pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,25 +22,25 @@ __all__ = ['SecretRolesetArgs', 'SecretRoleset']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class SecretRolesetArgs:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
backend: pulumi.Input[str],
|
25
|
+
backend: pulumi.Input[builtins.str],
|
25
26
|
bindings: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]],
|
26
|
-
project: pulumi.Input[str],
|
27
|
-
roleset: pulumi.Input[str],
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
secret_type: Optional[pulumi.Input[str]] = None,
|
30
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
27
|
+
project: pulumi.Input[builtins.str],
|
28
|
+
roleset: pulumi.Input[builtins.str],
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
secret_type: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
31
32
|
"""
|
32
33
|
The set of arguments for constructing a SecretRoleset resource.
|
33
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
34
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
34
35
|
:param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
35
|
-
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
36
|
-
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
37
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
|
+
:param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
37
|
+
:param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
|
38
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
38
39
|
The value should not contain leading or trailing forward slashes.
|
39
40
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
40
41
|
*Available only for Vault Enterprise*.
|
41
|
-
:param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
42
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
42
|
+
:param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
43
44
|
"""
|
44
45
|
pulumi.set(__self__, "backend", backend)
|
45
46
|
pulumi.set(__self__, "bindings", bindings)
|
@@ -54,14 +55,14 @@ class SecretRolesetArgs:
|
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def backend(self) -> pulumi.Input[str]:
|
58
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
58
59
|
"""
|
59
60
|
Path where the GCP Secrets Engine is mounted
|
60
61
|
"""
|
61
62
|
return pulumi.get(self, "backend")
|
62
63
|
|
63
64
|
@backend.setter
|
64
|
-
def backend(self, value: pulumi.Input[str]):
|
65
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
65
66
|
pulumi.set(self, "backend", value)
|
66
67
|
|
67
68
|
@property
|
@@ -78,31 +79,31 @@ class SecretRolesetArgs:
|
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def project(self) -> pulumi.Input[str]:
|
82
|
+
def project(self) -> pulumi.Input[builtins.str]:
|
82
83
|
"""
|
83
84
|
Name of the GCP project that this roleset's service account will belong to.
|
84
85
|
"""
|
85
86
|
return pulumi.get(self, "project")
|
86
87
|
|
87
88
|
@project.setter
|
88
|
-
def project(self, value: pulumi.Input[str]):
|
89
|
+
def project(self, value: pulumi.Input[builtins.str]):
|
89
90
|
pulumi.set(self, "project", value)
|
90
91
|
|
91
92
|
@property
|
92
93
|
@pulumi.getter
|
93
|
-
def roleset(self) -> pulumi.Input[str]:
|
94
|
+
def roleset(self) -> pulumi.Input[builtins.str]:
|
94
95
|
"""
|
95
96
|
Name of the Roleset to create
|
96
97
|
"""
|
97
98
|
return pulumi.get(self, "roleset")
|
98
99
|
|
99
100
|
@roleset.setter
|
100
|
-
def roleset(self, value: pulumi.Input[str]):
|
101
|
+
def roleset(self, value: pulumi.Input[builtins.str]):
|
101
102
|
pulumi.set(self, "roleset", value)
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter
|
105
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
106
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
106
107
|
"""
|
107
108
|
The namespace to provision the resource in.
|
108
109
|
The value should not contain leading or trailing forward slashes.
|
@@ -112,58 +113,58 @@ class SecretRolesetArgs:
|
|
112
113
|
return pulumi.get(self, "namespace")
|
113
114
|
|
114
115
|
@namespace.setter
|
115
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
116
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
116
117
|
pulumi.set(self, "namespace", value)
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter(name="secretType")
|
120
|
-
def secret_type(self) -> Optional[pulumi.Input[str]]:
|
121
|
+
def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
121
122
|
"""
|
122
123
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
123
124
|
"""
|
124
125
|
return pulumi.get(self, "secret_type")
|
125
126
|
|
126
127
|
@secret_type.setter
|
127
|
-
def secret_type(self, value: Optional[pulumi.Input[str]]):
|
128
|
+
def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
128
129
|
pulumi.set(self, "secret_type", value)
|
129
130
|
|
130
131
|
@property
|
131
132
|
@pulumi.getter(name="tokenScopes")
|
132
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
133
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
133
134
|
"""
|
134
135
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
135
136
|
"""
|
136
137
|
return pulumi.get(self, "token_scopes")
|
137
138
|
|
138
139
|
@token_scopes.setter
|
139
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
140
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
140
141
|
pulumi.set(self, "token_scopes", value)
|
141
142
|
|
142
143
|
|
143
144
|
@pulumi.input_type
|
144
145
|
class _SecretRolesetState:
|
145
146
|
def __init__(__self__, *,
|
146
|
-
backend: Optional[pulumi.Input[str]] = None,
|
147
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
147
148
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]] = None,
|
148
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
149
|
-
project: Optional[pulumi.Input[str]] = None,
|
150
|
-
roleset: Optional[pulumi.Input[str]] = None,
|
151
|
-
secret_type: Optional[pulumi.Input[str]] = None,
|
152
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
153
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
149
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
150
|
+
project: Optional[pulumi.Input[builtins.str]] = None,
|
151
|
+
roleset: Optional[pulumi.Input[builtins.str]] = None,
|
152
|
+
secret_type: Optional[pulumi.Input[builtins.str]] = None,
|
153
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
154
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
154
155
|
"""
|
155
156
|
Input properties used for looking up and filtering SecretRoleset resources.
|
156
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
157
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
157
158
|
:param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
158
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
159
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
159
160
|
The value should not contain leading or trailing forward slashes.
|
160
161
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
162
|
*Available only for Vault Enterprise*.
|
162
|
-
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
163
|
-
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
164
|
-
:param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
165
|
-
:param pulumi.Input[str] service_account_email: Email of the service account created by Vault for this Roleset.
|
166
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
163
|
+
:param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
164
|
+
:param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
|
165
|
+
:param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
166
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
|
167
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
167
168
|
"""
|
168
169
|
if backend is not None:
|
169
170
|
pulumi.set(__self__, "backend", backend)
|
@@ -184,14 +185,14 @@ class _SecretRolesetState:
|
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter
|
187
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
188
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
188
189
|
"""
|
189
190
|
Path where the GCP Secrets Engine is mounted
|
190
191
|
"""
|
191
192
|
return pulumi.get(self, "backend")
|
192
193
|
|
193
194
|
@backend.setter
|
194
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
195
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
195
196
|
pulumi.set(self, "backend", value)
|
196
197
|
|
197
198
|
@property
|
@@ -208,7 +209,7 @@ class _SecretRolesetState:
|
|
208
209
|
|
209
210
|
@property
|
210
211
|
@pulumi.getter
|
211
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
212
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
212
213
|
"""
|
213
214
|
The namespace to provision the resource in.
|
214
215
|
The value should not contain leading or trailing forward slashes.
|
@@ -218,67 +219,67 @@ class _SecretRolesetState:
|
|
218
219
|
return pulumi.get(self, "namespace")
|
219
220
|
|
220
221
|
@namespace.setter
|
221
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
222
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
222
223
|
pulumi.set(self, "namespace", value)
|
223
224
|
|
224
225
|
@property
|
225
226
|
@pulumi.getter
|
226
|
-
def project(self) -> Optional[pulumi.Input[str]]:
|
227
|
+
def project(self) -> Optional[pulumi.Input[builtins.str]]:
|
227
228
|
"""
|
228
229
|
Name of the GCP project that this roleset's service account will belong to.
|
229
230
|
"""
|
230
231
|
return pulumi.get(self, "project")
|
231
232
|
|
232
233
|
@project.setter
|
233
|
-
def project(self, value: Optional[pulumi.Input[str]]):
|
234
|
+
def project(self, value: Optional[pulumi.Input[builtins.str]]):
|
234
235
|
pulumi.set(self, "project", value)
|
235
236
|
|
236
237
|
@property
|
237
238
|
@pulumi.getter
|
238
|
-
def roleset(self) -> Optional[pulumi.Input[str]]:
|
239
|
+
def roleset(self) -> Optional[pulumi.Input[builtins.str]]:
|
239
240
|
"""
|
240
241
|
Name of the Roleset to create
|
241
242
|
"""
|
242
243
|
return pulumi.get(self, "roleset")
|
243
244
|
|
244
245
|
@roleset.setter
|
245
|
-
def roleset(self, value: Optional[pulumi.Input[str]]):
|
246
|
+
def roleset(self, value: Optional[pulumi.Input[builtins.str]]):
|
246
247
|
pulumi.set(self, "roleset", value)
|
247
248
|
|
248
249
|
@property
|
249
250
|
@pulumi.getter(name="secretType")
|
250
|
-
def secret_type(self) -> Optional[pulumi.Input[str]]:
|
251
|
+
def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
251
252
|
"""
|
252
253
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
253
254
|
"""
|
254
255
|
return pulumi.get(self, "secret_type")
|
255
256
|
|
256
257
|
@secret_type.setter
|
257
|
-
def secret_type(self, value: Optional[pulumi.Input[str]]):
|
258
|
+
def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
258
259
|
pulumi.set(self, "secret_type", value)
|
259
260
|
|
260
261
|
@property
|
261
262
|
@pulumi.getter(name="serviceAccountEmail")
|
262
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
263
|
+
def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
|
263
264
|
"""
|
264
265
|
Email of the service account created by Vault for this Roleset.
|
265
266
|
"""
|
266
267
|
return pulumi.get(self, "service_account_email")
|
267
268
|
|
268
269
|
@service_account_email.setter
|
269
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
270
|
+
def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
|
270
271
|
pulumi.set(self, "service_account_email", value)
|
271
272
|
|
272
273
|
@property
|
273
274
|
@pulumi.getter(name="tokenScopes")
|
274
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
275
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
275
276
|
"""
|
276
277
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
277
278
|
"""
|
278
279
|
return pulumi.get(self, "token_scopes")
|
279
280
|
|
280
281
|
@token_scopes.setter
|
281
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
282
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
282
283
|
pulumi.set(self, "token_scopes", value)
|
283
284
|
|
284
285
|
|
@@ -287,13 +288,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
287
288
|
def __init__(__self__,
|
288
289
|
resource_name: str,
|
289
290
|
opts: Optional[pulumi.ResourceOptions] = None,
|
290
|
-
backend: Optional[pulumi.Input[str]] = None,
|
291
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
291
292
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
292
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
293
|
-
project: Optional[pulumi.Input[str]] = None,
|
294
|
-
roleset: Optional[pulumi.Input[str]] = None,
|
295
|
-
secret_type: Optional[pulumi.Input[str]] = None,
|
296
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
293
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
294
|
+
project: Optional[pulumi.Input[builtins.str]] = None,
|
295
|
+
roleset: Optional[pulumi.Input[builtins.str]] = None,
|
296
|
+
secret_type: Optional[pulumi.Input[builtins.str]] = None,
|
297
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
297
298
|
__props__=None):
|
298
299
|
"""
|
299
300
|
Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
|
@@ -333,16 +334,16 @@ class SecretRoleset(pulumi.CustomResource):
|
|
333
334
|
|
334
335
|
:param str resource_name: The name of the resource.
|
335
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
337
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
337
338
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
338
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
339
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
339
340
|
The value should not contain leading or trailing forward slashes.
|
340
341
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
341
342
|
*Available only for Vault Enterprise*.
|
342
|
-
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
343
|
-
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
344
|
-
:param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
345
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
343
|
+
:param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
344
|
+
:param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
|
345
|
+
:param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
346
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
346
347
|
"""
|
347
348
|
...
|
348
349
|
@overload
|
@@ -401,13 +402,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
401
402
|
def _internal_init(__self__,
|
402
403
|
resource_name: str,
|
403
404
|
opts: Optional[pulumi.ResourceOptions] = None,
|
404
|
-
backend: Optional[pulumi.Input[str]] = None,
|
405
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
405
406
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
406
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
407
|
-
project: Optional[pulumi.Input[str]] = None,
|
408
|
-
roleset: Optional[pulumi.Input[str]] = None,
|
409
|
-
secret_type: Optional[pulumi.Input[str]] = None,
|
410
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
407
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
408
|
+
project: Optional[pulumi.Input[builtins.str]] = None,
|
409
|
+
roleset: Optional[pulumi.Input[builtins.str]] = None,
|
410
|
+
secret_type: Optional[pulumi.Input[builtins.str]] = None,
|
411
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
411
412
|
__props__=None):
|
412
413
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
413
414
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -443,14 +444,14 @@ class SecretRoleset(pulumi.CustomResource):
|
|
443
444
|
def get(resource_name: str,
|
444
445
|
id: pulumi.Input[str],
|
445
446
|
opts: Optional[pulumi.ResourceOptions] = None,
|
446
|
-
backend: Optional[pulumi.Input[str]] = None,
|
447
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
447
448
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
448
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
449
|
-
project: Optional[pulumi.Input[str]] = None,
|
450
|
-
roleset: Optional[pulumi.Input[str]] = None,
|
451
|
-
secret_type: Optional[pulumi.Input[str]] = None,
|
452
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
453
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretRoleset':
|
449
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
450
|
+
project: Optional[pulumi.Input[builtins.str]] = None,
|
451
|
+
roleset: Optional[pulumi.Input[builtins.str]] = None,
|
452
|
+
secret_type: Optional[pulumi.Input[builtins.str]] = None,
|
453
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
454
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretRoleset':
|
454
455
|
"""
|
455
456
|
Get an existing SecretRoleset resource's state with the given name, id, and optional extra
|
456
457
|
properties used to qualify the lookup.
|
@@ -458,17 +459,17 @@ class SecretRoleset(pulumi.CustomResource):
|
|
458
459
|
:param str resource_name: The unique name of the resulting resource.
|
459
460
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
460
461
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
461
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
462
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
462
463
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
463
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
464
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
464
465
|
The value should not contain leading or trailing forward slashes.
|
465
466
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
466
467
|
*Available only for Vault Enterprise*.
|
467
|
-
:param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
|
468
|
-
:param pulumi.Input[str] roleset: Name of the Roleset to create
|
469
|
-
:param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
470
|
-
:param pulumi.Input[str] service_account_email: Email of the service account created by Vault for this Roleset.
|
471
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
468
|
+
:param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
469
|
+
:param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
|
470
|
+
:param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
471
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
|
472
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
472
473
|
"""
|
473
474
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
474
475
|
|
@@ -486,7 +487,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
486
487
|
|
487
488
|
@property
|
488
489
|
@pulumi.getter
|
489
|
-
def backend(self) -> pulumi.Output[str]:
|
490
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
490
491
|
"""
|
491
492
|
Path where the GCP Secrets Engine is mounted
|
492
493
|
"""
|
@@ -502,7 +503,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
502
503
|
|
503
504
|
@property
|
504
505
|
@pulumi.getter
|
505
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
506
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
506
507
|
"""
|
507
508
|
The namespace to provision the resource in.
|
508
509
|
The value should not contain leading or trailing forward slashes.
|
@@ -513,7 +514,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
513
514
|
|
514
515
|
@property
|
515
516
|
@pulumi.getter
|
516
|
-
def project(self) -> pulumi.Output[str]:
|
517
|
+
def project(self) -> pulumi.Output[builtins.str]:
|
517
518
|
"""
|
518
519
|
Name of the GCP project that this roleset's service account will belong to.
|
519
520
|
"""
|
@@ -521,7 +522,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
521
522
|
|
522
523
|
@property
|
523
524
|
@pulumi.getter
|
524
|
-
def roleset(self) -> pulumi.Output[str]:
|
525
|
+
def roleset(self) -> pulumi.Output[builtins.str]:
|
525
526
|
"""
|
526
527
|
Name of the Roleset to create
|
527
528
|
"""
|
@@ -529,7 +530,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
529
530
|
|
530
531
|
@property
|
531
532
|
@pulumi.getter(name="secretType")
|
532
|
-
def secret_type(self) -> pulumi.Output[str]:
|
533
|
+
def secret_type(self) -> pulumi.Output[builtins.str]:
|
533
534
|
"""
|
534
535
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
535
536
|
"""
|
@@ -537,7 +538,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
537
538
|
|
538
539
|
@property
|
539
540
|
@pulumi.getter(name="serviceAccountEmail")
|
540
|
-
def service_account_email(self) -> pulumi.Output[str]:
|
541
|
+
def service_account_email(self) -> pulumi.Output[builtins.str]:
|
541
542
|
"""
|
542
543
|
Email of the service account created by Vault for this Roleset.
|
543
544
|
"""
|
@@ -545,7 +546,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
545
546
|
|
546
547
|
@property
|
547
548
|
@pulumi.getter(name="tokenScopes")
|
548
|
-
def token_scopes(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
549
|
+
def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
549
550
|
"""
|
550
551
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
551
552
|
"""
|