pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,20 +20,20 @@ __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendStsRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
account_id: pulumi.Input[str],
|
23
|
-
sts_role: pulumi.Input[str],
|
24
|
-
backend: Optional[pulumi.Input[str]] = None,
|
25
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
account_id: pulumi.Input[builtins.str],
|
24
|
+
sts_role: pulumi.Input[builtins.str],
|
25
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a AuthBackendStsRole resource.
|
29
|
-
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
30
|
-
:param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
|
30
|
+
:param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
|
31
|
+
:param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
|
31
32
|
by EC2 instances in the account specified by `account_id`.
|
32
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
33
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
33
34
|
mounted at. Defaults to `aws`.
|
34
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
35
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
|
+
:param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
36
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
36
37
|
The value should not contain leading or trailing forward slashes.
|
37
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
39
|
*Available only for Vault Enterprise*.
|
@@ -48,19 +49,19 @@ class AuthBackendStsRoleArgs:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter(name="accountId")
|
51
|
-
def account_id(self) -> pulumi.Input[str]:
|
52
|
+
def account_id(self) -> pulumi.Input[builtins.str]:
|
52
53
|
"""
|
53
54
|
The AWS account ID to configure the STS role for.
|
54
55
|
"""
|
55
56
|
return pulumi.get(self, "account_id")
|
56
57
|
|
57
58
|
@account_id.setter
|
58
|
-
def account_id(self, value: pulumi.Input[str]):
|
59
|
+
def account_id(self, value: pulumi.Input[builtins.str]):
|
59
60
|
pulumi.set(self, "account_id", value)
|
60
61
|
|
61
62
|
@property
|
62
63
|
@pulumi.getter(name="stsRole")
|
63
|
-
def sts_role(self) -> pulumi.Input[str]:
|
64
|
+
def sts_role(self) -> pulumi.Input[builtins.str]:
|
64
65
|
"""
|
65
66
|
The STS role to assume when verifying requests made
|
66
67
|
by EC2 instances in the account specified by `account_id`.
|
@@ -68,12 +69,12 @@ class AuthBackendStsRoleArgs:
|
|
68
69
|
return pulumi.get(self, "sts_role")
|
69
70
|
|
70
71
|
@sts_role.setter
|
71
|
-
def sts_role(self, value: pulumi.Input[str]):
|
72
|
+
def sts_role(self, value: pulumi.Input[builtins.str]):
|
72
73
|
pulumi.set(self, "sts_role", value)
|
73
74
|
|
74
75
|
@property
|
75
76
|
@pulumi.getter
|
76
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
77
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
77
78
|
"""
|
78
79
|
The path the AWS auth backend being configured was
|
79
80
|
mounted at. Defaults to `aws`.
|
@@ -81,24 +82,24 @@ class AuthBackendStsRoleArgs:
|
|
81
82
|
return pulumi.get(self, "backend")
|
82
83
|
|
83
84
|
@backend.setter
|
84
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
85
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
85
86
|
pulumi.set(self, "backend", value)
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="externalId")
|
89
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
90
|
+
def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
90
91
|
"""
|
91
92
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
92
93
|
"""
|
93
94
|
return pulumi.get(self, "external_id")
|
94
95
|
|
95
96
|
@external_id.setter
|
96
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
97
|
+
def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
97
98
|
pulumi.set(self, "external_id", value)
|
98
99
|
|
99
100
|
@property
|
100
101
|
@pulumi.getter
|
101
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
102
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
102
103
|
"""
|
103
104
|
The namespace to provision the resource in.
|
104
105
|
The value should not contain leading or trailing forward slashes.
|
@@ -108,29 +109,29 @@ class AuthBackendStsRoleArgs:
|
|
108
109
|
return pulumi.get(self, "namespace")
|
109
110
|
|
110
111
|
@namespace.setter
|
111
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
112
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
112
113
|
pulumi.set(self, "namespace", value)
|
113
114
|
|
114
115
|
|
115
116
|
@pulumi.input_type
|
116
117
|
class _AuthBackendStsRoleState:
|
117
118
|
def __init__(__self__, *,
|
118
|
-
account_id: Optional[pulumi.Input[str]] = None,
|
119
|
-
backend: Optional[pulumi.Input[str]] = None,
|
120
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
121
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
122
|
-
sts_role: Optional[pulumi.Input[str]] = None):
|
119
|
+
account_id: Optional[pulumi.Input[builtins.str]] = None,
|
120
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
121
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
122
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
123
|
+
sts_role: Optional[pulumi.Input[builtins.str]] = None):
|
123
124
|
"""
|
124
125
|
Input properties used for looking up and filtering AuthBackendStsRole resources.
|
125
|
-
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
126
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
126
|
+
:param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
|
127
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
127
128
|
mounted at. Defaults to `aws`.
|
128
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
129
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
129
|
+
:param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
130
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
130
131
|
The value should not contain leading or trailing forward slashes.
|
131
132
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
132
133
|
*Available only for Vault Enterprise*.
|
133
|
-
:param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
|
134
|
+
:param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
|
134
135
|
by EC2 instances in the account specified by `account_id`.
|
135
136
|
"""
|
136
137
|
if account_id is not None:
|
@@ -146,19 +147,19 @@ class _AuthBackendStsRoleState:
|
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter(name="accountId")
|
149
|
-
def account_id(self) -> Optional[pulumi.Input[str]]:
|
150
|
+
def account_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
150
151
|
"""
|
151
152
|
The AWS account ID to configure the STS role for.
|
152
153
|
"""
|
153
154
|
return pulumi.get(self, "account_id")
|
154
155
|
|
155
156
|
@account_id.setter
|
156
|
-
def account_id(self, value: Optional[pulumi.Input[str]]):
|
157
|
+
def account_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
157
158
|
pulumi.set(self, "account_id", value)
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter
|
161
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
162
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
162
163
|
"""
|
163
164
|
The path the AWS auth backend being configured was
|
164
165
|
mounted at. Defaults to `aws`.
|
@@ -166,24 +167,24 @@ class _AuthBackendStsRoleState:
|
|
166
167
|
return pulumi.get(self, "backend")
|
167
168
|
|
168
169
|
@backend.setter
|
169
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
170
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
170
171
|
pulumi.set(self, "backend", value)
|
171
172
|
|
172
173
|
@property
|
173
174
|
@pulumi.getter(name="externalId")
|
174
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
175
|
+
def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
175
176
|
"""
|
176
177
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
177
178
|
"""
|
178
179
|
return pulumi.get(self, "external_id")
|
179
180
|
|
180
181
|
@external_id.setter
|
181
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
182
|
+
def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
182
183
|
pulumi.set(self, "external_id", value)
|
183
184
|
|
184
185
|
@property
|
185
186
|
@pulumi.getter
|
186
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
187
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
187
188
|
"""
|
188
189
|
The namespace to provision the resource in.
|
189
190
|
The value should not contain leading or trailing forward slashes.
|
@@ -193,12 +194,12 @@ class _AuthBackendStsRoleState:
|
|
193
194
|
return pulumi.get(self, "namespace")
|
194
195
|
|
195
196
|
@namespace.setter
|
196
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
197
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
197
198
|
pulumi.set(self, "namespace", value)
|
198
199
|
|
199
200
|
@property
|
200
201
|
@pulumi.getter(name="stsRole")
|
201
|
-
def sts_role(self) -> Optional[pulumi.Input[str]]:
|
202
|
+
def sts_role(self) -> Optional[pulumi.Input[builtins.str]]:
|
202
203
|
"""
|
203
204
|
The STS role to assume when verifying requests made
|
204
205
|
by EC2 instances in the account specified by `account_id`.
|
@@ -206,7 +207,7 @@ class _AuthBackendStsRoleState:
|
|
206
207
|
return pulumi.get(self, "sts_role")
|
207
208
|
|
208
209
|
@sts_role.setter
|
209
|
-
def sts_role(self, value: Optional[pulumi.Input[str]]):
|
210
|
+
def sts_role(self, value: Optional[pulumi.Input[builtins.str]]):
|
210
211
|
pulumi.set(self, "sts_role", value)
|
211
212
|
|
212
213
|
|
@@ -215,11 +216,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
215
216
|
def __init__(__self__,
|
216
217
|
resource_name: str,
|
217
218
|
opts: Optional[pulumi.ResourceOptions] = None,
|
218
|
-
account_id: Optional[pulumi.Input[str]] = None,
|
219
|
-
backend: Optional[pulumi.Input[str]] = None,
|
220
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
221
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
222
|
-
sts_role: Optional[pulumi.Input[str]] = None,
|
219
|
+
account_id: Optional[pulumi.Input[builtins.str]] = None,
|
220
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
221
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
222
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
223
|
+
sts_role: Optional[pulumi.Input[builtins.str]] = None,
|
223
224
|
__props__=None):
|
224
225
|
"""
|
225
226
|
## Example Usage
|
@@ -245,15 +246,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
245
246
|
|
246
247
|
:param str resource_name: The name of the resource.
|
247
248
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
248
|
-
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
249
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
249
|
+
:param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
|
250
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
250
251
|
mounted at. Defaults to `aws`.
|
251
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
252
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
252
|
+
:param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
253
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
253
254
|
The value should not contain leading or trailing forward slashes.
|
254
255
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
256
|
*Available only for Vault Enterprise*.
|
256
|
-
:param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
|
257
|
+
:param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
|
257
258
|
by EC2 instances in the account specified by `account_id`.
|
258
259
|
"""
|
259
260
|
...
|
@@ -299,11 +300,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
299
300
|
def _internal_init(__self__,
|
300
301
|
resource_name: str,
|
301
302
|
opts: Optional[pulumi.ResourceOptions] = None,
|
302
|
-
account_id: Optional[pulumi.Input[str]] = None,
|
303
|
-
backend: Optional[pulumi.Input[str]] = None,
|
304
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
305
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
306
|
-
sts_role: Optional[pulumi.Input[str]] = None,
|
303
|
+
account_id: Optional[pulumi.Input[builtins.str]] = None,
|
304
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
305
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
306
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
307
|
+
sts_role: Optional[pulumi.Input[builtins.str]] = None,
|
307
308
|
__props__=None):
|
308
309
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
309
310
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -332,11 +333,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
332
333
|
def get(resource_name: str,
|
333
334
|
id: pulumi.Input[str],
|
334
335
|
opts: Optional[pulumi.ResourceOptions] = None,
|
335
|
-
account_id: Optional[pulumi.Input[str]] = None,
|
336
|
-
backend: Optional[pulumi.Input[str]] = None,
|
337
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
338
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
339
|
-
sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
|
336
|
+
account_id: Optional[pulumi.Input[builtins.str]] = None,
|
337
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
338
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
339
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
340
|
+
sts_role: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendStsRole':
|
340
341
|
"""
|
341
342
|
Get an existing AuthBackendStsRole resource's state with the given name, id, and optional extra
|
342
343
|
properties used to qualify the lookup.
|
@@ -344,15 +345,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
344
345
|
:param str resource_name: The unique name of the resulting resource.
|
345
346
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
346
347
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
347
|
-
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
348
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
348
|
+
:param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
|
349
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
349
350
|
mounted at. Defaults to `aws`.
|
350
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
351
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
351
|
+
:param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
352
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
352
353
|
The value should not contain leading or trailing forward slashes.
|
353
354
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
355
|
*Available only for Vault Enterprise*.
|
355
|
-
:param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
|
356
|
+
:param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
|
356
357
|
by EC2 instances in the account specified by `account_id`.
|
357
358
|
"""
|
358
359
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -368,7 +369,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
368
369
|
|
369
370
|
@property
|
370
371
|
@pulumi.getter(name="accountId")
|
371
|
-
def account_id(self) -> pulumi.Output[str]:
|
372
|
+
def account_id(self) -> pulumi.Output[builtins.str]:
|
372
373
|
"""
|
373
374
|
The AWS account ID to configure the STS role for.
|
374
375
|
"""
|
@@ -376,7 +377,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
376
377
|
|
377
378
|
@property
|
378
379
|
@pulumi.getter
|
379
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
380
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
380
381
|
"""
|
381
382
|
The path the AWS auth backend being configured was
|
382
383
|
mounted at. Defaults to `aws`.
|
@@ -385,7 +386,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
385
386
|
|
386
387
|
@property
|
387
388
|
@pulumi.getter(name="externalId")
|
388
|
-
def external_id(self) -> pulumi.Output[Optional[str]]:
|
389
|
+
def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
389
390
|
"""
|
390
391
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
391
392
|
"""
|
@@ -393,7 +394,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
393
394
|
|
394
395
|
@property
|
395
396
|
@pulumi.getter
|
396
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
397
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
397
398
|
"""
|
398
399
|
The namespace to provision the resource in.
|
399
400
|
The value should not contain leading or trailing forward slashes.
|
@@ -404,7 +405,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
404
405
|
|
405
406
|
@property
|
406
407
|
@pulumi.getter(name="stsRole")
|
407
|
-
def sts_role(self) -> pulumi.Output[str]:
|
408
|
+
def sts_role(self) -> pulumi.Output[builtins.str]:
|
408
409
|
"""
|
409
410
|
The STS role to assume when verifying requests made
|
410
411
|
by EC2 instances in the account specified by `account_id`.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -75,7 +76,7 @@ class GetAccessCredentialsResult:
|
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter(name="accessKey")
|
78
|
-
def access_key(self) -> str:
|
79
|
+
def access_key(self) -> builtins.str:
|
79
80
|
"""
|
80
81
|
The AWS Access Key ID returned by Vault.
|
81
82
|
"""
|
@@ -83,12 +84,12 @@ class GetAccessCredentialsResult:
|
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter
|
86
|
-
def backend(self) -> str:
|
87
|
+
def backend(self) -> builtins.str:
|
87
88
|
return pulumi.get(self, "backend")
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def id(self) -> str:
|
92
|
+
def id(self) -> builtins.str:
|
92
93
|
"""
|
93
94
|
The provider-assigned unique ID for this managed resource.
|
94
95
|
"""
|
@@ -96,7 +97,7 @@ class GetAccessCredentialsResult:
|
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter(name="leaseDuration")
|
99
|
-
def lease_duration(self) -> int:
|
100
|
+
def lease_duration(self) -> builtins.int:
|
100
101
|
"""
|
101
102
|
The duration of the secret lease, in seconds relative
|
102
103
|
to the time the data was requested. Once this time has passed any plan
|
@@ -106,7 +107,7 @@ class GetAccessCredentialsResult:
|
|
106
107
|
|
107
108
|
@property
|
108
109
|
@pulumi.getter(name="leaseId")
|
109
|
-
def lease_id(self) -> str:
|
110
|
+
def lease_id(self) -> builtins.str:
|
110
111
|
"""
|
111
112
|
The lease identifier assigned by Vault.
|
112
113
|
"""
|
@@ -114,37 +115,37 @@ class GetAccessCredentialsResult:
|
|
114
115
|
|
115
116
|
@property
|
116
117
|
@pulumi.getter(name="leaseRenewable")
|
117
|
-
def lease_renewable(self) -> bool:
|
118
|
+
def lease_renewable(self) -> builtins.bool:
|
118
119
|
return pulumi.get(self, "lease_renewable")
|
119
120
|
|
120
121
|
@property
|
121
122
|
@pulumi.getter(name="leaseStartTime")
|
122
|
-
def lease_start_time(self) -> str:
|
123
|
+
def lease_start_time(self) -> builtins.str:
|
123
124
|
return pulumi.get(self, "lease_start_time")
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter
|
127
|
-
def namespace(self) -> Optional[str]:
|
128
|
+
def namespace(self) -> Optional[builtins.str]:
|
128
129
|
return pulumi.get(self, "namespace")
|
129
130
|
|
130
131
|
@property
|
131
132
|
@pulumi.getter
|
132
|
-
def region(self) -> Optional[str]:
|
133
|
+
def region(self) -> Optional[builtins.str]:
|
133
134
|
return pulumi.get(self, "region")
|
134
135
|
|
135
136
|
@property
|
136
137
|
@pulumi.getter
|
137
|
-
def role(self) -> str:
|
138
|
+
def role(self) -> builtins.str:
|
138
139
|
return pulumi.get(self, "role")
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter(name="roleArn")
|
142
|
-
def role_arn(self) -> Optional[str]:
|
143
|
+
def role_arn(self) -> Optional[builtins.str]:
|
143
144
|
return pulumi.get(self, "role_arn")
|
144
145
|
|
145
146
|
@property
|
146
147
|
@pulumi.getter(name="secretKey")
|
147
|
-
def secret_key(self) -> str:
|
148
|
+
def secret_key(self) -> builtins.str:
|
148
149
|
"""
|
149
150
|
The AWS Secret Key returned by Vault.
|
150
151
|
"""
|
@@ -152,7 +153,7 @@ class GetAccessCredentialsResult:
|
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter(name="securityToken")
|
155
|
-
def security_token(self) -> str:
|
156
|
+
def security_token(self) -> builtins.str:
|
156
157
|
"""
|
157
158
|
The STS token returned by Vault, if any.
|
158
159
|
"""
|
@@ -160,12 +161,12 @@ class GetAccessCredentialsResult:
|
|
160
161
|
|
161
162
|
@property
|
162
163
|
@pulumi.getter
|
163
|
-
def ttl(self) -> Optional[str]:
|
164
|
+
def ttl(self) -> Optional[builtins.str]:
|
164
165
|
return pulumi.get(self, "ttl")
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter
|
168
|
-
def type(self) -> Optional[str]:
|
169
|
+
def type(self) -> Optional[builtins.str]:
|
169
170
|
return pulumi.get(self, "type")
|
170
171
|
|
171
172
|
|
@@ -192,34 +193,34 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
|
|
192
193
|
type=self.type)
|
193
194
|
|
194
195
|
|
195
|
-
def get_access_credentials(backend: Optional[str] = None,
|
196
|
-
namespace: Optional[str] = None,
|
197
|
-
region: Optional[str] = None,
|
198
|
-
role: Optional[str] = None,
|
199
|
-
role_arn: Optional[str] = None,
|
200
|
-
ttl: Optional[str] = None,
|
201
|
-
type: Optional[str] = None,
|
196
|
+
def get_access_credentials(backend: Optional[builtins.str] = None,
|
197
|
+
namespace: Optional[builtins.str] = None,
|
198
|
+
region: Optional[builtins.str] = None,
|
199
|
+
role: Optional[builtins.str] = None,
|
200
|
+
role_arn: Optional[builtins.str] = None,
|
201
|
+
ttl: Optional[builtins.str] = None,
|
202
|
+
type: Optional[builtins.str] = None,
|
202
203
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
|
203
204
|
"""
|
204
205
|
## Example Usage
|
205
206
|
|
206
207
|
|
207
|
-
:param str backend: The path to the AWS secret backend to
|
208
|
+
:param builtins.str backend: The path to the AWS secret backend to
|
208
209
|
read credentials from, with no leading or trailing `/`s.
|
209
|
-
:param str namespace: The namespace of the target resource.
|
210
|
+
:param builtins.str namespace: The namespace of the target resource.
|
210
211
|
The value should not contain leading or trailing forward slashes.
|
211
212
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
212
213
|
*Available only for Vault Enterprise*.
|
213
|
-
:param str region: The region the read credentials belong to.
|
214
|
-
:param str role: The name of the AWS secret backend role to read
|
214
|
+
:param builtins.str region: The region the read credentials belong to.
|
215
|
+
:param builtins.str role: The name of the AWS secret backend role to read
|
215
216
|
credentials from, with no leading or trailing `/`s.
|
216
|
-
:param str role_arn: The specific AWS ARN to use
|
217
|
+
:param builtins.str role_arn: The specific AWS ARN to use
|
217
218
|
from the configured role. If the role does not have multiple ARNs, this does
|
218
219
|
not need to be specified.
|
219
|
-
:param str ttl: Specifies the TTL for the use of the STS token. This
|
220
|
+
:param builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
220
221
|
is specified as a string with a duration suffix. Valid only when
|
221
222
|
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
222
|
-
:param str type: The type of credentials to read. Defaults
|
223
|
+
:param builtins.str type: The type of credentials to read. Defaults
|
223
224
|
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
224
225
|
Key. Can also be set to `"sts"`, which will return a security token
|
225
226
|
in addition to the keys.
|
@@ -251,34 +252,34 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
251
252
|
security_token=pulumi.get(__ret__, 'security_token'),
|
252
253
|
ttl=pulumi.get(__ret__, 'ttl'),
|
253
254
|
type=pulumi.get(__ret__, 'type'))
|
254
|
-
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
255
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
256
|
-
region: Optional[pulumi.Input[Optional[str]]] = None,
|
257
|
-
role: Optional[pulumi.Input[str]] = None,
|
258
|
-
role_arn: Optional[pulumi.Input[Optional[str]]] = None,
|
259
|
-
ttl: Optional[pulumi.Input[Optional[str]]] = None,
|
260
|
-
type: Optional[pulumi.Input[Optional[str]]] = None,
|
255
|
+
def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
256
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
257
|
+
region: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
258
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
259
|
+
role_arn: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
260
|
+
ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
261
|
+
type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
261
262
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
262
263
|
"""
|
263
264
|
## Example Usage
|
264
265
|
|
265
266
|
|
266
|
-
:param str backend: The path to the AWS secret backend to
|
267
|
+
:param builtins.str backend: The path to the AWS secret backend to
|
267
268
|
read credentials from, with no leading or trailing `/`s.
|
268
|
-
:param str namespace: The namespace of the target resource.
|
269
|
+
:param builtins.str namespace: The namespace of the target resource.
|
269
270
|
The value should not contain leading or trailing forward slashes.
|
270
271
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
272
|
*Available only for Vault Enterprise*.
|
272
|
-
:param str region: The region the read credentials belong to.
|
273
|
-
:param str role: The name of the AWS secret backend role to read
|
273
|
+
:param builtins.str region: The region the read credentials belong to.
|
274
|
+
:param builtins.str role: The name of the AWS secret backend role to read
|
274
275
|
credentials from, with no leading or trailing `/`s.
|
275
|
-
:param str role_arn: The specific AWS ARN to use
|
276
|
+
:param builtins.str role_arn: The specific AWS ARN to use
|
276
277
|
from the configured role. If the role does not have multiple ARNs, this does
|
277
278
|
not need to be specified.
|
278
|
-
:param str ttl: Specifies the TTL for the use of the STS token. This
|
279
|
+
:param builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
279
280
|
is specified as a string with a duration suffix. Valid only when
|
280
281
|
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
281
|
-
:param str type: The type of credentials to read. Defaults
|
282
|
+
:param builtins.str type: The type of credentials to read. Defaults
|
282
283
|
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
283
284
|
Key. Can also be set to `"sts"`, which will return a security token
|
284
285
|
in addition to the keys.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,17 +49,17 @@ class GetStaticAccessCredentialsResult:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter(name="accessKey")
|
51
|
-
def access_key(self) -> str:
|
52
|
+
def access_key(self) -> builtins.str:
|
52
53
|
return pulumi.get(self, "access_key")
|
53
54
|
|
54
55
|
@property
|
55
56
|
@pulumi.getter
|
56
|
-
def backend(self) -> str:
|
57
|
+
def backend(self) -> builtins.str:
|
57
58
|
return pulumi.get(self, "backend")
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def id(self) -> str:
|
62
|
+
def id(self) -> builtins.str:
|
62
63
|
"""
|
63
64
|
The provider-assigned unique ID for this managed resource.
|
64
65
|
"""
|
@@ -66,17 +67,17 @@ class GetStaticAccessCredentialsResult:
|
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def name(self) -> str:
|
70
|
+
def name(self) -> builtins.str:
|
70
71
|
return pulumi.get(self, "name")
|
71
72
|
|
72
73
|
@property
|
73
74
|
@pulumi.getter
|
74
|
-
def namespace(self) -> Optional[str]:
|
75
|
+
def namespace(self) -> Optional[builtins.str]:
|
75
76
|
return pulumi.get(self, "namespace")
|
76
77
|
|
77
78
|
@property
|
78
79
|
@pulumi.getter(name="secretKey")
|
79
|
-
def secret_key(self) -> str:
|
80
|
+
def secret_key(self) -> builtins.str:
|
80
81
|
return pulumi.get(self, "secret_key")
|
81
82
|
|
82
83
|
|
@@ -94,9 +95,9 @@ class AwaitableGetStaticAccessCredentialsResult(GetStaticAccessCredentialsResult
|
|
94
95
|
secret_key=self.secret_key)
|
95
96
|
|
96
97
|
|
97
|
-
def get_static_access_credentials(backend: Optional[str] = None,
|
98
|
-
name: Optional[str] = None,
|
99
|
-
namespace: Optional[str] = None,
|
98
|
+
def get_static_access_credentials(backend: Optional[builtins.str] = None,
|
99
|
+
name: Optional[builtins.str] = None,
|
100
|
+
namespace: Optional[builtins.str] = None,
|
100
101
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticAccessCredentialsResult:
|
101
102
|
"""
|
102
103
|
Use this data source to access information about an existing resource.
|
@@ -115,9 +116,9 @@ def get_static_access_credentials(backend: Optional[str] = None,
|
|
115
116
|
name=pulumi.get(__ret__, 'name'),
|
116
117
|
namespace=pulumi.get(__ret__, 'namespace'),
|
117
118
|
secret_key=pulumi.get(__ret__, 'secret_key'))
|
118
|
-
def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
119
|
-
name: Optional[pulumi.Input[str]] = None,
|
120
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
119
|
+
def get_static_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
120
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
121
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
121
122
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
|
122
123
|
"""
|
123
124
|
Use this data source to access information about an existing resource.
|