pulumi-vault 6.1.0__py3-none-any.whl → 6.1.0a1711522308__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
pulumi_vault/__init__.py CHANGED
@@ -12,8 +12,6 @@ from .cert_auth_backend_role import *
12
12
  from .egp_policy import *
13
13
  from .get_auth_backend import *
14
14
  from .get_auth_backends import *
15
- from .get_namespace import *
16
- from .get_namespaces import *
17
15
  from .get_nomad_access_token import *
18
16
  from .get_policy_document import *
19
17
  from .get_raft_autopilot_state import *
@@ -14,9 +14,8 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
14
14
  @pulumi.input_type
15
15
  class SecretBackendRoleArgs:
16
16
  def __init__(__self__, *,
17
+ allowed_kubernetes_namespaces: pulumi.Input[Sequence[pulumi.Input[str]]],
17
18
  backend: pulumi.Input[str],
18
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
19
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
19
  extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
21
20
  extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
21
  generated_role_rules: Optional[pulumi.Input[str]] = None,
@@ -30,15 +29,10 @@ class SecretBackendRoleArgs:
30
29
  token_max_ttl: Optional[pulumi.Input[int]] = None):
31
30
  """
32
31
  The set of arguments for constructing a SecretBackendRole resource.
32
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
33
+ can generate credentials for. If set to `*` all namespaces are allowed.
33
34
  :param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
34
35
  the role in.
35
- :param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
36
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
37
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
38
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
39
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
40
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
41
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
42
36
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
43
37
  Kubernetes objects.
44
38
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_labels: Additional labels to apply to all generated Kubernetes
@@ -68,11 +62,8 @@ class SecretBackendRoleArgs:
68
62
  :param pulumi.Input[int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
69
63
  :param pulumi.Input[int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
70
64
  """
65
+ pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
71
66
  pulumi.set(__self__, "backend", backend)
72
- if allowed_kubernetes_namespace_selector is not None:
73
- pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
74
- if allowed_kubernetes_namespaces is not None:
75
- pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
76
67
  if extra_annotations is not None:
77
68
  pulumi.set(__self__, "extra_annotations", extra_annotations)
78
69
  if extra_labels is not None:
@@ -96,6 +87,19 @@ class SecretBackendRoleArgs:
96
87
  if token_max_ttl is not None:
97
88
  pulumi.set(__self__, "token_max_ttl", token_max_ttl)
98
89
 
90
+ @property
91
+ @pulumi.getter(name="allowedKubernetesNamespaces")
92
+ def allowed_kubernetes_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
93
+ """
94
+ The list of Kubernetes namespaces this role
95
+ can generate credentials for. If set to `*` all namespaces are allowed.
96
+ """
97
+ return pulumi.get(self, "allowed_kubernetes_namespaces")
98
+
99
+ @allowed_kubernetes_namespaces.setter
100
+ def allowed_kubernetes_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
101
+ pulumi.set(self, "allowed_kubernetes_namespaces", value)
102
+
99
103
  @property
100
104
  @pulumi.getter
101
105
  def backend(self) -> pulumi.Input[str]:
@@ -109,35 +113,6 @@ class SecretBackendRoleArgs:
109
113
  def backend(self, value: pulumi.Input[str]):
110
114
  pulumi.set(self, "backend", value)
111
115
 
112
- @property
113
- @pulumi.getter(name="allowedKubernetesNamespaceSelector")
114
- def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[str]]:
115
- """
116
- A label selector for Kubernetes namespaces
117
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
118
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
119
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
120
- """
121
- return pulumi.get(self, "allowed_kubernetes_namespace_selector")
122
-
123
- @allowed_kubernetes_namespace_selector.setter
124
- def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[str]]):
125
- pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
126
-
127
- @property
128
- @pulumi.getter(name="allowedKubernetesNamespaces")
129
- def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
130
- """
131
- The list of Kubernetes namespaces this role
132
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
133
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
134
- """
135
- return pulumi.get(self, "allowed_kubernetes_namespaces")
136
-
137
- @allowed_kubernetes_namespaces.setter
138
- def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
139
- pulumi.set(self, "allowed_kubernetes_namespaces", value)
140
-
141
116
  @property
142
117
  @pulumi.getter(name="extraAnnotations")
143
118
  def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
@@ -291,7 +266,6 @@ class SecretBackendRoleArgs:
291
266
  @pulumi.input_type
292
267
  class _SecretBackendRoleState:
293
268
  def __init__(__self__, *,
294
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
295
269
  allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
296
270
  backend: Optional[pulumi.Input[str]] = None,
297
271
  extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -307,13 +281,8 @@ class _SecretBackendRoleState:
307
281
  token_max_ttl: Optional[pulumi.Input[int]] = None):
308
282
  """
309
283
  Input properties used for looking up and filtering SecretBackendRole resources.
310
- :param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
311
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
312
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
313
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
314
284
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
315
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
316
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
285
+ can generate credentials for. If set to `*` all namespaces are allowed.
317
286
  :param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
318
287
  the role in.
319
288
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
@@ -345,8 +314,6 @@ class _SecretBackendRoleState:
345
314
  :param pulumi.Input[int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
346
315
  :param pulumi.Input[int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
347
316
  """
348
- if allowed_kubernetes_namespace_selector is not None:
349
- pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
350
317
  if allowed_kubernetes_namespaces is not None:
351
318
  pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
352
319
  if backend is not None:
@@ -374,28 +341,12 @@ class _SecretBackendRoleState:
374
341
  if token_max_ttl is not None:
375
342
  pulumi.set(__self__, "token_max_ttl", token_max_ttl)
376
343
 
377
- @property
378
- @pulumi.getter(name="allowedKubernetesNamespaceSelector")
379
- def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[str]]:
380
- """
381
- A label selector for Kubernetes namespaces
382
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
383
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
384
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
385
- """
386
- return pulumi.get(self, "allowed_kubernetes_namespace_selector")
387
-
388
- @allowed_kubernetes_namespace_selector.setter
389
- def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[str]]):
390
- pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
391
-
392
344
  @property
393
345
  @pulumi.getter(name="allowedKubernetesNamespaces")
394
346
  def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
395
347
  """
396
348
  The list of Kubernetes namespaces this role
397
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
398
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
349
+ can generate credentials for. If set to `*` all namespaces are allowed.
399
350
  """
400
351
  return pulumi.get(self, "allowed_kubernetes_namespaces")
401
352
 
@@ -571,7 +522,6 @@ class SecretBackendRole(pulumi.CustomResource):
571
522
  def __init__(__self__,
572
523
  resource_name: str,
573
524
  opts: Optional[pulumi.ResourceOptions] = None,
574
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
575
525
  allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
576
526
  backend: Optional[pulumi.Input[str]] = None,
577
527
  extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -699,13 +649,8 @@ class SecretBackendRole(pulumi.CustomResource):
699
649
 
700
650
  :param str resource_name: The name of the resource.
701
651
  :param pulumi.ResourceOptions opts: Options for the resource.
702
- :param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
703
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
704
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
705
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
706
652
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
707
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
708
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
653
+ can generate credentials for. If set to `*` all namespaces are allowed.
709
654
  :param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
710
655
  the role in.
711
656
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
@@ -869,7 +814,6 @@ class SecretBackendRole(pulumi.CustomResource):
869
814
  def _internal_init(__self__,
870
815
  resource_name: str,
871
816
  opts: Optional[pulumi.ResourceOptions] = None,
872
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
873
817
  allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
874
818
  backend: Optional[pulumi.Input[str]] = None,
875
819
  extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -892,7 +836,8 @@ class SecretBackendRole(pulumi.CustomResource):
892
836
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
893
837
  __props__ = SecretBackendRoleArgs.__new__(SecretBackendRoleArgs)
894
838
 
895
- __props__.__dict__["allowed_kubernetes_namespace_selector"] = allowed_kubernetes_namespace_selector
839
+ if allowed_kubernetes_namespaces is None and not opts.urn:
840
+ raise TypeError("Missing required property 'allowed_kubernetes_namespaces'")
896
841
  __props__.__dict__["allowed_kubernetes_namespaces"] = allowed_kubernetes_namespaces
897
842
  if backend is None and not opts.urn:
898
843
  raise TypeError("Missing required property 'backend'")
@@ -918,7 +863,6 @@ class SecretBackendRole(pulumi.CustomResource):
918
863
  def get(resource_name: str,
919
864
  id: pulumi.Input[str],
920
865
  opts: Optional[pulumi.ResourceOptions] = None,
921
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
922
866
  allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
923
867
  backend: Optional[pulumi.Input[str]] = None,
924
868
  extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -939,13 +883,8 @@ class SecretBackendRole(pulumi.CustomResource):
939
883
  :param str resource_name: The unique name of the resulting resource.
940
884
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
941
885
  :param pulumi.ResourceOptions opts: Options for the resource.
942
- :param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
943
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
944
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
945
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
946
886
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
947
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
948
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
887
+ can generate credentials for. If set to `*` all namespaces are allowed.
949
888
  :param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
950
889
  the role in.
951
890
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
@@ -981,7 +920,6 @@ class SecretBackendRole(pulumi.CustomResource):
981
920
 
982
921
  __props__ = _SecretBackendRoleState.__new__(_SecretBackendRoleState)
983
922
 
984
- __props__.__dict__["allowed_kubernetes_namespace_selector"] = allowed_kubernetes_namespace_selector
985
923
  __props__.__dict__["allowed_kubernetes_namespaces"] = allowed_kubernetes_namespaces
986
924
  __props__.__dict__["backend"] = backend
987
925
  __props__.__dict__["extra_annotations"] = extra_annotations
@@ -997,24 +935,12 @@ class SecretBackendRole(pulumi.CustomResource):
997
935
  __props__.__dict__["token_max_ttl"] = token_max_ttl
998
936
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
999
937
 
1000
- @property
1001
- @pulumi.getter(name="allowedKubernetesNamespaceSelector")
1002
- def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[str]]:
1003
- """
1004
- A label selector for Kubernetes namespaces
1005
- in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
1006
- of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
1007
- If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
1008
- """
1009
- return pulumi.get(self, "allowed_kubernetes_namespace_selector")
1010
-
1011
938
  @property
1012
939
  @pulumi.getter(name="allowedKubernetesNamespaces")
1013
- def allowed_kubernetes_namespaces(self) -> pulumi.Output[Optional[Sequence[str]]]:
940
+ def allowed_kubernetes_namespaces(self) -> pulumi.Output[Sequence[str]]:
1014
941
  """
1015
942
  The list of Kubernetes namespaces this role
1016
- can generate credentials for. If set to `*` all namespaces are allowed. If set with
1017
- `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
943
+ can generate credentials for. If set to `*` all namespaces are allowed.
1018
944
  """
1019
945
  return pulumi.get(self, "allowed_kubernetes_namespaces")
1020
946
 
@@ -199,11 +199,11 @@ class SecretBackend(pulumi.CustomResource):
199
199
  import pulumi_vault as vault
200
200
 
201
201
  mongo = vault.Mount("mongo",
202
+ description="MongoDB Atlas secret engine mount",
202
203
  path="mongodbatlas",
203
- type="mongodbatlas",
204
- description="MongoDB Atlas secret engine mount")
204
+ type="mongodbatlas")
205
205
  config = vault.mongodbatlas.SecretBackend("config",
206
- mount=mongo.path,
206
+ mount="vault_mount.mongo.path",
207
207
  private_key="privateKey",
208
208
  public_key="publicKey")
209
209
  ```
@@ -242,11 +242,11 @@ class SecretBackend(pulumi.CustomResource):
242
242
  import pulumi_vault as vault
243
243
 
244
244
  mongo = vault.Mount("mongo",
245
+ description="MongoDB Atlas secret engine mount",
245
246
  path="mongodbatlas",
246
- type="mongodbatlas",
247
- description="MongoDB Atlas secret engine mount")
247
+ type="mongodbatlas")
248
248
  config = vault.mongodbatlas.SecretBackend("config",
249
- mount=mongo.path,
249
+ mount="vault_mount.mongo.path",
250
250
  private_key="privateKey",
251
251
  public_key="publicKey")
252
252
  ```
@@ -28,7 +28,7 @@ class SecretRoleArgs:
28
28
  """
29
29
  The set of arguments for constructing a SecretRole resource.
30
30
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
31
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
31
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
32
32
  :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
33
33
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
34
34
  :param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
@@ -40,8 +40,8 @@ class SecretRoleArgs:
40
40
  :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
41
41
  Required if `project_id` is not set.
42
42
  :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
43
- Required if `organization_id` is not set.
44
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
43
+ Required if `organization_id is` not set.
44
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
45
45
  :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
46
46
  """
47
47
  pulumi.set(__self__, "mount", mount)
@@ -81,7 +81,7 @@ class SecretRoleArgs:
81
81
  @pulumi.getter
82
82
  def roles(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
83
83
  """
84
- List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
84
+ List of roles that the API Key needs to have.
85
85
  """
86
86
  return pulumi.get(self, "roles")
87
87
 
@@ -170,7 +170,7 @@ class SecretRoleArgs:
170
170
  def project_id(self) -> Optional[pulumi.Input[str]]:
171
171
  """
172
172
  Unique identifier for the project to which the target API Key belongs.
173
- Required if `organization_id` is not set.
173
+ Required if `organization_id is` not set.
174
174
  """
175
175
  return pulumi.get(self, "project_id")
176
176
 
@@ -182,7 +182,7 @@ class SecretRoleArgs:
182
182
  @pulumi.getter(name="projectRoles")
183
183
  def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
184
184
  """
185
- Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
185
+ Roles assigned when an org API key is assigned to a project API key.
186
186
  """
187
187
  return pulumi.get(self, "project_roles")
188
188
 
@@ -231,9 +231,9 @@ class _SecretRoleState:
231
231
  :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
232
232
  Required if `project_id` is not set.
233
233
  :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
234
- Required if `organization_id` is not set.
235
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
236
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
234
+ Required if `organization_id is` not set.
235
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
236
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
237
237
  :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
238
238
  """
239
239
  if cidr_blocks is not None:
@@ -352,7 +352,7 @@ class _SecretRoleState:
352
352
  def project_id(self) -> Optional[pulumi.Input[str]]:
353
353
  """
354
354
  Unique identifier for the project to which the target API Key belongs.
355
- Required if `organization_id` is not set.
355
+ Required if `organization_id is` not set.
356
356
  """
357
357
  return pulumi.get(self, "project_id")
358
358
 
@@ -364,7 +364,7 @@ class _SecretRoleState:
364
364
  @pulumi.getter(name="projectRoles")
365
365
  def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
366
366
  """
367
- Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
367
+ Roles assigned when an org API key is assigned to a project API key.
368
368
  """
369
369
  return pulumi.get(self, "project_roles")
370
370
 
@@ -376,7 +376,7 @@ class _SecretRoleState:
376
376
  @pulumi.getter
377
377
  def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
378
378
  """
379
- List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
379
+ List of roles that the API Key needs to have.
380
380
  """
381
381
  return pulumi.get(self, "roles")
382
382
 
@@ -427,17 +427,17 @@ class SecretRole(pulumi.CustomResource):
427
427
  type="mongodbatlas",
428
428
  description="MongoDB Atlas secret engine mount")
429
429
  config = vault.mongodbatlas.SecretBackend("config",
430
- mount=mongo.path,
430
+ mount="vault_mount.mongo.path",
431
431
  private_key="privateKey",
432
432
  public_key="publicKey")
433
433
  role = vault.mongodbatlas.SecretRole("role",
434
434
  mount=mongo.path,
435
435
  organization_id="7cf5a45a9ccf6400e60981b7",
436
436
  project_id="5cf5a45a9ccf6400e60981b6",
437
- roles=["ORG_READ_ONLY"],
437
+ roles="ORG_READ_ONLY",
438
438
  ip_addresses="192.168.1.5, 192.168.1.6",
439
439
  cidr_blocks="192.168.1.3/35",
440
- project_roles=["GROUP_READ_ONLY"],
440
+ project_roles="GROUP_READ_ONLY",
441
441
  ttl="60",
442
442
  max_ttl="120")
443
443
  ```
@@ -466,9 +466,9 @@ class SecretRole(pulumi.CustomResource):
466
466
  :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
467
467
  Required if `project_id` is not set.
468
468
  :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
469
- Required if `organization_id` is not set.
470
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
471
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
469
+ Required if `organization_id is` not set.
470
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
471
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
472
472
  :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
473
473
  """
474
474
  ...
@@ -490,17 +490,17 @@ class SecretRole(pulumi.CustomResource):
490
490
  type="mongodbatlas",
491
491
  description="MongoDB Atlas secret engine mount")
492
492
  config = vault.mongodbatlas.SecretBackend("config",
493
- mount=mongo.path,
493
+ mount="vault_mount.mongo.path",
494
494
  private_key="privateKey",
495
495
  public_key="publicKey")
496
496
  role = vault.mongodbatlas.SecretRole("role",
497
497
  mount=mongo.path,
498
498
  organization_id="7cf5a45a9ccf6400e60981b7",
499
499
  project_id="5cf5a45a9ccf6400e60981b6",
500
- roles=["ORG_READ_ONLY"],
500
+ roles="ORG_READ_ONLY",
501
501
  ip_addresses="192.168.1.5, 192.168.1.6",
502
502
  cidr_blocks="192.168.1.3/35",
503
- project_roles=["GROUP_READ_ONLY"],
503
+ project_roles="GROUP_READ_ONLY",
504
504
  ttl="60",
505
505
  max_ttl="120")
506
506
  ```
@@ -605,9 +605,9 @@ class SecretRole(pulumi.CustomResource):
605
605
  :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
606
606
  Required if `project_id` is not set.
607
607
  :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
608
- Required if `organization_id` is not set.
609
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
610
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
608
+ Required if `organization_id is` not set.
609
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
610
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
611
611
  :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
612
612
  """
613
613
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -692,7 +692,7 @@ class SecretRole(pulumi.CustomResource):
692
692
  def project_id(self) -> pulumi.Output[Optional[str]]:
693
693
  """
694
694
  Unique identifier for the project to which the target API Key belongs.
695
- Required if `organization_id` is not set.
695
+ Required if `organization_id is` not set.
696
696
  """
697
697
  return pulumi.get(self, "project_id")
698
698
 
@@ -700,7 +700,7 @@ class SecretRole(pulumi.CustomResource):
700
700
  @pulumi.getter(name="projectRoles")
701
701
  def project_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
702
702
  """
703
- Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
703
+ Roles assigned when an org API key is assigned to a project API key.
704
704
  """
705
705
  return pulumi.get(self, "project_roles")
706
706
 
@@ -708,7 +708,7 @@ class SecretRole(pulumi.CustomResource):
708
708
  @pulumi.getter
709
709
  def roles(self) -> pulumi.Output[Sequence[str]]:
710
710
  """
711
- List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
711
+ List of roles that the API Key needs to have.
712
712
  """
713
713
  return pulumi.get(self, "roles")
714
714
 
@@ -13,5 +13,3 @@ from .sync_gcp_destination import *
13
13
  from .sync_gh_destination import *
14
14
  from .sync_github_apps import *
15
15
  from .sync_vercel_destination import *
16
- from ._inputs import *
17
- from . import outputs