pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,29 +20,29 @@ __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendLibrarySetArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
service_account_names: pulumi.Input[Sequence[pulumi.Input[str]]],
|
23
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
24
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
25
|
-
mount: Optional[pulumi.Input[str]] = None,
|
26
|
-
name: Optional[pulumi.Input[str]] = None,
|
27
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
28
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
service_account_names: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
24
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
26
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
29
30
|
"""
|
30
31
|
The set of arguments for constructing a SecretBackendLibrarySet resource.
|
31
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
32
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
33
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
33
34
|
accounts must be checked in by the entity or client token that checked them
|
34
35
|
out. Defaults to false.
|
35
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
36
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
36
37
|
to the configuration max_ttl if not provided.
|
37
|
-
:param pulumi.Input[str] mount: The path where the LDAP secrets backend is mounted.
|
38
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
38
|
+
:param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
39
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
39
40
|
Must be unique within the backend.
|
40
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
41
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
41
42
|
The value should not contain leading or trailing forward slashes.
|
42
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
44
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
45
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
45
46
|
ttl if not provided.
|
46
47
|
"""
|
47
48
|
pulumi.set(__self__, "service_account_names", service_account_names)
|
@@ -60,19 +61,19 @@ class SecretBackendLibrarySetArgs:
|
|
60
61
|
|
61
62
|
@property
|
62
63
|
@pulumi.getter(name="serviceAccountNames")
|
63
|
-
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
64
|
+
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
64
65
|
"""
|
65
66
|
Specifies the slice of service accounts mapped to this set.
|
66
67
|
"""
|
67
68
|
return pulumi.get(self, "service_account_names")
|
68
69
|
|
69
70
|
@service_account_names.setter
|
70
|
-
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
71
|
+
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
71
72
|
pulumi.set(self, "service_account_names", value)
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter(name="disableCheckInEnforcement")
|
75
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[bool]]:
|
76
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
|
76
77
|
"""
|
77
78
|
Disable enforcing that service
|
78
79
|
accounts must be checked in by the entity or client token that checked them
|
@@ -81,12 +82,12 @@ class SecretBackendLibrarySetArgs:
|
|
81
82
|
return pulumi.get(self, "disable_check_in_enforcement")
|
82
83
|
|
83
84
|
@disable_check_in_enforcement.setter
|
84
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[bool]]):
|
85
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
|
85
86
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="maxTtl")
|
89
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
90
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
90
91
|
"""
|
91
92
|
The maximum password time-to-live in seconds. Defaults
|
92
93
|
to the configuration max_ttl if not provided.
|
@@ -94,24 +95,24 @@ class SecretBackendLibrarySetArgs:
|
|
94
95
|
return pulumi.get(self, "max_ttl")
|
95
96
|
|
96
97
|
@max_ttl.setter
|
97
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
98
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
98
99
|
pulumi.set(self, "max_ttl", value)
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter
|
102
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
103
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
103
104
|
"""
|
104
105
|
The path where the LDAP secrets backend is mounted.
|
105
106
|
"""
|
106
107
|
return pulumi.get(self, "mount")
|
107
108
|
|
108
109
|
@mount.setter
|
109
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
110
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
110
111
|
pulumi.set(self, "mount", value)
|
111
112
|
|
112
113
|
@property
|
113
114
|
@pulumi.getter
|
114
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
115
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
115
116
|
"""
|
116
117
|
The name to identify this set of service accounts.
|
117
118
|
Must be unique within the backend.
|
@@ -119,12 +120,12 @@ class SecretBackendLibrarySetArgs:
|
|
119
120
|
return pulumi.get(self, "name")
|
120
121
|
|
121
122
|
@name.setter
|
122
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
123
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
123
124
|
pulumi.set(self, "name", value)
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter
|
127
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
128
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
128
129
|
"""
|
129
130
|
The namespace to provision the resource in.
|
130
131
|
The value should not contain leading or trailing forward slashes.
|
@@ -134,12 +135,12 @@ class SecretBackendLibrarySetArgs:
|
|
134
135
|
return pulumi.get(self, "namespace")
|
135
136
|
|
136
137
|
@namespace.setter
|
137
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
138
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
138
139
|
pulumi.set(self, "namespace", value)
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter
|
142
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
143
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
143
144
|
"""
|
144
145
|
The password time-to-live in seconds. Defaults to the configuration
|
145
146
|
ttl if not provided.
|
@@ -147,36 +148,36 @@ class SecretBackendLibrarySetArgs:
|
|
147
148
|
return pulumi.get(self, "ttl")
|
148
149
|
|
149
150
|
@ttl.setter
|
150
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
151
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
151
152
|
pulumi.set(self, "ttl", value)
|
152
153
|
|
153
154
|
|
154
155
|
@pulumi.input_type
|
155
156
|
class _SecretBackendLibrarySetState:
|
156
157
|
def __init__(__self__, *,
|
157
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
158
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
159
|
-
mount: Optional[pulumi.Input[str]] = None,
|
160
|
-
name: Optional[pulumi.Input[str]] = None,
|
161
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
162
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
163
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
158
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
159
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
160
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
161
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
162
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
163
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
164
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
164
165
|
"""
|
165
166
|
Input properties used for looking up and filtering SecretBackendLibrarySet resources.
|
166
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service
|
167
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
167
168
|
accounts must be checked in by the entity or client token that checked them
|
168
169
|
out. Defaults to false.
|
169
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
170
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
170
171
|
to the configuration max_ttl if not provided.
|
171
|
-
:param pulumi.Input[str] mount: The path where the LDAP secrets backend is mounted.
|
172
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
172
|
+
:param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
173
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
173
174
|
Must be unique within the backend.
|
174
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
175
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
175
176
|
The value should not contain leading or trailing forward slashes.
|
176
177
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
178
|
*Available only for Vault Enterprise*.
|
178
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
179
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
179
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
180
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
180
181
|
ttl if not provided.
|
181
182
|
"""
|
182
183
|
if disable_check_in_enforcement is not None:
|
@@ -196,7 +197,7 @@ class _SecretBackendLibrarySetState:
|
|
196
197
|
|
197
198
|
@property
|
198
199
|
@pulumi.getter(name="disableCheckInEnforcement")
|
199
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[bool]]:
|
200
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
|
200
201
|
"""
|
201
202
|
Disable enforcing that service
|
202
203
|
accounts must be checked in by the entity or client token that checked them
|
@@ -205,12 +206,12 @@ class _SecretBackendLibrarySetState:
|
|
205
206
|
return pulumi.get(self, "disable_check_in_enforcement")
|
206
207
|
|
207
208
|
@disable_check_in_enforcement.setter
|
208
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[bool]]):
|
209
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
|
209
210
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
210
211
|
|
211
212
|
@property
|
212
213
|
@pulumi.getter(name="maxTtl")
|
213
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
214
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
214
215
|
"""
|
215
216
|
The maximum password time-to-live in seconds. Defaults
|
216
217
|
to the configuration max_ttl if not provided.
|
@@ -218,24 +219,24 @@ class _SecretBackendLibrarySetState:
|
|
218
219
|
return pulumi.get(self, "max_ttl")
|
219
220
|
|
220
221
|
@max_ttl.setter
|
221
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
222
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
222
223
|
pulumi.set(self, "max_ttl", value)
|
223
224
|
|
224
225
|
@property
|
225
226
|
@pulumi.getter
|
226
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
227
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
227
228
|
"""
|
228
229
|
The path where the LDAP secrets backend is mounted.
|
229
230
|
"""
|
230
231
|
return pulumi.get(self, "mount")
|
231
232
|
|
232
233
|
@mount.setter
|
233
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
234
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
234
235
|
pulumi.set(self, "mount", value)
|
235
236
|
|
236
237
|
@property
|
237
238
|
@pulumi.getter
|
238
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
239
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
239
240
|
"""
|
240
241
|
The name to identify this set of service accounts.
|
241
242
|
Must be unique within the backend.
|
@@ -243,12 +244,12 @@ class _SecretBackendLibrarySetState:
|
|
243
244
|
return pulumi.get(self, "name")
|
244
245
|
|
245
246
|
@name.setter
|
246
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
247
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
247
248
|
pulumi.set(self, "name", value)
|
248
249
|
|
249
250
|
@property
|
250
251
|
@pulumi.getter
|
251
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
252
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
252
253
|
"""
|
253
254
|
The namespace to provision the resource in.
|
254
255
|
The value should not contain leading or trailing forward slashes.
|
@@ -258,24 +259,24 @@ class _SecretBackendLibrarySetState:
|
|
258
259
|
return pulumi.get(self, "namespace")
|
259
260
|
|
260
261
|
@namespace.setter
|
261
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
262
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
262
263
|
pulumi.set(self, "namespace", value)
|
263
264
|
|
264
265
|
@property
|
265
266
|
@pulumi.getter(name="serviceAccountNames")
|
266
|
-
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
267
|
+
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
267
268
|
"""
|
268
269
|
Specifies the slice of service accounts mapped to this set.
|
269
270
|
"""
|
270
271
|
return pulumi.get(self, "service_account_names")
|
271
272
|
|
272
273
|
@service_account_names.setter
|
273
|
-
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
274
|
+
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
274
275
|
pulumi.set(self, "service_account_names", value)
|
275
276
|
|
276
277
|
@property
|
277
278
|
@pulumi.getter
|
278
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
279
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
279
280
|
"""
|
280
281
|
The password time-to-live in seconds. Defaults to the configuration
|
281
282
|
ttl if not provided.
|
@@ -283,7 +284,7 @@ class _SecretBackendLibrarySetState:
|
|
283
284
|
return pulumi.get(self, "ttl")
|
284
285
|
|
285
286
|
@ttl.setter
|
286
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
287
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
287
288
|
pulumi.set(self, "ttl", value)
|
288
289
|
|
289
290
|
|
@@ -292,13 +293,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
292
293
|
def __init__(__self__,
|
293
294
|
resource_name: str,
|
294
295
|
opts: Optional[pulumi.ResourceOptions] = None,
|
295
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
296
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
297
|
-
mount: Optional[pulumi.Input[str]] = None,
|
298
|
-
name: Optional[pulumi.Input[str]] = None,
|
299
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
300
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
301
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
296
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
297
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
298
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
299
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
300
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
301
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
302
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
302
303
|
__props__=None):
|
303
304
|
"""
|
304
305
|
## Example Usage
|
@@ -336,20 +337,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
336
337
|
|
337
338
|
:param str resource_name: The name of the resource.
|
338
339
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
339
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service
|
340
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
340
341
|
accounts must be checked in by the entity or client token that checked them
|
341
342
|
out. Defaults to false.
|
342
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
343
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
343
344
|
to the configuration max_ttl if not provided.
|
344
|
-
:param pulumi.Input[str] mount: The path where the LDAP secrets backend is mounted.
|
345
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
345
|
+
:param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
346
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
346
347
|
Must be unique within the backend.
|
347
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
348
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
348
349
|
The value should not contain leading or trailing forward slashes.
|
349
350
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
350
351
|
*Available only for Vault Enterprise*.
|
351
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
352
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
352
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
353
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
353
354
|
ttl if not provided.
|
354
355
|
"""
|
355
356
|
...
|
@@ -407,13 +408,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
407
408
|
def _internal_init(__self__,
|
408
409
|
resource_name: str,
|
409
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
410
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
411
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
412
|
-
mount: Optional[pulumi.Input[str]] = None,
|
413
|
-
name: Optional[pulumi.Input[str]] = None,
|
414
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
415
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
416
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
411
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
412
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
413
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
414
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
415
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
416
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
417
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
417
418
|
__props__=None):
|
418
419
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
419
420
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -442,13 +443,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
442
443
|
def get(resource_name: str,
|
443
444
|
id: pulumi.Input[str],
|
444
445
|
opts: Optional[pulumi.ResourceOptions] = None,
|
445
|
-
disable_check_in_enforcement: Optional[pulumi.Input[bool]] = None,
|
446
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
447
|
-
mount: Optional[pulumi.Input[str]] = None,
|
448
|
-
name: Optional[pulumi.Input[str]] = None,
|
449
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
450
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
451
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendLibrarySet':
|
446
|
+
disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
|
447
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
448
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
449
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
450
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
451
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
452
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendLibrarySet':
|
452
453
|
"""
|
453
454
|
Get an existing SecretBackendLibrarySet resource's state with the given name, id, and optional extra
|
454
455
|
properties used to qualify the lookup.
|
@@ -456,20 +457,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
456
457
|
:param str resource_name: The unique name of the resulting resource.
|
457
458
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
458
459
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
459
|
-
:param pulumi.Input[bool] disable_check_in_enforcement: Disable enforcing that service
|
460
|
+
:param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
460
461
|
accounts must be checked in by the entity or client token that checked them
|
461
462
|
out. Defaults to false.
|
462
|
-
:param pulumi.Input[int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
463
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
463
464
|
to the configuration max_ttl if not provided.
|
464
|
-
:param pulumi.Input[str] mount: The path where the LDAP secrets backend is mounted.
|
465
|
-
:param pulumi.Input[str] name: The name to identify this set of service accounts.
|
465
|
+
:param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
466
|
+
:param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
|
466
467
|
Must be unique within the backend.
|
467
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
468
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
468
469
|
The value should not contain leading or trailing forward slashes.
|
469
470
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
470
471
|
*Available only for Vault Enterprise*.
|
471
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
472
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
472
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
473
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
473
474
|
ttl if not provided.
|
474
475
|
"""
|
475
476
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -487,7 +488,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
487
488
|
|
488
489
|
@property
|
489
490
|
@pulumi.getter(name="disableCheckInEnforcement")
|
490
|
-
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[bool]]:
|
491
|
+
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[builtins.bool]]:
|
491
492
|
"""
|
492
493
|
Disable enforcing that service
|
493
494
|
accounts must be checked in by the entity or client token that checked them
|
@@ -497,7 +498,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
497
498
|
|
498
499
|
@property
|
499
500
|
@pulumi.getter(name="maxTtl")
|
500
|
-
def max_ttl(self) -> pulumi.Output[int]:
|
501
|
+
def max_ttl(self) -> pulumi.Output[builtins.int]:
|
501
502
|
"""
|
502
503
|
The maximum password time-to-live in seconds. Defaults
|
503
504
|
to the configuration max_ttl if not provided.
|
@@ -506,7 +507,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
506
507
|
|
507
508
|
@property
|
508
509
|
@pulumi.getter
|
509
|
-
def mount(self) -> pulumi.Output[Optional[str]]:
|
510
|
+
def mount(self) -> pulumi.Output[Optional[builtins.str]]:
|
510
511
|
"""
|
511
512
|
The path where the LDAP secrets backend is mounted.
|
512
513
|
"""
|
@@ -514,7 +515,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
514
515
|
|
515
516
|
@property
|
516
517
|
@pulumi.getter
|
517
|
-
def name(self) -> pulumi.Output[str]:
|
518
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
518
519
|
"""
|
519
520
|
The name to identify this set of service accounts.
|
520
521
|
Must be unique within the backend.
|
@@ -523,7 +524,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
523
524
|
|
524
525
|
@property
|
525
526
|
@pulumi.getter
|
526
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
527
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
527
528
|
"""
|
528
529
|
The namespace to provision the resource in.
|
529
530
|
The value should not contain leading or trailing forward slashes.
|
@@ -534,7 +535,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
534
535
|
|
535
536
|
@property
|
536
537
|
@pulumi.getter(name="serviceAccountNames")
|
537
|
-
def service_account_names(self) -> pulumi.Output[Sequence[str]]:
|
538
|
+
def service_account_names(self) -> pulumi.Output[Sequence[builtins.str]]:
|
538
539
|
"""
|
539
540
|
Specifies the slice of service accounts mapped to this set.
|
540
541
|
"""
|
@@ -542,7 +543,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
542
543
|
|
543
544
|
@property
|
544
545
|
@pulumi.getter
|
545
|
-
def ttl(self) -> pulumi.Output[int]:
|
546
|
+
def ttl(self) -> pulumi.Output[builtins.int]:
|
546
547
|
"""
|
547
548
|
The password time-to-live in seconds. Defaults to the configuration
|
548
549
|
ttl if not provided.
|