pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,36 +20,36 @@ __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendRoleSecretIdArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
role_name: pulumi.Input[str],
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
metadata: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
28
|
-
secret_id: Optional[pulumi.Input[str]] = None,
|
29
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
30
|
-
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
31
|
-
wrapping_ttl: Optional[pulumi.Input[str]] = None):
|
23
|
+
role_name: pulumi.Input[builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
metadata: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
29
|
+
secret_id: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
31
|
+
with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
|
32
33
|
"""
|
33
34
|
The set of arguments for constructing a AuthBackendRoleSecretId resource.
|
34
|
-
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
35
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
35
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
|
36
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
37
38
|
perform the login operation using this SecretID.
|
38
|
-
:param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
|
39
|
+
:param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
|
39
40
|
key-value pairs to be set on tokens issued with this SecretID.
|
40
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
41
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
41
42
|
The value should not contain leading or trailing forward slashes.
|
42
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
44
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
45
|
-
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
45
|
+
:param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
|
46
|
+
:param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
46
47
|
mode. Defaults to Vault auto-generating SecretIDs.
|
47
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
48
|
-
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
48
|
+
:param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
|
49
|
+
:param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
49
50
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
50
51
|
invalidated through unwrapping.
|
51
|
-
:param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
|
52
|
+
:param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
|
52
53
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
53
54
|
and available for the duration specified. Only a single unwrapping of the
|
54
55
|
token is allowed.
|
@@ -75,31 +76,31 @@ class AuthBackendRoleSecretIdArgs:
|
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter(name="roleName")
|
78
|
-
def role_name(self) -> pulumi.Input[str]:
|
79
|
+
def role_name(self) -> pulumi.Input[builtins.str]:
|
79
80
|
"""
|
80
81
|
The name of the role to create the SecretID for.
|
81
82
|
"""
|
82
83
|
return pulumi.get(self, "role_name")
|
83
84
|
|
84
85
|
@role_name.setter
|
85
|
-
def role_name(self, value: pulumi.Input[str]):
|
86
|
+
def role_name(self, value: pulumi.Input[builtins.str]):
|
86
87
|
pulumi.set(self, "role_name", value)
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter
|
90
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
91
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
91
92
|
"""
|
92
93
|
Unique name of the auth backend to configure.
|
93
94
|
"""
|
94
95
|
return pulumi.get(self, "backend")
|
95
96
|
|
96
97
|
@backend.setter
|
97
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
98
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
98
99
|
pulumi.set(self, "backend", value)
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="cidrLists")
|
102
|
-
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
103
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
103
104
|
"""
|
104
105
|
If set, specifies blocks of IP addresses which can
|
105
106
|
perform the login operation using this SecretID.
|
@@ -107,12 +108,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
107
108
|
return pulumi.get(self, "cidr_lists")
|
108
109
|
|
109
110
|
@cidr_lists.setter
|
110
|
-
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
111
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
111
112
|
pulumi.set(self, "cidr_lists", value)
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter
|
115
|
-
def metadata(self) -> Optional[pulumi.Input[str]]:
|
116
|
+
def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
|
116
117
|
"""
|
117
118
|
A JSON-encoded string containing metadata in
|
118
119
|
key-value pairs to be set on tokens issued with this SecretID.
|
@@ -120,12 +121,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
120
121
|
return pulumi.get(self, "metadata")
|
121
122
|
|
122
123
|
@metadata.setter
|
123
|
-
def metadata(self, value: Optional[pulumi.Input[str]]):
|
124
|
+
def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
|
124
125
|
pulumi.set(self, "metadata", value)
|
125
126
|
|
126
127
|
@property
|
127
128
|
@pulumi.getter
|
128
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
129
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
129
130
|
"""
|
130
131
|
The namespace to provision the resource in.
|
131
132
|
The value should not contain leading or trailing forward slashes.
|
@@ -135,24 +136,24 @@ class AuthBackendRoleSecretIdArgs:
|
|
135
136
|
return pulumi.get(self, "namespace")
|
136
137
|
|
137
138
|
@namespace.setter
|
138
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
139
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
139
140
|
pulumi.set(self, "namespace", value)
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter(name="numUses")
|
143
|
-
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
144
|
+
def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
144
145
|
"""
|
145
146
|
The number of uses for the secret-id.
|
146
147
|
"""
|
147
148
|
return pulumi.get(self, "num_uses")
|
148
149
|
|
149
150
|
@num_uses.setter
|
150
|
-
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
151
|
+
def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
151
152
|
pulumi.set(self, "num_uses", value)
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter(name="secretId")
|
155
|
-
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
156
|
+
def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
156
157
|
"""
|
157
158
|
The SecretID to be created. If set, uses "Push"
|
158
159
|
mode. Defaults to Vault auto-generating SecretIDs.
|
@@ -160,24 +161,24 @@ class AuthBackendRoleSecretIdArgs:
|
|
160
161
|
return pulumi.get(self, "secret_id")
|
161
162
|
|
162
163
|
@secret_id.setter
|
163
|
-
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
164
|
+
def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
164
165
|
pulumi.set(self, "secret_id", value)
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter
|
168
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
169
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
169
170
|
"""
|
170
171
|
The TTL duration of the SecretID.
|
171
172
|
"""
|
172
173
|
return pulumi.get(self, "ttl")
|
173
174
|
|
174
175
|
@ttl.setter
|
175
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
176
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
176
177
|
pulumi.set(self, "ttl", value)
|
177
178
|
|
178
179
|
@property
|
179
180
|
@pulumi.getter(name="withWrappedAccessor")
|
180
|
-
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
181
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
|
181
182
|
"""
|
182
183
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
183
184
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -186,12 +187,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
186
187
|
return pulumi.get(self, "with_wrapped_accessor")
|
187
188
|
|
188
189
|
@with_wrapped_accessor.setter
|
189
|
-
def with_wrapped_accessor(self, value: Optional[pulumi.Input[bool]]):
|
190
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
|
190
191
|
pulumi.set(self, "with_wrapped_accessor", value)
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter(name="wrappingTtl")
|
194
|
-
def wrapping_ttl(self) -> Optional[pulumi.Input[str]]:
|
195
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
195
196
|
"""
|
196
197
|
If set, the SecretID response will be
|
197
198
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
@@ -201,50 +202,50 @@ class AuthBackendRoleSecretIdArgs:
|
|
201
202
|
return pulumi.get(self, "wrapping_ttl")
|
202
203
|
|
203
204
|
@wrapping_ttl.setter
|
204
|
-
def wrapping_ttl(self, value: Optional[pulumi.Input[str]]):
|
205
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
205
206
|
pulumi.set(self, "wrapping_ttl", value)
|
206
207
|
|
207
208
|
|
208
209
|
@pulumi.input_type
|
209
210
|
class _AuthBackendRoleSecretIdState:
|
210
211
|
def __init__(__self__, *,
|
211
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
212
|
-
backend: Optional[pulumi.Input[str]] = None,
|
213
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
214
|
-
metadata: Optional[pulumi.Input[str]] = None,
|
215
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
216
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
217
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
218
|
-
secret_id: Optional[pulumi.Input[str]] = None,
|
219
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
220
|
-
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
221
|
-
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
222
|
-
wrapping_token: Optional[pulumi.Input[str]] = None,
|
223
|
-
wrapping_ttl: Optional[pulumi.Input[str]] = None):
|
212
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
213
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
214
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
215
|
+
metadata: Optional[pulumi.Input[builtins.str]] = None,
|
216
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
217
|
+
num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
218
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
219
|
+
secret_id: Optional[pulumi.Input[builtins.str]] = None,
|
220
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
221
|
+
with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
|
222
|
+
wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
|
223
|
+
wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
|
224
|
+
wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
|
224
225
|
"""
|
225
226
|
Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
|
226
|
-
:param pulumi.Input[str] accessor: The unique ID for this SecretID that can be safely logged.
|
227
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
228
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
227
|
+
:param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
228
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
229
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
229
230
|
perform the login operation using this SecretID.
|
230
|
-
:param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
|
231
|
+
:param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
|
231
232
|
key-value pairs to be set on tokens issued with this SecretID.
|
232
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
233
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
233
234
|
The value should not contain leading or trailing forward slashes.
|
234
235
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
236
|
*Available only for Vault Enterprise*.
|
236
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
237
|
-
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
238
|
-
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
237
|
+
:param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
|
238
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
|
239
|
+
:param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
239
240
|
mode. Defaults to Vault auto-generating SecretIDs.
|
240
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
241
|
-
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
241
|
+
:param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
|
242
|
+
:param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
242
243
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
243
244
|
invalidated through unwrapping.
|
244
|
-
:param pulumi.Input[str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
245
|
+
:param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
245
246
|
be safely logged.
|
246
|
-
:param pulumi.Input[str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
247
|
-
:param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
|
247
|
+
:param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
248
|
+
:param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
|
248
249
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
249
250
|
and available for the duration specified. Only a single unwrapping of the
|
250
251
|
token is allowed.
|
@@ -278,31 +279,31 @@ class _AuthBackendRoleSecretIdState:
|
|
278
279
|
|
279
280
|
@property
|
280
281
|
@pulumi.getter
|
281
|
-
def accessor(self) -> Optional[pulumi.Input[str]]:
|
282
|
+
def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
|
282
283
|
"""
|
283
284
|
The unique ID for this SecretID that can be safely logged.
|
284
285
|
"""
|
285
286
|
return pulumi.get(self, "accessor")
|
286
287
|
|
287
288
|
@accessor.setter
|
288
|
-
def accessor(self, value: Optional[pulumi.Input[str]]):
|
289
|
+
def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
|
289
290
|
pulumi.set(self, "accessor", value)
|
290
291
|
|
291
292
|
@property
|
292
293
|
@pulumi.getter
|
293
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
294
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
294
295
|
"""
|
295
296
|
Unique name of the auth backend to configure.
|
296
297
|
"""
|
297
298
|
return pulumi.get(self, "backend")
|
298
299
|
|
299
300
|
@backend.setter
|
300
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
301
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
301
302
|
pulumi.set(self, "backend", value)
|
302
303
|
|
303
304
|
@property
|
304
305
|
@pulumi.getter(name="cidrLists")
|
305
|
-
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
306
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
306
307
|
"""
|
307
308
|
If set, specifies blocks of IP addresses which can
|
308
309
|
perform the login operation using this SecretID.
|
@@ -310,12 +311,12 @@ class _AuthBackendRoleSecretIdState:
|
|
310
311
|
return pulumi.get(self, "cidr_lists")
|
311
312
|
|
312
313
|
@cidr_lists.setter
|
313
|
-
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
314
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
314
315
|
pulumi.set(self, "cidr_lists", value)
|
315
316
|
|
316
317
|
@property
|
317
318
|
@pulumi.getter
|
318
|
-
def metadata(self) -> Optional[pulumi.Input[str]]:
|
319
|
+
def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
|
319
320
|
"""
|
320
321
|
A JSON-encoded string containing metadata in
|
321
322
|
key-value pairs to be set on tokens issued with this SecretID.
|
@@ -323,12 +324,12 @@ class _AuthBackendRoleSecretIdState:
|
|
323
324
|
return pulumi.get(self, "metadata")
|
324
325
|
|
325
326
|
@metadata.setter
|
326
|
-
def metadata(self, value: Optional[pulumi.Input[str]]):
|
327
|
+
def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
|
327
328
|
pulumi.set(self, "metadata", value)
|
328
329
|
|
329
330
|
@property
|
330
331
|
@pulumi.getter
|
331
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
332
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
332
333
|
"""
|
333
334
|
The namespace to provision the resource in.
|
334
335
|
The value should not contain leading or trailing forward slashes.
|
@@ -338,36 +339,36 @@ class _AuthBackendRoleSecretIdState:
|
|
338
339
|
return pulumi.get(self, "namespace")
|
339
340
|
|
340
341
|
@namespace.setter
|
341
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
342
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
342
343
|
pulumi.set(self, "namespace", value)
|
343
344
|
|
344
345
|
@property
|
345
346
|
@pulumi.getter(name="numUses")
|
346
|
-
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
347
|
+
def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
347
348
|
"""
|
348
349
|
The number of uses for the secret-id.
|
349
350
|
"""
|
350
351
|
return pulumi.get(self, "num_uses")
|
351
352
|
|
352
353
|
@num_uses.setter
|
353
|
-
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
354
|
+
def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
354
355
|
pulumi.set(self, "num_uses", value)
|
355
356
|
|
356
357
|
@property
|
357
358
|
@pulumi.getter(name="roleName")
|
358
|
-
def role_name(self) -> Optional[pulumi.Input[str]]:
|
359
|
+
def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
359
360
|
"""
|
360
361
|
The name of the role to create the SecretID for.
|
361
362
|
"""
|
362
363
|
return pulumi.get(self, "role_name")
|
363
364
|
|
364
365
|
@role_name.setter
|
365
|
-
def role_name(self, value: Optional[pulumi.Input[str]]):
|
366
|
+
def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
366
367
|
pulumi.set(self, "role_name", value)
|
367
368
|
|
368
369
|
@property
|
369
370
|
@pulumi.getter(name="secretId")
|
370
|
-
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
371
|
+
def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
371
372
|
"""
|
372
373
|
The SecretID to be created. If set, uses "Push"
|
373
374
|
mode. Defaults to Vault auto-generating SecretIDs.
|
@@ -375,24 +376,24 @@ class _AuthBackendRoleSecretIdState:
|
|
375
376
|
return pulumi.get(self, "secret_id")
|
376
377
|
|
377
378
|
@secret_id.setter
|
378
|
-
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
379
|
+
def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
379
380
|
pulumi.set(self, "secret_id", value)
|
380
381
|
|
381
382
|
@property
|
382
383
|
@pulumi.getter
|
383
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
384
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
384
385
|
"""
|
385
386
|
The TTL duration of the SecretID.
|
386
387
|
"""
|
387
388
|
return pulumi.get(self, "ttl")
|
388
389
|
|
389
390
|
@ttl.setter
|
390
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
391
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
391
392
|
pulumi.set(self, "ttl", value)
|
392
393
|
|
393
394
|
@property
|
394
395
|
@pulumi.getter(name="withWrappedAccessor")
|
395
|
-
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
396
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
|
396
397
|
"""
|
397
398
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
398
399
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -401,12 +402,12 @@ class _AuthBackendRoleSecretIdState:
|
|
401
402
|
return pulumi.get(self, "with_wrapped_accessor")
|
402
403
|
|
403
404
|
@with_wrapped_accessor.setter
|
404
|
-
def with_wrapped_accessor(self, value: Optional[pulumi.Input[bool]]):
|
405
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
|
405
406
|
pulumi.set(self, "with_wrapped_accessor", value)
|
406
407
|
|
407
408
|
@property
|
408
409
|
@pulumi.getter(name="wrappingAccessor")
|
409
|
-
def wrapping_accessor(self) -> Optional[pulumi.Input[str]]:
|
410
|
+
def wrapping_accessor(self) -> Optional[pulumi.Input[builtins.str]]:
|
410
411
|
"""
|
411
412
|
The unique ID for the response-wrapped SecretID that can
|
412
413
|
be safely logged.
|
@@ -414,24 +415,24 @@ class _AuthBackendRoleSecretIdState:
|
|
414
415
|
return pulumi.get(self, "wrapping_accessor")
|
415
416
|
|
416
417
|
@wrapping_accessor.setter
|
417
|
-
def wrapping_accessor(self, value: Optional[pulumi.Input[str]]):
|
418
|
+
def wrapping_accessor(self, value: Optional[pulumi.Input[builtins.str]]):
|
418
419
|
pulumi.set(self, "wrapping_accessor", value)
|
419
420
|
|
420
421
|
@property
|
421
422
|
@pulumi.getter(name="wrappingToken")
|
422
|
-
def wrapping_token(self) -> Optional[pulumi.Input[str]]:
|
423
|
+
def wrapping_token(self) -> Optional[pulumi.Input[builtins.str]]:
|
423
424
|
"""
|
424
425
|
The token used to retrieve a response-wrapped SecretID.
|
425
426
|
"""
|
426
427
|
return pulumi.get(self, "wrapping_token")
|
427
428
|
|
428
429
|
@wrapping_token.setter
|
429
|
-
def wrapping_token(self, value: Optional[pulumi.Input[str]]):
|
430
|
+
def wrapping_token(self, value: Optional[pulumi.Input[builtins.str]]):
|
430
431
|
pulumi.set(self, "wrapping_token", value)
|
431
432
|
|
432
433
|
@property
|
433
434
|
@pulumi.getter(name="wrappingTtl")
|
434
|
-
def wrapping_ttl(self) -> Optional[pulumi.Input[str]]:
|
435
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
435
436
|
"""
|
436
437
|
If set, the SecretID response will be
|
437
438
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
@@ -441,7 +442,7 @@ class _AuthBackendRoleSecretIdState:
|
|
441
442
|
return pulumi.get(self, "wrapping_ttl")
|
442
443
|
|
443
444
|
@wrapping_ttl.setter
|
444
|
-
def wrapping_ttl(self, value: Optional[pulumi.Input[str]]):
|
445
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
445
446
|
pulumi.set(self, "wrapping_ttl", value)
|
446
447
|
|
447
448
|
|
@@ -450,16 +451,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
450
451
|
def __init__(__self__,
|
451
452
|
resource_name: str,
|
452
453
|
opts: Optional[pulumi.ResourceOptions] = None,
|
453
|
-
backend: Optional[pulumi.Input[str]] = None,
|
454
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
455
|
-
metadata: Optional[pulumi.Input[str]] = None,
|
456
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
457
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
458
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
459
|
-
secret_id: Optional[pulumi.Input[str]] = None,
|
460
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
461
|
-
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
462
|
-
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
454
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
455
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
456
|
+
metadata: Optional[pulumi.Input[builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
458
|
+
num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
459
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
460
|
+
secret_id: Optional[pulumi.Input[builtins.str]] = None,
|
461
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
462
|
+
with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
|
463
|
+
wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
463
464
|
__props__=None):
|
464
465
|
"""
|
465
466
|
Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
|
@@ -492,24 +493,24 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
492
493
|
|
493
494
|
:param str resource_name: The name of the resource.
|
494
495
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
495
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
496
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
496
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
497
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
497
498
|
perform the login operation using this SecretID.
|
498
|
-
:param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
|
499
|
+
:param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
|
499
500
|
key-value pairs to be set on tokens issued with this SecretID.
|
500
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
501
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
501
502
|
The value should not contain leading or trailing forward slashes.
|
502
503
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
503
504
|
*Available only for Vault Enterprise*.
|
504
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
505
|
-
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
506
|
-
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
505
|
+
:param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
|
506
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
|
507
|
+
:param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
507
508
|
mode. Defaults to Vault auto-generating SecretIDs.
|
508
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
509
|
-
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
509
|
+
:param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
|
510
|
+
:param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
510
511
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
511
512
|
invalidated through unwrapping.
|
512
|
-
:param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
|
513
|
+
:param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
|
513
514
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
514
515
|
and available for the duration specified. Only a single unwrapping of the
|
515
516
|
token is allowed.
|
@@ -564,16 +565,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
564
565
|
def _internal_init(__self__,
|
565
566
|
resource_name: str,
|
566
567
|
opts: Optional[pulumi.ResourceOptions] = None,
|
567
|
-
backend: Optional[pulumi.Input[str]] = None,
|
568
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
569
|
-
metadata: Optional[pulumi.Input[str]] = None,
|
570
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
571
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
572
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
573
|
-
secret_id: Optional[pulumi.Input[str]] = None,
|
574
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
575
|
-
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
576
|
-
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
568
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
569
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
570
|
+
metadata: Optional[pulumi.Input[builtins.str]] = None,
|
571
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
572
|
+
num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
573
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
574
|
+
secret_id: Optional[pulumi.Input[builtins.str]] = None,
|
575
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
576
|
+
with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
|
577
|
+
wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
577
578
|
__props__=None):
|
578
579
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
579
580
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -612,19 +613,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
612
613
|
def get(resource_name: str,
|
613
614
|
id: pulumi.Input[str],
|
614
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
615
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
616
|
-
backend: Optional[pulumi.Input[str]] = None,
|
617
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
618
|
-
metadata: Optional[pulumi.Input[str]] = None,
|
619
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
620
|
-
num_uses: Optional[pulumi.Input[int]] = None,
|
621
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
622
|
-
secret_id: Optional[pulumi.Input[str]] = None,
|
623
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
624
|
-
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
625
|
-
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
626
|
-
wrapping_token: Optional[pulumi.Input[str]] = None,
|
627
|
-
wrapping_ttl: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRoleSecretId':
|
616
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
617
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
618
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
619
|
+
metadata: Optional[pulumi.Input[builtins.str]] = None,
|
620
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
621
|
+
num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
622
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
623
|
+
secret_id: Optional[pulumi.Input[builtins.str]] = None,
|
624
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
625
|
+
with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
|
626
|
+
wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
|
627
|
+
wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
|
628
|
+
wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleSecretId':
|
628
629
|
"""
|
629
630
|
Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
|
630
631
|
properties used to qualify the lookup.
|
@@ -632,28 +633,28 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
632
633
|
:param str resource_name: The unique name of the resulting resource.
|
633
634
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
634
635
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
635
|
-
:param pulumi.Input[str] accessor: The unique ID for this SecretID that can be safely logged.
|
636
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
637
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
636
|
+
:param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
637
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
638
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
638
639
|
perform the login operation using this SecretID.
|
639
|
-
:param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
|
640
|
+
:param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
|
640
641
|
key-value pairs to be set on tokens issued with this SecretID.
|
641
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
642
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
642
643
|
The value should not contain leading or trailing forward slashes.
|
643
644
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
644
645
|
*Available only for Vault Enterprise*.
|
645
|
-
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
646
|
-
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
647
|
-
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
646
|
+
:param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
|
647
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
|
648
|
+
:param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
648
649
|
mode. Defaults to Vault auto-generating SecretIDs.
|
649
|
-
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
650
|
-
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
650
|
+
:param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
|
651
|
+
:param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
651
652
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
652
653
|
invalidated through unwrapping.
|
653
|
-
:param pulumi.Input[str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
654
|
+
:param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
654
655
|
be safely logged.
|
655
|
-
:param pulumi.Input[str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
656
|
-
:param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
|
656
|
+
:param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
657
|
+
:param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
|
657
658
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
658
659
|
and available for the duration specified. Only a single unwrapping of the
|
659
660
|
token is allowed.
|
@@ -679,7 +680,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
679
680
|
|
680
681
|
@property
|
681
682
|
@pulumi.getter
|
682
|
-
def accessor(self) -> pulumi.Output[str]:
|
683
|
+
def accessor(self) -> pulumi.Output[builtins.str]:
|
683
684
|
"""
|
684
685
|
The unique ID for this SecretID that can be safely logged.
|
685
686
|
"""
|
@@ -687,7 +688,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
687
688
|
|
688
689
|
@property
|
689
690
|
@pulumi.getter
|
690
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
691
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
691
692
|
"""
|
692
693
|
Unique name of the auth backend to configure.
|
693
694
|
"""
|
@@ -695,7 +696,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
695
696
|
|
696
697
|
@property
|
697
698
|
@pulumi.getter(name="cidrLists")
|
698
|
-
def cidr_lists(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
699
|
+
def cidr_lists(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
699
700
|
"""
|
700
701
|
If set, specifies blocks of IP addresses which can
|
701
702
|
perform the login operation using this SecretID.
|
@@ -704,7 +705,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
704
705
|
|
705
706
|
@property
|
706
707
|
@pulumi.getter
|
707
|
-
def metadata(self) -> pulumi.Output[Optional[str]]:
|
708
|
+
def metadata(self) -> pulumi.Output[Optional[builtins.str]]:
|
708
709
|
"""
|
709
710
|
A JSON-encoded string containing metadata in
|
710
711
|
key-value pairs to be set on tokens issued with this SecretID.
|
@@ -713,7 +714,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
713
714
|
|
714
715
|
@property
|
715
716
|
@pulumi.getter
|
716
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
717
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
717
718
|
"""
|
718
719
|
The namespace to provision the resource in.
|
719
720
|
The value should not contain leading or trailing forward slashes.
|
@@ -724,7 +725,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
724
725
|
|
725
726
|
@property
|
726
727
|
@pulumi.getter(name="numUses")
|
727
|
-
def num_uses(self) -> pulumi.Output[Optional[int]]:
|
728
|
+
def num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
|
728
729
|
"""
|
729
730
|
The number of uses for the secret-id.
|
730
731
|
"""
|
@@ -732,7 +733,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
732
733
|
|
733
734
|
@property
|
734
735
|
@pulumi.getter(name="roleName")
|
735
|
-
def role_name(self) -> pulumi.Output[str]:
|
736
|
+
def role_name(self) -> pulumi.Output[builtins.str]:
|
736
737
|
"""
|
737
738
|
The name of the role to create the SecretID for.
|
738
739
|
"""
|
@@ -740,7 +741,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
740
741
|
|
741
742
|
@property
|
742
743
|
@pulumi.getter(name="secretId")
|
743
|
-
def secret_id(self) -> pulumi.Output[str]:
|
744
|
+
def secret_id(self) -> pulumi.Output[builtins.str]:
|
744
745
|
"""
|
745
746
|
The SecretID to be created. If set, uses "Push"
|
746
747
|
mode. Defaults to Vault auto-generating SecretIDs.
|
@@ -749,7 +750,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
749
750
|
|
750
751
|
@property
|
751
752
|
@pulumi.getter
|
752
|
-
def ttl(self) -> pulumi.Output[Optional[int]]:
|
753
|
+
def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
753
754
|
"""
|
754
755
|
The TTL duration of the SecretID.
|
755
756
|
"""
|
@@ -757,7 +758,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
757
758
|
|
758
759
|
@property
|
759
760
|
@pulumi.getter(name="withWrappedAccessor")
|
760
|
-
def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
|
761
|
+
def with_wrapped_accessor(self) -> pulumi.Output[Optional[builtins.bool]]:
|
761
762
|
"""
|
762
763
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
763
764
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -767,7 +768,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
767
768
|
|
768
769
|
@property
|
769
770
|
@pulumi.getter(name="wrappingAccessor")
|
770
|
-
def wrapping_accessor(self) -> pulumi.Output[str]:
|
771
|
+
def wrapping_accessor(self) -> pulumi.Output[builtins.str]:
|
771
772
|
"""
|
772
773
|
The unique ID for the response-wrapped SecretID that can
|
773
774
|
be safely logged.
|
@@ -776,7 +777,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
776
777
|
|
777
778
|
@property
|
778
779
|
@pulumi.getter(name="wrappingToken")
|
779
|
-
def wrapping_token(self) -> pulumi.Output[str]:
|
780
|
+
def wrapping_token(self) -> pulumi.Output[builtins.str]:
|
780
781
|
"""
|
781
782
|
The token used to retrieve a response-wrapped SecretID.
|
782
783
|
"""
|
@@ -784,7 +785,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
784
785
|
|
785
786
|
@property
|
786
787
|
@pulumi.getter(name="wrappingTtl")
|
787
|
-
def wrapping_ttl(self) -> pulumi.Output[Optional[str]]:
|
788
|
+
def wrapping_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
788
789
|
"""
|
789
790
|
If set, the SecretID response will be
|
790
791
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|