pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -16,8 +16,6 @@ class SecretBackendCaArgs:
|
|
16
16
|
def __init__(__self__, *,
|
17
17
|
backend: Optional[pulumi.Input[str]] = None,
|
18
18
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
19
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
20
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
21
19
|
namespace: Optional[pulumi.Input[str]] = None,
|
22
20
|
private_key: Optional[pulumi.Input[str]] = None,
|
23
21
|
public_key: Optional[pulumi.Input[str]] = None):
|
@@ -25,8 +23,6 @@ class SecretBackendCaArgs:
|
|
25
23
|
The set of arguments for constructing a SecretBackendCa resource.
|
26
24
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
27
25
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
28
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
29
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
30
26
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
27
|
The value should not contain leading or trailing forward slashes.
|
32
28
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -38,10 +34,6 @@ class SecretBackendCaArgs:
|
|
38
34
|
pulumi.set(__self__, "backend", backend)
|
39
35
|
if generate_signing_key is not None:
|
40
36
|
pulumi.set(__self__, "generate_signing_key", generate_signing_key)
|
41
|
-
if key_bits is not None:
|
42
|
-
pulumi.set(__self__, "key_bits", key_bits)
|
43
|
-
if key_type is not None:
|
44
|
-
pulumi.set(__self__, "key_type", key_type)
|
45
37
|
if namespace is not None:
|
46
38
|
pulumi.set(__self__, "namespace", namespace)
|
47
39
|
if private_key is not None:
|
@@ -73,30 +65,6 @@ class SecretBackendCaArgs:
|
|
73
65
|
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
74
66
|
pulumi.set(self, "generate_signing_key", value)
|
75
67
|
|
76
|
-
@property
|
77
|
-
@pulumi.getter(name="keyBits")
|
78
|
-
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
79
|
-
"""
|
80
|
-
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
81
|
-
"""
|
82
|
-
return pulumi.get(self, "key_bits")
|
83
|
-
|
84
|
-
@key_bits.setter
|
85
|
-
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
86
|
-
pulumi.set(self, "key_bits", value)
|
87
|
-
|
88
|
-
@property
|
89
|
-
@pulumi.getter(name="keyType")
|
90
|
-
def key_type(self) -> Optional[pulumi.Input[str]]:
|
91
|
-
"""
|
92
|
-
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
93
|
-
"""
|
94
|
-
return pulumi.get(self, "key_type")
|
95
|
-
|
96
|
-
@key_type.setter
|
97
|
-
def key_type(self, value: Optional[pulumi.Input[str]]):
|
98
|
-
pulumi.set(self, "key_type", value)
|
99
|
-
|
100
68
|
@property
|
101
69
|
@pulumi.getter
|
102
70
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -142,8 +110,6 @@ class _SecretBackendCaState:
|
|
142
110
|
def __init__(__self__, *,
|
143
111
|
backend: Optional[pulumi.Input[str]] = None,
|
144
112
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
145
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
146
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
147
113
|
namespace: Optional[pulumi.Input[str]] = None,
|
148
114
|
private_key: Optional[pulumi.Input[str]] = None,
|
149
115
|
public_key: Optional[pulumi.Input[str]] = None):
|
@@ -151,8 +117,6 @@ class _SecretBackendCaState:
|
|
151
117
|
Input properties used for looking up and filtering SecretBackendCa resources.
|
152
118
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
153
119
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
154
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
155
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
156
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
157
121
|
The value should not contain leading or trailing forward slashes.
|
158
122
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -164,10 +128,6 @@ class _SecretBackendCaState:
|
|
164
128
|
pulumi.set(__self__, "backend", backend)
|
165
129
|
if generate_signing_key is not None:
|
166
130
|
pulumi.set(__self__, "generate_signing_key", generate_signing_key)
|
167
|
-
if key_bits is not None:
|
168
|
-
pulumi.set(__self__, "key_bits", key_bits)
|
169
|
-
if key_type is not None:
|
170
|
-
pulumi.set(__self__, "key_type", key_type)
|
171
131
|
if namespace is not None:
|
172
132
|
pulumi.set(__self__, "namespace", namespace)
|
173
133
|
if private_key is not None:
|
@@ -199,30 +159,6 @@ class _SecretBackendCaState:
|
|
199
159
|
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
200
160
|
pulumi.set(self, "generate_signing_key", value)
|
201
161
|
|
202
|
-
@property
|
203
|
-
@pulumi.getter(name="keyBits")
|
204
|
-
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
205
|
-
"""
|
206
|
-
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
207
|
-
"""
|
208
|
-
return pulumi.get(self, "key_bits")
|
209
|
-
|
210
|
-
@key_bits.setter
|
211
|
-
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
212
|
-
pulumi.set(self, "key_bits", value)
|
213
|
-
|
214
|
-
@property
|
215
|
-
@pulumi.getter(name="keyType")
|
216
|
-
def key_type(self) -> Optional[pulumi.Input[str]]:
|
217
|
-
"""
|
218
|
-
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
219
|
-
"""
|
220
|
-
return pulumi.get(self, "key_type")
|
221
|
-
|
222
|
-
@key_type.setter
|
223
|
-
def key_type(self, value: Optional[pulumi.Input[str]]):
|
224
|
-
pulumi.set(self, "key_type", value)
|
225
|
-
|
226
162
|
@property
|
227
163
|
@pulumi.getter
|
228
164
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -270,8 +206,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
270
206
|
opts: Optional[pulumi.ResourceOptions] = None,
|
271
207
|
backend: Optional[pulumi.Input[str]] = None,
|
272
208
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
273
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
274
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
275
209
|
namespace: Optional[pulumi.Input[str]] = None,
|
276
210
|
private_key: Optional[pulumi.Input[str]] = None,
|
277
211
|
public_key: Optional[pulumi.Input[str]] = None,
|
@@ -282,6 +216,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
282
216
|
|
283
217
|
## Example Usage
|
284
218
|
|
219
|
+
<!--Start PulumiCodeChooser -->
|
285
220
|
```python
|
286
221
|
import pulumi
|
287
222
|
import pulumi_vault as vault
|
@@ -289,6 +224,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
289
224
|
example = vault.Mount("example", type="ssh")
|
290
225
|
foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
|
291
226
|
```
|
227
|
+
<!--End PulumiCodeChooser -->
|
292
228
|
|
293
229
|
## Import
|
294
230
|
|
@@ -302,8 +238,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
302
238
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
303
239
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
304
240
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
305
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
306
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
307
241
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
308
242
|
The value should not contain leading or trailing forward slashes.
|
309
243
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -323,6 +257,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
323
257
|
|
324
258
|
## Example Usage
|
325
259
|
|
260
|
+
<!--Start PulumiCodeChooser -->
|
326
261
|
```python
|
327
262
|
import pulumi
|
328
263
|
import pulumi_vault as vault
|
@@ -330,6 +265,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
330
265
|
example = vault.Mount("example", type="ssh")
|
331
266
|
foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
|
332
267
|
```
|
268
|
+
<!--End PulumiCodeChooser -->
|
333
269
|
|
334
270
|
## Import
|
335
271
|
|
@@ -356,8 +292,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
356
292
|
opts: Optional[pulumi.ResourceOptions] = None,
|
357
293
|
backend: Optional[pulumi.Input[str]] = None,
|
358
294
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
359
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
360
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
361
295
|
namespace: Optional[pulumi.Input[str]] = None,
|
362
296
|
private_key: Optional[pulumi.Input[str]] = None,
|
363
297
|
public_key: Optional[pulumi.Input[str]] = None,
|
@@ -372,8 +306,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
372
306
|
|
373
307
|
__props__.__dict__["backend"] = backend
|
374
308
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
375
|
-
__props__.__dict__["key_bits"] = key_bits
|
376
|
-
__props__.__dict__["key_type"] = key_type
|
377
309
|
__props__.__dict__["namespace"] = namespace
|
378
310
|
__props__.__dict__["private_key"] = None if private_key is None else pulumi.Output.secret(private_key)
|
379
311
|
__props__.__dict__["public_key"] = public_key
|
@@ -391,8 +323,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
391
323
|
opts: Optional[pulumi.ResourceOptions] = None,
|
392
324
|
backend: Optional[pulumi.Input[str]] = None,
|
393
325
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
394
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
395
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
396
326
|
namespace: Optional[pulumi.Input[str]] = None,
|
397
327
|
private_key: Optional[pulumi.Input[str]] = None,
|
398
328
|
public_key: Optional[pulumi.Input[str]] = None) -> 'SecretBackendCa':
|
@@ -405,8 +335,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
405
335
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
406
336
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
407
337
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
408
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
409
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
410
338
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
411
339
|
The value should not contain leading or trailing forward slashes.
|
412
340
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -420,8 +348,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
420
348
|
|
421
349
|
__props__.__dict__["backend"] = backend
|
422
350
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
423
|
-
__props__.__dict__["key_bits"] = key_bits
|
424
|
-
__props__.__dict__["key_type"] = key_type
|
425
351
|
__props__.__dict__["namespace"] = namespace
|
426
352
|
__props__.__dict__["private_key"] = private_key
|
427
353
|
__props__.__dict__["public_key"] = public_key
|
@@ -443,22 +369,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
443
369
|
"""
|
444
370
|
return pulumi.get(self, "generate_signing_key")
|
445
371
|
|
446
|
-
@property
|
447
|
-
@pulumi.getter(name="keyBits")
|
448
|
-
def key_bits(self) -> pulumi.Output[Optional[int]]:
|
449
|
-
"""
|
450
|
-
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
451
|
-
"""
|
452
|
-
return pulumi.get(self, "key_bits")
|
453
|
-
|
454
|
-
@property
|
455
|
-
@pulumi.getter(name="keyType")
|
456
|
-
def key_type(self) -> pulumi.Output[Optional[str]]:
|
457
|
-
"""
|
458
|
-
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
459
|
-
"""
|
460
|
-
return pulumi.get(self, "key_type")
|
461
|
-
|
462
372
|
@property
|
463
373
|
@pulumi.getter
|
464
374
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
@@ -921,24 +921,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
921
921
|
|
922
922
|
## Example Usage
|
923
923
|
|
924
|
+
<!--Start PulumiCodeChooser -->
|
924
925
|
```python
|
925
926
|
import pulumi
|
926
927
|
import pulumi_vault as vault
|
927
928
|
|
928
929
|
example = vault.Mount("example", type="ssh")
|
929
930
|
foo = vault.ssh.SecretBackendRole("foo",
|
930
|
-
name="my-role",
|
931
931
|
backend=example.path,
|
932
932
|
key_type="ca",
|
933
933
|
allow_user_certificates=True)
|
934
934
|
bar = vault.ssh.SecretBackendRole("bar",
|
935
|
-
name="otp-role",
|
936
935
|
backend=example.path,
|
937
936
|
key_type="otp",
|
938
937
|
default_user="default",
|
939
938
|
allowed_users="default,baz",
|
940
939
|
cidr_list="0.0.0.0/0")
|
941
940
|
```
|
941
|
+
<!--End PulumiCodeChooser -->
|
942
942
|
|
943
943
|
## Import
|
944
944
|
|
@@ -995,24 +995,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
995
995
|
|
996
996
|
## Example Usage
|
997
997
|
|
998
|
+
<!--Start PulumiCodeChooser -->
|
998
999
|
```python
|
999
1000
|
import pulumi
|
1000
1001
|
import pulumi_vault as vault
|
1001
1002
|
|
1002
1003
|
example = vault.Mount("example", type="ssh")
|
1003
1004
|
foo = vault.ssh.SecretBackendRole("foo",
|
1004
|
-
name="my-role",
|
1005
1005
|
backend=example.path,
|
1006
1006
|
key_type="ca",
|
1007
1007
|
allow_user_certificates=True)
|
1008
1008
|
bar = vault.ssh.SecretBackendRole("bar",
|
1009
|
-
name="otp-role",
|
1010
1009
|
backend=example.path,
|
1011
1010
|
key_type="otp",
|
1012
1011
|
default_user="default",
|
1013
1012
|
allowed_users="default,baz",
|
1014
1013
|
cidr_list="0.0.0.0/0")
|
1015
1014
|
```
|
1015
|
+
<!--End PulumiCodeChooser -->
|
1016
1016
|
|
1017
1017
|
## Import
|
1018
1018
|
|
@@ -25,6 +25,9 @@ class SecretBackendArgs:
|
|
25
25
|
token: Optional[pulumi.Input[str]] = None):
|
26
26
|
"""
|
27
27
|
The set of arguments for constructing a SecretBackend resource.
|
28
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
29
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
30
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
28
31
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
29
32
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
30
33
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -35,6 +38,7 @@ class SecretBackendArgs:
|
|
35
38
|
The value should not contain leading or trailing forward slashes.
|
36
39
|
The `namespace` is always relative to the provider's configured namespace.
|
37
40
|
*Available only for Vault Enterprise*.
|
41
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
38
42
|
"""
|
39
43
|
if address is not None:
|
40
44
|
pulumi.set(__self__, "address", address)
|
@@ -58,6 +62,9 @@ class SecretBackendArgs:
|
|
58
62
|
@property
|
59
63
|
@pulumi.getter
|
60
64
|
def address(self) -> Optional[pulumi.Input[str]]:
|
65
|
+
"""
|
66
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
67
|
+
"""
|
61
68
|
return pulumi.get(self, "address")
|
62
69
|
|
63
70
|
@address.setter
|
@@ -67,6 +74,9 @@ class SecretBackendArgs:
|
|
67
74
|
@property
|
68
75
|
@pulumi.getter
|
69
76
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
77
|
+
"""
|
78
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
79
|
+
"""
|
70
80
|
return pulumi.get(self, "backend")
|
71
81
|
|
72
82
|
@backend.setter
|
@@ -76,6 +86,9 @@ class SecretBackendArgs:
|
|
76
86
|
@property
|
77
87
|
@pulumi.getter(name="basePath")
|
78
88
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
89
|
+
"""
|
90
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
91
|
+
"""
|
79
92
|
return pulumi.get(self, "base_path")
|
80
93
|
|
81
94
|
@base_path.setter
|
@@ -150,6 +163,9 @@ class SecretBackendArgs:
|
|
150
163
|
@property
|
151
164
|
@pulumi.getter
|
152
165
|
def token(self) -> Optional[pulumi.Input[str]]:
|
166
|
+
"""
|
167
|
+
Specifies the Terraform Cloud access token to use.
|
168
|
+
"""
|
153
169
|
return pulumi.get(self, "token")
|
154
170
|
|
155
171
|
@token.setter
|
@@ -171,6 +187,9 @@ class _SecretBackendState:
|
|
171
187
|
token: Optional[pulumi.Input[str]] = None):
|
172
188
|
"""
|
173
189
|
Input properties used for looking up and filtering SecretBackend resources.
|
190
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
191
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
192
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
174
193
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
175
194
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
176
195
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -181,6 +200,7 @@ class _SecretBackendState:
|
|
181
200
|
The value should not contain leading or trailing forward slashes.
|
182
201
|
The `namespace` is always relative to the provider's configured namespace.
|
183
202
|
*Available only for Vault Enterprise*.
|
203
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
184
204
|
"""
|
185
205
|
if address is not None:
|
186
206
|
pulumi.set(__self__, "address", address)
|
@@ -204,6 +224,9 @@ class _SecretBackendState:
|
|
204
224
|
@property
|
205
225
|
@pulumi.getter
|
206
226
|
def address(self) -> Optional[pulumi.Input[str]]:
|
227
|
+
"""
|
228
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
229
|
+
"""
|
207
230
|
return pulumi.get(self, "address")
|
208
231
|
|
209
232
|
@address.setter
|
@@ -213,6 +236,9 @@ class _SecretBackendState:
|
|
213
236
|
@property
|
214
237
|
@pulumi.getter
|
215
238
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
239
|
+
"""
|
240
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
241
|
+
"""
|
216
242
|
return pulumi.get(self, "backend")
|
217
243
|
|
218
244
|
@backend.setter
|
@@ -222,6 +248,9 @@ class _SecretBackendState:
|
|
222
248
|
@property
|
223
249
|
@pulumi.getter(name="basePath")
|
224
250
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
251
|
+
"""
|
252
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
253
|
+
"""
|
225
254
|
return pulumi.get(self, "base_path")
|
226
255
|
|
227
256
|
@base_path.setter
|
@@ -296,6 +325,9 @@ class _SecretBackendState:
|
|
296
325
|
@property
|
297
326
|
@pulumi.getter
|
298
327
|
def token(self) -> Optional[pulumi.Input[str]]:
|
328
|
+
"""
|
329
|
+
Specifies the Terraform Cloud access token to use.
|
330
|
+
"""
|
299
331
|
return pulumi.get(self, "token")
|
300
332
|
|
301
333
|
@token.setter
|
@@ -321,6 +353,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
321
353
|
"""
|
322
354
|
## Example Usage
|
323
355
|
|
356
|
+
<!--Start PulumiCodeChooser -->
|
324
357
|
```python
|
325
358
|
import pulumi
|
326
359
|
import pulumi_vault as vault
|
@@ -330,6 +363,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
330
363
|
description="Manages the Terraform Cloud backend",
|
331
364
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
332
365
|
```
|
366
|
+
<!--End PulumiCodeChooser -->
|
333
367
|
|
334
368
|
## Import
|
335
369
|
|
@@ -341,6 +375,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
341
375
|
|
342
376
|
:param str resource_name: The name of the resource.
|
343
377
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
378
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
379
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
380
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
344
381
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
345
382
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
346
383
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -351,6 +388,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
351
388
|
The value should not contain leading or trailing forward slashes.
|
352
389
|
The `namespace` is always relative to the provider's configured namespace.
|
353
390
|
*Available only for Vault Enterprise*.
|
391
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
354
392
|
"""
|
355
393
|
...
|
356
394
|
@overload
|
@@ -361,6 +399,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
361
399
|
"""
|
362
400
|
## Example Usage
|
363
401
|
|
402
|
+
<!--Start PulumiCodeChooser -->
|
364
403
|
```python
|
365
404
|
import pulumi
|
366
405
|
import pulumi_vault as vault
|
@@ -370,6 +409,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
370
409
|
description="Manages the Terraform Cloud backend",
|
371
410
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
372
411
|
```
|
412
|
+
<!--End PulumiCodeChooser -->
|
373
413
|
|
374
414
|
## Import
|
375
415
|
|
@@ -449,6 +489,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
449
489
|
:param str resource_name: The unique name of the resulting resource.
|
450
490
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
451
491
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
492
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
493
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
494
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
452
495
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
453
496
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
454
497
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -459,6 +502,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
459
502
|
The value should not contain leading or trailing forward slashes.
|
460
503
|
The `namespace` is always relative to the provider's configured namespace.
|
461
504
|
*Available only for Vault Enterprise*.
|
505
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
462
506
|
"""
|
463
507
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
464
508
|
|
@@ -478,16 +522,25 @@ class SecretBackend(pulumi.CustomResource):
|
|
478
522
|
@property
|
479
523
|
@pulumi.getter
|
480
524
|
def address(self) -> pulumi.Output[Optional[str]]:
|
525
|
+
"""
|
526
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
527
|
+
"""
|
481
528
|
return pulumi.get(self, "address")
|
482
529
|
|
483
530
|
@property
|
484
531
|
@pulumi.getter
|
485
532
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
533
|
+
"""
|
534
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
535
|
+
"""
|
486
536
|
return pulumi.get(self, "backend")
|
487
537
|
|
488
538
|
@property
|
489
539
|
@pulumi.getter(name="basePath")
|
490
540
|
def base_path(self) -> pulumi.Output[Optional[str]]:
|
541
|
+
"""
|
542
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
543
|
+
"""
|
491
544
|
return pulumi.get(self, "base_path")
|
492
545
|
|
493
546
|
@property
|
@@ -538,5 +591,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
538
591
|
@property
|
539
592
|
@pulumi.getter
|
540
593
|
def token(self) -> pulumi.Output[Optional[str]]:
|
594
|
+
"""
|
595
|
+
Specifies the Terraform Cloud access token to use.
|
596
|
+
"""
|
541
597
|
return pulumi.get(self, "token")
|
542
598
|
|
@@ -19,6 +19,7 @@ class SecretCredsArgs:
|
|
19
19
|
namespace: Optional[pulumi.Input[str]] = None):
|
20
20
|
"""
|
21
21
|
The set of arguments for constructing a SecretCreds resource.
|
22
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
22
23
|
:param pulumi.Input[str] role: Name of the role.
|
23
24
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
24
25
|
The value should not contain leading or trailing forward slashes.
|
@@ -33,6 +34,9 @@ class SecretCredsArgs:
|
|
33
34
|
@property
|
34
35
|
@pulumi.getter
|
35
36
|
def backend(self) -> pulumi.Input[str]:
|
37
|
+
"""
|
38
|
+
Terraform Cloud secret backend to generate tokens from
|
39
|
+
"""
|
36
40
|
return pulumi.get(self, "backend")
|
37
41
|
|
38
42
|
@backend.setter
|
@@ -80,6 +84,7 @@ class _SecretCredsState:
|
|
80
84
|
token_id: Optional[pulumi.Input[str]] = None):
|
81
85
|
"""
|
82
86
|
Input properties used for looking up and filtering SecretCreds resources.
|
87
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
83
88
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
84
89
|
Vault lease associated with them.
|
85
90
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -114,6 +119,9 @@ class _SecretCredsState:
|
|
114
119
|
@property
|
115
120
|
@pulumi.getter
|
116
121
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
122
|
+
"""
|
123
|
+
Terraform Cloud secret backend to generate tokens from
|
124
|
+
"""
|
117
125
|
return pulumi.get(self, "backend")
|
118
126
|
|
119
127
|
@backend.setter
|
@@ -223,6 +231,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
223
231
|
"""
|
224
232
|
## Example Usage
|
225
233
|
|
234
|
+
<!--Start PulumiCodeChooser -->
|
226
235
|
```python
|
227
236
|
import pulumi
|
228
237
|
import pulumi_vault as vault
|
@@ -233,16 +242,17 @@ class SecretCreds(pulumi.CustomResource):
|
|
233
242
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
234
243
|
example = vault.terraformcloud.SecretRole("example",
|
235
244
|
backend=test.backend,
|
236
|
-
name="test-role",
|
237
245
|
organization="example-organization-name",
|
238
246
|
team_id="team-ieF4isC...")
|
239
247
|
token = vault.terraformcloud.SecretCreds("token",
|
240
248
|
backend=test.backend,
|
241
249
|
role=example.name)
|
242
250
|
```
|
251
|
+
<!--End PulumiCodeChooser -->
|
243
252
|
|
244
253
|
:param str resource_name: The name of the resource.
|
245
254
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
255
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
246
256
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
247
257
|
The value should not contain leading or trailing forward slashes.
|
248
258
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -258,6 +268,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
258
268
|
"""
|
259
269
|
## Example Usage
|
260
270
|
|
271
|
+
<!--Start PulumiCodeChooser -->
|
261
272
|
```python
|
262
273
|
import pulumi
|
263
274
|
import pulumi_vault as vault
|
@@ -268,13 +279,13 @@ class SecretCreds(pulumi.CustomResource):
|
|
268
279
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
269
280
|
example = vault.terraformcloud.SecretRole("example",
|
270
281
|
backend=test.backend,
|
271
|
-
name="test-role",
|
272
282
|
organization="example-organization-name",
|
273
283
|
team_id="team-ieF4isC...")
|
274
284
|
token = vault.terraformcloud.SecretCreds("token",
|
275
285
|
backend=test.backend,
|
276
286
|
role=example.name)
|
277
287
|
```
|
288
|
+
<!--End PulumiCodeChooser -->
|
278
289
|
|
279
290
|
:param str resource_name: The name of the resource.
|
280
291
|
:param SecretCredsArgs args: The arguments to use to populate this resource's properties.
|
@@ -342,6 +353,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
342
353
|
:param str resource_name: The unique name of the resulting resource.
|
343
354
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
344
355
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
356
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
345
357
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
346
358
|
Vault lease associated with them.
|
347
359
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -373,6 +385,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
373
385
|
@property
|
374
386
|
@pulumi.getter
|
375
387
|
def backend(self) -> pulumi.Output[str]:
|
388
|
+
"""
|
389
|
+
Terraform Cloud secret backend to generate tokens from
|
390
|
+
"""
|
376
391
|
return pulumi.get(self, "backend")
|
377
392
|
|
378
393
|
@property
|