pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,28 +20,28 @@ __all__ = ['SecretLibraryArgs', 'SecretLibrary']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretLibraryArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
service_account_names: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
25
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
26
|
-
name: Optional[pulumi.Input[str]] = None,
|
27
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
28
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
service_account_names: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
25
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
27
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
29
30
|
"""
|
30
31
|
The set of arguments for constructing a SecretLibrary resource.
|
31
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
32
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
32
33
|
with no leading or trailing `/`s.
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
34
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
35
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
35
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
36
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
36
37
|
max_ttl if not provided.
|
37
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
38
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
38
39
|
Must be unique within the backend.
|
39
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
40
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
40
41
|
The value should not contain leading or trailing forward slashes.
|
41
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
42
43
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
44
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
44
45
|
ttl if not provided.
|
45
46
|
"""
|
46
47
|
pulumi.set(__self__, "backend", backend)
|
@@ -58,7 +59,7 @@ class SecretLibraryArgs:
|
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def backend(self) -> pulumi.Input[str]:
|
62
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
62
63
|
"""
|
63
64
|
The path the AD secret backend is mounted at,
|
64
65
|
with no leading or trailing `/`s.
|
@@ -66,36 +67,36 @@ class SecretLibraryArgs:
|
|
66
67
|
return pulumi.get(self, "backend")
|
67
68
|
|
68
69
|
@backend.setter
|
69
|
-
def backend(self, value: pulumi.Input[str]):
|
70
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
70
71
|
pulumi.set(self, "backend", value)
|
71
72
|
|
72
73
|
@property
|
73
74
|
@pulumi.getter(name="serviceAccountNames")
|
74
|
-
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
75
|
+
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
75
76
|
"""
|
76
77
|
Specifies the slice of service accounts mapped to this set.
|
77
78
|
"""
|
78
79
|
return pulumi.get(self, "service_account_names")
|
79
80
|
|
80
81
|
@service_account_names.setter
|
81
|
-
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
82
|
+
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
82
83
|
pulumi.set(self, "service_account_names", value)
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter(name="disableCheckInEnforcement")
|
86
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[bool]]:
|
87
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
|
87
88
|
"""
|
88
89
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
89
90
|
"""
|
90
91
|
return pulumi.get(self, "disable_check_in_enforcement")
|
91
92
|
|
92
93
|
@disable_check_in_enforcement.setter
|
93
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[bool]]):
|
94
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
|
94
95
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
95
96
|
|
96
97
|
@property
|
97
98
|
@pulumi.getter(name="maxTtl")
|
98
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
99
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
99
100
|
"""
|
100
101
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
101
102
|
max_ttl if not provided.
|
@@ -103,12 +104,12 @@ class SecretLibraryArgs:
|
|
103
104
|
return pulumi.get(self, "max_ttl")
|
104
105
|
|
105
106
|
@max_ttl.setter
|
106
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
107
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
107
108
|
pulumi.set(self, "max_ttl", value)
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter
|
111
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
112
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
112
113
|
"""
|
113
114
|
The name to identify this set of service accounts.
|
114
115
|
Must be unique within the backend.
|
@@ -116,12 +117,12 @@ class SecretLibraryArgs:
|
|
116
117
|
return pulumi.get(self, "name")
|
117
118
|
|
118
119
|
@name.setter
|
119
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
120
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
120
121
|
pulumi.set(self, "name", value)
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter
|
124
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
125
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
125
126
|
"""
|
126
127
|
The namespace to provision the resource in.
|
127
128
|
The value should not contain leading or trailing forward slashes.
|
@@ -131,12 +132,12 @@ class SecretLibraryArgs:
|
|
131
132
|
return pulumi.get(self, "namespace")
|
132
133
|
|
133
134
|
@namespace.setter
|
134
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
135
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
135
136
|
pulumi.set(self, "namespace", value)
|
136
137
|
|
137
138
|
@property
|
138
139
|
@pulumi.getter
|
139
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
140
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
140
141
|
"""
|
141
142
|
The password time-to-live in seconds. Defaults to the configuration
|
142
143
|
ttl if not provided.
|
@@ -144,35 +145,35 @@ class SecretLibraryArgs:
|
|
144
145
|
return pulumi.get(self, "ttl")
|
145
146
|
|
146
147
|
@ttl.setter
|
147
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
148
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
148
149
|
pulumi.set(self, "ttl", value)
|
149
150
|
|
150
151
|
|
151
152
|
@pulumi.input_type
|
152
153
|
class _SecretLibraryState:
|
153
154
|
def __init__(__self__, *,
|
154
|
-
backend: Optional[pulumi.Input[str]] = None,
|
155
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
156
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
157
|
-
name: Optional[pulumi.Input[str]] = None,
|
158
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
159
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
160
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
155
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
156
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
157
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
158
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
159
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
160
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
161
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
161
162
|
"""
|
162
163
|
Input properties used for looking up and filtering SecretLibrary resources.
|
163
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
164
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
164
165
|
with no leading or trailing `/`s.
|
165
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
166
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
166
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
167
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
167
168
|
max_ttl if not provided.
|
168
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
169
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
169
170
|
Must be unique within the backend.
|
170
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
171
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
171
172
|
The value should not contain leading or trailing forward slashes.
|
172
173
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
173
174
|
*Available only for Vault Enterprise*.
|
174
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
175
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
175
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
176
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
176
177
|
ttl if not provided.
|
177
178
|
"""
|
178
179
|
if backend is not None:
|
@@ -192,7 +193,7 @@ class _SecretLibraryState:
|
|
192
193
|
|
193
194
|
@property
|
194
195
|
@pulumi.getter
|
195
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
196
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
196
197
|
"""
|
197
198
|
The path the AD secret backend is mounted at,
|
198
199
|
with no leading or trailing `/`s.
|
@@ -200,24 +201,24 @@ class _SecretLibraryState:
|
|
200
201
|
return pulumi.get(self, "backend")
|
201
202
|
|
202
203
|
@backend.setter
|
203
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "backend", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="disableCheckInEnforcement")
|
208
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[bool]]:
|
209
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
|
209
210
|
"""
|
210
211
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
211
212
|
"""
|
212
213
|
return pulumi.get(self, "disable_check_in_enforcement")
|
213
214
|
|
214
215
|
@disable_check_in_enforcement.setter
|
215
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[bool]]):
|
216
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
|
216
217
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
217
218
|
|
218
219
|
@property
|
219
220
|
@pulumi.getter(name="maxTtl")
|
220
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
221
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
221
222
|
"""
|
222
223
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
223
224
|
max_ttl if not provided.
|
@@ -225,12 +226,12 @@ class _SecretLibraryState:
|
|
225
226
|
return pulumi.get(self, "max_ttl")
|
226
227
|
|
227
228
|
@max_ttl.setter
|
228
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
229
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
229
230
|
pulumi.set(self, "max_ttl", value)
|
230
231
|
|
231
232
|
@property
|
232
233
|
@pulumi.getter
|
233
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
234
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
234
235
|
"""
|
235
236
|
The name to identify this set of service accounts.
|
236
237
|
Must be unique within the backend.
|
@@ -238,12 +239,12 @@ class _SecretLibraryState:
|
|
238
239
|
return pulumi.get(self, "name")
|
239
240
|
|
240
241
|
@name.setter
|
241
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
242
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
242
243
|
pulumi.set(self, "name", value)
|
243
244
|
|
244
245
|
@property
|
245
246
|
@pulumi.getter
|
246
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
247
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
247
248
|
"""
|
248
249
|
The namespace to provision the resource in.
|
249
250
|
The value should not contain leading or trailing forward slashes.
|
@@ -253,24 +254,24 @@ class _SecretLibraryState:
|
|
253
254
|
return pulumi.get(self, "namespace")
|
254
255
|
|
255
256
|
@namespace.setter
|
256
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
257
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
257
258
|
pulumi.set(self, "namespace", value)
|
258
259
|
|
259
260
|
@property
|
260
261
|
@pulumi.getter(name="serviceAccountNames")
|
261
|
-
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
262
|
+
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
262
263
|
"""
|
263
264
|
Specifies the slice of service accounts mapped to this set.
|
264
265
|
"""
|
265
266
|
return pulumi.get(self, "service_account_names")
|
266
267
|
|
267
268
|
@service_account_names.setter
|
268
|
-
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
269
|
+
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
269
270
|
pulumi.set(self, "service_account_names", value)
|
270
271
|
|
271
272
|
@property
|
272
273
|
@pulumi.getter
|
273
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
274
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
274
275
|
"""
|
275
276
|
The password time-to-live in seconds. Defaults to the configuration
|
276
277
|
ttl if not provided.
|
@@ -278,7 +279,7 @@ class _SecretLibraryState:
|
|
278
279
|
return pulumi.get(self, "ttl")
|
279
280
|
|
280
281
|
@ttl.setter
|
281
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
282
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
282
283
|
pulumi.set(self, "ttl", value)
|
283
284
|
|
284
285
|
|
@@ -287,13 +288,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
287
288
|
def __init__(__self__,
|
288
289
|
resource_name: str,
|
289
290
|
opts: Optional[pulumi.ResourceOptions] = None,
|
290
|
-
backend: Optional[pulumi.Input[str]] = None,
|
291
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
292
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
293
|
-
name: Optional[pulumi.Input[str]] = None,
|
294
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
295
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
296
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
291
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
292
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
293
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
294
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
295
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
296
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
297
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
297
298
|
__props__=None):
|
298
299
|
"""
|
299
300
|
## Example Usage
|
@@ -331,19 +332,19 @@ class SecretLibrary(pulumi.CustomResource):
|
|
331
332
|
|
332
333
|
:param str resource_name: The name of the resource.
|
333
334
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
334
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
335
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
335
336
|
with no leading or trailing `/`s.
|
336
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
337
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
337
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
338
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
338
339
|
max_ttl if not provided.
|
339
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
340
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
340
341
|
Must be unique within the backend.
|
341
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
342
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
342
343
|
The value should not contain leading or trailing forward slashes.
|
343
344
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
344
345
|
*Available only for Vault Enterprise*.
|
345
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
346
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
346
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
347
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
347
348
|
ttl if not provided.
|
348
349
|
"""
|
349
350
|
...
|
@@ -401,13 +402,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
401
402
|
def _internal_init(__self__,
|
402
403
|
resource_name: str,
|
403
404
|
opts: Optional[pulumi.ResourceOptions] = None,
|
404
|
-
backend: Optional[pulumi.Input[str]] = None,
|
405
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
406
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
407
|
-
name: Optional[pulumi.Input[str]] = None,
|
408
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
409
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
410
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
405
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
406
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
407
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
408
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
409
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
410
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
411
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
411
412
|
__props__=None):
|
412
413
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
413
414
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -438,13 +439,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
438
439
|
def get(resource_name: str,
|
439
440
|
id: pulumi.Input[str],
|
440
441
|
opts: Optional[pulumi.ResourceOptions] = None,
|
441
|
-
backend: Optional[pulumi.Input[str]] = None,
|
442
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
443
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
444
|
-
name: Optional[pulumi.Input[str]] = None,
|
445
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
446
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
447
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretLibrary':
|
442
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
443
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
444
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
445
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
446
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
447
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
448
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretLibrary':
|
448
449
|
"""
|
449
450
|
Get an existing SecretLibrary resource's state with the given name, id, and optional extra
|
450
451
|
properties used to qualify the lookup.
|
@@ -452,19 +453,19 @@ class SecretLibrary(pulumi.CustomResource):
|
|
452
453
|
:param str resource_name: The unique name of the resulting resource.
|
453
454
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
454
455
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
455
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
456
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
456
457
|
with no leading or trailing `/`s.
|
457
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
458
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
458
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
459
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
459
460
|
max_ttl if not provided.
|
460
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
461
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
461
462
|
Must be unique within the backend.
|
462
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
463
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
463
464
|
The value should not contain leading or trailing forward slashes.
|
464
465
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
465
466
|
*Available only for Vault Enterprise*.
|
466
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
467
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
467
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
468
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
468
469
|
ttl if not provided.
|
469
470
|
"""
|
470
471
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -482,7 +483,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
482
483
|
|
483
484
|
@property
|
484
485
|
@pulumi.getter
|
485
|
-
def backend(self) -> pulumi.Output[str]:
|
486
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
486
487
|
"""
|
487
488
|
The path the AD secret backend is mounted at,
|
488
489
|
with no leading or trailing `/`s.
|
@@ -491,7 +492,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
491
492
|
|
492
493
|
@property
|
493
494
|
@pulumi.getter(name="disableCheckInEnforcement")
|
494
|
-
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[bool]]:
|
495
|
+
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[builtins.bool]]:
|
495
496
|
"""
|
496
497
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
497
498
|
"""
|
@@ -499,7 +500,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
499
500
|
|
500
501
|
@property
|
501
502
|
@pulumi.getter(name="maxTtl")
|
502
|
-
def max_ttl(self) -> pulumi.Output[int]:
|
503
|
+
def max_ttl(self) -> pulumi.Output[builtins.int]:
|
503
504
|
"""
|
504
505
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
505
506
|
max_ttl if not provided.
|
@@ -508,7 +509,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
508
509
|
|
509
510
|
@property
|
510
511
|
@pulumi.getter
|
511
|
-
def name(self) -> pulumi.Output[str]:
|
512
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
512
513
|
"""
|
513
514
|
The name to identify this set of service accounts.
|
514
515
|
Must be unique within the backend.
|
@@ -517,7 +518,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
517
518
|
|
518
519
|
@property
|
519
520
|
@pulumi.getter
|
520
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
521
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
521
522
|
"""
|
522
523
|
The namespace to provision the resource in.
|
523
524
|
The value should not contain leading or trailing forward slashes.
|
@@ -528,7 +529,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
528
529
|
|
529
530
|
@property
|
530
531
|
@pulumi.getter(name="serviceAccountNames")
|
531
|
-
def service_account_names(self) -> pulumi.Output[Sequence[str]]:
|
532
|
+
def service_account_names(self) -> pulumi.Output[Sequence[builtins.str]]:
|
532
533
|
"""
|
533
534
|
Specifies the slice of service accounts mapped to this set.
|
534
535
|
"""
|
@@ -536,7 +537,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
536
537
|
|
537
538
|
@property
|
538
539
|
@pulumi.getter
|
539
|
-
def ttl(self) -> pulumi.Output[int]:
|
540
|
+
def ttl(self) -> pulumi.Output[builtins.int]:
|
540
541
|
"""
|
541
542
|
The password time-to-live in seconds. Defaults to the configuration
|
542
543
|
ttl if not provided.
|