pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,46 +20,46 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
|
-
db_name: pulumi.Input[str],
|
25
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
26
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
27
|
-
default_ttl: Optional[pulumi.Input[int]] = None,
|
28
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
29
|
-
name: Optional[pulumi.Input[str]] = None,
|
30
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
31
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
33
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
creation_statements: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
25
|
+
db_name: pulumi.Input[builtins.str],
|
26
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
27
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
default_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
29
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
30
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
33
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
34
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
34
35
|
"""
|
35
36
|
The set of arguments for constructing a SecretBackendRole resource.
|
36
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
37
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] creation_statements: The database statements to execute when
|
38
39
|
creating a user.
|
39
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
40
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for
|
40
41
|
the role.
|
41
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
42
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] credential_config: Specifies the configuration
|
42
43
|
for the given `credential_type`.
|
43
44
|
|
44
45
|
The following options are available for each `credential_type` value:
|
45
|
-
:param pulumi.Input[str] credential_type: Specifies the type of credential that
|
46
|
+
:param pulumi.Input[builtins.str] credential_type: Specifies the type of credential that
|
46
47
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
47
48
|
See the plugin's API page for credential types supported by individual databases.
|
48
|
-
:param pulumi.Input[int] default_ttl: The default number of seconds for leases for this
|
49
|
+
:param pulumi.Input[builtins.int] default_ttl: The default number of seconds for leases for this
|
49
50
|
role.
|
50
|
-
:param pulumi.Input[int] max_ttl: The maximum number of seconds for leases for this
|
51
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum number of seconds for leases for this
|
51
52
|
role.
|
52
|
-
:param pulumi.Input[str] name: A unique name to give the role.
|
53
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
53
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the role.
|
54
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
54
55
|
The value should not contain leading or trailing forward slashes.
|
55
56
|
The `namespace` is always relative to the provider's configured namespace.
|
56
57
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] renew_statements: The database statements to execute when
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] renew_statements: The database statements to execute when
|
58
59
|
renewing a user.
|
59
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] revocation_statements: The database statements to execute when
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] revocation_statements: The database statements to execute when
|
60
61
|
revoking a user.
|
61
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rollback_statements: The database statements to execute when
|
62
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rollback_statements: The database statements to execute when
|
62
63
|
rolling back creation due to an error.
|
63
64
|
"""
|
64
65
|
pulumi.set(__self__, "backend", backend)
|
@@ -85,19 +86,19 @@ class SecretBackendRoleArgs:
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def backend(self) -> pulumi.Input[str]:
|
89
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
89
90
|
"""
|
90
91
|
The unique name of the Vault mount to configure.
|
91
92
|
"""
|
92
93
|
return pulumi.get(self, "backend")
|
93
94
|
|
94
95
|
@backend.setter
|
95
|
-
def backend(self, value: pulumi.Input[str]):
|
96
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
96
97
|
pulumi.set(self, "backend", value)
|
97
98
|
|
98
99
|
@property
|
99
100
|
@pulumi.getter(name="creationStatements")
|
100
|
-
def creation_statements(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
101
|
+
def creation_statements(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
101
102
|
"""
|
102
103
|
The database statements to execute when
|
103
104
|
creating a user.
|
@@ -105,12 +106,12 @@ class SecretBackendRoleArgs:
|
|
105
106
|
return pulumi.get(self, "creation_statements")
|
106
107
|
|
107
108
|
@creation_statements.setter
|
108
|
-
def creation_statements(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
109
|
+
def creation_statements(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
109
110
|
pulumi.set(self, "creation_statements", value)
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter(name="dbName")
|
113
|
-
def db_name(self) -> pulumi.Input[str]:
|
114
|
+
def db_name(self) -> pulumi.Input[builtins.str]:
|
114
115
|
"""
|
115
116
|
The unique name of the database connection to use for
|
116
117
|
the role.
|
@@ -118,12 +119,12 @@ class SecretBackendRoleArgs:
|
|
118
119
|
return pulumi.get(self, "db_name")
|
119
120
|
|
120
121
|
@db_name.setter
|
121
|
-
def db_name(self, value: pulumi.Input[str]):
|
122
|
+
def db_name(self, value: pulumi.Input[builtins.str]):
|
122
123
|
pulumi.set(self, "db_name", value)
|
123
124
|
|
124
125
|
@property
|
125
126
|
@pulumi.getter(name="credentialConfig")
|
126
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
127
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
127
128
|
"""
|
128
129
|
Specifies the configuration
|
129
130
|
for the given `credential_type`.
|
@@ -133,12 +134,12 @@ class SecretBackendRoleArgs:
|
|
133
134
|
return pulumi.get(self, "credential_config")
|
134
135
|
|
135
136
|
@credential_config.setter
|
136
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
137
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
137
138
|
pulumi.set(self, "credential_config", value)
|
138
139
|
|
139
140
|
@property
|
140
141
|
@pulumi.getter(name="credentialType")
|
141
|
-
def credential_type(self) -> Optional[pulumi.Input[str]]:
|
142
|
+
def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
142
143
|
"""
|
143
144
|
Specifies the type of credential that
|
144
145
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -147,12 +148,12 @@ class SecretBackendRoleArgs:
|
|
147
148
|
return pulumi.get(self, "credential_type")
|
148
149
|
|
149
150
|
@credential_type.setter
|
150
|
-
def credential_type(self, value: Optional[pulumi.Input[str]]):
|
151
|
+
def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
151
152
|
pulumi.set(self, "credential_type", value)
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter(name="defaultTtl")
|
155
|
-
def default_ttl(self) -> Optional[pulumi.Input[int]]:
|
156
|
+
def default_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
156
157
|
"""
|
157
158
|
The default number of seconds for leases for this
|
158
159
|
role.
|
@@ -160,12 +161,12 @@ class SecretBackendRoleArgs:
|
|
160
161
|
return pulumi.get(self, "default_ttl")
|
161
162
|
|
162
163
|
@default_ttl.setter
|
163
|
-
def default_ttl(self, value: Optional[pulumi.Input[int]]):
|
164
|
+
def default_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
164
165
|
pulumi.set(self, "default_ttl", value)
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter(name="maxTtl")
|
168
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
169
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
169
170
|
"""
|
170
171
|
The maximum number of seconds for leases for this
|
171
172
|
role.
|
@@ -173,24 +174,24 @@ class SecretBackendRoleArgs:
|
|
173
174
|
return pulumi.get(self, "max_ttl")
|
174
175
|
|
175
176
|
@max_ttl.setter
|
176
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
177
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
177
178
|
pulumi.set(self, "max_ttl", value)
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter
|
181
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
182
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
182
183
|
"""
|
183
184
|
A unique name to give the role.
|
184
185
|
"""
|
185
186
|
return pulumi.get(self, "name")
|
186
187
|
|
187
188
|
@name.setter
|
188
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
189
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
189
190
|
pulumi.set(self, "name", value)
|
190
191
|
|
191
192
|
@property
|
192
193
|
@pulumi.getter
|
193
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
194
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
194
195
|
"""
|
195
196
|
The namespace to provision the resource in.
|
196
197
|
The value should not contain leading or trailing forward slashes.
|
@@ -200,12 +201,12 @@ class SecretBackendRoleArgs:
|
|
200
201
|
return pulumi.get(self, "namespace")
|
201
202
|
|
202
203
|
@namespace.setter
|
203
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "namespace", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="renewStatements")
|
208
|
-
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
209
|
+
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
209
210
|
"""
|
210
211
|
The database statements to execute when
|
211
212
|
renewing a user.
|
@@ -213,12 +214,12 @@ class SecretBackendRoleArgs:
|
|
213
214
|
return pulumi.get(self, "renew_statements")
|
214
215
|
|
215
216
|
@renew_statements.setter
|
216
|
-
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
217
|
+
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
217
218
|
pulumi.set(self, "renew_statements", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="revocationStatements")
|
221
|
-
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
222
|
+
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
222
223
|
"""
|
223
224
|
The database statements to execute when
|
224
225
|
revoking a user.
|
@@ -226,12 +227,12 @@ class SecretBackendRoleArgs:
|
|
226
227
|
return pulumi.get(self, "revocation_statements")
|
227
228
|
|
228
229
|
@revocation_statements.setter
|
229
|
-
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
230
|
+
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
230
231
|
pulumi.set(self, "revocation_statements", value)
|
231
232
|
|
232
233
|
@property
|
233
234
|
@pulumi.getter(name="rollbackStatements")
|
234
|
-
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
235
|
+
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
235
236
|
"""
|
236
237
|
The database statements to execute when
|
237
238
|
rolling back creation due to an error.
|
@@ -239,53 +240,53 @@ class SecretBackendRoleArgs:
|
|
239
240
|
return pulumi.get(self, "rollback_statements")
|
240
241
|
|
241
242
|
@rollback_statements.setter
|
242
|
-
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
243
|
+
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
243
244
|
pulumi.set(self, "rollback_statements", value)
|
244
245
|
|
245
246
|
|
246
247
|
@pulumi.input_type
|
247
248
|
class _SecretBackendRoleState:
|
248
249
|
def __init__(__self__, *,
|
249
|
-
backend: Optional[pulumi.Input[str]] = None,
|
250
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
251
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
252
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
253
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
254
|
-
default_ttl: Optional[pulumi.Input[int]] = None,
|
255
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
256
|
-
name: Optional[pulumi.Input[str]] = None,
|
257
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
258
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
259
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
260
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
250
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
251
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
252
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
253
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
254
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
255
|
+
default_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
256
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
257
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
258
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
259
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
260
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
261
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
261
262
|
"""
|
262
263
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
263
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
264
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
264
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
265
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] creation_statements: The database statements to execute when
|
265
266
|
creating a user.
|
266
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
267
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] credential_config: Specifies the configuration
|
267
268
|
for the given `credential_type`.
|
268
269
|
|
269
270
|
The following options are available for each `credential_type` value:
|
270
|
-
:param pulumi.Input[str] credential_type: Specifies the type of credential that
|
271
|
+
:param pulumi.Input[builtins.str] credential_type: Specifies the type of credential that
|
271
272
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
272
273
|
See the plugin's API page for credential types supported by individual databases.
|
273
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
274
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for
|
274
275
|
the role.
|
275
|
-
:param pulumi.Input[int] default_ttl: The default number of seconds for leases for this
|
276
|
+
:param pulumi.Input[builtins.int] default_ttl: The default number of seconds for leases for this
|
276
277
|
role.
|
277
|
-
:param pulumi.Input[int] max_ttl: The maximum number of seconds for leases for this
|
278
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum number of seconds for leases for this
|
278
279
|
role.
|
279
|
-
:param pulumi.Input[str] name: A unique name to give the role.
|
280
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
280
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the role.
|
281
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
281
282
|
The value should not contain leading or trailing forward slashes.
|
282
283
|
The `namespace` is always relative to the provider's configured namespace.
|
283
284
|
*Available only for Vault Enterprise*.
|
284
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] renew_statements: The database statements to execute when
|
285
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] renew_statements: The database statements to execute when
|
285
286
|
renewing a user.
|
286
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] revocation_statements: The database statements to execute when
|
287
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] revocation_statements: The database statements to execute when
|
287
288
|
revoking a user.
|
288
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rollback_statements: The database statements to execute when
|
289
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rollback_statements: The database statements to execute when
|
289
290
|
rolling back creation due to an error.
|
290
291
|
"""
|
291
292
|
if backend is not None:
|
@@ -315,19 +316,19 @@ class _SecretBackendRoleState:
|
|
315
316
|
|
316
317
|
@property
|
317
318
|
@pulumi.getter
|
318
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
319
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
319
320
|
"""
|
320
321
|
The unique name of the Vault mount to configure.
|
321
322
|
"""
|
322
323
|
return pulumi.get(self, "backend")
|
323
324
|
|
324
325
|
@backend.setter
|
325
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
326
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
326
327
|
pulumi.set(self, "backend", value)
|
327
328
|
|
328
329
|
@property
|
329
330
|
@pulumi.getter(name="creationStatements")
|
330
|
-
def creation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
331
|
+
def creation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
331
332
|
"""
|
332
333
|
The database statements to execute when
|
333
334
|
creating a user.
|
@@ -335,12 +336,12 @@ class _SecretBackendRoleState:
|
|
335
336
|
return pulumi.get(self, "creation_statements")
|
336
337
|
|
337
338
|
@creation_statements.setter
|
338
|
-
def creation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
339
|
+
def creation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
339
340
|
pulumi.set(self, "creation_statements", value)
|
340
341
|
|
341
342
|
@property
|
342
343
|
@pulumi.getter(name="credentialConfig")
|
343
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
344
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
344
345
|
"""
|
345
346
|
Specifies the configuration
|
346
347
|
for the given `credential_type`.
|
@@ -350,12 +351,12 @@ class _SecretBackendRoleState:
|
|
350
351
|
return pulumi.get(self, "credential_config")
|
351
352
|
|
352
353
|
@credential_config.setter
|
353
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
354
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
354
355
|
pulumi.set(self, "credential_config", value)
|
355
356
|
|
356
357
|
@property
|
357
358
|
@pulumi.getter(name="credentialType")
|
358
|
-
def credential_type(self) -> Optional[pulumi.Input[str]]:
|
359
|
+
def credential_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
359
360
|
"""
|
360
361
|
Specifies the type of credential that
|
361
362
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -364,12 +365,12 @@ class _SecretBackendRoleState:
|
|
364
365
|
return pulumi.get(self, "credential_type")
|
365
366
|
|
366
367
|
@credential_type.setter
|
367
|
-
def credential_type(self, value: Optional[pulumi.Input[str]]):
|
368
|
+
def credential_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
368
369
|
pulumi.set(self, "credential_type", value)
|
369
370
|
|
370
371
|
@property
|
371
372
|
@pulumi.getter(name="dbName")
|
372
|
-
def db_name(self) -> Optional[pulumi.Input[str]]:
|
373
|
+
def db_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
373
374
|
"""
|
374
375
|
The unique name of the database connection to use for
|
375
376
|
the role.
|
@@ -377,12 +378,12 @@ class _SecretBackendRoleState:
|
|
377
378
|
return pulumi.get(self, "db_name")
|
378
379
|
|
379
380
|
@db_name.setter
|
380
|
-
def db_name(self, value: Optional[pulumi.Input[str]]):
|
381
|
+
def db_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
381
382
|
pulumi.set(self, "db_name", value)
|
382
383
|
|
383
384
|
@property
|
384
385
|
@pulumi.getter(name="defaultTtl")
|
385
|
-
def default_ttl(self) -> Optional[pulumi.Input[int]]:
|
386
|
+
def default_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
386
387
|
"""
|
387
388
|
The default number of seconds for leases for this
|
388
389
|
role.
|
@@ -390,12 +391,12 @@ class _SecretBackendRoleState:
|
|
390
391
|
return pulumi.get(self, "default_ttl")
|
391
392
|
|
392
393
|
@default_ttl.setter
|
393
|
-
def default_ttl(self, value: Optional[pulumi.Input[int]]):
|
394
|
+
def default_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
394
395
|
pulumi.set(self, "default_ttl", value)
|
395
396
|
|
396
397
|
@property
|
397
398
|
@pulumi.getter(name="maxTtl")
|
398
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
399
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
399
400
|
"""
|
400
401
|
The maximum number of seconds for leases for this
|
401
402
|
role.
|
@@ -403,24 +404,24 @@ class _SecretBackendRoleState:
|
|
403
404
|
return pulumi.get(self, "max_ttl")
|
404
405
|
|
405
406
|
@max_ttl.setter
|
406
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
407
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
407
408
|
pulumi.set(self, "max_ttl", value)
|
408
409
|
|
409
410
|
@property
|
410
411
|
@pulumi.getter
|
411
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
412
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
412
413
|
"""
|
413
414
|
A unique name to give the role.
|
414
415
|
"""
|
415
416
|
return pulumi.get(self, "name")
|
416
417
|
|
417
418
|
@name.setter
|
418
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
419
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
419
420
|
pulumi.set(self, "name", value)
|
420
421
|
|
421
422
|
@property
|
422
423
|
@pulumi.getter
|
423
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
424
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
424
425
|
"""
|
425
426
|
The namespace to provision the resource in.
|
426
427
|
The value should not contain leading or trailing forward slashes.
|
@@ -430,12 +431,12 @@ class _SecretBackendRoleState:
|
|
430
431
|
return pulumi.get(self, "namespace")
|
431
432
|
|
432
433
|
@namespace.setter
|
433
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
434
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
434
435
|
pulumi.set(self, "namespace", value)
|
435
436
|
|
436
437
|
@property
|
437
438
|
@pulumi.getter(name="renewStatements")
|
438
|
-
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
439
|
+
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
439
440
|
"""
|
440
441
|
The database statements to execute when
|
441
442
|
renewing a user.
|
@@ -443,12 +444,12 @@ class _SecretBackendRoleState:
|
|
443
444
|
return pulumi.get(self, "renew_statements")
|
444
445
|
|
445
446
|
@renew_statements.setter
|
446
|
-
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
447
|
+
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
447
448
|
pulumi.set(self, "renew_statements", value)
|
448
449
|
|
449
450
|
@property
|
450
451
|
@pulumi.getter(name="revocationStatements")
|
451
|
-
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
452
|
+
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
452
453
|
"""
|
453
454
|
The database statements to execute when
|
454
455
|
revoking a user.
|
@@ -456,12 +457,12 @@ class _SecretBackendRoleState:
|
|
456
457
|
return pulumi.get(self, "revocation_statements")
|
457
458
|
|
458
459
|
@revocation_statements.setter
|
459
|
-
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
460
|
+
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
460
461
|
pulumi.set(self, "revocation_statements", value)
|
461
462
|
|
462
463
|
@property
|
463
464
|
@pulumi.getter(name="rollbackStatements")
|
464
|
-
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
465
|
+
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
465
466
|
"""
|
466
467
|
The database statements to execute when
|
467
468
|
rolling back creation due to an error.
|
@@ -469,7 +470,7 @@ class _SecretBackendRoleState:
|
|
469
470
|
return pulumi.get(self, "rollback_statements")
|
470
471
|
|
471
472
|
@rollback_statements.setter
|
472
|
-
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
473
|
+
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
473
474
|
pulumi.set(self, "rollback_statements", value)
|
474
475
|
|
475
476
|
|
@@ -478,18 +479,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
478
479
|
def __init__(__self__,
|
479
480
|
resource_name: str,
|
480
481
|
opts: Optional[pulumi.ResourceOptions] = None,
|
481
|
-
backend: Optional[pulumi.Input[str]] = None,
|
482
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
483
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
484
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
485
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
486
|
-
default_ttl: Optional[pulumi.Input[int]] = None,
|
487
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
488
|
-
name: Optional[pulumi.Input[str]] = None,
|
489
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
490
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
491
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
492
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
482
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
483
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
484
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
485
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
486
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
487
|
+
default_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
488
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
489
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
490
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
491
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
492
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
493
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
493
494
|
__props__=None):
|
494
495
|
"""
|
495
496
|
## Example Usage
|
@@ -528,32 +529,32 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
528
529
|
|
529
530
|
:param str resource_name: The name of the resource.
|
530
531
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
531
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
532
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
532
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] creation_statements: The database statements to execute when
|
533
534
|
creating a user.
|
534
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
535
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] credential_config: Specifies the configuration
|
535
536
|
for the given `credential_type`.
|
536
537
|
|
537
538
|
The following options are available for each `credential_type` value:
|
538
|
-
:param pulumi.Input[str] credential_type: Specifies the type of credential that
|
539
|
+
:param pulumi.Input[builtins.str] credential_type: Specifies the type of credential that
|
539
540
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
540
541
|
See the plugin's API page for credential types supported by individual databases.
|
541
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
542
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for
|
542
543
|
the role.
|
543
|
-
:param pulumi.Input[int] default_ttl: The default number of seconds for leases for this
|
544
|
+
:param pulumi.Input[builtins.int] default_ttl: The default number of seconds for leases for this
|
544
545
|
role.
|
545
|
-
:param pulumi.Input[int] max_ttl: The maximum number of seconds for leases for this
|
546
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum number of seconds for leases for this
|
546
547
|
role.
|
547
|
-
:param pulumi.Input[str] name: A unique name to give the role.
|
548
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
548
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the role.
|
549
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
549
550
|
The value should not contain leading or trailing forward slashes.
|
550
551
|
The `namespace` is always relative to the provider's configured namespace.
|
551
552
|
*Available only for Vault Enterprise*.
|
552
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] renew_statements: The database statements to execute when
|
553
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] renew_statements: The database statements to execute when
|
553
554
|
renewing a user.
|
554
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] revocation_statements: The database statements to execute when
|
555
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] revocation_statements: The database statements to execute when
|
555
556
|
revoking a user.
|
556
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rollback_statements: The database statements to execute when
|
557
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rollback_statements: The database statements to execute when
|
557
558
|
rolling back creation due to an error.
|
558
559
|
"""
|
559
560
|
...
|
@@ -612,18 +613,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
612
613
|
def _internal_init(__self__,
|
613
614
|
resource_name: str,
|
614
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
615
|
-
backend: Optional[pulumi.Input[str]] = None,
|
616
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
617
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
618
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
619
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
620
|
-
default_ttl: Optional[pulumi.Input[int]] = None,
|
621
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
622
|
-
name: Optional[pulumi.Input[str]] = None,
|
623
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
624
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
625
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
626
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
616
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
617
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
618
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
619
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
620
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
621
|
+
default_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
622
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
623
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
624
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
625
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
626
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
627
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
627
628
|
__props__=None):
|
628
629
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
629
630
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -661,18 +662,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
661
662
|
def get(resource_name: str,
|
662
663
|
id: pulumi.Input[str],
|
663
664
|
opts: Optional[pulumi.ResourceOptions] = None,
|
664
|
-
backend: Optional[pulumi.Input[str]] = None,
|
665
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
666
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
667
|
-
credential_type: Optional[pulumi.Input[str]] = None,
|
668
|
-
db_name: Optional[pulumi.Input[str]] = None,
|
669
|
-
default_ttl: Optional[pulumi.Input[int]] = None,
|
670
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
671
|
-
name: Optional[pulumi.Input[str]] = None,
|
672
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
673
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
674
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
675
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendRole':
|
665
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
666
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
667
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
668
|
+
credential_type: Optional[pulumi.Input[builtins.str]] = None,
|
669
|
+
db_name: Optional[pulumi.Input[builtins.str]] = None,
|
670
|
+
default_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
671
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
672
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
673
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
674
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
675
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
676
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretBackendRole':
|
676
677
|
"""
|
677
678
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
678
679
|
properties used to qualify the lookup.
|
@@ -680,32 +681,32 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
680
681
|
:param str resource_name: The unique name of the resulting resource.
|
681
682
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
682
683
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
683
|
-
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
684
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
684
|
+
:param pulumi.Input[builtins.str] backend: The unique name of the Vault mount to configure.
|
685
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] creation_statements: The database statements to execute when
|
685
686
|
creating a user.
|
686
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] credential_config: Specifies the configuration
|
687
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] credential_config: Specifies the configuration
|
687
688
|
for the given `credential_type`.
|
688
689
|
|
689
690
|
The following options are available for each `credential_type` value:
|
690
|
-
:param pulumi.Input[str] credential_type: Specifies the type of credential that
|
691
|
+
:param pulumi.Input[builtins.str] credential_type: Specifies the type of credential that
|
691
692
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
692
693
|
See the plugin's API page for credential types supported by individual databases.
|
693
|
-
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
694
|
+
:param pulumi.Input[builtins.str] db_name: The unique name of the database connection to use for
|
694
695
|
the role.
|
695
|
-
:param pulumi.Input[int] default_ttl: The default number of seconds for leases for this
|
696
|
+
:param pulumi.Input[builtins.int] default_ttl: The default number of seconds for leases for this
|
696
697
|
role.
|
697
|
-
:param pulumi.Input[int] max_ttl: The maximum number of seconds for leases for this
|
698
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum number of seconds for leases for this
|
698
699
|
role.
|
699
|
-
:param pulumi.Input[str] name: A unique name to give the role.
|
700
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
700
|
+
:param pulumi.Input[builtins.str] name: A unique name to give the role.
|
701
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
701
702
|
The value should not contain leading or trailing forward slashes.
|
702
703
|
The `namespace` is always relative to the provider's configured namespace.
|
703
704
|
*Available only for Vault Enterprise*.
|
704
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] renew_statements: The database statements to execute when
|
705
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] renew_statements: The database statements to execute when
|
705
706
|
renewing a user.
|
706
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] revocation_statements: The database statements to execute when
|
707
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] revocation_statements: The database statements to execute when
|
707
708
|
revoking a user.
|
708
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] rollback_statements: The database statements to execute when
|
709
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] rollback_statements: The database statements to execute when
|
709
710
|
rolling back creation due to an error.
|
710
711
|
"""
|
711
712
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -728,7 +729,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
728
729
|
|
729
730
|
@property
|
730
731
|
@pulumi.getter
|
731
|
-
def backend(self) -> pulumi.Output[str]:
|
732
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
732
733
|
"""
|
733
734
|
The unique name of the Vault mount to configure.
|
734
735
|
"""
|
@@ -736,7 +737,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
736
737
|
|
737
738
|
@property
|
738
739
|
@pulumi.getter(name="creationStatements")
|
739
|
-
def creation_statements(self) -> pulumi.Output[Sequence[str]]:
|
740
|
+
def creation_statements(self) -> pulumi.Output[Sequence[builtins.str]]:
|
740
741
|
"""
|
741
742
|
The database statements to execute when
|
742
743
|
creating a user.
|
@@ -745,7 +746,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
746
|
|
746
747
|
@property
|
747
748
|
@pulumi.getter(name="credentialConfig")
|
748
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
749
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
|
749
750
|
"""
|
750
751
|
Specifies the configuration
|
751
752
|
for the given `credential_type`.
|
@@ -756,7 +757,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
756
757
|
|
757
758
|
@property
|
758
759
|
@pulumi.getter(name="credentialType")
|
759
|
-
def credential_type(self) -> pulumi.Output[str]:
|
760
|
+
def credential_type(self) -> pulumi.Output[builtins.str]:
|
760
761
|
"""
|
761
762
|
Specifies the type of credential that
|
762
763
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -766,7 +767,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
766
767
|
|
767
768
|
@property
|
768
769
|
@pulumi.getter(name="dbName")
|
769
|
-
def db_name(self) -> pulumi.Output[str]:
|
770
|
+
def db_name(self) -> pulumi.Output[builtins.str]:
|
770
771
|
"""
|
771
772
|
The unique name of the database connection to use for
|
772
773
|
the role.
|
@@ -775,7 +776,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
775
776
|
|
776
777
|
@property
|
777
778
|
@pulumi.getter(name="defaultTtl")
|
778
|
-
def default_ttl(self) -> pulumi.Output[Optional[int]]:
|
779
|
+
def default_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
779
780
|
"""
|
780
781
|
The default number of seconds for leases for this
|
781
782
|
role.
|
@@ -784,7 +785,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
784
785
|
|
785
786
|
@property
|
786
787
|
@pulumi.getter(name="maxTtl")
|
787
|
-
def max_ttl(self) -> pulumi.Output[Optional[int]]:
|
788
|
+
def max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
788
789
|
"""
|
789
790
|
The maximum number of seconds for leases for this
|
790
791
|
role.
|
@@ -793,7 +794,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
793
794
|
|
794
795
|
@property
|
795
796
|
@pulumi.getter
|
796
|
-
def name(self) -> pulumi.Output[str]:
|
797
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
797
798
|
"""
|
798
799
|
A unique name to give the role.
|
799
800
|
"""
|
@@ -801,7 +802,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
801
802
|
|
802
803
|
@property
|
803
804
|
@pulumi.getter
|
804
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
805
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
805
806
|
"""
|
806
807
|
The namespace to provision the resource in.
|
807
808
|
The value should not contain leading or trailing forward slashes.
|
@@ -812,7 +813,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
812
813
|
|
813
814
|
@property
|
814
815
|
@pulumi.getter(name="renewStatements")
|
815
|
-
def renew_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
816
|
+
def renew_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
816
817
|
"""
|
817
818
|
The database statements to execute when
|
818
819
|
renewing a user.
|
@@ -821,7 +822,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
821
822
|
|
822
823
|
@property
|
823
824
|
@pulumi.getter(name="revocationStatements")
|
824
|
-
def revocation_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
825
|
+
def revocation_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
825
826
|
"""
|
826
827
|
The database statements to execute when
|
827
828
|
revoking a user.
|
@@ -830,7 +831,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
830
831
|
|
831
832
|
@property
|
832
833
|
@pulumi.getter(name="rollbackStatements")
|
833
|
-
def rollback_statements(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
834
|
+
def rollback_statements(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
834
835
|
"""
|
835
836
|
The database statements to execute when
|
836
837
|
rolling back creation due to an error.
|