pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +24 -0
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/ad/secret_backend.py +7 -138
- pulumi_vault/ad/secret_library.py +7 -7
- pulumi_vault/ad/secret_role.py +7 -7
- pulumi_vault/approle/auth_backend_login.py +7 -7
- pulumi_vault/approle/auth_backend_role.py +7 -7
- pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
- pulumi_vault/audit.py +7 -7
- pulumi_vault/auth_backend.py +7 -7
- pulumi_vault/aws/auth_backend_cert.py +7 -7
- pulumi_vault/aws/auth_backend_client.py +7 -7
- pulumi_vault/aws/auth_backend_config_identity.py +7 -7
- pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
- pulumi_vault/aws/auth_backend_login.py +7 -7
- pulumi_vault/aws/auth_backend_role.py +7 -7
- pulumi_vault/aws/auth_backend_role_tag.py +7 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
- pulumi_vault/aws/auth_backend_sts_role.py +7 -7
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +7 -7
- pulumi_vault/aws/secret_backend_role.py +7 -7
- pulumi_vault/aws/secret_backend_static_role.py +7 -7
- pulumi_vault/azure/auth_backend_config.py +7 -7
- pulumi_vault/azure/auth_backend_role.py +7 -7
- pulumi_vault/azure/backend.py +7 -7
- pulumi_vault/azure/backend_role.py +7 -7
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/cert_auth_backend_role.py +7 -63
- pulumi_vault/config/_inputs.py +52 -0
- pulumi_vault/config/outputs.py +30 -0
- pulumi_vault/config/ui_custom_message.py +524 -0
- pulumi_vault/consul/secret_backend.py +7 -7
- pulumi_vault/consul/secret_backend_role.py +7 -76
- pulumi_vault/egp_policy.py +7 -7
- pulumi_vault/gcp/auth_backend.py +7 -7
- pulumi_vault/gcp/auth_backend_role.py +7 -7
- pulumi_vault/gcp/secret_backend.py +7 -7
- pulumi_vault/gcp/secret_roleset.py +7 -7
- pulumi_vault/gcp/secret_static_account.py +7 -7
- pulumi_vault/generic/endpoint.py +7 -7
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/generic/secret.py +7 -7
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +20 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/github/auth_backend.py +7 -7
- pulumi_vault/github/team.py +7 -7
- pulumi_vault/github/user.py +7 -7
- pulumi_vault/identity/entity.py +7 -7
- pulumi_vault/identity/entity_alias.py +7 -7
- pulumi_vault/identity/entity_policies.py +7 -7
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/identity/group.py +7 -7
- pulumi_vault/identity/group_alias.py +7 -7
- pulumi_vault/identity/group_member_entity_ids.py +7 -58
- pulumi_vault/identity/group_member_group_ids.py +7 -7
- pulumi_vault/identity/group_policies.py +7 -7
- pulumi_vault/identity/oidc.py +7 -7
- pulumi_vault/identity/oidc_assignment.py +7 -7
- pulumi_vault/identity/oidc_client.py +19 -15
- pulumi_vault/identity/oidc_key.py +7 -7
- pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
- pulumi_vault/identity/oidc_provider.py +7 -7
- pulumi_vault/identity/oidc_role.py +7 -7
- pulumi_vault/identity/oidc_scope.py +7 -7
- pulumi_vault/jwt/auth_backend.py +7 -7
- pulumi_vault/jwt/auth_backend_role.py +7 -7
- pulumi_vault/kmip/secret_backend.py +7 -7
- pulumi_vault/kmip/secret_role.py +7 -7
- pulumi_vault/kmip/secret_scope.py +7 -7
- pulumi_vault/kubernetes/auth_backend_role.py +7 -7
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kubernetes/secret_backend.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +7 -7
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +5 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/kv/secret.py +7 -7
- pulumi_vault/kv/secret_backend_v2.py +7 -7
- pulumi_vault/kv/secret_v2.py +7 -7
- pulumi_vault/ldap/auth_backend.py +7 -7
- pulumi_vault/ldap/auth_backend_group.py +7 -7
- pulumi_vault/ldap/auth_backend_user.py +7 -7
- pulumi_vault/ldap/secret_backend.py +61 -76
- pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
- pulumi_vault/ldap/secret_backend_library_set.py +7 -7
- pulumi_vault/ldap/secret_backend_static_role.py +62 -8
- pulumi_vault/mfa_duo.py +7 -7
- pulumi_vault/mfa_okta.py +7 -7
- pulumi_vault/mfa_pingid.py +7 -7
- pulumi_vault/mfa_totp.py +7 -7
- pulumi_vault/mongodbatlas/secret_backend.py +7 -7
- pulumi_vault/mongodbatlas/secret_role.py +7 -7
- pulumi_vault/mount.py +11 -7
- pulumi_vault/namespace.py +7 -7
- pulumi_vault/nomad_secret_backend.py +7 -7
- pulumi_vault/nomad_secret_role.py +7 -7
- pulumi_vault/okta/auth_backend.py +7 -7
- pulumi_vault/okta/auth_backend_group.py +7 -7
- pulumi_vault/okta/auth_backend_user.py +7 -7
- pulumi_vault/password_policy.py +7 -7
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
- pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
- pulumi_vault/pkisecret/secret_backend_key.py +7 -7
- pulumi_vault/pkisecret/secret_backend_role.py +7 -7
- pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
- pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
- pulumi_vault/policy.py +7 -7
- pulumi_vault/rabbitmq/secret_backend.py +7 -7
- pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
- pulumi_vault/raft_autopilot.py +7 -7
- pulumi_vault/raft_snapshot_agent_config.py +7 -7
- pulumi_vault/rgp_policy.py +7 -7
- pulumi_vault/saml/auth_backend.py +7 -7
- pulumi_vault/saml/auth_backend_role.py +7 -7
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/sync_association.py +7 -7
- pulumi_vault/secrets/sync_aws_destination.py +161 -7
- pulumi_vault/secrets/sync_azure_destination.py +7 -7
- pulumi_vault/secrets/sync_gcp_destination.py +77 -7
- pulumi_vault/secrets/sync_gh_destination.py +122 -7
- pulumi_vault/secrets/sync_github_apps.py +370 -0
- pulumi_vault/secrets/sync_vercel_destination.py +7 -7
- pulumi_vault/ssh/secret_backend_ca.py +7 -7
- pulumi_vault/ssh/secret_backend_role.py +7 -83
- pulumi_vault/terraformcloud/secret_creds.py +7 -7
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/token.py +7 -7
- pulumi_vault/tokenauth/auth_backend_role.py +7 -7
- pulumi_vault/transform/alphabet.py +7 -7
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transform/role.py +7 -7
- pulumi_vault/transform/template.py +7 -7
- pulumi_vault/transform/transformation.py +7 -7
- pulumi_vault/transit/secret_backend_key.py +7 -84
- pulumi_vault/transit/secret_cache_config.py +7 -7
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.0.0.dist-info/RECORD +248 -0
- pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -26,7 +26,6 @@ class SecretBackendRoleArgs:
|
|
26
26
|
partition: Optional[pulumi.Input[str]] = None,
|
27
27
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
28
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
29
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
30
29
|
ttl: Optional[pulumi.Input[int]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -41,7 +40,7 @@ class SecretBackendRoleArgs:
|
|
41
40
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
42
41
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
43
42
|
The value should not contain leading or trailing forward slashes.
|
44
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
43
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
45
44
|
*Available only for Vault Enterprise*.
|
46
45
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
47
46
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -52,8 +51,6 @@ class SecretBackendRoleArgs:
|
|
52
51
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
53
52
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
54
53
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
55
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
56
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
57
54
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
58
55
|
"""
|
59
56
|
if backend is not None:
|
@@ -80,11 +77,6 @@ class SecretBackendRoleArgs:
|
|
80
77
|
pulumi.set(__self__, "policies", policies)
|
81
78
|
if service_identities is not None:
|
82
79
|
pulumi.set(__self__, "service_identities", service_identities)
|
83
|
-
if token_type is not None:
|
84
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
85
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
86
|
-
if token_type is not None:
|
87
|
-
pulumi.set(__self__, "token_type", token_type)
|
88
80
|
if ttl is not None:
|
89
81
|
pulumi.set(__self__, "ttl", ttl)
|
90
82
|
|
@@ -180,7 +172,7 @@ class SecretBackendRoleArgs:
|
|
180
172
|
"""
|
181
173
|
The namespace to provision the resource in.
|
182
174
|
The value should not contain leading or trailing forward slashes.
|
183
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
175
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
184
176
|
*Available only for Vault Enterprise*.
|
185
177
|
"""
|
186
178
|
return pulumi.get(self, "namespace")
|
@@ -242,22 +234,6 @@ class SecretBackendRoleArgs:
|
|
242
234
|
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
243
235
|
pulumi.set(self, "service_identities", value)
|
244
236
|
|
245
|
-
@property
|
246
|
-
@pulumi.getter(name="tokenType")
|
247
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
248
|
-
"""
|
249
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
250
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
251
|
-
"""
|
252
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
253
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
254
|
-
|
255
|
-
return pulumi.get(self, "token_type")
|
256
|
-
|
257
|
-
@token_type.setter
|
258
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
259
|
-
pulumi.set(self, "token_type", value)
|
260
|
-
|
261
237
|
@property
|
262
238
|
@pulumi.getter
|
263
239
|
def ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -286,7 +262,6 @@ class _SecretBackendRoleState:
|
|
286
262
|
partition: Optional[pulumi.Input[str]] = None,
|
287
263
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
288
264
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
289
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
290
265
|
ttl: Optional[pulumi.Input[int]] = None):
|
291
266
|
"""
|
292
267
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -301,7 +276,7 @@ class _SecretBackendRoleState:
|
|
301
276
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
302
277
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
303
278
|
The value should not contain leading or trailing forward slashes.
|
304
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
279
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
305
280
|
*Available only for Vault Enterprise*.
|
306
281
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
307
282
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -312,8 +287,6 @@ class _SecretBackendRoleState:
|
|
312
287
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
313
288
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
314
289
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
315
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
316
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
317
290
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
318
291
|
"""
|
319
292
|
if backend is not None:
|
@@ -340,11 +313,6 @@ class _SecretBackendRoleState:
|
|
340
313
|
pulumi.set(__self__, "policies", policies)
|
341
314
|
if service_identities is not None:
|
342
315
|
pulumi.set(__self__, "service_identities", service_identities)
|
343
|
-
if token_type is not None:
|
344
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
345
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
346
|
-
if token_type is not None:
|
347
|
-
pulumi.set(__self__, "token_type", token_type)
|
348
316
|
if ttl is not None:
|
349
317
|
pulumi.set(__self__, "ttl", ttl)
|
350
318
|
|
@@ -440,7 +408,7 @@ class _SecretBackendRoleState:
|
|
440
408
|
"""
|
441
409
|
The namespace to provision the resource in.
|
442
410
|
The value should not contain leading or trailing forward slashes.
|
443
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
411
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
444
412
|
*Available only for Vault Enterprise*.
|
445
413
|
"""
|
446
414
|
return pulumi.get(self, "namespace")
|
@@ -502,22 +470,6 @@ class _SecretBackendRoleState:
|
|
502
470
|
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
503
471
|
pulumi.set(self, "service_identities", value)
|
504
472
|
|
505
|
-
@property
|
506
|
-
@pulumi.getter(name="tokenType")
|
507
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
508
|
-
"""
|
509
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
510
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
511
|
-
"""
|
512
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
513
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
514
|
-
|
515
|
-
return pulumi.get(self, "token_type")
|
516
|
-
|
517
|
-
@token_type.setter
|
518
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
519
|
-
pulumi.set(self, "token_type", value)
|
520
|
-
|
521
473
|
@property
|
522
474
|
@pulumi.getter
|
523
475
|
def ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -548,7 +500,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
548
500
|
partition: Optional[pulumi.Input[str]] = None,
|
549
501
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
550
502
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
551
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
552
503
|
ttl: Optional[pulumi.Input[int]] = None,
|
553
504
|
__props__=None):
|
554
505
|
"""
|
@@ -599,7 +550,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
599
550
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
600
551
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
601
552
|
The value should not contain leading or trailing forward slashes.
|
602
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
553
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
603
554
|
*Available only for Vault Enterprise*.
|
604
555
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
605
556
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -610,8 +561,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
610
561
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
611
562
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
612
563
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
613
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
614
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
615
564
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
616
565
|
"""
|
617
566
|
...
|
@@ -682,7 +631,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
682
631
|
partition: Optional[pulumi.Input[str]] = None,
|
683
632
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
684
633
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
685
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
686
634
|
ttl: Optional[pulumi.Input[int]] = None,
|
687
635
|
__props__=None):
|
688
636
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -705,7 +653,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
705
653
|
__props__.__dict__["partition"] = partition
|
706
654
|
__props__.__dict__["policies"] = policies
|
707
655
|
__props__.__dict__["service_identities"] = service_identities
|
708
|
-
__props__.__dict__["token_type"] = token_type
|
709
656
|
__props__.__dict__["ttl"] = ttl
|
710
657
|
super(SecretBackendRole, __self__).__init__(
|
711
658
|
'vault:consul/secretBackendRole:SecretBackendRole',
|
@@ -729,7 +676,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
729
676
|
partition: Optional[pulumi.Input[str]] = None,
|
730
677
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
731
678
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
732
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
733
679
|
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
|
734
680
|
"""
|
735
681
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -749,7 +695,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
749
695
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
750
696
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
751
697
|
The value should not contain leading or trailing forward slashes.
|
752
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
698
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
753
699
|
*Available only for Vault Enterprise*.
|
754
700
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
755
701
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -760,8 +706,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
760
706
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
761
707
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
762
708
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
763
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
764
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
765
709
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
766
710
|
"""
|
767
711
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -780,7 +724,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
724
|
__props__.__dict__["partition"] = partition
|
781
725
|
__props__.__dict__["policies"] = policies
|
782
726
|
__props__.__dict__["service_identities"] = service_identities
|
783
|
-
__props__.__dict__["token_type"] = token_type
|
784
727
|
__props__.__dict__["ttl"] = ttl
|
785
728
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
786
729
|
|
@@ -848,7 +791,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
848
791
|
"""
|
849
792
|
The namespace to provision the resource in.
|
850
793
|
The value should not contain leading or trailing forward slashes.
|
851
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
794
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
852
795
|
*Available only for Vault Enterprise*.
|
853
796
|
"""
|
854
797
|
return pulumi.get(self, "namespace")
|
@@ -890,18 +833,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
890
833
|
"""
|
891
834
|
return pulumi.get(self, "service_identities")
|
892
835
|
|
893
|
-
@property
|
894
|
-
@pulumi.getter(name="tokenType")
|
895
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
896
|
-
"""
|
897
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
898
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
899
|
-
"""
|
900
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
901
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
902
|
-
|
903
|
-
return pulumi.get(self, "token_type")
|
904
|
-
|
905
836
|
@property
|
906
837
|
@pulumi.getter
|
907
838
|
def ttl(self) -> pulumi.Output[Optional[int]]:
|
pulumi_vault/egp_policy.py
CHANGED
@@ -27,7 +27,7 @@ class EgpPolicyArgs:
|
|
27
27
|
:param pulumi.Input[str] name: The name of the policy
|
28
28
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
29
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
30
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
31
|
*Available only for Vault Enterprise*.
|
32
32
|
"""
|
33
33
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -92,7 +92,7 @@ class EgpPolicyArgs:
|
|
92
92
|
"""
|
93
93
|
The namespace to provision the resource in.
|
94
94
|
The value should not contain leading or trailing forward slashes.
|
95
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
95
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
96
96
|
*Available only for Vault Enterprise*.
|
97
97
|
"""
|
98
98
|
return pulumi.get(self, "namespace")
|
@@ -116,7 +116,7 @@ class _EgpPolicyState:
|
|
116
116
|
:param pulumi.Input[str] name: The name of the policy
|
117
117
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
118
118
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
120
|
*Available only for Vault Enterprise*.
|
121
121
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
122
122
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -162,7 +162,7 @@ class _EgpPolicyState:
|
|
162
162
|
"""
|
163
163
|
The namespace to provision the resource in.
|
164
164
|
The value should not contain leading or trailing forward slashes.
|
165
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
165
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
166
166
|
*Available only for Vault Enterprise*.
|
167
167
|
"""
|
168
168
|
return pulumi.get(self, "namespace")
|
@@ -236,7 +236,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
236
236
|
:param pulumi.Input[str] name: The name of the policy
|
237
237
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
238
238
|
The value should not contain leading or trailing forward slashes.
|
239
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
239
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
240
240
|
*Available only for Vault Enterprise*.
|
241
241
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
242
242
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -336,7 +336,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
336
336
|
:param pulumi.Input[str] name: The name of the policy
|
337
337
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
338
338
|
The value should not contain leading or trailing forward slashes.
|
339
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
339
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
340
340
|
*Available only for Vault Enterprise*.
|
341
341
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
342
342
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -374,7 +374,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
374
374
|
"""
|
375
375
|
The namespace to provision the resource in.
|
376
376
|
The value should not contain leading or trailing forward slashes.
|
377
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
377
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
378
378
|
*Available only for Vault Enterprise*.
|
379
379
|
"""
|
380
380
|
return pulumi.get(self, "namespace")
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -46,7 +46,7 @@ class AuthBackendArgs:
|
|
46
46
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
47
47
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
48
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
49
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
50
|
*Available only for Vault Enterprise*.
|
51
51
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
52
52
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
@@ -177,7 +177,7 @@ class AuthBackendArgs:
|
|
177
177
|
"""
|
178
178
|
The namespace to provision the resource in.
|
179
179
|
The value should not contain leading or trailing forward slashes.
|
180
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
180
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
181
|
*Available only for Vault Enterprise*.
|
182
182
|
"""
|
183
183
|
return pulumi.get(self, "namespace")
|
@@ -272,7 +272,7 @@ class _AuthBackendState:
|
|
272
272
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
273
273
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
274
274
|
The value should not contain leading or trailing forward slashes.
|
275
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
275
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
276
276
|
*Available only for Vault Enterprise*.
|
277
277
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
278
278
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
@@ -417,7 +417,7 @@ class _AuthBackendState:
|
|
417
417
|
"""
|
418
418
|
The namespace to provision the resource in.
|
419
419
|
The value should not contain leading or trailing forward slashes.
|
420
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
420
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
421
421
|
*Available only for Vault Enterprise*.
|
422
422
|
"""
|
423
423
|
return pulumi.get(self, "namespace")
|
@@ -542,7 +542,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
542
542
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
543
543
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
544
544
|
The value should not contain leading or trailing forward slashes.
|
545
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
545
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
546
546
|
*Available only for Vault Enterprise*.
|
547
547
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
548
548
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
@@ -684,7 +684,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
684
684
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
685
685
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
686
686
|
The value should not contain leading or trailing forward slashes.
|
687
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
687
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
688
688
|
*Available only for Vault Enterprise*.
|
689
689
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
690
690
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
@@ -789,7 +789,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
789
789
|
"""
|
790
790
|
The namespace to provision the resource in.
|
791
791
|
The value should not contain leading or trailing forward slashes.
|
792
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
792
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
793
793
|
*Available only for Vault Enterprise*.
|
794
794
|
"""
|
795
795
|
return pulumi.get(self, "namespace")
|
@@ -51,7 +51,7 @@ class AuthBackendRoleArgs:
|
|
51
51
|
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
52
52
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
53
53
|
The value should not contain leading or trailing forward slashes.
|
54
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
55
|
*Available only for Vault Enterprise*.
|
56
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
57
57
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -270,7 +270,7 @@ class AuthBackendRoleArgs:
|
|
270
270
|
"""
|
271
271
|
The namespace to provision the resource in.
|
272
272
|
The value should not contain leading or trailing forward slashes.
|
273
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
273
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
274
274
|
*Available only for Vault Enterprise*.
|
275
275
|
"""
|
276
276
|
return pulumi.get(self, "namespace")
|
@@ -443,7 +443,7 @@ class _AuthBackendRoleState:
|
|
443
443
|
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
444
444
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
445
445
|
The value should not contain leading or trailing forward slashes.
|
446
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
446
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
447
447
|
*Available only for Vault Enterprise*.
|
448
448
|
:param pulumi.Input[str] role: Name of the GCP role
|
449
449
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
@@ -642,7 +642,7 @@ class _AuthBackendRoleState:
|
|
642
642
|
"""
|
643
643
|
The namespace to provision the resource in.
|
644
644
|
The value should not contain leading or trailing forward slashes.
|
645
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
645
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
646
646
|
*Available only for Vault Enterprise*.
|
647
647
|
"""
|
648
648
|
return pulumi.get(self, "namespace")
|
@@ -879,7 +879,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
879
879
|
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
880
880
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
881
881
|
The value should not contain leading or trailing forward slashes.
|
882
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
882
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
883
883
|
*Available only for Vault Enterprise*.
|
884
884
|
:param pulumi.Input[str] role: Name of the GCP role
|
885
885
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
@@ -1075,7 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1075
1075
|
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
1076
1076
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1077
1077
|
The value should not contain leading or trailing forward slashes.
|
1078
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1078
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1079
1079
|
*Available only for Vault Enterprise*.
|
1080
1080
|
:param pulumi.Input[str] role: Name of the GCP role
|
1081
1081
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
@@ -1217,7 +1217,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1217
1217
|
"""
|
1218
1218
|
The namespace to provision the resource in.
|
1219
1219
|
The value should not contain leading or trailing forward slashes.
|
1220
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1220
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1221
1221
|
*Available only for Vault Enterprise*.
|
1222
1222
|
"""
|
1223
1223
|
return pulumi.get(self, "namespace")
|
@@ -35,7 +35,7 @@ class SecretBackendArgs:
|
|
35
35
|
for credentials issued by this backend. Defaults to '0'.
|
36
36
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
37
37
|
The value should not contain leading or trailing forward slashes.
|
38
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
39
|
*Available only for Vault Enterprise*.
|
40
40
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
41
41
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -138,7 +138,7 @@ class SecretBackendArgs:
|
|
138
138
|
"""
|
139
139
|
The namespace to provision the resource in.
|
140
140
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
141
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
142
|
*Available only for Vault Enterprise*.
|
143
143
|
"""
|
144
144
|
return pulumi.get(self, "namespace")
|
@@ -185,7 +185,7 @@ class _SecretBackendState:
|
|
185
185
|
for credentials issued by this backend. Defaults to '0'.
|
186
186
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
187
187
|
The value should not contain leading or trailing forward slashes.
|
188
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
188
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
189
189
|
*Available only for Vault Enterprise*.
|
190
190
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
191
191
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -288,7 +288,7 @@ class _SecretBackendState:
|
|
288
288
|
"""
|
289
289
|
The namespace to provision the resource in.
|
290
290
|
The value should not contain leading or trailing forward slashes.
|
291
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
291
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
292
292
|
*Available only for Vault Enterprise*.
|
293
293
|
"""
|
294
294
|
return pulumi.get(self, "namespace")
|
@@ -350,7 +350,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
350
350
|
for credentials issued by this backend. Defaults to '0'.
|
351
351
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
352
352
|
The value should not contain leading or trailing forward slashes.
|
353
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
353
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
354
|
*Available only for Vault Enterprise*.
|
355
355
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
356
356
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -451,7 +451,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
451
451
|
for credentials issued by this backend. Defaults to '0'.
|
452
452
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
453
453
|
The value should not contain leading or trailing forward slashes.
|
454
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
454
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
455
455
|
*Available only for Vault Enterprise*.
|
456
456
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
457
457
|
not begin or end with a `/`. Defaults to `gcp`.
|
@@ -527,7 +527,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
527
527
|
"""
|
528
528
|
The namespace to provision the resource in.
|
529
529
|
The value should not contain leading or trailing forward slashes.
|
530
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
530
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
531
531
|
*Available only for Vault Enterprise*.
|
532
532
|
"""
|
533
533
|
return pulumi.get(self, "namespace")
|
@@ -31,7 +31,7 @@ class SecretRolesetArgs:
|
|
31
31
|
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
32
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
33
33
|
The value should not contain leading or trailing forward slashes.
|
34
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
35
|
*Available only for Vault Enterprise*.
|
36
36
|
:param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
37
37
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
@@ -101,7 +101,7 @@ class SecretRolesetArgs:
|
|
101
101
|
"""
|
102
102
|
The namespace to provision the resource in.
|
103
103
|
The value should not contain leading or trailing forward slashes.
|
104
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
104
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
105
105
|
*Available only for Vault Enterprise*.
|
106
106
|
"""
|
107
107
|
return pulumi.get(self, "namespace")
|
@@ -152,7 +152,7 @@ class _SecretRolesetState:
|
|
152
152
|
:param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
153
153
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
154
154
|
The value should not contain leading or trailing forward slashes.
|
155
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
155
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
156
156
|
*Available only for Vault Enterprise*.
|
157
157
|
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
158
158
|
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
@@ -207,7 +207,7 @@ class _SecretRolesetState:
|
|
207
207
|
"""
|
208
208
|
The namespace to provision the resource in.
|
209
209
|
The value should not contain leading or trailing forward slashes.
|
210
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
210
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
211
211
|
*Available only for Vault Enterprise*.
|
212
212
|
"""
|
213
213
|
return pulumi.get(self, "namespace")
|
@@ -333,7 +333,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
333
333
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretRolesetBindingArgs']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
334
334
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
335
335
|
The value should not contain leading or trailing forward slashes.
|
336
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
336
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
337
337
|
*Available only for Vault Enterprise*.
|
338
338
|
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
339
339
|
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
@@ -459,7 +459,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
459
459
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretRolesetBindingArgs']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
460
460
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
461
461
|
The value should not contain leading or trailing forward slashes.
|
462
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
462
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
463
463
|
*Available only for Vault Enterprise*.
|
464
464
|
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
465
465
|
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
@@ -503,7 +503,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
503
503
|
"""
|
504
504
|
The namespace to provision the resource in.
|
505
505
|
The value should not contain leading or trailing forward slashes.
|
506
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
506
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
507
507
|
*Available only for Vault Enterprise*.
|
508
508
|
"""
|
509
509
|
return pulumi.get(self, "namespace")
|
@@ -31,7 +31,7 @@ class SecretStaticAccountArgs:
|
|
31
31
|
:param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
|
32
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
33
33
|
The value should not contain leading or trailing forward slashes.
|
34
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
35
|
*Available only for Vault Enterprise*.
|
36
36
|
:param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
37
37
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
|
@@ -102,7 +102,7 @@ class SecretStaticAccountArgs:
|
|
102
102
|
"""
|
103
103
|
The namespace to provision the resource in.
|
104
104
|
The value should not contain leading or trailing forward slashes.
|
105
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
105
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
106
106
|
*Available only for Vault Enterprise*.
|
107
107
|
"""
|
108
108
|
return pulumi.get(self, "namespace")
|
@@ -153,7 +153,7 @@ class _SecretStaticAccountState:
|
|
153
153
|
:param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
|
154
154
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
155
155
|
The value should not contain leading or trailing forward slashes.
|
156
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
156
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
157
157
|
*Available only for Vault Enterprise*.
|
158
158
|
:param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
159
159
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
|
@@ -208,7 +208,7 @@ class _SecretStaticAccountState:
|
|
208
208
|
"""
|
209
209
|
The namespace to provision the resource in.
|
210
210
|
The value should not contain leading or trailing forward slashes.
|
211
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
211
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
212
212
|
*Available only for Vault Enterprise*.
|
213
213
|
"""
|
214
214
|
return pulumi.get(self, "namespace")
|
@@ -336,7 +336,7 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
336
336
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretStaticAccountBindingArgs']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
|
337
337
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
338
338
|
The value should not contain leading or trailing forward slashes.
|
339
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
339
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
340
340
|
*Available only for Vault Enterprise*.
|
341
341
|
:param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
342
342
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
|
@@ -462,7 +462,7 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
462
462
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretStaticAccountBindingArgs']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
|
463
463
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
464
464
|
The value should not contain leading or trailing forward slashes.
|
465
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
465
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
466
466
|
*Available only for Vault Enterprise*.
|
467
467
|
:param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
468
468
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
|
@@ -506,7 +506,7 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
506
506
|
"""
|
507
507
|
The namespace to provision the resource in.
|
508
508
|
The value should not contain leading or trailing forward slashes.
|
509
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
509
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
510
510
|
*Available only for Vault Enterprise*.
|
511
511
|
"""
|
512
512
|
return pulumi.get(self, "namespace")
|