pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,28 +20,28 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendStaticRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
role_name: pulumi.Input[str],
|
23
|
-
rotation_period: pulumi.Input[int],
|
24
|
-
username: pulumi.Input[str],
|
25
|
-
dn: Optional[pulumi.Input[str]] = None,
|
26
|
-
mount: Optional[pulumi.Input[str]] = None,
|
27
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
28
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None):
|
23
|
+
role_name: pulumi.Input[builtins.str],
|
24
|
+
rotation_period: pulumi.Input[builtins.int],
|
25
|
+
username: pulumi.Input[builtins.str],
|
26
|
+
dn: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
|
29
30
|
"""
|
30
31
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
31
|
-
:param pulumi.Input[str] role_name: Name of the role.
|
32
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
33
|
-
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
34
|
-
:param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
32
|
+
:param pulumi.Input[builtins.str] role_name: Name of the role.
|
33
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
34
|
+
:param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
35
|
+
:param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
35
36
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
36
37
|
search performed during password rotation. Cannot be modified after creation.
|
37
|
-
:param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
|
38
|
+
:param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
|
38
39
|
not begin or end with a `/`. Defaults to `ldap`.
|
39
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
40
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
40
41
|
The value should not contain leading or trailing forward slashes.
|
41
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
42
43
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
44
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
44
45
|
Requires Vault 1.16 or above.
|
45
46
|
"""
|
46
47
|
pulumi.set(__self__, "role_name", role_name)
|
@@ -57,43 +58,43 @@ class SecretBackendStaticRoleArgs:
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter(name="roleName")
|
60
|
-
def role_name(self) -> pulumi.Input[str]:
|
61
|
+
def role_name(self) -> pulumi.Input[builtins.str]:
|
61
62
|
"""
|
62
63
|
Name of the role.
|
63
64
|
"""
|
64
65
|
return pulumi.get(self, "role_name")
|
65
66
|
|
66
67
|
@role_name.setter
|
67
|
-
def role_name(self, value: pulumi.Input[str]):
|
68
|
+
def role_name(self, value: pulumi.Input[builtins.str]):
|
68
69
|
pulumi.set(self, "role_name", value)
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="rotationPeriod")
|
72
|
-
def rotation_period(self) -> pulumi.Input[int]:
|
73
|
+
def rotation_period(self) -> pulumi.Input[builtins.int]:
|
73
74
|
"""
|
74
75
|
How often Vault should rotate the password of the user entry.
|
75
76
|
"""
|
76
77
|
return pulumi.get(self, "rotation_period")
|
77
78
|
|
78
79
|
@rotation_period.setter
|
79
|
-
def rotation_period(self, value: pulumi.Input[int]):
|
80
|
+
def rotation_period(self, value: pulumi.Input[builtins.int]):
|
80
81
|
pulumi.set(self, "rotation_period", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def username(self) -> pulumi.Input[str]:
|
85
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
85
86
|
"""
|
86
87
|
The username of the existing LDAP entry to manage password rotation for.
|
87
88
|
"""
|
88
89
|
return pulumi.get(self, "username")
|
89
90
|
|
90
91
|
@username.setter
|
91
|
-
def username(self, value: pulumi.Input[str]):
|
92
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
92
93
|
pulumi.set(self, "username", value)
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def dn(self) -> Optional[pulumi.Input[str]]:
|
97
|
+
def dn(self) -> Optional[pulumi.Input[builtins.str]]:
|
97
98
|
"""
|
98
99
|
Distinguished name (DN) of the existing LDAP entry to manage
|
99
100
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -102,12 +103,12 @@ class SecretBackendStaticRoleArgs:
|
|
102
103
|
return pulumi.get(self, "dn")
|
103
104
|
|
104
105
|
@dn.setter
|
105
|
-
def dn(self, value: Optional[pulumi.Input[str]]):
|
106
|
+
def dn(self, value: Optional[pulumi.Input[builtins.str]]):
|
106
107
|
pulumi.set(self, "dn", value)
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
111
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
111
112
|
"""
|
112
113
|
The unique path this backend should be mounted at. Must
|
113
114
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -115,12 +116,12 @@ class SecretBackendStaticRoleArgs:
|
|
115
116
|
return pulumi.get(self, "mount")
|
116
117
|
|
117
118
|
@mount.setter
|
118
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
119
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
119
120
|
pulumi.set(self, "mount", value)
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter
|
123
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
The namespace to provision the resource in.
|
126
127
|
The value should not contain leading or trailing forward slashes.
|
@@ -130,12 +131,12 @@ class SecretBackendStaticRoleArgs:
|
|
130
131
|
return pulumi.get(self, "namespace")
|
131
132
|
|
132
133
|
@namespace.setter
|
133
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
134
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
134
135
|
pulumi.set(self, "namespace", value)
|
135
136
|
|
136
137
|
@property
|
137
138
|
@pulumi.getter(name="skipImportRotation")
|
138
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
139
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
139
140
|
"""
|
140
141
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
141
142
|
Requires Vault 1.16 or above.
|
@@ -143,36 +144,36 @@ class SecretBackendStaticRoleArgs:
|
|
143
144
|
return pulumi.get(self, "skip_import_rotation")
|
144
145
|
|
145
146
|
@skip_import_rotation.setter
|
146
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
147
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
147
148
|
pulumi.set(self, "skip_import_rotation", value)
|
148
149
|
|
149
150
|
|
150
151
|
@pulumi.input_type
|
151
152
|
class _SecretBackendStaticRoleState:
|
152
153
|
def __init__(__self__, *,
|
153
|
-
dn: Optional[pulumi.Input[str]] = None,
|
154
|
-
mount: Optional[pulumi.Input[str]] = None,
|
155
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
156
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
157
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
158
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
159
|
-
username: Optional[pulumi.Input[str]] = None):
|
154
|
+
dn: Optional[pulumi.Input[builtins.str]] = None,
|
155
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
156
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
157
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
158
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
159
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
160
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
160
161
|
"""
|
161
162
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
162
|
-
:param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
163
|
+
:param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
163
164
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
164
165
|
search performed during password rotation. Cannot be modified after creation.
|
165
|
-
:param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
|
166
|
+
:param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
|
166
167
|
not begin or end with a `/`. Defaults to `ldap`.
|
167
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
168
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
168
169
|
The value should not contain leading or trailing forward slashes.
|
169
170
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
170
171
|
*Available only for Vault Enterprise*.
|
171
|
-
:param pulumi.Input[str] role_name: Name of the role.
|
172
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
173
|
-
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
172
|
+
:param pulumi.Input[builtins.str] role_name: Name of the role.
|
173
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
174
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
174
175
|
Requires Vault 1.16 or above.
|
175
|
-
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
176
|
+
:param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
176
177
|
"""
|
177
178
|
if dn is not None:
|
178
179
|
pulumi.set(__self__, "dn", dn)
|
@@ -191,7 +192,7 @@ class _SecretBackendStaticRoleState:
|
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter
|
194
|
-
def dn(self) -> Optional[pulumi.Input[str]]:
|
195
|
+
def dn(self) -> Optional[pulumi.Input[builtins.str]]:
|
195
196
|
"""
|
196
197
|
Distinguished name (DN) of the existing LDAP entry to manage
|
197
198
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -200,12 +201,12 @@ class _SecretBackendStaticRoleState:
|
|
200
201
|
return pulumi.get(self, "dn")
|
201
202
|
|
202
203
|
@dn.setter
|
203
|
-
def dn(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def dn(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "dn", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter
|
208
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
209
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
209
210
|
"""
|
210
211
|
The unique path this backend should be mounted at. Must
|
211
212
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -213,12 +214,12 @@ class _SecretBackendStaticRoleState:
|
|
213
214
|
return pulumi.get(self, "mount")
|
214
215
|
|
215
216
|
@mount.setter
|
216
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
217
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
217
218
|
pulumi.set(self, "mount", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter
|
221
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
222
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
222
223
|
"""
|
223
224
|
The namespace to provision the resource in.
|
224
225
|
The value should not contain leading or trailing forward slashes.
|
@@ -228,36 +229,36 @@ class _SecretBackendStaticRoleState:
|
|
228
229
|
return pulumi.get(self, "namespace")
|
229
230
|
|
230
231
|
@namespace.setter
|
231
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
232
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
232
233
|
pulumi.set(self, "namespace", value)
|
233
234
|
|
234
235
|
@property
|
235
236
|
@pulumi.getter(name="roleName")
|
236
|
-
def role_name(self) -> Optional[pulumi.Input[str]]:
|
237
|
+
def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
237
238
|
"""
|
238
239
|
Name of the role.
|
239
240
|
"""
|
240
241
|
return pulumi.get(self, "role_name")
|
241
242
|
|
242
243
|
@role_name.setter
|
243
|
-
def role_name(self, value: Optional[pulumi.Input[str]]):
|
244
|
+
def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
244
245
|
pulumi.set(self, "role_name", value)
|
245
246
|
|
246
247
|
@property
|
247
248
|
@pulumi.getter(name="rotationPeriod")
|
248
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
249
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
249
250
|
"""
|
250
251
|
How often Vault should rotate the password of the user entry.
|
251
252
|
"""
|
252
253
|
return pulumi.get(self, "rotation_period")
|
253
254
|
|
254
255
|
@rotation_period.setter
|
255
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
256
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
256
257
|
pulumi.set(self, "rotation_period", value)
|
257
258
|
|
258
259
|
@property
|
259
260
|
@pulumi.getter(name="skipImportRotation")
|
260
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
261
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
261
262
|
"""
|
262
263
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
263
264
|
Requires Vault 1.16 or above.
|
@@ -265,19 +266,19 @@ class _SecretBackendStaticRoleState:
|
|
265
266
|
return pulumi.get(self, "skip_import_rotation")
|
266
267
|
|
267
268
|
@skip_import_rotation.setter
|
268
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
269
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
269
270
|
pulumi.set(self, "skip_import_rotation", value)
|
270
271
|
|
271
272
|
@property
|
272
273
|
@pulumi.getter
|
273
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
274
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
274
275
|
"""
|
275
276
|
The username of the existing LDAP entry to manage password rotation for.
|
276
277
|
"""
|
277
278
|
return pulumi.get(self, "username")
|
278
279
|
|
279
280
|
@username.setter
|
280
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
281
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
281
282
|
pulumi.set(self, "username", value)
|
282
283
|
|
283
284
|
|
@@ -286,13 +287,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
286
287
|
def __init__(__self__,
|
287
288
|
resource_name: str,
|
288
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
289
|
-
dn: Optional[pulumi.Input[str]] = None,
|
290
|
-
mount: Optional[pulumi.Input[str]] = None,
|
291
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
292
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
293
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
294
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
295
|
-
username: Optional[pulumi.Input[str]] = None,
|
290
|
+
dn: Optional[pulumi.Input[builtins.str]] = None,
|
291
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
293
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
294
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
295
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
296
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
296
297
|
__props__=None):
|
297
298
|
"""
|
298
299
|
## Example Usage
|
@@ -327,20 +328,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
327
328
|
|
328
329
|
:param str resource_name: The name of the resource.
|
329
330
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
330
|
-
:param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
331
|
+
:param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
331
332
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
332
333
|
search performed during password rotation. Cannot be modified after creation.
|
333
|
-
:param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
|
334
|
+
:param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
|
334
335
|
not begin or end with a `/`. Defaults to `ldap`.
|
335
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
336
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
336
337
|
The value should not contain leading or trailing forward slashes.
|
337
338
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
338
339
|
*Available only for Vault Enterprise*.
|
339
|
-
:param pulumi.Input[str] role_name: Name of the role.
|
340
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
341
|
-
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
340
|
+
:param pulumi.Input[builtins.str] role_name: Name of the role.
|
341
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
342
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
342
343
|
Requires Vault 1.16 or above.
|
343
|
-
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
344
|
+
:param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
344
345
|
"""
|
345
346
|
...
|
346
347
|
@overload
|
@@ -394,13 +395,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
394
395
|
def _internal_init(__self__,
|
395
396
|
resource_name: str,
|
396
397
|
opts: Optional[pulumi.ResourceOptions] = None,
|
397
|
-
dn: Optional[pulumi.Input[str]] = None,
|
398
|
-
mount: Optional[pulumi.Input[str]] = None,
|
399
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
400
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
401
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
402
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
403
|
-
username: Optional[pulumi.Input[str]] = None,
|
398
|
+
dn: Optional[pulumi.Input[builtins.str]] = None,
|
399
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
400
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
401
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
402
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
403
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
404
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
404
405
|
__props__=None):
|
405
406
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
406
407
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -433,13 +434,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
433
434
|
def get(resource_name: str,
|
434
435
|
id: pulumi.Input[str],
|
435
436
|
opts: Optional[pulumi.ResourceOptions] = None,
|
436
|
-
dn: Optional[pulumi.Input[str]] = None,
|
437
|
-
mount: Optional[pulumi.Input[str]] = None,
|
438
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
439
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
440
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
441
|
-
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
442
|
-
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
437
|
+
dn: Optional[pulumi.Input[builtins.str]] = None,
|
438
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
439
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
440
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
441
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
442
|
+
skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
443
|
+
username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
|
443
444
|
"""
|
444
445
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
445
446
|
properties used to qualify the lookup.
|
@@ -447,20 +448,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
447
448
|
:param str resource_name: The unique name of the resulting resource.
|
448
449
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
449
450
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
450
|
-
:param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
451
|
+
:param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
451
452
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
452
453
|
search performed during password rotation. Cannot be modified after creation.
|
453
|
-
:param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
|
454
|
+
:param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
|
454
455
|
not begin or end with a `/`. Defaults to `ldap`.
|
455
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
456
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
456
457
|
The value should not contain leading or trailing forward slashes.
|
457
458
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
458
459
|
*Available only for Vault Enterprise*.
|
459
|
-
:param pulumi.Input[str] role_name: Name of the role.
|
460
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
461
|
-
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
460
|
+
:param pulumi.Input[builtins.str] role_name: Name of the role.
|
461
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
462
|
+
:param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
462
463
|
Requires Vault 1.16 or above.
|
463
|
-
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
464
|
+
:param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
464
465
|
"""
|
465
466
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
466
467
|
|
@@ -477,7 +478,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
477
478
|
|
478
479
|
@property
|
479
480
|
@pulumi.getter
|
480
|
-
def dn(self) -> pulumi.Output[Optional[str]]:
|
481
|
+
def dn(self) -> pulumi.Output[Optional[builtins.str]]:
|
481
482
|
"""
|
482
483
|
Distinguished name (DN) of the existing LDAP entry to manage
|
483
484
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -487,7 +488,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
487
488
|
|
488
489
|
@property
|
489
490
|
@pulumi.getter
|
490
|
-
def mount(self) -> pulumi.Output[Optional[str]]:
|
491
|
+
def mount(self) -> pulumi.Output[Optional[builtins.str]]:
|
491
492
|
"""
|
492
493
|
The unique path this backend should be mounted at. Must
|
493
494
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -496,7 +497,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
496
497
|
|
497
498
|
@property
|
498
499
|
@pulumi.getter
|
499
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
500
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
500
501
|
"""
|
501
502
|
The namespace to provision the resource in.
|
502
503
|
The value should not contain leading or trailing forward slashes.
|
@@ -507,7 +508,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
507
508
|
|
508
509
|
@property
|
509
510
|
@pulumi.getter(name="roleName")
|
510
|
-
def role_name(self) -> pulumi.Output[str]:
|
511
|
+
def role_name(self) -> pulumi.Output[builtins.str]:
|
511
512
|
"""
|
512
513
|
Name of the role.
|
513
514
|
"""
|
@@ -515,7 +516,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
515
516
|
|
516
517
|
@property
|
517
518
|
@pulumi.getter(name="rotationPeriod")
|
518
|
-
def rotation_period(self) -> pulumi.Output[int]:
|
519
|
+
def rotation_period(self) -> pulumi.Output[builtins.int]:
|
519
520
|
"""
|
520
521
|
How often Vault should rotate the password of the user entry.
|
521
522
|
"""
|
@@ -523,7 +524,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
523
524
|
|
524
525
|
@property
|
525
526
|
@pulumi.getter(name="skipImportRotation")
|
526
|
-
def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
|
527
|
+
def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
527
528
|
"""
|
528
529
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
529
530
|
Requires Vault 1.16 or above.
|
@@ -532,7 +533,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
532
533
|
|
533
534
|
@property
|
534
535
|
@pulumi.getter
|
535
|
-
def username(self) -> pulumi.Output[str]:
|
536
|
+
def username(self) -> pulumi.Output[builtins.str]:
|
536
537
|
"""
|
537
538
|
The username of the existing LDAP entry to manage password rotation for.
|
538
539
|
"""
|
pulumi_vault/managed/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|