
- pulumi_vault/approle/auth_backend_login.py +7 -7
- pulumi_vault/approle/auth_backend_role.py +7 -7
- pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
- pulumi_vault/audit.py +7 -7
- pulumi_vault/auth_backend.py +7 -7
- pulumi_vault/aws/auth_backend_cert.py +7 -7
- pulumi_vault/aws/auth_backend_client.py +7 -7
- pulumi_vault/aws/auth_backend_config_identity.py +7 -7
- pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
- pulumi_vault/aws/auth_backend_login.py +7 -7
- pulumi_vault/aws/auth_backend_role.py +7 -7
- pulumi_vault/aws/auth_backend_role_tag.py +7 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
- pulumi_vault/aws/auth_backend_sts_role.py +7 -7
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +7 -7
- pulumi_vault/aws/secret_backend_role.py +7 -7
- pulumi_vault/aws/secret_backend_static_role.py +7 -7
- pulumi_vault/azure/auth_backend_config.py +7 -7
- pulumi_vault/azure/auth_backend_role.py +7 -7
- pulumi_vault/azure/backend.py +7 -7
- pulumi_vault/azure/backend_role.py +7 -7
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/cert_auth_backend_role.py +7 -63
- pulumi_vault/config/_inputs.py +52 -0
- pulumi_vault/config/outputs.py +30 -0
- pulumi_vault/config/ui_custom_message.py +524 -0
- pulumi_vault/consul/secret_backend.py +7 -7
- pulumi_vault/consul/secret_backend_role.py +7 -76
- pulumi_vault/egp_policy.py +7 -7
- pulumi_vault/gcp/auth_backend.py +7 -7
- pulumi_vault/gcp/auth_backend_role.py +7 -7
- pulumi_vault/gcp/secret_backend.py +7 -7
- pulumi_vault/gcp/secret_roleset.py +7 -7
- pulumi_vault/gcp/secret_static_account.py +7 -7
- pulumi_vault/generic/endpoint.py +7 -7
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/generic/secret.py +7 -7
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +20 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/github/auth_backend.py +7 -7
- pulumi_vault/github/team.py +7 -7
- pulumi_vault/github/user.py +7 -7
- pulumi_vault/identity/entity.py +7 -7
- pulumi_vault/identity/entity_alias.py +7 -7
- pulumi_vault/identity/entity_policies.py +7 -7
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/identity/group.py +7 -7
- pulumi_vault/identity/group_alias.py +7 -7
- pulumi_vault/identity/group_member_entity_ids.py +7 -58
- pulumi_vault/identity/group_member_group_ids.py +7 -7
- pulumi_vault/identity/group_policies.py +7 -7
- pulumi_vault/identity/oidc.py +7 -7
- pulumi_vault/identity/oidc_assignment.py +7 -7
- pulumi_vault/identity/oidc_client.py +19 -15
- pulumi_vault/identity/oidc_key.py +7 -7
- pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
- pulumi_vault/identity/oidc_provider.py +7 -7
- pulumi_vault/identity/oidc_role.py +7 -7
- pulumi_vault/identity/oidc_scope.py +7 -7
- pulumi_vault/jwt/auth_backend.py +7 -7
- pulumi_vault/jwt/auth_backend_role.py +7 -7
- pulumi_vault/kmip/secret_backend.py +7 -7
- pulumi_vault/kmip/secret_role.py +7 -7
- pulumi_vault/kmip/secret_scope.py +7 -7
- pulumi_vault/kubernetes/auth_backend_role.py +7 -7
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kubernetes/secret_backend.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +7 -7
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +5 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/kv/secret.py +7 -7
- pulumi_vault/kv/secret_backend_v2.py +7 -7
- pulumi_vault/kv/secret_v2.py +7 -7
- pulumi_vault/ldap/auth_backend.py +7 -7
- pulumi_vault/ldap/auth_backend_group.py +7 -7
- pulumi_vault/ldap/auth_backend_user.py +7 -7
- pulumi_vault/ldap/secret_backend.py +61 -76
- pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
- pulumi_vault/ldap/secret_backend_library_set.py +7 -7
- pulumi_vault/ldap/secret_backend_static_role.py +62 -8
- pulumi_vault/mfa_duo.py +7 -7
- pulumi_vault/mfa_okta.py +7 -7
- pulumi_vault/mfa_pingid.py +7 -7
- pulumi_vault/mfa_totp.py +7 -7
- pulumi_vault/mongodbatlas/secret_backend.py +7 -7
- pulumi_vault/mongodbatlas/secret_role.py +7 -7
- pulumi_vault/mount.py +11 -7
- pulumi_vault/namespace.py +7 -7
- pulumi_vault/nomad_secret_backend.py +7 -7
- pulumi_vault/nomad_secret_role.py +7 -7
- pulumi_vault/okta/auth_backend.py +7 -7
- pulumi_vault/okta/auth_backend_group.py +7 -7
- pulumi_vault/okta/auth_backend_user.py +7 -7
- pulumi_vault/password_policy.py +7 -7
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
- pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
- pulumi_vault/pkisecret/secret_backend_key.py +7 -7
- pulumi_vault/pkisecret/secret_backend_role.py +7 -7
- pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
- pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
- pulumi_vault/policy.py +7 -7
- pulumi_vault/rabbitmq/secret_backend.py +7 -7
- pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
- pulumi_vault/raft_autopilot.py +7 -7
- pulumi_vault/raft_snapshot_agent_config.py +7 -7
- pulumi_vault/rgp_policy.py +7 -7
- pulumi_vault/saml/auth_backend.py +7 -7
- pulumi_vault/saml/auth_backend_role.py +7 -7
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/sync_association.py +7 -7
- pulumi_vault/secrets/sync_aws_destination.py +161 -7
- pulumi_vault/secrets/sync_azure_destination.py +7 -7
- pulumi_vault/secrets/sync_gcp_destination.py +77 -7
- pulumi_vault/secrets/sync_gh_destination.py +122 -7
- pulumi_vault/secrets/sync_github_apps.py +370 -0
- pulumi_vault/secrets/sync_vercel_destination.py +7 -7
- pulumi_vault/ssh/secret_backend_ca.py +7 -7
- pulumi_vault/ssh/secret_backend_role.py +7 -83
- pulumi_vault/terraformcloud/secret_creds.py +7 -7
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/token.py +7 -7
- pulumi_vault/tokenauth/auth_backend_role.py +7 -7
- pulumi_vault/transform/alphabet.py +7 -7
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transform/role.py +7 -7
- pulumi_vault/transform/template.py +7 -7
- pulumi_vault/transform/transformation.py +7 -7
- pulumi_vault/transit/secret_backend_key.py +7 -84
- pulumi_vault/transit/secret_cache_config.py +7 -7
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.0.0.dist-info/RECORD +248 -0
- pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -28,7 +28,6 @@ class SecretBackendArgs:
|
|
28
28
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
29
29
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
30
30
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
31
|
-
length: Optional[pulumi.Input[int]] = None,
|
32
31
|
local: Optional[pulumi.Input[bool]] = None,
|
33
32
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
34
33
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -38,6 +37,7 @@ class SecretBackendArgs:
|
|
38
37
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
39
38
|
schema: Optional[pulumi.Input[str]] = None,
|
40
39
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
40
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
|
41
41
|
starttls: Optional[pulumi.Input[bool]] = None,
|
42
42
|
upndomain: Optional[pulumi.Input[str]] = None,
|
43
43
|
url: Optional[pulumi.Input[str]] = None,
|
@@ -62,14 +62,12 @@ class SecretBackendArgs:
|
|
62
62
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
63
63
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
64
64
|
Defaults to `false`.
|
65
|
-
:param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
66
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
67
65
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
68
66
|
replication.Tolerance duration to use when checking the last rotation time.
|
69
67
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
70
68
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
71
69
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
70
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
71
|
*Available only for Vault Enterprise*.
|
74
72
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
75
73
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
@@ -79,6 +77,8 @@ class SecretBackendArgs:
|
|
79
77
|
before returning back an error.
|
80
78
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
81
79
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
80
|
+
:param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
81
|
+
Defaults to false. Requires Vault 1.16 or above.
|
82
82
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
83
83
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
84
84
|
:param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
@@ -112,11 +112,6 @@ class SecretBackendArgs:
|
|
112
112
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
113
113
|
if insecure_tls is not None:
|
114
114
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
115
|
-
if length is not None:
|
116
|
-
warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
|
117
|
-
pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
|
118
|
-
if length is not None:
|
119
|
-
pulumi.set(__self__, "length", length)
|
120
115
|
if local is not None:
|
121
116
|
pulumi.set(__self__, "local", local)
|
122
117
|
if max_lease_ttl_seconds is not None:
|
@@ -135,6 +130,8 @@ class SecretBackendArgs:
|
|
135
130
|
pulumi.set(__self__, "schema", schema)
|
136
131
|
if seal_wrap is not None:
|
137
132
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
133
|
+
if skip_static_role_import_rotation is not None:
|
134
|
+
pulumi.set(__self__, "skip_static_role_import_rotation", skip_static_role_import_rotation)
|
138
135
|
if starttls is not None:
|
139
136
|
pulumi.set(__self__, "starttls", starttls)
|
140
137
|
if upndomain is not None:
|
@@ -317,22 +314,6 @@ class SecretBackendArgs:
|
|
317
314
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
318
315
|
pulumi.set(self, "insecure_tls", value)
|
319
316
|
|
320
|
-
@property
|
321
|
-
@pulumi.getter
|
322
|
-
def length(self) -> Optional[pulumi.Input[int]]:
|
323
|
-
"""
|
324
|
-
**Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
325
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
326
|
-
"""
|
327
|
-
warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
|
328
|
-
pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
|
329
|
-
|
330
|
-
return pulumi.get(self, "length")
|
331
|
-
|
332
|
-
@length.setter
|
333
|
-
def length(self, value: Optional[pulumi.Input[int]]):
|
334
|
-
pulumi.set(self, "length", value)
|
335
|
-
|
336
317
|
@property
|
337
318
|
@pulumi.getter
|
338
319
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -364,7 +345,7 @@ class SecretBackendArgs:
|
|
364
345
|
"""
|
365
346
|
The namespace to provision the resource in.
|
366
347
|
The value should not contain leading or trailing forward slashes.
|
367
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
348
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
349
|
*Available only for Vault Enterprise*.
|
369
350
|
"""
|
370
351
|
return pulumi.get(self, "namespace")
|
@@ -447,6 +428,19 @@ class SecretBackendArgs:
|
|
447
428
|
def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
|
448
429
|
pulumi.set(self, "seal_wrap", value)
|
449
430
|
|
431
|
+
@property
|
432
|
+
@pulumi.getter(name="skipStaticRoleImportRotation")
|
433
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
434
|
+
"""
|
435
|
+
If set to true, static roles will not be rotated during import.
|
436
|
+
Defaults to false. Requires Vault 1.16 or above.
|
437
|
+
"""
|
438
|
+
return pulumi.get(self, "skip_static_role_import_rotation")
|
439
|
+
|
440
|
+
@skip_static_role_import_rotation.setter
|
441
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
442
|
+
pulumi.set(self, "skip_static_role_import_rotation", value)
|
443
|
+
|
450
444
|
@property
|
451
445
|
@pulumi.getter
|
452
446
|
def starttls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -527,7 +521,6 @@ class _SecretBackendState:
|
|
527
521
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
528
522
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
529
523
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
530
|
-
length: Optional[pulumi.Input[int]] = None,
|
531
524
|
local: Optional[pulumi.Input[bool]] = None,
|
532
525
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
533
526
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -537,6 +530,7 @@ class _SecretBackendState:
|
|
537
530
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
538
531
|
schema: Optional[pulumi.Input[str]] = None,
|
539
532
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
533
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
|
540
534
|
starttls: Optional[pulumi.Input[bool]] = None,
|
541
535
|
upndomain: Optional[pulumi.Input[str]] = None,
|
542
536
|
url: Optional[pulumi.Input[str]] = None,
|
@@ -562,14 +556,12 @@ class _SecretBackendState:
|
|
562
556
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
563
557
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
564
558
|
Defaults to `false`.
|
565
|
-
:param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
566
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
567
559
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
568
560
|
replication.Tolerance duration to use when checking the last rotation time.
|
569
561
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
570
562
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
571
563
|
The value should not contain leading or trailing forward slashes.
|
572
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
564
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
573
565
|
*Available only for Vault Enterprise*.
|
574
566
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
575
567
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
@@ -579,6 +571,8 @@ class _SecretBackendState:
|
|
579
571
|
before returning back an error.
|
580
572
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
581
573
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
574
|
+
:param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
575
|
+
Defaults to false. Requires Vault 1.16 or above.
|
582
576
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
583
577
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
584
578
|
:param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
@@ -616,11 +610,6 @@ class _SecretBackendState:
|
|
616
610
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
617
611
|
if insecure_tls is not None:
|
618
612
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
619
|
-
if length is not None:
|
620
|
-
warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
|
621
|
-
pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
|
622
|
-
if length is not None:
|
623
|
-
pulumi.set(__self__, "length", length)
|
624
613
|
if local is not None:
|
625
614
|
pulumi.set(__self__, "local", local)
|
626
615
|
if max_lease_ttl_seconds is not None:
|
@@ -639,6 +628,8 @@ class _SecretBackendState:
|
|
639
628
|
pulumi.set(__self__, "schema", schema)
|
640
629
|
if seal_wrap is not None:
|
641
630
|
pulumi.set(__self__, "seal_wrap", seal_wrap)
|
631
|
+
if skip_static_role_import_rotation is not None:
|
632
|
+
pulumi.set(__self__, "skip_static_role_import_rotation", skip_static_role_import_rotation)
|
642
633
|
if starttls is not None:
|
643
634
|
pulumi.set(__self__, "starttls", starttls)
|
644
635
|
if upndomain is not None:
|
@@ -833,22 +824,6 @@ class _SecretBackendState:
|
|
833
824
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
834
825
|
pulumi.set(self, "insecure_tls", value)
|
835
826
|
|
836
|
-
@property
|
837
|
-
@pulumi.getter
|
838
|
-
def length(self) -> Optional[pulumi.Input[int]]:
|
839
|
-
"""
|
840
|
-
**Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
841
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
842
|
-
"""
|
843
|
-
warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
|
844
|
-
pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
|
845
|
-
|
846
|
-
return pulumi.get(self, "length")
|
847
|
-
|
848
|
-
@length.setter
|
849
|
-
def length(self, value: Optional[pulumi.Input[int]]):
|
850
|
-
pulumi.set(self, "length", value)
|
851
|
-
|
852
827
|
@property
|
853
828
|
@pulumi.getter
|
854
829
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -880,7 +855,7 @@ class _SecretBackendState:
|
|
880
855
|
"""
|
881
856
|
The namespace to provision the resource in.
|
882
857
|
The value should not contain leading or trailing forward slashes.
|
883
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
858
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
884
859
|
*Available only for Vault Enterprise*.
|
885
860
|
"""
|
886
861
|
return pulumi.get(self, "namespace")
|
@@ -963,6 +938,19 @@ class _SecretBackendState:
|
|
963
938
|
def seal_wrap(self, value: Optional[pulumi.Input[bool]]):
|
964
939
|
pulumi.set(self, "seal_wrap", value)
|
965
940
|
|
941
|
+
@property
|
942
|
+
@pulumi.getter(name="skipStaticRoleImportRotation")
|
943
|
+
def skip_static_role_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
944
|
+
"""
|
945
|
+
If set to true, static roles will not be rotated during import.
|
946
|
+
Defaults to false. Requires Vault 1.16 or above.
|
947
|
+
"""
|
948
|
+
return pulumi.get(self, "skip_static_role_import_rotation")
|
949
|
+
|
950
|
+
@skip_static_role_import_rotation.setter
|
951
|
+
def skip_static_role_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
952
|
+
pulumi.set(self, "skip_static_role_import_rotation", value)
|
953
|
+
|
966
954
|
@property
|
967
955
|
@pulumi.getter
|
968
956
|
def starttls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1044,7 +1032,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1044
1032
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1045
1033
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1046
1034
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1047
|
-
length: Optional[pulumi.Input[int]] = None,
|
1048
1035
|
local: Optional[pulumi.Input[bool]] = None,
|
1049
1036
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1050
1037
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -1054,6 +1041,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1054
1041
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1055
1042
|
schema: Optional[pulumi.Input[str]] = None,
|
1056
1043
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1044
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
|
1057
1045
|
starttls: Optional[pulumi.Input[bool]] = None,
|
1058
1046
|
upndomain: Optional[pulumi.Input[str]] = None,
|
1059
1047
|
url: Optional[pulumi.Input[str]] = None,
|
@@ -1105,14 +1093,12 @@ class SecretBackend(pulumi.CustomResource):
|
|
1105
1093
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1106
1094
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1107
1095
|
Defaults to `false`.
|
1108
|
-
:param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
1109
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
1110
1096
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1111
1097
|
replication.Tolerance duration to use when checking the last rotation time.
|
1112
1098
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1113
1099
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1114
1100
|
The value should not contain leading or trailing forward slashes.
|
1115
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1101
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1116
1102
|
*Available only for Vault Enterprise*.
|
1117
1103
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1118
1104
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
@@ -1122,6 +1108,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
1122
1108
|
before returning back an error.
|
1123
1109
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1124
1110
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1111
|
+
:param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1112
|
+
Defaults to false. Requires Vault 1.16 or above.
|
1125
1113
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1126
1114
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1127
1115
|
:param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
@@ -1190,7 +1178,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1190
1178
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1191
1179
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1192
1180
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1193
|
-
length: Optional[pulumi.Input[int]] = None,
|
1194
1181
|
local: Optional[pulumi.Input[bool]] = None,
|
1195
1182
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1196
1183
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -1200,6 +1187,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1200
1187
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1201
1188
|
schema: Optional[pulumi.Input[str]] = None,
|
1202
1189
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1190
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
|
1203
1191
|
starttls: Optional[pulumi.Input[bool]] = None,
|
1204
1192
|
upndomain: Optional[pulumi.Input[str]] = None,
|
1205
1193
|
url: Optional[pulumi.Input[str]] = None,
|
@@ -1232,7 +1220,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1232
1220
|
__props__.__dict__["disable_remount"] = disable_remount
|
1233
1221
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1234
1222
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1235
|
-
__props__.__dict__["length"] = length
|
1236
1223
|
__props__.__dict__["local"] = local
|
1237
1224
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1238
1225
|
__props__.__dict__["namespace"] = namespace
|
@@ -1242,6 +1229,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1242
1229
|
__props__.__dict__["request_timeout"] = request_timeout
|
1243
1230
|
__props__.__dict__["schema"] = schema
|
1244
1231
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
1232
|
+
__props__.__dict__["skip_static_role_import_rotation"] = skip_static_role_import_rotation
|
1245
1233
|
__props__.__dict__["starttls"] = starttls
|
1246
1234
|
__props__.__dict__["upndomain"] = upndomain
|
1247
1235
|
__props__.__dict__["url"] = url
|
@@ -1275,7 +1263,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1275
1263
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1276
1264
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1277
1265
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1278
|
-
length: Optional[pulumi.Input[int]] = None,
|
1279
1266
|
local: Optional[pulumi.Input[bool]] = None,
|
1280
1267
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1281
1268
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -1285,6 +1272,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1285
1272
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1286
1273
|
schema: Optional[pulumi.Input[str]] = None,
|
1287
1274
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1275
|
+
skip_static_role_import_rotation: Optional[pulumi.Input[bool]] = None,
|
1288
1276
|
starttls: Optional[pulumi.Input[bool]] = None,
|
1289
1277
|
upndomain: Optional[pulumi.Input[str]] = None,
|
1290
1278
|
url: Optional[pulumi.Input[str]] = None,
|
@@ -1315,14 +1303,12 @@ class SecretBackend(pulumi.CustomResource):
|
|
1315
1303
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1316
1304
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1317
1305
|
Defaults to `false`.
|
1318
|
-
:param pulumi.Input[int] length: **Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
1319
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
1320
1306
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1321
1307
|
replication.Tolerance duration to use when checking the last rotation time.
|
1322
1308
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1323
1309
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1324
1310
|
The value should not contain leading or trailing forward slashes.
|
1325
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1311
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1326
1312
|
*Available only for Vault Enterprise*.
|
1327
1313
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1328
1314
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
@@ -1332,6 +1318,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
1332
1318
|
before returning back an error.
|
1333
1319
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1334
1320
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1321
|
+
:param pulumi.Input[bool] skip_static_role_import_rotation: If set to true, static roles will not be rotated during import.
|
1322
|
+
Defaults to false. Requires Vault 1.16 or above.
|
1335
1323
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1336
1324
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
1337
1325
|
:param pulumi.Input[str] url: LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
@@ -1358,7 +1346,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1358
1346
|
__props__.__dict__["disable_remount"] = disable_remount
|
1359
1347
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1360
1348
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1361
|
-
__props__.__dict__["length"] = length
|
1362
1349
|
__props__.__dict__["local"] = local
|
1363
1350
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1364
1351
|
__props__.__dict__["namespace"] = namespace
|
@@ -1368,6 +1355,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1368
1355
|
__props__.__dict__["request_timeout"] = request_timeout
|
1369
1356
|
__props__.__dict__["schema"] = schema
|
1370
1357
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
1358
|
+
__props__.__dict__["skip_static_role_import_rotation"] = skip_static_role_import_rotation
|
1371
1359
|
__props__.__dict__["starttls"] = starttls
|
1372
1360
|
__props__.__dict__["upndomain"] = upndomain
|
1373
1361
|
__props__.__dict__["url"] = url
|
@@ -1498,18 +1486,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1498
1486
|
"""
|
1499
1487
|
return pulumi.get(self, "insecure_tls")
|
1500
1488
|
|
1501
|
-
@property
|
1502
|
-
@pulumi.getter
|
1503
|
-
def length(self) -> pulumi.Output[int]:
|
1504
|
-
"""
|
1505
|
-
**Deprecated** use `password_policy`. The desired length of passwords that Vault generates.
|
1506
|
-
*Mutually exclusive with `password_policy` on vault-1.11+*
|
1507
|
-
"""
|
1508
|
-
warnings.warn("""Length is deprecated and password_policy should be used with Vault >= 1.5.""", DeprecationWarning)
|
1509
|
-
pulumi.log.warn("""length is deprecated: Length is deprecated and password_policy should be used with Vault >= 1.5.""")
|
1510
|
-
|
1511
|
-
return pulumi.get(self, "length")
|
1512
|
-
|
1513
1489
|
@property
|
1514
1490
|
@pulumi.getter
|
1515
1491
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1533,7 +1509,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1533
1509
|
"""
|
1534
1510
|
The namespace to provision the resource in.
|
1535
1511
|
The value should not contain leading or trailing forward slashes.
|
1536
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1512
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1537
1513
|
*Available only for Vault Enterprise*.
|
1538
1514
|
"""
|
1539
1515
|
return pulumi.get(self, "namespace")
|
@@ -1588,6 +1564,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
1588
1564
|
"""
|
1589
1565
|
return pulumi.get(self, "seal_wrap")
|
1590
1566
|
|
1567
|
+
@property
|
1568
|
+
@pulumi.getter(name="skipStaticRoleImportRotation")
|
1569
|
+
def skip_static_role_import_rotation(self) -> pulumi.Output[Optional[bool]]:
|
1570
|
+
"""
|
1571
|
+
If set to true, static roles will not be rotated during import.
|
1572
|
+
Defaults to false. Requires Vault 1.16 or above.
|
1573
|
+
"""
|
1574
|
+
return pulumi.get(self, "skip_static_role_import_rotation")
|
1575
|
+
|
1591
1576
|
@property
|
1592
1577
|
@pulumi.getter
|
1593
1578
|
def starttls(self) -> pulumi.Output[bool]:
|
@@ -46,7 +46,7 @@ class SecretBackendDynamicRoleArgs:
|
|
46
46
|
not begin or end with a `/`. Defaults to `ldap`.
|
47
47
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
48
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
49
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
50
|
*Available only for Vault Enterprise*.
|
51
51
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
52
52
|
rollback any changes in the event that execution of the `creation_ldif` results
|
@@ -165,7 +165,7 @@ class SecretBackendDynamicRoleArgs:
|
|
165
165
|
"""
|
166
166
|
The namespace to provision the resource in.
|
167
167
|
The value should not contain leading or trailing forward slashes.
|
168
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
168
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
169
169
|
*Available only for Vault Enterprise*.
|
170
170
|
"""
|
171
171
|
return pulumi.get(self, "namespace")
|
@@ -240,7 +240,7 @@ class _SecretBackendDynamicRoleState:
|
|
240
240
|
not begin or end with a `/`. Defaults to `ldap`.
|
241
241
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
242
242
|
The value should not contain leading or trailing forward slashes.
|
243
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
243
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
244
244
|
*Available only for Vault Enterprise*.
|
245
245
|
:param pulumi.Input[str] role_name: Name of the role.
|
246
246
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -351,7 +351,7 @@ class _SecretBackendDynamicRoleState:
|
|
351
351
|
"""
|
352
352
|
The namespace to provision the resource in.
|
353
353
|
The value should not contain leading or trailing forward slashes.
|
354
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
354
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
355
355
|
*Available only for Vault Enterprise*.
|
356
356
|
"""
|
357
357
|
return pulumi.get(self, "namespace")
|
@@ -484,7 +484,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
484
484
|
not begin or end with a `/`. Defaults to `ldap`.
|
485
485
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
486
486
|
The value should not contain leading or trailing forward slashes.
|
487
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
487
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
488
488
|
*Available only for Vault Enterprise*.
|
489
489
|
:param pulumi.Input[str] role_name: Name of the role.
|
490
490
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -640,7 +640,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
640
640
|
not begin or end with a `/`. Defaults to `ldap`.
|
641
641
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
642
642
|
The value should not contain leading or trailing forward slashes.
|
643
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
643
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
644
644
|
*Available only for Vault Enterprise*.
|
645
645
|
:param pulumi.Input[str] role_name: Name of the role.
|
646
646
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -727,7 +727,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
727
727
|
"""
|
728
728
|
The namespace to provision the resource in.
|
729
729
|
The value should not contain leading or trailing forward slashes.
|
730
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
730
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
731
731
|
*Available only for Vault Enterprise*.
|
732
732
|
"""
|
733
733
|
return pulumi.get(self, "namespace")
|
@@ -34,7 +34,7 @@ class SecretBackendLibrarySetArgs:
|
|
34
34
|
Must be unique within the backend.
|
35
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
36
|
The value should not contain leading or trailing forward slashes.
|
37
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
38
|
*Available only for Vault Enterprise*.
|
39
39
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
40
40
|
ttl if not provided.
|
@@ -123,7 +123,7 @@ class SecretBackendLibrarySetArgs:
|
|
123
123
|
"""
|
124
124
|
The namespace to provision the resource in.
|
125
125
|
The value should not contain leading or trailing forward slashes.
|
126
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
126
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
127
127
|
*Available only for Vault Enterprise*.
|
128
128
|
"""
|
129
129
|
return pulumi.get(self, "namespace")
|
@@ -168,7 +168,7 @@ class _SecretBackendLibrarySetState:
|
|
168
168
|
Must be unique within the backend.
|
169
169
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
170
170
|
The value should not contain leading or trailing forward slashes.
|
171
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
171
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
172
172
|
*Available only for Vault Enterprise*.
|
173
173
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
174
174
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -247,7 +247,7 @@ class _SecretBackendLibrarySetState:
|
|
247
247
|
"""
|
248
248
|
The namespace to provision the resource in.
|
249
249
|
The value should not contain leading or trailing forward slashes.
|
250
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
250
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
251
251
|
*Available only for Vault Enterprise*.
|
252
252
|
"""
|
253
253
|
return pulumi.get(self, "namespace")
|
@@ -342,7 +342,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
342
342
|
Must be unique within the backend.
|
343
343
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
344
344
|
The value should not contain leading or trailing forward slashes.
|
345
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
345
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
346
346
|
*Available only for Vault Enterprise*.
|
347
347
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
348
348
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -463,7 +463,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
463
463
|
Must be unique within the backend.
|
464
464
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
465
465
|
The value should not contain leading or trailing forward slashes.
|
466
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
466
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
467
467
|
*Available only for Vault Enterprise*.
|
468
468
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
469
469
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -524,7 +524,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
524
524
|
"""
|
525
525
|
The namespace to provision the resource in.
|
526
526
|
The value should not contain leading or trailing forward slashes.
|
527
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
527
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
528
528
|
*Available only for Vault Enterprise*.
|
529
529
|
"""
|
530
530
|
return pulumi.get(self, "namespace")
|