pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,13 +20,13 @@ __all__ = ['SecretCredsArgs', 'SecretCreds']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretCredsArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
role: pulumi.Input[str],
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
role: pulumi.Input[builtins.str],
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
25
26
|
"""
|
26
27
|
The set of arguments for constructing a SecretCreds resource.
|
27
|
-
:param pulumi.Input[str] role: Name of the role.
|
28
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
|
+
:param pulumi.Input[builtins.str] role: Name of the role.
|
29
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
29
30
|
The value should not contain leading or trailing forward slashes.
|
30
31
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
32
|
*Available only for Vault Enterprise*.
|
@@ -37,28 +38,28 @@ class SecretCredsArgs:
|
|
37
38
|
|
38
39
|
@property
|
39
40
|
@pulumi.getter
|
40
|
-
def backend(self) -> pulumi.Input[str]:
|
41
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
41
42
|
return pulumi.get(self, "backend")
|
42
43
|
|
43
44
|
@backend.setter
|
44
|
-
def backend(self, value: pulumi.Input[str]):
|
45
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
45
46
|
pulumi.set(self, "backend", value)
|
46
47
|
|
47
48
|
@property
|
48
49
|
@pulumi.getter
|
49
|
-
def role(self) -> pulumi.Input[str]:
|
50
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
50
51
|
"""
|
51
52
|
Name of the role.
|
52
53
|
"""
|
53
54
|
return pulumi.get(self, "role")
|
54
55
|
|
55
56
|
@role.setter
|
56
|
-
def role(self, value: pulumi.Input[str]):
|
57
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
57
58
|
pulumi.set(self, "role", value)
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
62
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
62
63
|
"""
|
63
64
|
The namespace to provision the resource in.
|
64
65
|
The value should not contain leading or trailing forward slashes.
|
@@ -68,35 +69,35 @@ class SecretCredsArgs:
|
|
68
69
|
return pulumi.get(self, "namespace")
|
69
70
|
|
70
71
|
@namespace.setter
|
71
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
72
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
72
73
|
pulumi.set(self, "namespace", value)
|
73
74
|
|
74
75
|
|
75
76
|
@pulumi.input_type
|
76
77
|
class _SecretCredsState:
|
77
78
|
def __init__(__self__, *,
|
78
|
-
backend: Optional[pulumi.Input[str]] = None,
|
79
|
-
lease_id: Optional[pulumi.Input[str]] = None,
|
80
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
81
|
-
organization: Optional[pulumi.Input[str]] = None,
|
82
|
-
role: Optional[pulumi.Input[str]] = None,
|
83
|
-
team_id: Optional[pulumi.Input[str]] = None,
|
84
|
-
token: Optional[pulumi.Input[str]] = None,
|
85
|
-
token_id: Optional[pulumi.Input[str]] = None):
|
79
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
80
|
+
lease_id: Optional[pulumi.Input[builtins.str]] = None,
|
81
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
82
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
83
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
84
|
+
team_id: Optional[pulumi.Input[builtins.str]] = None,
|
85
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
86
|
+
token_id: Optional[pulumi.Input[builtins.str]] = None):
|
86
87
|
"""
|
87
88
|
Input properties used for looking up and filtering SecretCreds resources.
|
88
|
-
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
89
|
+
:param pulumi.Input[builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
|
89
90
|
Vault lease associated with them.
|
90
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
91
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
91
92
|
The value should not contain leading or trailing forward slashes.
|
92
93
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
93
94
|
*Available only for Vault Enterprise*.
|
94
|
-
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
95
|
-
:param pulumi.Input[str] role: Name of the role.
|
96
|
-
:param pulumi.Input[str] team_id: The team id associated with the token provided.
|
97
|
-
:param pulumi.Input[str] token: The actual token that was generated and can be used with API calls
|
95
|
+
:param pulumi.Input[builtins.str] organization: The organization associated with the token provided.
|
96
|
+
:param pulumi.Input[builtins.str] role: Name of the role.
|
97
|
+
:param pulumi.Input[builtins.str] team_id: The team id associated with the token provided.
|
98
|
+
:param pulumi.Input[builtins.str] token: The actual token that was generated and can be used with API calls
|
98
99
|
to identify the user of the call.
|
99
|
-
:param pulumi.Input[str] token_id: The public identifier for a specific token. It can be used
|
100
|
+
:param pulumi.Input[builtins.str] token_id: The public identifier for a specific token. It can be used
|
100
101
|
to look up information about a token or to revoke a token.
|
101
102
|
"""
|
102
103
|
if backend is not None:
|
@@ -118,16 +119,16 @@ class _SecretCredsState:
|
|
118
119
|
|
119
120
|
@property
|
120
121
|
@pulumi.getter
|
121
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
122
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
122
123
|
return pulumi.get(self, "backend")
|
123
124
|
|
124
125
|
@backend.setter
|
125
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
126
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
126
127
|
pulumi.set(self, "backend", value)
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter(name="leaseId")
|
130
|
-
def lease_id(self) -> Optional[pulumi.Input[str]]:
|
131
|
+
def lease_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
131
132
|
"""
|
132
133
|
The lease associated with the token. Only user tokens will have a
|
133
134
|
Vault lease associated with them.
|
@@ -135,12 +136,12 @@ class _SecretCredsState:
|
|
135
136
|
return pulumi.get(self, "lease_id")
|
136
137
|
|
137
138
|
@lease_id.setter
|
138
|
-
def lease_id(self, value: Optional[pulumi.Input[str]]):
|
139
|
+
def lease_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
139
140
|
pulumi.set(self, "lease_id", value)
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter
|
143
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
144
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
144
145
|
"""
|
145
146
|
The namespace to provision the resource in.
|
146
147
|
The value should not contain leading or trailing forward slashes.
|
@@ -150,48 +151,48 @@ class _SecretCredsState:
|
|
150
151
|
return pulumi.get(self, "namespace")
|
151
152
|
|
152
153
|
@namespace.setter
|
153
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
154
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
154
155
|
pulumi.set(self, "namespace", value)
|
155
156
|
|
156
157
|
@property
|
157
158
|
@pulumi.getter
|
158
|
-
def organization(self) -> Optional[pulumi.Input[str]]:
|
159
|
+
def organization(self) -> Optional[pulumi.Input[builtins.str]]:
|
159
160
|
"""
|
160
161
|
The organization associated with the token provided.
|
161
162
|
"""
|
162
163
|
return pulumi.get(self, "organization")
|
163
164
|
|
164
165
|
@organization.setter
|
165
|
-
def organization(self, value: Optional[pulumi.Input[str]]):
|
166
|
+
def organization(self, value: Optional[pulumi.Input[builtins.str]]):
|
166
167
|
pulumi.set(self, "organization", value)
|
167
168
|
|
168
169
|
@property
|
169
170
|
@pulumi.getter
|
170
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
171
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
171
172
|
"""
|
172
173
|
Name of the role.
|
173
174
|
"""
|
174
175
|
return pulumi.get(self, "role")
|
175
176
|
|
176
177
|
@role.setter
|
177
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
178
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
178
179
|
pulumi.set(self, "role", value)
|
179
180
|
|
180
181
|
@property
|
181
182
|
@pulumi.getter(name="teamId")
|
182
|
-
def team_id(self) -> Optional[pulumi.Input[str]]:
|
183
|
+
def team_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
183
184
|
"""
|
184
185
|
The team id associated with the token provided.
|
185
186
|
"""
|
186
187
|
return pulumi.get(self, "team_id")
|
187
188
|
|
188
189
|
@team_id.setter
|
189
|
-
def team_id(self, value: Optional[pulumi.Input[str]]):
|
190
|
+
def team_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
190
191
|
pulumi.set(self, "team_id", value)
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter
|
194
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
195
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
195
196
|
"""
|
196
197
|
The actual token that was generated and can be used with API calls
|
197
198
|
to identify the user of the call.
|
@@ -199,12 +200,12 @@ class _SecretCredsState:
|
|
199
200
|
return pulumi.get(self, "token")
|
200
201
|
|
201
202
|
@token.setter
|
202
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
203
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
203
204
|
pulumi.set(self, "token", value)
|
204
205
|
|
205
206
|
@property
|
206
207
|
@pulumi.getter(name="tokenId")
|
207
|
-
def token_id(self) -> Optional[pulumi.Input[str]]:
|
208
|
+
def token_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
208
209
|
"""
|
209
210
|
The public identifier for a specific token. It can be used
|
210
211
|
to look up information about a token or to revoke a token.
|
@@ -212,7 +213,7 @@ class _SecretCredsState:
|
|
212
213
|
return pulumi.get(self, "token_id")
|
213
214
|
|
214
215
|
@token_id.setter
|
215
|
-
def token_id(self, value: Optional[pulumi.Input[str]]):
|
216
|
+
def token_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
216
217
|
pulumi.set(self, "token_id", value)
|
217
218
|
|
218
219
|
|
@@ -221,9 +222,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
221
222
|
def __init__(__self__,
|
222
223
|
resource_name: str,
|
223
224
|
opts: Optional[pulumi.ResourceOptions] = None,
|
224
|
-
backend: Optional[pulumi.Input[str]] = None,
|
225
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
226
|
-
role: Optional[pulumi.Input[str]] = None,
|
225
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
226
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
227
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
227
228
|
__props__=None):
|
228
229
|
"""
|
229
230
|
## Example Usage
|
@@ -248,11 +249,11 @@ class SecretCreds(pulumi.CustomResource):
|
|
248
249
|
|
249
250
|
:param str resource_name: The name of the resource.
|
250
251
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
251
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
252
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
252
253
|
The value should not contain leading or trailing forward slashes.
|
253
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
254
255
|
*Available only for Vault Enterprise*.
|
255
|
-
:param pulumi.Input[str] role: Name of the role.
|
256
|
+
:param pulumi.Input[builtins.str] role: Name of the role.
|
256
257
|
"""
|
257
258
|
...
|
258
259
|
@overload
|
@@ -296,9 +297,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
296
297
|
def _internal_init(__self__,
|
297
298
|
resource_name: str,
|
298
299
|
opts: Optional[pulumi.ResourceOptions] = None,
|
299
|
-
backend: Optional[pulumi.Input[str]] = None,
|
300
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
301
|
-
role: Optional[pulumi.Input[str]] = None,
|
300
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
301
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
302
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
302
303
|
__props__=None):
|
303
304
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
304
305
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -332,14 +333,14 @@ class SecretCreds(pulumi.CustomResource):
|
|
332
333
|
def get(resource_name: str,
|
333
334
|
id: pulumi.Input[str],
|
334
335
|
opts: Optional[pulumi.ResourceOptions] = None,
|
335
|
-
backend: Optional[pulumi.Input[str]] = None,
|
336
|
-
lease_id: Optional[pulumi.Input[str]] = None,
|
337
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
338
|
-
organization: Optional[pulumi.Input[str]] = None,
|
339
|
-
role: Optional[pulumi.Input[str]] = None,
|
340
|
-
team_id: Optional[pulumi.Input[str]] = None,
|
341
|
-
token: Optional[pulumi.Input[str]] = None,
|
342
|
-
token_id: Optional[pulumi.Input[str]] = None) -> 'SecretCreds':
|
336
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
337
|
+
lease_id: Optional[pulumi.Input[builtins.str]] = None,
|
338
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
339
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
340
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
341
|
+
team_id: Optional[pulumi.Input[builtins.str]] = None,
|
342
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
343
|
+
token_id: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretCreds':
|
343
344
|
"""
|
344
345
|
Get an existing SecretCreds resource's state with the given name, id, and optional extra
|
345
346
|
properties used to qualify the lookup.
|
@@ -347,18 +348,18 @@ class SecretCreds(pulumi.CustomResource):
|
|
347
348
|
:param str resource_name: The unique name of the resulting resource.
|
348
349
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
349
350
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
350
|
-
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
351
|
+
:param pulumi.Input[builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
|
351
352
|
Vault lease associated with them.
|
352
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
353
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
353
354
|
The value should not contain leading or trailing forward slashes.
|
354
355
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
355
356
|
*Available only for Vault Enterprise*.
|
356
|
-
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
357
|
-
:param pulumi.Input[str] role: Name of the role.
|
358
|
-
:param pulumi.Input[str] team_id: The team id associated with the token provided.
|
359
|
-
:param pulumi.Input[str] token: The actual token that was generated and can be used with API calls
|
357
|
+
:param pulumi.Input[builtins.str] organization: The organization associated with the token provided.
|
358
|
+
:param pulumi.Input[builtins.str] role: Name of the role.
|
359
|
+
:param pulumi.Input[builtins.str] team_id: The team id associated with the token provided.
|
360
|
+
:param pulumi.Input[builtins.str] token: The actual token that was generated and can be used with API calls
|
360
361
|
to identify the user of the call.
|
361
|
-
:param pulumi.Input[str] token_id: The public identifier for a specific token. It can be used
|
362
|
+
:param pulumi.Input[builtins.str] token_id: The public identifier for a specific token. It can be used
|
362
363
|
to look up information about a token or to revoke a token.
|
363
364
|
"""
|
364
365
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -377,12 +378,12 @@ class SecretCreds(pulumi.CustomResource):
|
|
377
378
|
|
378
379
|
@property
|
379
380
|
@pulumi.getter
|
380
|
-
def backend(self) -> pulumi.Output[str]:
|
381
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
381
382
|
return pulumi.get(self, "backend")
|
382
383
|
|
383
384
|
@property
|
384
385
|
@pulumi.getter(name="leaseId")
|
385
|
-
def lease_id(self) -> pulumi.Output[str]:
|
386
|
+
def lease_id(self) -> pulumi.Output[builtins.str]:
|
386
387
|
"""
|
387
388
|
The lease associated with the token. Only user tokens will have a
|
388
389
|
Vault lease associated with them.
|
@@ -391,7 +392,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
391
392
|
|
392
393
|
@property
|
393
394
|
@pulumi.getter
|
394
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
395
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
395
396
|
"""
|
396
397
|
The namespace to provision the resource in.
|
397
398
|
The value should not contain leading or trailing forward slashes.
|
@@ -402,7 +403,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
402
403
|
|
403
404
|
@property
|
404
405
|
@pulumi.getter
|
405
|
-
def organization(self) -> pulumi.Output[str]:
|
406
|
+
def organization(self) -> pulumi.Output[builtins.str]:
|
406
407
|
"""
|
407
408
|
The organization associated with the token provided.
|
408
409
|
"""
|
@@ -410,7 +411,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
410
411
|
|
411
412
|
@property
|
412
413
|
@pulumi.getter
|
413
|
-
def role(self) -> pulumi.Output[str]:
|
414
|
+
def role(self) -> pulumi.Output[builtins.str]:
|
414
415
|
"""
|
415
416
|
Name of the role.
|
416
417
|
"""
|
@@ -418,7 +419,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
418
419
|
|
419
420
|
@property
|
420
421
|
@pulumi.getter(name="teamId")
|
421
|
-
def team_id(self) -> pulumi.Output[str]:
|
422
|
+
def team_id(self) -> pulumi.Output[builtins.str]:
|
422
423
|
"""
|
423
424
|
The team id associated with the token provided.
|
424
425
|
"""
|
@@ -426,7 +427,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
426
427
|
|
427
428
|
@property
|
428
429
|
@pulumi.getter
|
429
|
-
def token(self) -> pulumi.Output[str]:
|
430
|
+
def token(self) -> pulumi.Output[builtins.str]:
|
430
431
|
"""
|
431
432
|
The actual token that was generated and can be used with API calls
|
432
433
|
to identify the user of the call.
|
@@ -435,7 +436,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
435
436
|
|
436
437
|
@property
|
437
438
|
@pulumi.getter(name="tokenId")
|
438
|
-
def token_id(self) -> pulumi.Output[str]:
|
439
|
+
def token_id(self) -> pulumi.Output[builtins.str]:
|
439
440
|
"""
|
440
441
|
The public identifier for a specific token. It can be used
|
441
442
|
to look up information about a token or to revoke a token.
|