pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,32 +20,32 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendStaticRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
rotation_period: pulumi.Input[int],
|
23
|
-
username: pulumi.Input[str],
|
24
|
-
assume_role_arn: Optional[pulumi.Input[str]] = None,
|
25
|
-
assume_role_session_name: Optional[pulumi.Input[str]] = None,
|
26
|
-
backend: Optional[pulumi.Input[str]] = None,
|
27
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
28
|
-
name: Optional[pulumi.Input[str]] = None,
|
29
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
rotation_period: pulumi.Input[builtins.int],
|
24
|
+
username: pulumi.Input[builtins.str],
|
25
|
+
assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
30
31
|
"""
|
31
32
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
32
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
33
|
-
:param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
|
34
|
-
:param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
33
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
34
|
+
:param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
35
|
+
:param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
35
36
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
36
37
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
37
38
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
38
|
-
:param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
39
|
+
:param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
39
40
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
40
41
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
41
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
42
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
42
43
|
not begin or end with a `/`. Defaults to `aws`
|
43
|
-
:param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
|
44
|
+
:param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
44
45
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
46
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
46
47
|
Must be unique within the backend.
|
47
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
48
49
|
The value should not contain leading or trailing forward slashes.
|
49
50
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
51
|
*Available only for Vault Enterprise*.
|
@@ -66,31 +67,31 @@ class SecretBackendStaticRoleArgs:
|
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter(name="rotationPeriod")
|
69
|
-
def rotation_period(self) -> pulumi.Input[int]:
|
70
|
+
def rotation_period(self) -> pulumi.Input[builtins.int]:
|
70
71
|
"""
|
71
72
|
How often Vault should rotate the password of the user entry.
|
72
73
|
"""
|
73
74
|
return pulumi.get(self, "rotation_period")
|
74
75
|
|
75
76
|
@rotation_period.setter
|
76
|
-
def rotation_period(self, value: pulumi.Input[int]):
|
77
|
+
def rotation_period(self, value: pulumi.Input[builtins.int]):
|
77
78
|
pulumi.set(self, "rotation_period", value)
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def username(self) -> pulumi.Input[str]:
|
82
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
82
83
|
"""
|
83
84
|
The username of the existing AWS IAM to manage password rotation for.
|
84
85
|
"""
|
85
86
|
return pulumi.get(self, "username")
|
86
87
|
|
87
88
|
@username.setter
|
88
|
-
def username(self, value: pulumi.Input[str]):
|
89
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
89
90
|
pulumi.set(self, "username", value)
|
90
91
|
|
91
92
|
@property
|
92
93
|
@pulumi.getter(name="assumeRoleArn")
|
93
|
-
def assume_role_arn(self) -> Optional[pulumi.Input[str]]:
|
94
|
+
def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
|
94
95
|
"""
|
95
96
|
Specifies the ARN of the role that Vault should assume.
|
96
97
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -100,12 +101,12 @@ class SecretBackendStaticRoleArgs:
|
|
100
101
|
return pulumi.get(self, "assume_role_arn")
|
101
102
|
|
102
103
|
@assume_role_arn.setter
|
103
|
-
def assume_role_arn(self, value: Optional[pulumi.Input[str]]):
|
104
|
+
def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
|
104
105
|
pulumi.set(self, "assume_role_arn", value)
|
105
106
|
|
106
107
|
@property
|
107
108
|
@pulumi.getter(name="assumeRoleSessionName")
|
108
|
-
def assume_role_session_name(self) -> Optional[pulumi.Input[str]]:
|
109
|
+
def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
109
110
|
"""
|
110
111
|
Specifies the session name to use when assuming the role.
|
111
112
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -114,12 +115,12 @@ class SecretBackendStaticRoleArgs:
|
|
114
115
|
return pulumi.get(self, "assume_role_session_name")
|
115
116
|
|
116
117
|
@assume_role_session_name.setter
|
117
|
-
def assume_role_session_name(self, value: Optional[pulumi.Input[str]]):
|
118
|
+
def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
118
119
|
pulumi.set(self, "assume_role_session_name", value)
|
119
120
|
|
120
121
|
@property
|
121
122
|
@pulumi.getter
|
122
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
123
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
123
124
|
"""
|
124
125
|
The unique path this backend should be mounted at. Must
|
125
126
|
not begin or end with a `/`. Defaults to `aws`
|
@@ -127,12 +128,12 @@ class SecretBackendStaticRoleArgs:
|
|
127
128
|
return pulumi.get(self, "backend")
|
128
129
|
|
129
130
|
@backend.setter
|
130
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
131
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
131
132
|
pulumi.set(self, "backend", value)
|
132
133
|
|
133
134
|
@property
|
134
135
|
@pulumi.getter(name="externalId")
|
135
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
136
|
+
def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
136
137
|
"""
|
137
138
|
Specifies the external ID to use when assuming the role.
|
138
139
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
@@ -140,12 +141,12 @@ class SecretBackendStaticRoleArgs:
|
|
140
141
|
return pulumi.get(self, "external_id")
|
141
142
|
|
142
143
|
@external_id.setter
|
143
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
144
|
+
def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
144
145
|
pulumi.set(self, "external_id", value)
|
145
146
|
|
146
147
|
@property
|
147
148
|
@pulumi.getter
|
148
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
149
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
149
150
|
"""
|
150
151
|
The name to identify this role within the backend.
|
151
152
|
Must be unique within the backend.
|
@@ -153,12 +154,12 @@ class SecretBackendStaticRoleArgs:
|
|
153
154
|
return pulumi.get(self, "name")
|
154
155
|
|
155
156
|
@name.setter
|
156
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
157
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
157
158
|
pulumi.set(self, "name", value)
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter
|
161
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
162
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
162
163
|
"""
|
163
164
|
The namespace to provision the resource in.
|
164
165
|
The value should not contain leading or trailing forward slashes.
|
@@ -168,42 +169,42 @@ class SecretBackendStaticRoleArgs:
|
|
168
169
|
return pulumi.get(self, "namespace")
|
169
170
|
|
170
171
|
@namespace.setter
|
171
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
172
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
172
173
|
pulumi.set(self, "namespace", value)
|
173
174
|
|
174
175
|
|
175
176
|
@pulumi.input_type
|
176
177
|
class _SecretBackendStaticRoleState:
|
177
178
|
def __init__(__self__, *,
|
178
|
-
assume_role_arn: Optional[pulumi.Input[str]] = None,
|
179
|
-
assume_role_session_name: Optional[pulumi.Input[str]] = None,
|
180
|
-
backend: Optional[pulumi.Input[str]] = None,
|
181
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
182
|
-
name: Optional[pulumi.Input[str]] = None,
|
183
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
184
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
185
|
-
username: Optional[pulumi.Input[str]] = None):
|
179
|
+
assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
180
|
+
assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
181
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
182
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
183
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
184
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
185
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
186
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
186
187
|
"""
|
187
188
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
188
|
-
:param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
189
|
+
:param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
189
190
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
190
191
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
191
192
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
192
|
-
:param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
193
|
+
:param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
193
194
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
194
195
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
195
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
196
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
196
197
|
not begin or end with a `/`. Defaults to `aws`
|
197
|
-
:param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
|
198
|
+
:param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
198
199
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
199
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
200
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
200
201
|
Must be unique within the backend.
|
201
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
202
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
202
203
|
The value should not contain leading or trailing forward slashes.
|
203
204
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
204
205
|
*Available only for Vault Enterprise*.
|
205
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
206
|
-
:param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
|
206
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
207
|
+
:param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
207
208
|
"""
|
208
209
|
if assume_role_arn is not None:
|
209
210
|
pulumi.set(__self__, "assume_role_arn", assume_role_arn)
|
@@ -224,7 +225,7 @@ class _SecretBackendStaticRoleState:
|
|
224
225
|
|
225
226
|
@property
|
226
227
|
@pulumi.getter(name="assumeRoleArn")
|
227
|
-
def assume_role_arn(self) -> Optional[pulumi.Input[str]]:
|
228
|
+
def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
|
228
229
|
"""
|
229
230
|
Specifies the ARN of the role that Vault should assume.
|
230
231
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -234,12 +235,12 @@ class _SecretBackendStaticRoleState:
|
|
234
235
|
return pulumi.get(self, "assume_role_arn")
|
235
236
|
|
236
237
|
@assume_role_arn.setter
|
237
|
-
def assume_role_arn(self, value: Optional[pulumi.Input[str]]):
|
238
|
+
def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
|
238
239
|
pulumi.set(self, "assume_role_arn", value)
|
239
240
|
|
240
241
|
@property
|
241
242
|
@pulumi.getter(name="assumeRoleSessionName")
|
242
|
-
def assume_role_session_name(self) -> Optional[pulumi.Input[str]]:
|
243
|
+
def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
243
244
|
"""
|
244
245
|
Specifies the session name to use when assuming the role.
|
245
246
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -248,12 +249,12 @@ class _SecretBackendStaticRoleState:
|
|
248
249
|
return pulumi.get(self, "assume_role_session_name")
|
249
250
|
|
250
251
|
@assume_role_session_name.setter
|
251
|
-
def assume_role_session_name(self, value: Optional[pulumi.Input[str]]):
|
252
|
+
def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
252
253
|
pulumi.set(self, "assume_role_session_name", value)
|
253
254
|
|
254
255
|
@property
|
255
256
|
@pulumi.getter
|
256
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
257
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
257
258
|
"""
|
258
259
|
The unique path this backend should be mounted at. Must
|
259
260
|
not begin or end with a `/`. Defaults to `aws`
|
@@ -261,12 +262,12 @@ class _SecretBackendStaticRoleState:
|
|
261
262
|
return pulumi.get(self, "backend")
|
262
263
|
|
263
264
|
@backend.setter
|
264
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
265
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
265
266
|
pulumi.set(self, "backend", value)
|
266
267
|
|
267
268
|
@property
|
268
269
|
@pulumi.getter(name="externalId")
|
269
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
270
|
+
def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
270
271
|
"""
|
271
272
|
Specifies the external ID to use when assuming the role.
|
272
273
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
@@ -274,12 +275,12 @@ class _SecretBackendStaticRoleState:
|
|
274
275
|
return pulumi.get(self, "external_id")
|
275
276
|
|
276
277
|
@external_id.setter
|
277
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
278
|
+
def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
278
279
|
pulumi.set(self, "external_id", value)
|
279
280
|
|
280
281
|
@property
|
281
282
|
@pulumi.getter
|
282
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
283
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
283
284
|
"""
|
284
285
|
The name to identify this role within the backend.
|
285
286
|
Must be unique within the backend.
|
@@ -287,12 +288,12 @@ class _SecretBackendStaticRoleState:
|
|
287
288
|
return pulumi.get(self, "name")
|
288
289
|
|
289
290
|
@name.setter
|
290
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
291
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
291
292
|
pulumi.set(self, "name", value)
|
292
293
|
|
293
294
|
@property
|
294
295
|
@pulumi.getter
|
295
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
296
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
296
297
|
"""
|
297
298
|
The namespace to provision the resource in.
|
298
299
|
The value should not contain leading or trailing forward slashes.
|
@@ -302,31 +303,31 @@ class _SecretBackendStaticRoleState:
|
|
302
303
|
return pulumi.get(self, "namespace")
|
303
304
|
|
304
305
|
@namespace.setter
|
305
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
306
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
306
307
|
pulumi.set(self, "namespace", value)
|
307
308
|
|
308
309
|
@property
|
309
310
|
@pulumi.getter(name="rotationPeriod")
|
310
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
311
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
311
312
|
"""
|
312
313
|
How often Vault should rotate the password of the user entry.
|
313
314
|
"""
|
314
315
|
return pulumi.get(self, "rotation_period")
|
315
316
|
|
316
317
|
@rotation_period.setter
|
317
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
318
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
318
319
|
pulumi.set(self, "rotation_period", value)
|
319
320
|
|
320
321
|
@property
|
321
322
|
@pulumi.getter
|
322
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
323
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
323
324
|
"""
|
324
325
|
The username of the existing AWS IAM to manage password rotation for.
|
325
326
|
"""
|
326
327
|
return pulumi.get(self, "username")
|
327
328
|
|
328
329
|
@username.setter
|
329
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
330
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
330
331
|
pulumi.set(self, "username", value)
|
331
332
|
|
332
333
|
|
@@ -335,14 +336,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
335
336
|
def __init__(__self__,
|
336
337
|
resource_name: str,
|
337
338
|
opts: Optional[pulumi.ResourceOptions] = None,
|
338
|
-
assume_role_arn: Optional[pulumi.Input[str]] = None,
|
339
|
-
assume_role_session_name: Optional[pulumi.Input[str]] = None,
|
340
|
-
backend: Optional[pulumi.Input[str]] = None,
|
341
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
342
|
-
name: Optional[pulumi.Input[str]] = None,
|
343
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
344
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
345
|
-
username: Optional[pulumi.Input[str]] = None,
|
339
|
+
assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
340
|
+
assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
341
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
343
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
344
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
345
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
346
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
346
347
|
__props__=None):
|
347
348
|
"""
|
348
349
|
## Example Usage
|
@@ -389,25 +390,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
389
390
|
|
390
391
|
:param str resource_name: The name of the resource.
|
391
392
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
392
|
-
:param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
393
|
+
:param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
393
394
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
394
395
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
395
396
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
396
|
-
:param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
397
|
+
:param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
397
398
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
398
399
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
399
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
400
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
400
401
|
not begin or end with a `/`. Defaults to `aws`
|
401
|
-
:param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
|
402
|
+
:param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
402
403
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
403
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
404
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
404
405
|
Must be unique within the backend.
|
405
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
406
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
406
407
|
The value should not contain leading or trailing forward slashes.
|
407
408
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
408
409
|
*Available only for Vault Enterprise*.
|
409
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
410
|
-
:param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
|
410
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
411
|
+
:param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
411
412
|
"""
|
412
413
|
...
|
413
414
|
@overload
|
@@ -473,14 +474,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
473
474
|
def _internal_init(__self__,
|
474
475
|
resource_name: str,
|
475
476
|
opts: Optional[pulumi.ResourceOptions] = None,
|
476
|
-
assume_role_arn: Optional[pulumi.Input[str]] = None,
|
477
|
-
assume_role_session_name: Optional[pulumi.Input[str]] = None,
|
478
|
-
backend: Optional[pulumi.Input[str]] = None,
|
479
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
480
|
-
name: Optional[pulumi.Input[str]] = None,
|
481
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
482
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
483
|
-
username: Optional[pulumi.Input[str]] = None,
|
477
|
+
assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
478
|
+
assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
479
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
480
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
481
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
482
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
483
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
484
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
484
485
|
__props__=None):
|
485
486
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
486
487
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -512,14 +513,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
512
513
|
def get(resource_name: str,
|
513
514
|
id: pulumi.Input[str],
|
514
515
|
opts: Optional[pulumi.ResourceOptions] = None,
|
515
|
-
assume_role_arn: Optional[pulumi.Input[str]] = None,
|
516
|
-
assume_role_session_name: Optional[pulumi.Input[str]] = None,
|
517
|
-
backend: Optional[pulumi.Input[str]] = None,
|
518
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
519
|
-
name: Optional[pulumi.Input[str]] = None,
|
520
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
521
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
522
|
-
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
516
|
+
assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
517
|
+
assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
518
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
519
|
+
external_id: Optional[pulumi.Input[builtins.str]] = None,
|
520
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
521
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
522
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
523
|
+
username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
|
523
524
|
"""
|
524
525
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
525
526
|
properties used to qualify the lookup.
|
@@ -527,25 +528,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
527
528
|
:param str resource_name: The unique name of the resulting resource.
|
528
529
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
529
530
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
530
|
-
:param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
531
|
+
:param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
531
532
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
532
533
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
533
534
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
534
|
-
:param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
535
|
+
:param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
535
536
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
536
537
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
537
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
|
538
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
|
538
539
|
not begin or end with a `/`. Defaults to `aws`
|
539
|
-
:param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
|
540
|
+
:param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
540
541
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
541
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
542
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
542
543
|
Must be unique within the backend.
|
543
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
544
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
544
545
|
The value should not contain leading or trailing forward slashes.
|
545
546
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
546
547
|
*Available only for Vault Enterprise*.
|
547
|
-
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
548
|
-
:param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
|
548
|
+
:param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
549
|
+
:param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
549
550
|
"""
|
550
551
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
551
552
|
|
@@ -563,7 +564,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
563
564
|
|
564
565
|
@property
|
565
566
|
@pulumi.getter(name="assumeRoleArn")
|
566
|
-
def assume_role_arn(self) -> pulumi.Output[Optional[str]]:
|
567
|
+
def assume_role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
|
567
568
|
"""
|
568
569
|
Specifies the ARN of the role that Vault should assume.
|
569
570
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -574,7 +575,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
574
575
|
|
575
576
|
@property
|
576
577
|
@pulumi.getter(name="assumeRoleSessionName")
|
577
|
-
def assume_role_session_name(self) -> pulumi.Output[Optional[str]]:
|
578
|
+
def assume_role_session_name(self) -> pulumi.Output[Optional[builtins.str]]:
|
578
579
|
"""
|
579
580
|
Specifies the session name to use when assuming the role.
|
580
581
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -584,7 +585,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
584
585
|
|
585
586
|
@property
|
586
587
|
@pulumi.getter
|
587
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
588
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
588
589
|
"""
|
589
590
|
The unique path this backend should be mounted at. Must
|
590
591
|
not begin or end with a `/`. Defaults to `aws`
|
@@ -593,7 +594,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
593
594
|
|
594
595
|
@property
|
595
596
|
@pulumi.getter(name="externalId")
|
596
|
-
def external_id(self) -> pulumi.Output[Optional[str]]:
|
597
|
+
def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
597
598
|
"""
|
598
599
|
Specifies the external ID to use when assuming the role.
|
599
600
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
@@ -602,7 +603,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
602
603
|
|
603
604
|
@property
|
604
605
|
@pulumi.getter
|
605
|
-
def name(self) -> pulumi.Output[str]:
|
606
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
606
607
|
"""
|
607
608
|
The name to identify this role within the backend.
|
608
609
|
Must be unique within the backend.
|
@@ -611,7 +612,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
611
612
|
|
612
613
|
@property
|
613
614
|
@pulumi.getter
|
614
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
615
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
615
616
|
"""
|
616
617
|
The namespace to provision the resource in.
|
617
618
|
The value should not contain leading or trailing forward slashes.
|
@@ -622,7 +623,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
622
623
|
|
623
624
|
@property
|
624
625
|
@pulumi.getter(name="rotationPeriod")
|
625
|
-
def rotation_period(self) -> pulumi.Output[int]:
|
626
|
+
def rotation_period(self) -> pulumi.Output[builtins.int]:
|
626
627
|
"""
|
627
628
|
How often Vault should rotate the password of the user entry.
|
628
629
|
"""
|
@@ -630,7 +631,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
630
631
|
|
631
632
|
@property
|
632
633
|
@pulumi.getter
|
633
|
-
def username(self) -> pulumi.Output[str]:
|
634
|
+
def username(self) -> pulumi.Output[builtins.str]:
|
634
635
|
"""
|
635
636
|
The username of the existing AWS IAM to manage password rotation for.
|
636
637
|
"""
|
pulumi_vault/azure/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|