pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -81,12 +82,12 @@ class GetAccessCredentialsResult:
|
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def backend(self) -> str:
|
85
|
+
def backend(self) -> builtins.str:
|
85
86
|
return pulumi.get(self, "backend")
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="clientId")
|
89
|
-
def client_id(self) -> str:
|
90
|
+
def client_id(self) -> builtins.str:
|
90
91
|
"""
|
91
92
|
The client id for credentials to query the Azure APIs.
|
92
93
|
"""
|
@@ -94,7 +95,7 @@ class GetAccessCredentialsResult:
|
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter(name="clientSecret")
|
97
|
-
def client_secret(self) -> str:
|
98
|
+
def client_secret(self) -> builtins.str:
|
98
99
|
"""
|
99
100
|
The client secret for credentials to query the Azure APIs.
|
100
101
|
"""
|
@@ -102,12 +103,12 @@ class GetAccessCredentialsResult:
|
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter
|
105
|
-
def environment(self) -> Optional[str]:
|
106
|
+
def environment(self) -> Optional[builtins.str]:
|
106
107
|
return pulumi.get(self, "environment")
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def id(self) -> str:
|
111
|
+
def id(self) -> builtins.str:
|
111
112
|
"""
|
112
113
|
The provider-assigned unique ID for this managed resource.
|
113
114
|
"""
|
@@ -115,7 +116,7 @@ class GetAccessCredentialsResult:
|
|
115
116
|
|
116
117
|
@property
|
117
118
|
@pulumi.getter(name="leaseDuration")
|
118
|
-
def lease_duration(self) -> int:
|
119
|
+
def lease_duration(self) -> builtins.int:
|
119
120
|
"""
|
120
121
|
The duration of the secret lease, in seconds relative
|
121
122
|
to the time the data was requested. Once this time has passed any plan
|
@@ -125,7 +126,7 @@ class GetAccessCredentialsResult:
|
|
125
126
|
|
126
127
|
@property
|
127
128
|
@pulumi.getter(name="leaseId")
|
128
|
-
def lease_id(self) -> str:
|
129
|
+
def lease_id(self) -> builtins.str:
|
129
130
|
"""
|
130
131
|
The lease identifier assigned by Vault.
|
131
132
|
"""
|
@@ -133,52 +134,52 @@ class GetAccessCredentialsResult:
|
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter(name="leaseRenewable")
|
136
|
-
def lease_renewable(self) -> bool:
|
137
|
+
def lease_renewable(self) -> builtins.bool:
|
137
138
|
return pulumi.get(self, "lease_renewable")
|
138
139
|
|
139
140
|
@property
|
140
141
|
@pulumi.getter(name="leaseStartTime")
|
141
|
-
def lease_start_time(self) -> str:
|
142
|
+
def lease_start_time(self) -> builtins.str:
|
142
143
|
return pulumi.get(self, "lease_start_time")
|
143
144
|
|
144
145
|
@property
|
145
146
|
@pulumi.getter(name="maxCredValidationSeconds")
|
146
|
-
def max_cred_validation_seconds(self) -> Optional[int]:
|
147
|
+
def max_cred_validation_seconds(self) -> Optional[builtins.int]:
|
147
148
|
return pulumi.get(self, "max_cred_validation_seconds")
|
148
149
|
|
149
150
|
@property
|
150
151
|
@pulumi.getter
|
151
|
-
def namespace(self) -> Optional[str]:
|
152
|
+
def namespace(self) -> Optional[builtins.str]:
|
152
153
|
return pulumi.get(self, "namespace")
|
153
154
|
|
154
155
|
@property
|
155
156
|
@pulumi.getter(name="numSecondsBetweenTests")
|
156
|
-
def num_seconds_between_tests(self) -> Optional[int]:
|
157
|
+
def num_seconds_between_tests(self) -> Optional[builtins.int]:
|
157
158
|
return pulumi.get(self, "num_seconds_between_tests")
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter(name="numSequentialSuccesses")
|
161
|
-
def num_sequential_successes(self) -> Optional[int]:
|
162
|
+
def num_sequential_successes(self) -> Optional[builtins.int]:
|
162
163
|
return pulumi.get(self, "num_sequential_successes")
|
163
164
|
|
164
165
|
@property
|
165
166
|
@pulumi.getter
|
166
|
-
def role(self) -> str:
|
167
|
+
def role(self) -> builtins.str:
|
167
168
|
return pulumi.get(self, "role")
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter(name="subscriptionId")
|
171
|
-
def subscription_id(self) -> Optional[str]:
|
172
|
+
def subscription_id(self) -> Optional[builtins.str]:
|
172
173
|
return pulumi.get(self, "subscription_id")
|
173
174
|
|
174
175
|
@property
|
175
176
|
@pulumi.getter(name="tenantId")
|
176
|
-
def tenant_id(self) -> Optional[str]:
|
177
|
+
def tenant_id(self) -> Optional[builtins.str]:
|
177
178
|
return pulumi.get(self, "tenant_id")
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter(name="validateCreds")
|
181
|
-
def validate_creds(self) -> Optional[bool]:
|
182
|
+
def validate_creds(self) -> Optional[builtins.bool]:
|
182
183
|
return pulumi.get(self, "validate_creds")
|
183
184
|
|
184
185
|
|
@@ -207,16 +208,16 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
|
|
207
208
|
validate_creds=self.validate_creds)
|
208
209
|
|
209
210
|
|
210
|
-
def get_access_credentials(backend: Optional[str] = None,
|
211
|
-
environment: Optional[str] = None,
|
212
|
-
max_cred_validation_seconds: Optional[int] = None,
|
213
|
-
namespace: Optional[str] = None,
|
214
|
-
num_seconds_between_tests: Optional[int] = None,
|
215
|
-
num_sequential_successes: Optional[int] = None,
|
216
|
-
role: Optional[str] = None,
|
217
|
-
subscription_id: Optional[str] = None,
|
218
|
-
tenant_id: Optional[str] = None,
|
219
|
-
validate_creds: Optional[bool] = None,
|
211
|
+
def get_access_credentials(backend: Optional[builtins.str] = None,
|
212
|
+
environment: Optional[builtins.str] = None,
|
213
|
+
max_cred_validation_seconds: Optional[builtins.int] = None,
|
214
|
+
namespace: Optional[builtins.str] = None,
|
215
|
+
num_seconds_between_tests: Optional[builtins.int] = None,
|
216
|
+
num_sequential_successes: Optional[builtins.int] = None,
|
217
|
+
role: Optional[builtins.str] = None,
|
218
|
+
subscription_id: Optional[builtins.str] = None,
|
219
|
+
tenant_id: Optional[builtins.str] = None,
|
220
|
+
validate_creds: Optional[builtins.bool] = None,
|
220
221
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
|
221
222
|
"""
|
222
223
|
## Example Usage
|
@@ -239,34 +240,34 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
239
240
|
are required to be set for: `subscription_id`, `tenant_id`, `environment`.
|
240
241
|
|
241
242
|
|
242
|
-
:param str backend: The path to the Azure secret backend to
|
243
|
+
:param builtins.str backend: The path to the Azure secret backend to
|
243
244
|
read credentials from, with no leading or trailing `/`s.
|
244
|
-
:param str environment: The Azure environment to use during credential validation.
|
245
|
+
:param builtins.str environment: The Azure environment to use during credential validation.
|
245
246
|
Defaults to the environment configured in the Vault backend.
|
246
247
|
Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
|
247
248
|
*See the caveats section for more information on this field.*
|
248
|
-
:param int max_cred_validation_seconds: If 'validate_creds' is true,
|
249
|
+
:param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
|
249
250
|
the number of seconds after which to give up validating credentials. Defaults
|
250
251
|
to 300.
|
251
|
-
:param str namespace: The namespace of the target resource.
|
252
|
+
:param builtins.str namespace: The namespace of the target resource.
|
252
253
|
The value should not contain leading or trailing forward slashes.
|
253
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
254
255
|
*Available only for Vault Enterprise*.
|
255
|
-
:param int num_seconds_between_tests: If 'validate_creds' is true,
|
256
|
+
:param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
|
256
257
|
the number of seconds to wait between each test of generated credentials.
|
257
258
|
Defaults to 1.
|
258
|
-
:param int num_sequential_successes: If 'validate_creds' is true,
|
259
|
+
:param builtins.int num_sequential_successes: If 'validate_creds' is true,
|
259
260
|
the number of sequential successes required to validate generated
|
260
261
|
credentials. Defaults to 8.
|
261
|
-
:param str role: The name of the Azure secret backend role to read
|
262
|
+
:param builtins.str role: The name of the Azure secret backend role to read
|
262
263
|
credentials from, with no leading or trailing `/`s.
|
263
|
-
:param str subscription_id: The subscription ID to use during credential
|
264
|
+
:param builtins.str subscription_id: The subscription ID to use during credential
|
264
265
|
validation. Defaults to the subscription ID configured in the Vault `backend`.
|
265
266
|
*See the caveats section for more information on this field.*
|
266
|
-
:param str tenant_id: The tenant ID to use during credential validation.
|
267
|
+
:param builtins.str tenant_id: The tenant ID to use during credential validation.
|
267
268
|
Defaults to the tenant ID configured in the Vault `backend`.
|
268
269
|
*See the caveats section for more information on this field.*
|
269
|
-
:param bool validate_creds: Whether generated credentials should be
|
270
|
+
:param builtins.bool validate_creds: Whether generated credentials should be
|
270
271
|
validated before being returned. Defaults to `false`, which returns
|
271
272
|
credentials without checking whether they have fully propagated throughout
|
272
273
|
Azure Active Directory. Designating `true` activates testing.
|
@@ -303,16 +304,16 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
303
304
|
subscription_id=pulumi.get(__ret__, 'subscription_id'),
|
304
305
|
tenant_id=pulumi.get(__ret__, 'tenant_id'),
|
305
306
|
validate_creds=pulumi.get(__ret__, 'validate_creds'))
|
306
|
-
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
307
|
-
environment: Optional[pulumi.Input[Optional[str]]] = None,
|
308
|
-
max_cred_validation_seconds: Optional[pulumi.Input[Optional[int]]] = None,
|
309
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
310
|
-
num_seconds_between_tests: Optional[pulumi.Input[Optional[int]]] = None,
|
311
|
-
num_sequential_successes: Optional[pulumi.Input[Optional[int]]] = None,
|
312
|
-
role: Optional[pulumi.Input[str]] = None,
|
313
|
-
subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
|
314
|
-
tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
|
315
|
-
validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
|
307
|
+
def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
308
|
+
environment: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
309
|
+
max_cred_validation_seconds: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
310
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
311
|
+
num_seconds_between_tests: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
312
|
+
num_sequential_successes: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
313
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
314
|
+
subscription_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
315
|
+
tenant_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
316
|
+
validate_creds: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
316
317
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
317
318
|
"""
|
318
319
|
## Example Usage
|
@@ -335,34 +336,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
335
336
|
are required to be set for: `subscription_id`, `tenant_id`, `environment`.
|
336
337
|
|
337
338
|
|
338
|
-
:param str backend: The path to the Azure secret backend to
|
339
|
+
:param builtins.str backend: The path to the Azure secret backend to
|
339
340
|
read credentials from, with no leading or trailing `/`s.
|
340
|
-
:param str environment: The Azure environment to use during credential validation.
|
341
|
+
:param builtins.str environment: The Azure environment to use during credential validation.
|
341
342
|
Defaults to the environment configured in the Vault backend.
|
342
343
|
Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
|
343
344
|
*See the caveats section for more information on this field.*
|
344
|
-
:param int max_cred_validation_seconds: If 'validate_creds' is true,
|
345
|
+
:param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
|
345
346
|
the number of seconds after which to give up validating credentials. Defaults
|
346
347
|
to 300.
|
347
|
-
:param str namespace: The namespace of the target resource.
|
348
|
+
:param builtins.str namespace: The namespace of the target resource.
|
348
349
|
The value should not contain leading or trailing forward slashes.
|
349
350
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
350
351
|
*Available only for Vault Enterprise*.
|
351
|
-
:param int num_seconds_between_tests: If 'validate_creds' is true,
|
352
|
+
:param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
|
352
353
|
the number of seconds to wait between each test of generated credentials.
|
353
354
|
Defaults to 1.
|
354
|
-
:param int num_sequential_successes: If 'validate_creds' is true,
|
355
|
+
:param builtins.int num_sequential_successes: If 'validate_creds' is true,
|
355
356
|
the number of sequential successes required to validate generated
|
356
357
|
credentials. Defaults to 8.
|
357
|
-
:param str role: The name of the Azure secret backend role to read
|
358
|
+
:param builtins.str role: The name of the Azure secret backend role to read
|
358
359
|
credentials from, with no leading or trailing `/`s.
|
359
|
-
:param str subscription_id: The subscription ID to use during credential
|
360
|
+
:param builtins.str subscription_id: The subscription ID to use during credential
|
360
361
|
validation. Defaults to the subscription ID configured in the Vault `backend`.
|
361
362
|
*See the caveats section for more information on this field.*
|
362
|
-
:param str tenant_id: The tenant ID to use during credential validation.
|
363
|
+
:param builtins.str tenant_id: The tenant ID to use during credential validation.
|
363
364
|
Defaults to the tenant ID configured in the Vault `backend`.
|
364
365
|
*See the caveats section for more information on this field.*
|
365
|
-
:param bool validate_creds: Whether generated credentials should be
|
366
|
+
:param builtins.bool validate_creds: Whether generated credentials should be
|
366
367
|
validated before being returned. Defaults to `false`, which returns
|
367
368
|
credentials without checking whether they have fully propagated throughout
|
368
369
|
Azure Active Directory. Designating `true` activates testing.
|
pulumi_vault/azure/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -41,20 +42,20 @@ class BackendRoleAzureGroup(dict):
|
|
41
42
|
return super().get(key, default)
|
42
43
|
|
43
44
|
def __init__(__self__, *,
|
44
|
-
group_name: str,
|
45
|
-
object_id: Optional[str] = None):
|
45
|
+
group_name: builtins.str,
|
46
|
+
object_id: Optional[builtins.str] = None):
|
46
47
|
pulumi.set(__self__, "group_name", group_name)
|
47
48
|
if object_id is not None:
|
48
49
|
pulumi.set(__self__, "object_id", object_id)
|
49
50
|
|
50
51
|
@property
|
51
52
|
@pulumi.getter(name="groupName")
|
52
|
-
def group_name(self) -> str:
|
53
|
+
def group_name(self) -> builtins.str:
|
53
54
|
return pulumi.get(self, "group_name")
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter(name="objectId")
|
57
|
-
def object_id(self) -> Optional[str]:
|
58
|
+
def object_id(self) -> Optional[builtins.str]:
|
58
59
|
return pulumi.get(self, "object_id")
|
59
60
|
|
60
61
|
|
@@ -80,9 +81,9 @@ class BackendRoleAzureRole(dict):
|
|
80
81
|
return super().get(key, default)
|
81
82
|
|
82
83
|
def __init__(__self__, *,
|
83
|
-
scope: str,
|
84
|
-
role_id: Optional[str] = None,
|
85
|
-
role_name: Optional[str] = None):
|
84
|
+
scope: builtins.str,
|
85
|
+
role_id: Optional[builtins.str] = None,
|
86
|
+
role_name: Optional[builtins.str] = None):
|
86
87
|
pulumi.set(__self__, "scope", scope)
|
87
88
|
if role_id is not None:
|
88
89
|
pulumi.set(__self__, "role_id", role_id)
|
@@ -91,17 +92,17 @@ class BackendRoleAzureRole(dict):
|
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def scope(self) -> str:
|
95
|
+
def scope(self) -> builtins.str:
|
95
96
|
return pulumi.get(self, "scope")
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter(name="roleId")
|
99
|
-
def role_id(self) -> Optional[str]:
|
100
|
+
def role_id(self) -> Optional[builtins.str]:
|
100
101
|
return pulumi.get(self, "role_id")
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter(name="roleName")
|
104
|
-
def role_name(self) -> Optional[str]:
|
105
|
+
def role_name(self) -> Optional[builtins.str]:
|
105
106
|
return pulumi.get(self, "role_name")
|
106
107
|
|
107
108
|
|