pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,35 +20,35 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
19
20
  @pulumi.input_type
20
21
  class SecretRoleArgs:
21
22
  def __init__(__self__, *,
22
- mount: pulumi.Input[str],
23
- roles: pulumi.Input[Sequence[pulumi.Input[str]]],
24
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
- max_ttl: Optional[pulumi.Input[str]] = None,
27
- name: Optional[pulumi.Input[str]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- organization_id: Optional[pulumi.Input[str]] = None,
30
- project_id: Optional[pulumi.Input[str]] = None,
31
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
32
- ttl: Optional[pulumi.Input[str]] = None):
23
+ mount: pulumi.Input[builtins.str],
24
+ roles: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
25
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
28
+ name: Optional[pulumi.Input[builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ organization_id: Optional[pulumi.Input[builtins.str]] = None,
31
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
32
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
+ ttl: Optional[pulumi.Input[builtins.str]] = None):
33
34
  """
34
35
  The set of arguments for constructing a SecretRole resource.
35
- :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
36
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
37
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
38
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
39
- :param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
40
- :param pulumi.Input[str] name: The name of the role.
41
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
+ :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
37
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
38
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
39
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
40
+ :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
41
+ :param pulumi.Input[builtins.str] name: The name of the role.
42
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
42
43
  The value should not contain leading or trailing forward slashes.
43
44
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
45
  *Available only for Vault Enterprise*.
45
- :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
46
+ :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
46
47
  Required if `project_id` is not set.
47
- :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
48
+ :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
48
49
  Required if `organization_id` is not set.
49
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
50
- :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
50
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
51
+ :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
51
52
  """
52
53
  pulumi.set(__self__, "mount", mount)
53
54
  pulumi.set(__self__, "roles", roles)
@@ -72,79 +73,79 @@ class SecretRoleArgs:
72
73
 
73
74
  @property
74
75
  @pulumi.getter
75
- def mount(self) -> pulumi.Input[str]:
76
+ def mount(self) -> pulumi.Input[builtins.str]:
76
77
  """
77
78
  Path where the MongoDB Atlas Secrets Engine is mounted.
78
79
  """
79
80
  return pulumi.get(self, "mount")
80
81
 
81
82
  @mount.setter
82
- def mount(self, value: pulumi.Input[str]):
83
+ def mount(self, value: pulumi.Input[builtins.str]):
83
84
  pulumi.set(self, "mount", value)
84
85
 
85
86
  @property
86
87
  @pulumi.getter
87
- def roles(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
88
+ def roles(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
88
89
  """
89
90
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
90
91
  """
91
92
  return pulumi.get(self, "roles")
92
93
 
93
94
  @roles.setter
94
- def roles(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
95
+ def roles(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
95
96
  pulumi.set(self, "roles", value)
96
97
 
97
98
  @property
98
99
  @pulumi.getter(name="cidrBlocks")
99
- def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
100
+ def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
100
101
  """
101
102
  Whitelist entry in CIDR notation to be added for the API key.
102
103
  """
103
104
  return pulumi.get(self, "cidr_blocks")
104
105
 
105
106
  @cidr_blocks.setter
106
- def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
107
+ def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
107
108
  pulumi.set(self, "cidr_blocks", value)
108
109
 
109
110
  @property
110
111
  @pulumi.getter(name="ipAddresses")
111
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
112
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
112
113
  """
113
114
  IP address to be added to the whitelist for the API key.
114
115
  """
115
116
  return pulumi.get(self, "ip_addresses")
116
117
 
117
118
  @ip_addresses.setter
118
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
119
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
119
120
  pulumi.set(self, "ip_addresses", value)
120
121
 
121
122
  @property
122
123
  @pulumi.getter(name="maxTtl")
123
- def max_ttl(self) -> Optional[pulumi.Input[str]]:
124
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  The maximum allowed lifetime of credentials issued using this role.
126
127
  """
127
128
  return pulumi.get(self, "max_ttl")
128
129
 
129
130
  @max_ttl.setter
130
- def max_ttl(self, value: Optional[pulumi.Input[str]]):
131
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
131
132
  pulumi.set(self, "max_ttl", value)
132
133
 
133
134
  @property
134
135
  @pulumi.getter
135
- def name(self) -> Optional[pulumi.Input[str]]:
136
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
136
137
  """
137
138
  The name of the role.
138
139
  """
139
140
  return pulumi.get(self, "name")
140
141
 
141
142
  @name.setter
142
- def name(self, value: Optional[pulumi.Input[str]]):
143
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
143
144
  pulumi.set(self, "name", value)
144
145
 
145
146
  @property
146
147
  @pulumi.getter
147
- def namespace(self) -> Optional[pulumi.Input[str]]:
148
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
148
149
  """
149
150
  The namespace to provision the resource in.
150
151
  The value should not contain leading or trailing forward slashes.
@@ -154,12 +155,12 @@ class SecretRoleArgs:
154
155
  return pulumi.get(self, "namespace")
155
156
 
156
157
  @namespace.setter
157
- def namespace(self, value: Optional[pulumi.Input[str]]):
158
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
158
159
  pulumi.set(self, "namespace", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="organizationId")
162
- def organization_id(self) -> Optional[pulumi.Input[str]]:
163
+ def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
163
164
  """
164
165
  Unique identifier for the organization to which the target API Key belongs.
165
166
  Required if `project_id` is not set.
@@ -167,12 +168,12 @@ class SecretRoleArgs:
167
168
  return pulumi.get(self, "organization_id")
168
169
 
169
170
  @organization_id.setter
170
- def organization_id(self, value: Optional[pulumi.Input[str]]):
171
+ def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
171
172
  pulumi.set(self, "organization_id", value)
172
173
 
173
174
  @property
174
175
  @pulumi.getter(name="projectId")
175
- def project_id(self) -> Optional[pulumi.Input[str]]:
176
+ def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
176
177
  """
177
178
  Unique identifier for the project to which the target API Key belongs.
178
179
  Required if `organization_id` is not set.
@@ -180,66 +181,66 @@ class SecretRoleArgs:
180
181
  return pulumi.get(self, "project_id")
181
182
 
182
183
  @project_id.setter
183
- def project_id(self, value: Optional[pulumi.Input[str]]):
184
+ def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
184
185
  pulumi.set(self, "project_id", value)
185
186
 
186
187
  @property
187
188
  @pulumi.getter(name="projectRoles")
188
- def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
189
+ def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
189
190
  """
190
191
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
191
192
  """
192
193
  return pulumi.get(self, "project_roles")
193
194
 
194
195
  @project_roles.setter
195
- def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
196
+ def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
196
197
  pulumi.set(self, "project_roles", value)
197
198
 
198
199
  @property
199
200
  @pulumi.getter
200
- def ttl(self) -> Optional[pulumi.Input[str]]:
201
+ def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
201
202
  """
202
203
  Duration in seconds after which the issued credential should expire.
203
204
  """
204
205
  return pulumi.get(self, "ttl")
205
206
 
206
207
  @ttl.setter
207
- def ttl(self, value: Optional[pulumi.Input[str]]):
208
+ def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
208
209
  pulumi.set(self, "ttl", value)
209
210
 
210
211
 
211
212
  @pulumi.input_type
212
213
  class _SecretRoleState:
213
214
  def __init__(__self__, *,
214
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
215
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
216
- max_ttl: Optional[pulumi.Input[str]] = None,
217
- mount: Optional[pulumi.Input[str]] = None,
218
- name: Optional[pulumi.Input[str]] = None,
219
- namespace: Optional[pulumi.Input[str]] = None,
220
- organization_id: Optional[pulumi.Input[str]] = None,
221
- project_id: Optional[pulumi.Input[str]] = None,
222
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
223
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
224
- ttl: Optional[pulumi.Input[str]] = None):
215
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
216
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
217
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
218
+ mount: Optional[pulumi.Input[builtins.str]] = None,
219
+ name: Optional[pulumi.Input[builtins.str]] = None,
220
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
221
+ organization_id: Optional[pulumi.Input[builtins.str]] = None,
222
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
223
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
224
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
225
+ ttl: Optional[pulumi.Input[builtins.str]] = None):
225
226
  """
226
227
  Input properties used for looking up and filtering SecretRole resources.
227
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
228
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
229
- :param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
230
- :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
231
- :param pulumi.Input[str] name: The name of the role.
232
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
228
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
229
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
230
+ :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
231
+ :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
232
+ :param pulumi.Input[builtins.str] name: The name of the role.
233
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
233
234
  The value should not contain leading or trailing forward slashes.
234
235
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
236
  *Available only for Vault Enterprise*.
236
- :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
237
+ :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
237
238
  Required if `project_id` is not set.
238
- :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
239
+ :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
239
240
  Required if `organization_id` is not set.
240
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
241
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
242
- :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
241
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
242
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
243
+ :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
243
244
  """
244
245
  if cidr_blocks is not None:
245
246
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
@@ -266,67 +267,67 @@ class _SecretRoleState:
266
267
 
267
268
  @property
268
269
  @pulumi.getter(name="cidrBlocks")
269
- def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
270
+ def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
270
271
  """
271
272
  Whitelist entry in CIDR notation to be added for the API key.
272
273
  """
273
274
  return pulumi.get(self, "cidr_blocks")
274
275
 
275
276
  @cidr_blocks.setter
276
- def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
277
+ def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
277
278
  pulumi.set(self, "cidr_blocks", value)
278
279
 
279
280
  @property
280
281
  @pulumi.getter(name="ipAddresses")
281
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
282
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
282
283
  """
283
284
  IP address to be added to the whitelist for the API key.
284
285
  """
285
286
  return pulumi.get(self, "ip_addresses")
286
287
 
287
288
  @ip_addresses.setter
288
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
289
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
289
290
  pulumi.set(self, "ip_addresses", value)
290
291
 
291
292
  @property
292
293
  @pulumi.getter(name="maxTtl")
293
- def max_ttl(self) -> Optional[pulumi.Input[str]]:
294
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
294
295
  """
295
296
  The maximum allowed lifetime of credentials issued using this role.
296
297
  """
297
298
  return pulumi.get(self, "max_ttl")
298
299
 
299
300
  @max_ttl.setter
300
- def max_ttl(self, value: Optional[pulumi.Input[str]]):
301
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
301
302
  pulumi.set(self, "max_ttl", value)
302
303
 
303
304
  @property
304
305
  @pulumi.getter
305
- def mount(self) -> Optional[pulumi.Input[str]]:
306
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
306
307
  """
307
308
  Path where the MongoDB Atlas Secrets Engine is mounted.
308
309
  """
309
310
  return pulumi.get(self, "mount")
310
311
 
311
312
  @mount.setter
312
- def mount(self, value: Optional[pulumi.Input[str]]):
313
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
313
314
  pulumi.set(self, "mount", value)
314
315
 
315
316
  @property
316
317
  @pulumi.getter
317
- def name(self) -> Optional[pulumi.Input[str]]:
318
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
318
319
  """
319
320
  The name of the role.
320
321
  """
321
322
  return pulumi.get(self, "name")
322
323
 
323
324
  @name.setter
324
- def name(self, value: Optional[pulumi.Input[str]]):
325
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
325
326
  pulumi.set(self, "name", value)
326
327
 
327
328
  @property
328
329
  @pulumi.getter
329
- def namespace(self) -> Optional[pulumi.Input[str]]:
330
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
330
331
  """
331
332
  The namespace to provision the resource in.
332
333
  The value should not contain leading or trailing forward slashes.
@@ -336,12 +337,12 @@ class _SecretRoleState:
336
337
  return pulumi.get(self, "namespace")
337
338
 
338
339
  @namespace.setter
339
- def namespace(self, value: Optional[pulumi.Input[str]]):
340
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
340
341
  pulumi.set(self, "namespace", value)
341
342
 
342
343
  @property
343
344
  @pulumi.getter(name="organizationId")
344
- def organization_id(self) -> Optional[pulumi.Input[str]]:
345
+ def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
345
346
  """
346
347
  Unique identifier for the organization to which the target API Key belongs.
347
348
  Required if `project_id` is not set.
@@ -349,12 +350,12 @@ class _SecretRoleState:
349
350
  return pulumi.get(self, "organization_id")
350
351
 
351
352
  @organization_id.setter
352
- def organization_id(self, value: Optional[pulumi.Input[str]]):
353
+ def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
353
354
  pulumi.set(self, "organization_id", value)
354
355
 
355
356
  @property
356
357
  @pulumi.getter(name="projectId")
357
- def project_id(self) -> Optional[pulumi.Input[str]]:
358
+ def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
358
359
  """
359
360
  Unique identifier for the project to which the target API Key belongs.
360
361
  Required if `organization_id` is not set.
@@ -362,43 +363,43 @@ class _SecretRoleState:
362
363
  return pulumi.get(self, "project_id")
363
364
 
364
365
  @project_id.setter
365
- def project_id(self, value: Optional[pulumi.Input[str]]):
366
+ def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
366
367
  pulumi.set(self, "project_id", value)
367
368
 
368
369
  @property
369
370
  @pulumi.getter(name="projectRoles")
370
- def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
371
+ def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
371
372
  """
372
373
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
373
374
  """
374
375
  return pulumi.get(self, "project_roles")
375
376
 
376
377
  @project_roles.setter
377
- def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
378
+ def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
378
379
  pulumi.set(self, "project_roles", value)
379
380
 
380
381
  @property
381
382
  @pulumi.getter
382
- def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
383
+ def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
383
384
  """
384
385
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
385
386
  """
386
387
  return pulumi.get(self, "roles")
387
388
 
388
389
  @roles.setter
389
- def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
390
+ def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
390
391
  pulumi.set(self, "roles", value)
391
392
 
392
393
  @property
393
394
  @pulumi.getter
394
- def ttl(self) -> Optional[pulumi.Input[str]]:
395
+ def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
395
396
  """
396
397
  Duration in seconds after which the issued credential should expire.
397
398
  """
398
399
  return pulumi.get(self, "ttl")
399
400
 
400
401
  @ttl.setter
401
- def ttl(self, value: Optional[pulumi.Input[str]]):
402
+ def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
402
403
  pulumi.set(self, "ttl", value)
403
404
 
404
405
 
@@ -407,17 +408,17 @@ class SecretRole(pulumi.CustomResource):
407
408
  def __init__(__self__,
408
409
  resource_name: str,
409
410
  opts: Optional[pulumi.ResourceOptions] = None,
410
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
411
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
412
- max_ttl: Optional[pulumi.Input[str]] = None,
413
- mount: Optional[pulumi.Input[str]] = None,
414
- name: Optional[pulumi.Input[str]] = None,
415
- namespace: Optional[pulumi.Input[str]] = None,
416
- organization_id: Optional[pulumi.Input[str]] = None,
417
- project_id: Optional[pulumi.Input[str]] = None,
418
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
419
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
420
- ttl: Optional[pulumi.Input[str]] = None,
411
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
412
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
413
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
414
+ mount: Optional[pulumi.Input[builtins.str]] = None,
415
+ name: Optional[pulumi.Input[builtins.str]] = None,
416
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
417
+ organization_id: Optional[pulumi.Input[builtins.str]] = None,
418
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
419
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
420
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
421
+ ttl: Optional[pulumi.Input[builtins.str]] = None,
421
422
  __props__=None):
422
423
  """
423
424
  ## Example Usage
@@ -458,22 +459,22 @@ class SecretRole(pulumi.CustomResource):
458
459
 
459
460
  :param str resource_name: The name of the resource.
460
461
  :param pulumi.ResourceOptions opts: Options for the resource.
461
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
462
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
463
- :param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
464
- :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
465
- :param pulumi.Input[str] name: The name of the role.
466
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
462
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
463
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
464
+ :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
465
+ :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
466
+ :param pulumi.Input[builtins.str] name: The name of the role.
467
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
467
468
  The value should not contain leading or trailing forward slashes.
468
469
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
469
470
  *Available only for Vault Enterprise*.
470
- :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
471
+ :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
471
472
  Required if `project_id` is not set.
472
- :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
473
+ :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
473
474
  Required if `organization_id` is not set.
474
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
475
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
476
- :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
475
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
476
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
477
+ :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
477
478
  """
478
479
  ...
479
480
  @overload
@@ -533,17 +534,17 @@ class SecretRole(pulumi.CustomResource):
533
534
  def _internal_init(__self__,
534
535
  resource_name: str,
535
536
  opts: Optional[pulumi.ResourceOptions] = None,
536
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
537
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
538
- max_ttl: Optional[pulumi.Input[str]] = None,
539
- mount: Optional[pulumi.Input[str]] = None,
540
- name: Optional[pulumi.Input[str]] = None,
541
- namespace: Optional[pulumi.Input[str]] = None,
542
- organization_id: Optional[pulumi.Input[str]] = None,
543
- project_id: Optional[pulumi.Input[str]] = None,
544
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
545
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
546
- ttl: Optional[pulumi.Input[str]] = None,
537
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
538
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
539
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
540
+ mount: Optional[pulumi.Input[builtins.str]] = None,
541
+ name: Optional[pulumi.Input[builtins.str]] = None,
542
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
543
+ organization_id: Optional[pulumi.Input[builtins.str]] = None,
544
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
545
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
546
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
547
+ ttl: Optional[pulumi.Input[builtins.str]] = None,
547
548
  __props__=None):
548
549
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
549
550
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -578,17 +579,17 @@ class SecretRole(pulumi.CustomResource):
578
579
  def get(resource_name: str,
579
580
  id: pulumi.Input[str],
580
581
  opts: Optional[pulumi.ResourceOptions] = None,
581
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
582
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
583
- max_ttl: Optional[pulumi.Input[str]] = None,
584
- mount: Optional[pulumi.Input[str]] = None,
585
- name: Optional[pulumi.Input[str]] = None,
586
- namespace: Optional[pulumi.Input[str]] = None,
587
- organization_id: Optional[pulumi.Input[str]] = None,
588
- project_id: Optional[pulumi.Input[str]] = None,
589
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
590
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
591
- ttl: Optional[pulumi.Input[str]] = None) -> 'SecretRole':
582
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
583
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
584
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
585
+ mount: Optional[pulumi.Input[builtins.str]] = None,
586
+ name: Optional[pulumi.Input[builtins.str]] = None,
587
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
588
+ organization_id: Optional[pulumi.Input[builtins.str]] = None,
589
+ project_id: Optional[pulumi.Input[builtins.str]] = None,
590
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
591
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
592
+ ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretRole':
592
593
  """
593
594
  Get an existing SecretRole resource's state with the given name, id, and optional extra
594
595
  properties used to qualify the lookup.
@@ -596,22 +597,22 @@ class SecretRole(pulumi.CustomResource):
596
597
  :param str resource_name: The unique name of the resulting resource.
597
598
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
598
599
  :param pulumi.ResourceOptions opts: Options for the resource.
599
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
600
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
601
- :param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
602
- :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
603
- :param pulumi.Input[str] name: The name of the role.
604
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
600
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
601
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
602
+ :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
603
+ :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
604
+ :param pulumi.Input[builtins.str] name: The name of the role.
605
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
605
606
  The value should not contain leading or trailing forward slashes.
606
607
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
607
608
  *Available only for Vault Enterprise*.
608
- :param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
609
+ :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
609
610
  Required if `project_id` is not set.
610
- :param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
611
+ :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
611
612
  Required if `organization_id` is not set.
612
- :param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
613
- :param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
614
- :param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
613
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
614
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
615
+ :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
615
616
  """
616
617
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
617
618
 
@@ -632,7 +633,7 @@ class SecretRole(pulumi.CustomResource):
632
633
 
633
634
  @property
634
635
  @pulumi.getter(name="cidrBlocks")
635
- def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[str]]]:
636
+ def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
636
637
  """
637
638
  Whitelist entry in CIDR notation to be added for the API key.
638
639
  """
@@ -640,7 +641,7 @@ class SecretRole(pulumi.CustomResource):
640
641
 
641
642
  @property
642
643
  @pulumi.getter(name="ipAddresses")
643
- def ip_addresses(self) -> pulumi.Output[Optional[Sequence[str]]]:
644
+ def ip_addresses(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
644
645
  """
645
646
  IP address to be added to the whitelist for the API key.
646
647
  """
@@ -648,7 +649,7 @@ class SecretRole(pulumi.CustomResource):
648
649
 
649
650
  @property
650
651
  @pulumi.getter(name="maxTtl")
651
- def max_ttl(self) -> pulumi.Output[Optional[str]]:
652
+ def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
652
653
  """
653
654
  The maximum allowed lifetime of credentials issued using this role.
654
655
  """
@@ -656,7 +657,7 @@ class SecretRole(pulumi.CustomResource):
656
657
 
657
658
  @property
658
659
  @pulumi.getter
659
- def mount(self) -> pulumi.Output[str]:
660
+ def mount(self) -> pulumi.Output[builtins.str]:
660
661
  """
661
662
  Path where the MongoDB Atlas Secrets Engine is mounted.
662
663
  """
@@ -664,7 +665,7 @@ class SecretRole(pulumi.CustomResource):
664
665
 
665
666
  @property
666
667
  @pulumi.getter
667
- def name(self) -> pulumi.Output[str]:
668
+ def name(self) -> pulumi.Output[builtins.str]:
668
669
  """
669
670
  The name of the role.
670
671
  """
@@ -672,7 +673,7 @@ class SecretRole(pulumi.CustomResource):
672
673
 
673
674
  @property
674
675
  @pulumi.getter
675
- def namespace(self) -> pulumi.Output[Optional[str]]:
676
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
676
677
  """
677
678
  The namespace to provision the resource in.
678
679
  The value should not contain leading or trailing forward slashes.
@@ -683,7 +684,7 @@ class SecretRole(pulumi.CustomResource):
683
684
 
684
685
  @property
685
686
  @pulumi.getter(name="organizationId")
686
- def organization_id(self) -> pulumi.Output[Optional[str]]:
687
+ def organization_id(self) -> pulumi.Output[Optional[builtins.str]]:
687
688
  """
688
689
  Unique identifier for the organization to which the target API Key belongs.
689
690
  Required if `project_id` is not set.
@@ -692,7 +693,7 @@ class SecretRole(pulumi.CustomResource):
692
693
 
693
694
  @property
694
695
  @pulumi.getter(name="projectId")
695
- def project_id(self) -> pulumi.Output[Optional[str]]:
696
+ def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
696
697
  """
697
698
  Unique identifier for the project to which the target API Key belongs.
698
699
  Required if `organization_id` is not set.
@@ -701,7 +702,7 @@ class SecretRole(pulumi.CustomResource):
701
702
 
702
703
  @property
703
704
  @pulumi.getter(name="projectRoles")
704
- def project_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
705
+ def project_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
705
706
  """
706
707
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
707
708
  """
@@ -709,7 +710,7 @@ class SecretRole(pulumi.CustomResource):
709
710
 
710
711
  @property
711
712
  @pulumi.getter
712
- def roles(self) -> pulumi.Output[Sequence[str]]:
713
+ def roles(self) -> pulumi.Output[Sequence[builtins.str]]:
713
714
  """
714
715
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
715
716
  """
@@ -717,7 +718,7 @@ class SecretRole(pulumi.CustomResource):
717
718
 
718
719
  @property
719
720
  @pulumi.getter
720
- def ttl(self) -> pulumi.Output[Optional[str]]:
721
+ def ttl(self) -> pulumi.Output[Optional[builtins.str]]:
721
722
  """
722
723
  Duration in seconds after which the issued credential should expire.
723
724
  """