pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,35 +20,35 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
mount: pulumi.Input[str],
|
23
|
-
roles: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
27
|
-
name: Optional[pulumi.Input[str]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
organization_id: Optional[pulumi.Input[str]] = None,
|
30
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
31
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
23
|
+
mount: pulumi.Input[builtins.str],
|
24
|
+
roles: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
25
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
27
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
organization_id: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
33
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None):
|
33
34
|
"""
|
34
35
|
The set of arguments for constructing a SecretRole resource.
|
35
|
-
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
39
|
-
:param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
40
|
-
:param pulumi.Input[str] name: The name of the role.
|
41
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
|
+
:param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
40
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
41
|
+
:param pulumi.Input[builtins.str] name: The name of the role.
|
42
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
42
43
|
The value should not contain leading or trailing forward slashes.
|
43
44
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
45
|
*Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
46
|
+
:param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
46
47
|
Required if `project_id` is not set.
|
47
|
-
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
48
|
+
:param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
48
49
|
Required if `organization_id` is not set.
|
49
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
50
|
-
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
51
|
+
:param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
51
52
|
"""
|
52
53
|
pulumi.set(__self__, "mount", mount)
|
53
54
|
pulumi.set(__self__, "roles", roles)
|
@@ -72,79 +73,79 @@ class SecretRoleArgs:
|
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter
|
75
|
-
def mount(self) -> pulumi.Input[str]:
|
76
|
+
def mount(self) -> pulumi.Input[builtins.str]:
|
76
77
|
"""
|
77
78
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
78
79
|
"""
|
79
80
|
return pulumi.get(self, "mount")
|
80
81
|
|
81
82
|
@mount.setter
|
82
|
-
def mount(self, value: pulumi.Input[str]):
|
83
|
+
def mount(self, value: pulumi.Input[builtins.str]):
|
83
84
|
pulumi.set(self, "mount", value)
|
84
85
|
|
85
86
|
@property
|
86
87
|
@pulumi.getter
|
87
|
-
def roles(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
88
|
+
def roles(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
88
89
|
"""
|
89
90
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
90
91
|
"""
|
91
92
|
return pulumi.get(self, "roles")
|
92
93
|
|
93
94
|
@roles.setter
|
94
|
-
def roles(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
95
|
+
def roles(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
95
96
|
pulumi.set(self, "roles", value)
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter(name="cidrBlocks")
|
99
|
-
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
100
|
+
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
100
101
|
"""
|
101
102
|
Whitelist entry in CIDR notation to be added for the API key.
|
102
103
|
"""
|
103
104
|
return pulumi.get(self, "cidr_blocks")
|
104
105
|
|
105
106
|
@cidr_blocks.setter
|
106
|
-
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
107
|
+
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
107
108
|
pulumi.set(self, "cidr_blocks", value)
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter(name="ipAddresses")
|
111
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
112
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
112
113
|
"""
|
113
114
|
IP address to be added to the whitelist for the API key.
|
114
115
|
"""
|
115
116
|
return pulumi.get(self, "ip_addresses")
|
116
117
|
|
117
118
|
@ip_addresses.setter
|
118
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
119
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
119
120
|
pulumi.set(self, "ip_addresses", value)
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter(name="maxTtl")
|
123
|
-
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
The maximum allowed lifetime of credentials issued using this role.
|
126
127
|
"""
|
127
128
|
return pulumi.get(self, "max_ttl")
|
128
129
|
|
129
130
|
@max_ttl.setter
|
130
|
-
def max_ttl(self, value: Optional[pulumi.Input[str]]):
|
131
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
131
132
|
pulumi.set(self, "max_ttl", value)
|
132
133
|
|
133
134
|
@property
|
134
135
|
@pulumi.getter
|
135
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
136
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
136
137
|
"""
|
137
138
|
The name of the role.
|
138
139
|
"""
|
139
140
|
return pulumi.get(self, "name")
|
140
141
|
|
141
142
|
@name.setter
|
142
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
143
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
143
144
|
pulumi.set(self, "name", value)
|
144
145
|
|
145
146
|
@property
|
146
147
|
@pulumi.getter
|
147
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
148
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
148
149
|
"""
|
149
150
|
The namespace to provision the resource in.
|
150
151
|
The value should not contain leading or trailing forward slashes.
|
@@ -154,12 +155,12 @@ class SecretRoleArgs:
|
|
154
155
|
return pulumi.get(self, "namespace")
|
155
156
|
|
156
157
|
@namespace.setter
|
157
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
158
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
158
159
|
pulumi.set(self, "namespace", value)
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter(name="organizationId")
|
162
|
-
def organization_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
163
164
|
"""
|
164
165
|
Unique identifier for the organization to which the target API Key belongs.
|
165
166
|
Required if `project_id` is not set.
|
@@ -167,12 +168,12 @@ class SecretRoleArgs:
|
|
167
168
|
return pulumi.get(self, "organization_id")
|
168
169
|
|
169
170
|
@organization_id.setter
|
170
|
-
def organization_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
171
172
|
pulumi.set(self, "organization_id", value)
|
172
173
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter(name="projectId")
|
175
|
-
def project_id(self) -> Optional[pulumi.Input[str]]:
|
176
|
+
def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
176
177
|
"""
|
177
178
|
Unique identifier for the project to which the target API Key belongs.
|
178
179
|
Required if `organization_id` is not set.
|
@@ -180,66 +181,66 @@ class SecretRoleArgs:
|
|
180
181
|
return pulumi.get(self, "project_id")
|
181
182
|
|
182
183
|
@project_id.setter
|
183
|
-
def project_id(self, value: Optional[pulumi.Input[str]]):
|
184
|
+
def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
184
185
|
pulumi.set(self, "project_id", value)
|
185
186
|
|
186
187
|
@property
|
187
188
|
@pulumi.getter(name="projectRoles")
|
188
|
-
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
189
|
+
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
189
190
|
"""
|
190
191
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
191
192
|
"""
|
192
193
|
return pulumi.get(self, "project_roles")
|
193
194
|
|
194
195
|
@project_roles.setter
|
195
|
-
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
196
|
+
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
196
197
|
pulumi.set(self, "project_roles", value)
|
197
198
|
|
198
199
|
@property
|
199
200
|
@pulumi.getter
|
200
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
201
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
201
202
|
"""
|
202
203
|
Duration in seconds after which the issued credential should expire.
|
203
204
|
"""
|
204
205
|
return pulumi.get(self, "ttl")
|
205
206
|
|
206
207
|
@ttl.setter
|
207
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
208
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
208
209
|
pulumi.set(self, "ttl", value)
|
209
210
|
|
210
211
|
|
211
212
|
@pulumi.input_type
|
212
213
|
class _SecretRoleState:
|
213
214
|
def __init__(__self__, *,
|
214
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
215
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
216
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
217
|
-
mount: Optional[pulumi.Input[str]] = None,
|
218
|
-
name: Optional[pulumi.Input[str]] = None,
|
219
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
220
|
-
organization_id: Optional[pulumi.Input[str]] = None,
|
221
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
222
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
223
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
224
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
215
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
216
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
217
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
218
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
219
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
220
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
221
|
+
organization_id: Optional[pulumi.Input[builtins.str]] = None,
|
222
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
223
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
224
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
225
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None):
|
225
226
|
"""
|
226
227
|
Input properties used for looking up and filtering SecretRole resources.
|
227
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
228
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
229
|
-
:param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
230
|
-
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
231
|
-
:param pulumi.Input[str] name: The name of the role.
|
232
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
228
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
229
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
230
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
231
|
+
:param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
232
|
+
:param pulumi.Input[builtins.str] name: The name of the role.
|
233
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
233
234
|
The value should not contain leading or trailing forward slashes.
|
234
235
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
236
|
*Available only for Vault Enterprise*.
|
236
|
-
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
237
|
+
:param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
237
238
|
Required if `project_id` is not set.
|
238
|
-
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
239
|
+
:param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
239
240
|
Required if `organization_id` is not set.
|
240
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
241
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
242
|
-
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
241
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
242
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
243
|
+
:param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
243
244
|
"""
|
244
245
|
if cidr_blocks is not None:
|
245
246
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
@@ -266,67 +267,67 @@ class _SecretRoleState:
|
|
266
267
|
|
267
268
|
@property
|
268
269
|
@pulumi.getter(name="cidrBlocks")
|
269
|
-
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
270
|
+
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
270
271
|
"""
|
271
272
|
Whitelist entry in CIDR notation to be added for the API key.
|
272
273
|
"""
|
273
274
|
return pulumi.get(self, "cidr_blocks")
|
274
275
|
|
275
276
|
@cidr_blocks.setter
|
276
|
-
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
277
|
+
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
277
278
|
pulumi.set(self, "cidr_blocks", value)
|
278
279
|
|
279
280
|
@property
|
280
281
|
@pulumi.getter(name="ipAddresses")
|
281
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
282
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
282
283
|
"""
|
283
284
|
IP address to be added to the whitelist for the API key.
|
284
285
|
"""
|
285
286
|
return pulumi.get(self, "ip_addresses")
|
286
287
|
|
287
288
|
@ip_addresses.setter
|
288
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
289
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
289
290
|
pulumi.set(self, "ip_addresses", value)
|
290
291
|
|
291
292
|
@property
|
292
293
|
@pulumi.getter(name="maxTtl")
|
293
|
-
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
294
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
294
295
|
"""
|
295
296
|
The maximum allowed lifetime of credentials issued using this role.
|
296
297
|
"""
|
297
298
|
return pulumi.get(self, "max_ttl")
|
298
299
|
|
299
300
|
@max_ttl.setter
|
300
|
-
def max_ttl(self, value: Optional[pulumi.Input[str]]):
|
301
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
301
302
|
pulumi.set(self, "max_ttl", value)
|
302
303
|
|
303
304
|
@property
|
304
305
|
@pulumi.getter
|
305
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
306
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
306
307
|
"""
|
307
308
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
308
309
|
"""
|
309
310
|
return pulumi.get(self, "mount")
|
310
311
|
|
311
312
|
@mount.setter
|
312
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
313
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
313
314
|
pulumi.set(self, "mount", value)
|
314
315
|
|
315
316
|
@property
|
316
317
|
@pulumi.getter
|
317
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
318
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
318
319
|
"""
|
319
320
|
The name of the role.
|
320
321
|
"""
|
321
322
|
return pulumi.get(self, "name")
|
322
323
|
|
323
324
|
@name.setter
|
324
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
325
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
325
326
|
pulumi.set(self, "name", value)
|
326
327
|
|
327
328
|
@property
|
328
329
|
@pulumi.getter
|
329
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
330
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
330
331
|
"""
|
331
332
|
The namespace to provision the resource in.
|
332
333
|
The value should not contain leading or trailing forward slashes.
|
@@ -336,12 +337,12 @@ class _SecretRoleState:
|
|
336
337
|
return pulumi.get(self, "namespace")
|
337
338
|
|
338
339
|
@namespace.setter
|
339
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
340
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
340
341
|
pulumi.set(self, "namespace", value)
|
341
342
|
|
342
343
|
@property
|
343
344
|
@pulumi.getter(name="organizationId")
|
344
|
-
def organization_id(self) -> Optional[pulumi.Input[str]]:
|
345
|
+
def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
345
346
|
"""
|
346
347
|
Unique identifier for the organization to which the target API Key belongs.
|
347
348
|
Required if `project_id` is not set.
|
@@ -349,12 +350,12 @@ class _SecretRoleState:
|
|
349
350
|
return pulumi.get(self, "organization_id")
|
350
351
|
|
351
352
|
@organization_id.setter
|
352
|
-
def organization_id(self, value: Optional[pulumi.Input[str]]):
|
353
|
+
def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
353
354
|
pulumi.set(self, "organization_id", value)
|
354
355
|
|
355
356
|
@property
|
356
357
|
@pulumi.getter(name="projectId")
|
357
|
-
def project_id(self) -> Optional[pulumi.Input[str]]:
|
358
|
+
def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
358
359
|
"""
|
359
360
|
Unique identifier for the project to which the target API Key belongs.
|
360
361
|
Required if `organization_id` is not set.
|
@@ -362,43 +363,43 @@ class _SecretRoleState:
|
|
362
363
|
return pulumi.get(self, "project_id")
|
363
364
|
|
364
365
|
@project_id.setter
|
365
|
-
def project_id(self, value: Optional[pulumi.Input[str]]):
|
366
|
+
def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
366
367
|
pulumi.set(self, "project_id", value)
|
367
368
|
|
368
369
|
@property
|
369
370
|
@pulumi.getter(name="projectRoles")
|
370
|
-
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
371
|
+
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
371
372
|
"""
|
372
373
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
373
374
|
"""
|
374
375
|
return pulumi.get(self, "project_roles")
|
375
376
|
|
376
377
|
@project_roles.setter
|
377
|
-
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
378
|
+
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
378
379
|
pulumi.set(self, "project_roles", value)
|
379
380
|
|
380
381
|
@property
|
381
382
|
@pulumi.getter
|
382
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
383
|
+
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
383
384
|
"""
|
384
385
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
385
386
|
"""
|
386
387
|
return pulumi.get(self, "roles")
|
387
388
|
|
388
389
|
@roles.setter
|
389
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
390
|
+
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
390
391
|
pulumi.set(self, "roles", value)
|
391
392
|
|
392
393
|
@property
|
393
394
|
@pulumi.getter
|
394
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
395
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
395
396
|
"""
|
396
397
|
Duration in seconds after which the issued credential should expire.
|
397
398
|
"""
|
398
399
|
return pulumi.get(self, "ttl")
|
399
400
|
|
400
401
|
@ttl.setter
|
401
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
402
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
402
403
|
pulumi.set(self, "ttl", value)
|
403
404
|
|
404
405
|
|
@@ -407,17 +408,17 @@ class SecretRole(pulumi.CustomResource):
|
|
407
408
|
def __init__(__self__,
|
408
409
|
resource_name: str,
|
409
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
410
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
411
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
412
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
413
|
-
mount: Optional[pulumi.Input[str]] = None,
|
414
|
-
name: Optional[pulumi.Input[str]] = None,
|
415
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
416
|
-
organization_id: Optional[pulumi.Input[str]] = None,
|
417
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
418
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
419
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
420
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
411
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
412
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
413
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
414
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
415
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
416
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
417
|
+
organization_id: Optional[pulumi.Input[builtins.str]] = None,
|
418
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
419
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
420
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
421
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
421
422
|
__props__=None):
|
422
423
|
"""
|
423
424
|
## Example Usage
|
@@ -458,22 +459,22 @@ class SecretRole(pulumi.CustomResource):
|
|
458
459
|
|
459
460
|
:param str resource_name: The name of the resource.
|
460
461
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
461
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
462
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
463
|
-
:param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
464
|
-
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
465
|
-
:param pulumi.Input[str] name: The name of the role.
|
466
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
462
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
463
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
464
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
465
|
+
:param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
466
|
+
:param pulumi.Input[builtins.str] name: The name of the role.
|
467
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
467
468
|
The value should not contain leading or trailing forward slashes.
|
468
469
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
469
470
|
*Available only for Vault Enterprise*.
|
470
|
-
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
471
|
+
:param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
471
472
|
Required if `project_id` is not set.
|
472
|
-
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
473
|
+
:param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
473
474
|
Required if `organization_id` is not set.
|
474
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
475
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
476
|
-
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
475
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
476
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
477
|
+
:param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
477
478
|
"""
|
478
479
|
...
|
479
480
|
@overload
|
@@ -533,17 +534,17 @@ class SecretRole(pulumi.CustomResource):
|
|
533
534
|
def _internal_init(__self__,
|
534
535
|
resource_name: str,
|
535
536
|
opts: Optional[pulumi.ResourceOptions] = None,
|
536
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
537
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
538
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
539
|
-
mount: Optional[pulumi.Input[str]] = None,
|
540
|
-
name: Optional[pulumi.Input[str]] = None,
|
541
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
542
|
-
organization_id: Optional[pulumi.Input[str]] = None,
|
543
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
544
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
545
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
546
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
537
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
538
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
539
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
540
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
541
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
542
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
543
|
+
organization_id: Optional[pulumi.Input[builtins.str]] = None,
|
544
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
545
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
546
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
547
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
547
548
|
__props__=None):
|
548
549
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
549
550
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -578,17 +579,17 @@ class SecretRole(pulumi.CustomResource):
|
|
578
579
|
def get(resource_name: str,
|
579
580
|
id: pulumi.Input[str],
|
580
581
|
opts: Optional[pulumi.ResourceOptions] = None,
|
581
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
582
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
583
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
584
|
-
mount: Optional[pulumi.Input[str]] = None,
|
585
|
-
name: Optional[pulumi.Input[str]] = None,
|
586
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
587
|
-
organization_id: Optional[pulumi.Input[str]] = None,
|
588
|
-
project_id: Optional[pulumi.Input[str]] = None,
|
589
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
590
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
591
|
-
ttl: Optional[pulumi.Input[str]] = None) -> 'SecretRole':
|
582
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
583
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
584
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
585
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
586
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
587
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
588
|
+
organization_id: Optional[pulumi.Input[builtins.str]] = None,
|
589
|
+
project_id: Optional[pulumi.Input[builtins.str]] = None,
|
590
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
591
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
592
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretRole':
|
592
593
|
"""
|
593
594
|
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
594
595
|
properties used to qualify the lookup.
|
@@ -596,22 +597,22 @@ class SecretRole(pulumi.CustomResource):
|
|
596
597
|
:param str resource_name: The unique name of the resulting resource.
|
597
598
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
598
599
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
599
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
600
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
601
|
-
:param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
602
|
-
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
603
|
-
:param pulumi.Input[str] name: The name of the role.
|
604
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
600
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
601
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
602
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
603
|
+
:param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
604
|
+
:param pulumi.Input[builtins.str] name: The name of the role.
|
605
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
605
606
|
The value should not contain leading or trailing forward slashes.
|
606
607
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
607
608
|
*Available only for Vault Enterprise*.
|
608
|
-
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
609
|
+
:param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
609
610
|
Required if `project_id` is not set.
|
610
|
-
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
611
|
+
:param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
611
612
|
Required if `organization_id` is not set.
|
612
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
613
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
614
|
-
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
613
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
614
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
615
|
+
:param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
615
616
|
"""
|
616
617
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
617
618
|
|
@@ -632,7 +633,7 @@ class SecretRole(pulumi.CustomResource):
|
|
632
633
|
|
633
634
|
@property
|
634
635
|
@pulumi.getter(name="cidrBlocks")
|
635
|
-
def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
636
|
+
def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
636
637
|
"""
|
637
638
|
Whitelist entry in CIDR notation to be added for the API key.
|
638
639
|
"""
|
@@ -640,7 +641,7 @@ class SecretRole(pulumi.CustomResource):
|
|
640
641
|
|
641
642
|
@property
|
642
643
|
@pulumi.getter(name="ipAddresses")
|
643
|
-
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
644
|
+
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
644
645
|
"""
|
645
646
|
IP address to be added to the whitelist for the API key.
|
646
647
|
"""
|
@@ -648,7 +649,7 @@ class SecretRole(pulumi.CustomResource):
|
|
648
649
|
|
649
650
|
@property
|
650
651
|
@pulumi.getter(name="maxTtl")
|
651
|
-
def max_ttl(self) -> pulumi.Output[Optional[str]]:
|
652
|
+
def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
652
653
|
"""
|
653
654
|
The maximum allowed lifetime of credentials issued using this role.
|
654
655
|
"""
|
@@ -656,7 +657,7 @@ class SecretRole(pulumi.CustomResource):
|
|
656
657
|
|
657
658
|
@property
|
658
659
|
@pulumi.getter
|
659
|
-
def mount(self) -> pulumi.Output[str]:
|
660
|
+
def mount(self) -> pulumi.Output[builtins.str]:
|
660
661
|
"""
|
661
662
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
662
663
|
"""
|
@@ -664,7 +665,7 @@ class SecretRole(pulumi.CustomResource):
|
|
664
665
|
|
665
666
|
@property
|
666
667
|
@pulumi.getter
|
667
|
-
def name(self) -> pulumi.Output[str]:
|
668
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
668
669
|
"""
|
669
670
|
The name of the role.
|
670
671
|
"""
|
@@ -672,7 +673,7 @@ class SecretRole(pulumi.CustomResource):
|
|
672
673
|
|
673
674
|
@property
|
674
675
|
@pulumi.getter
|
675
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
676
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
676
677
|
"""
|
677
678
|
The namespace to provision the resource in.
|
678
679
|
The value should not contain leading or trailing forward slashes.
|
@@ -683,7 +684,7 @@ class SecretRole(pulumi.CustomResource):
|
|
683
684
|
|
684
685
|
@property
|
685
686
|
@pulumi.getter(name="organizationId")
|
686
|
-
def organization_id(self) -> pulumi.Output[Optional[str]]:
|
687
|
+
def organization_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
687
688
|
"""
|
688
689
|
Unique identifier for the organization to which the target API Key belongs.
|
689
690
|
Required if `project_id` is not set.
|
@@ -692,7 +693,7 @@ class SecretRole(pulumi.CustomResource):
|
|
692
693
|
|
693
694
|
@property
|
694
695
|
@pulumi.getter(name="projectId")
|
695
|
-
def project_id(self) -> pulumi.Output[Optional[str]]:
|
696
|
+
def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
696
697
|
"""
|
697
698
|
Unique identifier for the project to which the target API Key belongs.
|
698
699
|
Required if `organization_id` is not set.
|
@@ -701,7 +702,7 @@ class SecretRole(pulumi.CustomResource):
|
|
701
702
|
|
702
703
|
@property
|
703
704
|
@pulumi.getter(name="projectRoles")
|
704
|
-
def project_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
705
|
+
def project_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
705
706
|
"""
|
706
707
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
707
708
|
"""
|
@@ -709,7 +710,7 @@ class SecretRole(pulumi.CustomResource):
|
|
709
710
|
|
710
711
|
@property
|
711
712
|
@pulumi.getter
|
712
|
-
def roles(self) -> pulumi.Output[Sequence[str]]:
|
713
|
+
def roles(self) -> pulumi.Output[Sequence[builtins.str]]:
|
713
714
|
"""
|
714
715
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
715
716
|
"""
|
@@ -717,7 +718,7 @@ class SecretRole(pulumi.CustomResource):
|
|
717
718
|
|
718
719
|
@property
|
719
720
|
@pulumi.getter
|
720
|
-
def ttl(self) -> pulumi.Output[Optional[str]]:
|
721
|
+
def ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
721
722
|
"""
|
722
723
|
Duration in seconds after which the issued credential should expire.
|
723
724
|
"""
|