pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -24,12 +24,17 @@ class SecretRoleArgs:
|
|
24
24
|
user_id: Optional[pulumi.Input[str]] = None):
|
25
25
|
"""
|
26
26
|
The set of arguments for constructing a SecretRole resource.
|
27
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
27
28
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
29
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
28
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
31
|
The value should not contain leading or trailing forward slashes.
|
30
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
33
|
*Available only for Vault Enterprise*.
|
34
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
35
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
32
36
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
37
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
33
38
|
"""
|
34
39
|
if backend is not None:
|
35
40
|
pulumi.set(__self__, "backend", backend)
|
@@ -51,6 +56,9 @@ class SecretRoleArgs:
|
|
51
56
|
@property
|
52
57
|
@pulumi.getter
|
53
58
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
59
|
+
"""
|
60
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
61
|
+
"""
|
54
62
|
return pulumi.get(self, "backend")
|
55
63
|
|
56
64
|
@backend.setter
|
@@ -72,6 +80,9 @@ class SecretRoleArgs:
|
|
72
80
|
@property
|
73
81
|
@pulumi.getter
|
74
82
|
def name(self) -> Optional[pulumi.Input[str]]:
|
83
|
+
"""
|
84
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
85
|
+
"""
|
75
86
|
return pulumi.get(self, "name")
|
76
87
|
|
77
88
|
@name.setter
|
@@ -96,6 +107,9 @@ class SecretRoleArgs:
|
|
96
107
|
@property
|
97
108
|
@pulumi.getter
|
98
109
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
110
|
+
"""
|
111
|
+
Name of the Terraform Cloud or Enterprise organization
|
112
|
+
"""
|
99
113
|
return pulumi.get(self, "organization")
|
100
114
|
|
101
115
|
@organization.setter
|
@@ -105,6 +119,9 @@ class SecretRoleArgs:
|
|
105
119
|
@property
|
106
120
|
@pulumi.getter(name="teamId")
|
107
121
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
122
|
+
"""
|
123
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
124
|
+
"""
|
108
125
|
return pulumi.get(self, "team_id")
|
109
126
|
|
110
127
|
@team_id.setter
|
@@ -126,6 +143,9 @@ class SecretRoleArgs:
|
|
126
143
|
@property
|
127
144
|
@pulumi.getter(name="userId")
|
128
145
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
146
|
+
"""
|
147
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
148
|
+
"""
|
129
149
|
return pulumi.get(self, "user_id")
|
130
150
|
|
131
151
|
@user_id.setter
|
@@ -146,12 +166,17 @@ class _SecretRoleState:
|
|
146
166
|
user_id: Optional[pulumi.Input[str]] = None):
|
147
167
|
"""
|
148
168
|
Input properties used for looking up and filtering SecretRole resources.
|
169
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
149
170
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
171
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
150
172
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
151
173
|
The value should not contain leading or trailing forward slashes.
|
152
174
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
175
|
*Available only for Vault Enterprise*.
|
176
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
177
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
154
178
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
179
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
155
180
|
"""
|
156
181
|
if backend is not None:
|
157
182
|
pulumi.set(__self__, "backend", backend)
|
@@ -173,6 +198,9 @@ class _SecretRoleState:
|
|
173
198
|
@property
|
174
199
|
@pulumi.getter
|
175
200
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
201
|
+
"""
|
202
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
203
|
+
"""
|
176
204
|
return pulumi.get(self, "backend")
|
177
205
|
|
178
206
|
@backend.setter
|
@@ -194,6 +222,9 @@ class _SecretRoleState:
|
|
194
222
|
@property
|
195
223
|
@pulumi.getter
|
196
224
|
def name(self) -> Optional[pulumi.Input[str]]:
|
225
|
+
"""
|
226
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
227
|
+
"""
|
197
228
|
return pulumi.get(self, "name")
|
198
229
|
|
199
230
|
@name.setter
|
@@ -218,6 +249,9 @@ class _SecretRoleState:
|
|
218
249
|
@property
|
219
250
|
@pulumi.getter
|
220
251
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
252
|
+
"""
|
253
|
+
Name of the Terraform Cloud or Enterprise organization
|
254
|
+
"""
|
221
255
|
return pulumi.get(self, "organization")
|
222
256
|
|
223
257
|
@organization.setter
|
@@ -227,6 +261,9 @@ class _SecretRoleState:
|
|
227
261
|
@property
|
228
262
|
@pulumi.getter(name="teamId")
|
229
263
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
264
|
+
"""
|
265
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
266
|
+
"""
|
230
267
|
return pulumi.get(self, "team_id")
|
231
268
|
|
232
269
|
@team_id.setter
|
@@ -248,6 +285,9 @@ class _SecretRoleState:
|
|
248
285
|
@property
|
249
286
|
@pulumi.getter(name="userId")
|
250
287
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
288
|
+
"""
|
289
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
290
|
+
"""
|
251
291
|
return pulumi.get(self, "user_id")
|
252
292
|
|
253
293
|
@user_id.setter
|
@@ -272,6 +312,7 @@ class SecretRole(pulumi.CustomResource):
|
|
272
312
|
"""
|
273
313
|
## Example Usage
|
274
314
|
|
315
|
+
<!--Start PulumiCodeChooser -->
|
275
316
|
```python
|
276
317
|
import pulumi
|
277
318
|
import pulumi_vault as vault
|
@@ -282,10 +323,10 @@ class SecretRole(pulumi.CustomResource):
|
|
282
323
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
283
324
|
example = vault.terraformcloud.SecretRole("example",
|
284
325
|
backend=test.backend,
|
285
|
-
name="test-role",
|
286
326
|
organization="example-organization-name",
|
287
327
|
team_id="team-ieF4isC...")
|
288
328
|
```
|
329
|
+
<!--End PulumiCodeChooser -->
|
289
330
|
|
290
331
|
## Import
|
291
332
|
|
@@ -297,12 +338,17 @@ class SecretRole(pulumi.CustomResource):
|
|
297
338
|
|
298
339
|
:param str resource_name: The name of the resource.
|
299
340
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
341
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
300
342
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
343
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
301
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
302
345
|
The value should not contain leading or trailing forward slashes.
|
303
346
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
304
347
|
*Available only for Vault Enterprise*.
|
348
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
349
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
305
350
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
351
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
306
352
|
"""
|
307
353
|
...
|
308
354
|
@overload
|
@@ -313,6 +359,7 @@ class SecretRole(pulumi.CustomResource):
|
|
313
359
|
"""
|
314
360
|
## Example Usage
|
315
361
|
|
362
|
+
<!--Start PulumiCodeChooser -->
|
316
363
|
```python
|
317
364
|
import pulumi
|
318
365
|
import pulumi_vault as vault
|
@@ -323,10 +370,10 @@ class SecretRole(pulumi.CustomResource):
|
|
323
370
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
324
371
|
example = vault.terraformcloud.SecretRole("example",
|
325
372
|
backend=test.backend,
|
326
|
-
name="test-role",
|
327
373
|
organization="example-organization-name",
|
328
374
|
team_id="team-ieF4isC...")
|
329
375
|
```
|
376
|
+
<!--End PulumiCodeChooser -->
|
330
377
|
|
331
378
|
## Import
|
332
379
|
|
@@ -401,12 +448,17 @@ class SecretRole(pulumi.CustomResource):
|
|
401
448
|
:param str resource_name: The unique name of the resulting resource.
|
402
449
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
403
450
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
451
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
404
452
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
453
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
405
454
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
406
455
|
The value should not contain leading or trailing forward slashes.
|
407
456
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
408
457
|
*Available only for Vault Enterprise*.
|
458
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
459
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
409
460
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
461
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
410
462
|
"""
|
411
463
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
412
464
|
|
@@ -425,6 +477,9 @@ class SecretRole(pulumi.CustomResource):
|
|
425
477
|
@property
|
426
478
|
@pulumi.getter
|
427
479
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
480
|
+
"""
|
481
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
482
|
+
"""
|
428
483
|
return pulumi.get(self, "backend")
|
429
484
|
|
430
485
|
@property
|
@@ -438,6 +493,9 @@ class SecretRole(pulumi.CustomResource):
|
|
438
493
|
@property
|
439
494
|
@pulumi.getter
|
440
495
|
def name(self) -> pulumi.Output[str]:
|
496
|
+
"""
|
497
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
498
|
+
"""
|
441
499
|
return pulumi.get(self, "name")
|
442
500
|
|
443
501
|
@property
|
@@ -454,11 +512,17 @@ class SecretRole(pulumi.CustomResource):
|
|
454
512
|
@property
|
455
513
|
@pulumi.getter
|
456
514
|
def organization(self) -> pulumi.Output[Optional[str]]:
|
515
|
+
"""
|
516
|
+
Name of the Terraform Cloud or Enterprise organization
|
517
|
+
"""
|
457
518
|
return pulumi.get(self, "organization")
|
458
519
|
|
459
520
|
@property
|
460
521
|
@pulumi.getter(name="teamId")
|
461
522
|
def team_id(self) -> pulumi.Output[Optional[str]]:
|
523
|
+
"""
|
524
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
525
|
+
"""
|
462
526
|
return pulumi.get(self, "team_id")
|
463
527
|
|
464
528
|
@property
|
@@ -472,5 +536,8 @@ class SecretRole(pulumi.CustomResource):
|
|
472
536
|
@property
|
473
537
|
@pulumi.getter(name="userId")
|
474
538
|
def user_id(self) -> pulumi.Output[Optional[str]]:
|
539
|
+
"""
|
540
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
541
|
+
"""
|
475
542
|
return pulumi.get(self, "user_id")
|
476
543
|
|
pulumi_vault/token.py
CHANGED
@@ -623,24 +623,26 @@ class Token(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
+
<!--Start PulumiCodeChooser -->
|
626
627
|
```python
|
627
628
|
import pulumi
|
628
629
|
import pulumi_vault as vault
|
629
630
|
|
630
631
|
example = vault.Token("example",
|
631
|
-
|
632
|
+
metadata={
|
633
|
+
"purpose": "service-account",
|
634
|
+
},
|
632
635
|
policies=[
|
633
636
|
"policy1",
|
634
637
|
"policy2",
|
635
638
|
],
|
636
|
-
renewable=True,
|
637
|
-
ttl="24h",
|
638
|
-
renew_min_lease=43200,
|
639
639
|
renew_increment=86400,
|
640
|
-
|
641
|
-
|
642
|
-
|
640
|
+
renew_min_lease=43200,
|
641
|
+
renewable=True,
|
642
|
+
role_name="app",
|
643
|
+
ttl="24h")
|
643
644
|
```
|
645
|
+
<!--End PulumiCodeChooser -->
|
644
646
|
|
645
647
|
## Import
|
646
648
|
|
@@ -680,24 +682,26 @@ class Token(pulumi.CustomResource):
|
|
680
682
|
"""
|
681
683
|
## Example Usage
|
682
684
|
|
685
|
+
<!--Start PulumiCodeChooser -->
|
683
686
|
```python
|
684
687
|
import pulumi
|
685
688
|
import pulumi_vault as vault
|
686
689
|
|
687
690
|
example = vault.Token("example",
|
688
|
-
|
691
|
+
metadata={
|
692
|
+
"purpose": "service-account",
|
693
|
+
},
|
689
694
|
policies=[
|
690
695
|
"policy1",
|
691
696
|
"policy2",
|
692
697
|
],
|
693
|
-
renewable=True,
|
694
|
-
ttl="24h",
|
695
|
-
renew_min_lease=43200,
|
696
698
|
renew_increment=86400,
|
697
|
-
|
698
|
-
|
699
|
-
|
699
|
+
renew_min_lease=43200,
|
700
|
+
renewable=True,
|
701
|
+
role_name="app",
|
702
|
+
ttl="24h")
|
700
703
|
```
|
704
|
+
<!--End PulumiCodeChooser -->
|
701
705
|
|
702
706
|
## Import
|
703
707
|
|