pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,44 +20,44 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: Optional[pulumi.Input[str]] = None,
|
23
|
-
consul_namespace: Optional[pulumi.Input[str]] = None,
|
24
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
|
-
local: Optional[pulumi.Input[bool]] = None,
|
27
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
28
|
-
name: Optional[pulumi.Input[str]] = None,
|
29
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
30
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
31
|
-
partition: Optional[pulumi.Input[str]] = None,
|
32
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
33
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
27
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
28
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
29
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
32
|
+
partition: Optional[pulumi.Input[builtins.str]] = None,
|
33
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
34
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
35
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
35
36
|
"""
|
36
37
|
The set of arguments for constructing a SecretBackendRole resource.
|
37
|
-
:param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
38
|
-
:param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
|
38
|
+
:param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
39
|
+
:param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
39
40
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
40
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
41
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
42
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
42
43
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
43
|
-
:param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
44
|
-
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
45
|
-
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
46
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
44
|
+
:param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
45
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
46
|
+
:param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
|
47
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
47
48
|
The value should not contain leading or trailing forward slashes.
|
48
49
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
50
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
51
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
51
52
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
52
|
-
:param pulumi.Input[str] partition: The admin partition that the token will be created in.
|
53
|
+
:param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
|
53
54
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
55
56
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
56
57
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
57
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
58
59
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
59
|
-
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
60
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
|
60
61
|
"""
|
61
62
|
if backend is not None:
|
62
63
|
pulumi.set(__self__, "backend", backend)
|
@@ -87,19 +88,19 @@ class SecretBackendRoleArgs:
|
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter
|
90
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
91
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
91
92
|
"""
|
92
93
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
93
94
|
"""
|
94
95
|
return pulumi.get(self, "backend")
|
95
96
|
|
96
97
|
@backend.setter
|
97
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
98
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
98
99
|
pulumi.set(self, "backend", value)
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="consulNamespace")
|
102
|
-
def consul_namespace(self) -> Optional[pulumi.Input[str]]:
|
103
|
+
def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
103
104
|
"""
|
104
105
|
The Consul namespace that the token will be created in.
|
105
106
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
@@ -107,24 +108,24 @@ class SecretBackendRoleArgs:
|
|
107
108
|
return pulumi.get(self, "consul_namespace")
|
108
109
|
|
109
110
|
@consul_namespace.setter
|
110
|
-
def consul_namespace(self, value: Optional[pulumi.Input[str]]):
|
111
|
+
def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
111
112
|
pulumi.set(self, "consul_namespace", value)
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter(name="consulPolicies")
|
115
|
-
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
116
|
+
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
116
117
|
"""
|
117
118
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
118
119
|
"""
|
119
120
|
return pulumi.get(self, "consul_policies")
|
120
121
|
|
121
122
|
@consul_policies.setter
|
122
|
-
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
123
|
+
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
123
124
|
pulumi.set(self, "consul_policies", value)
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter(name="consulRoles")
|
127
|
-
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
128
|
+
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
128
129
|
"""
|
129
130
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
130
131
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
@@ -132,48 +133,48 @@ class SecretBackendRoleArgs:
|
|
132
133
|
return pulumi.get(self, "consul_roles")
|
133
134
|
|
134
135
|
@consul_roles.setter
|
135
|
-
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
136
|
+
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
136
137
|
pulumi.set(self, "consul_roles", value)
|
137
138
|
|
138
139
|
@property
|
139
140
|
@pulumi.getter
|
140
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
141
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
141
142
|
"""
|
142
143
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
143
144
|
"""
|
144
145
|
return pulumi.get(self, "local")
|
145
146
|
|
146
147
|
@local.setter
|
147
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
148
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
148
149
|
pulumi.set(self, "local", value)
|
149
150
|
|
150
151
|
@property
|
151
152
|
@pulumi.getter(name="maxTtl")
|
152
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
153
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
153
154
|
"""
|
154
155
|
Maximum TTL for leases associated with this role, in seconds.
|
155
156
|
"""
|
156
157
|
return pulumi.get(self, "max_ttl")
|
157
158
|
|
158
159
|
@max_ttl.setter
|
159
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
160
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
160
161
|
pulumi.set(self, "max_ttl", value)
|
161
162
|
|
162
163
|
@property
|
163
164
|
@pulumi.getter
|
164
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
165
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
165
166
|
"""
|
166
167
|
The name of the Consul secrets engine role to create.
|
167
168
|
"""
|
168
169
|
return pulumi.get(self, "name")
|
169
170
|
|
170
171
|
@name.setter
|
171
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
172
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
172
173
|
pulumi.set(self, "name", value)
|
173
174
|
|
174
175
|
@property
|
175
176
|
@pulumi.getter
|
176
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
177
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
177
178
|
"""
|
178
179
|
The namespace to provision the resource in.
|
179
180
|
The value should not contain leading or trailing forward slashes.
|
@@ -183,12 +184,12 @@ class SecretBackendRoleArgs:
|
|
183
184
|
return pulumi.get(self, "namespace")
|
184
185
|
|
185
186
|
@namespace.setter
|
186
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
187
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
187
188
|
pulumi.set(self, "namespace", value)
|
188
189
|
|
189
190
|
@property
|
190
191
|
@pulumi.getter(name="nodeIdentities")
|
191
|
-
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
192
|
+
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
192
193
|
"""
|
193
194
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
194
195
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -196,12 +197,12 @@ class SecretBackendRoleArgs:
|
|
196
197
|
return pulumi.get(self, "node_identities")
|
197
198
|
|
198
199
|
@node_identities.setter
|
199
|
-
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
200
|
+
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
200
201
|
pulumi.set(self, "node_identities", value)
|
201
202
|
|
202
203
|
@property
|
203
204
|
@pulumi.getter
|
204
|
-
def partition(self) -> Optional[pulumi.Input[str]]:
|
205
|
+
def partition(self) -> Optional[pulumi.Input[builtins.str]]:
|
205
206
|
"""
|
206
207
|
The admin partition that the token will be created in.
|
207
208
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
@@ -209,12 +210,12 @@ class SecretBackendRoleArgs:
|
|
209
210
|
return pulumi.get(self, "partition")
|
210
211
|
|
211
212
|
@partition.setter
|
212
|
-
def partition(self, value: Optional[pulumi.Input[str]]):
|
213
|
+
def partition(self, value: Optional[pulumi.Input[builtins.str]]):
|
213
214
|
pulumi.set(self, "partition", value)
|
214
215
|
|
215
216
|
@property
|
216
217
|
@pulumi.getter
|
217
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
218
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
218
219
|
"""
|
219
220
|
The list of Consul ACL policies to associate with these roles.
|
220
221
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -223,12 +224,12 @@ class SecretBackendRoleArgs:
|
|
223
224
|
return pulumi.get(self, "policies")
|
224
225
|
|
225
226
|
@policies.setter
|
226
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
227
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
227
228
|
pulumi.set(self, "policies", value)
|
228
229
|
|
229
230
|
@property
|
230
231
|
@pulumi.getter(name="serviceIdentities")
|
231
|
-
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
232
|
+
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
232
233
|
"""
|
233
234
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
234
235
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
@@ -236,63 +237,63 @@ class SecretBackendRoleArgs:
|
|
236
237
|
return pulumi.get(self, "service_identities")
|
237
238
|
|
238
239
|
@service_identities.setter
|
239
|
-
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
240
|
+
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
240
241
|
pulumi.set(self, "service_identities", value)
|
241
242
|
|
242
243
|
@property
|
243
244
|
@pulumi.getter
|
244
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
245
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
245
246
|
"""
|
246
247
|
Specifies the TTL for this role.
|
247
248
|
"""
|
248
249
|
return pulumi.get(self, "ttl")
|
249
250
|
|
250
251
|
@ttl.setter
|
251
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
252
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
252
253
|
pulumi.set(self, "ttl", value)
|
253
254
|
|
254
255
|
|
255
256
|
@pulumi.input_type
|
256
257
|
class _SecretBackendRoleState:
|
257
258
|
def __init__(__self__, *,
|
258
|
-
backend: Optional[pulumi.Input[str]] = None,
|
259
|
-
consul_namespace: Optional[pulumi.Input[str]] = None,
|
260
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
261
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
262
|
-
local: Optional[pulumi.Input[bool]] = None,
|
263
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
264
|
-
name: Optional[pulumi.Input[str]] = None,
|
265
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
266
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
267
|
-
partition: Optional[pulumi.Input[str]] = None,
|
268
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
269
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
270
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
259
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
260
|
+
consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
261
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
262
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
263
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
264
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
265
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
267
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
268
|
+
partition: Optional[pulumi.Input[builtins.str]] = None,
|
269
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
270
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
271
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
271
272
|
"""
|
272
273
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
273
|
-
:param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
274
|
-
:param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
|
274
|
+
:param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
275
|
+
:param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
275
276
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
276
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
277
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
277
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
278
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
278
279
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
279
|
-
:param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
280
|
-
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
281
|
-
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
282
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
280
|
+
:param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
281
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
282
|
+
:param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
|
283
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
283
284
|
The value should not contain leading or trailing forward slashes.
|
284
285
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
285
286
|
*Available only for Vault Enterprise*.
|
286
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
287
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
287
288
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
288
|
-
:param pulumi.Input[str] partition: The admin partition that the token will be created in.
|
289
|
+
:param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
|
289
290
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
290
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
|
291
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
291
292
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
292
293
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
293
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
294
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
294
295
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
295
|
-
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
296
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
|
296
297
|
"""
|
297
298
|
if backend is not None:
|
298
299
|
pulumi.set(__self__, "backend", backend)
|
@@ -323,19 +324,19 @@ class _SecretBackendRoleState:
|
|
323
324
|
|
324
325
|
@property
|
325
326
|
@pulumi.getter
|
326
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
327
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
327
328
|
"""
|
328
329
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
329
330
|
"""
|
330
331
|
return pulumi.get(self, "backend")
|
331
332
|
|
332
333
|
@backend.setter
|
333
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
334
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
334
335
|
pulumi.set(self, "backend", value)
|
335
336
|
|
336
337
|
@property
|
337
338
|
@pulumi.getter(name="consulNamespace")
|
338
|
-
def consul_namespace(self) -> Optional[pulumi.Input[str]]:
|
339
|
+
def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
339
340
|
"""
|
340
341
|
The Consul namespace that the token will be created in.
|
341
342
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
@@ -343,24 +344,24 @@ class _SecretBackendRoleState:
|
|
343
344
|
return pulumi.get(self, "consul_namespace")
|
344
345
|
|
345
346
|
@consul_namespace.setter
|
346
|
-
def consul_namespace(self, value: Optional[pulumi.Input[str]]):
|
347
|
+
def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
347
348
|
pulumi.set(self, "consul_namespace", value)
|
348
349
|
|
349
350
|
@property
|
350
351
|
@pulumi.getter(name="consulPolicies")
|
351
|
-
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
352
|
+
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
352
353
|
"""
|
353
354
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
354
355
|
"""
|
355
356
|
return pulumi.get(self, "consul_policies")
|
356
357
|
|
357
358
|
@consul_policies.setter
|
358
|
-
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
359
|
+
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
359
360
|
pulumi.set(self, "consul_policies", value)
|
360
361
|
|
361
362
|
@property
|
362
363
|
@pulumi.getter(name="consulRoles")
|
363
|
-
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
364
|
+
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
364
365
|
"""
|
365
366
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
366
367
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
@@ -368,48 +369,48 @@ class _SecretBackendRoleState:
|
|
368
369
|
return pulumi.get(self, "consul_roles")
|
369
370
|
|
370
371
|
@consul_roles.setter
|
371
|
-
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
372
|
+
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
372
373
|
pulumi.set(self, "consul_roles", value)
|
373
374
|
|
374
375
|
@property
|
375
376
|
@pulumi.getter
|
376
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
377
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
377
378
|
"""
|
378
379
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
379
380
|
"""
|
380
381
|
return pulumi.get(self, "local")
|
381
382
|
|
382
383
|
@local.setter
|
383
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
384
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
384
385
|
pulumi.set(self, "local", value)
|
385
386
|
|
386
387
|
@property
|
387
388
|
@pulumi.getter(name="maxTtl")
|
388
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
389
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
389
390
|
"""
|
390
391
|
Maximum TTL for leases associated with this role, in seconds.
|
391
392
|
"""
|
392
393
|
return pulumi.get(self, "max_ttl")
|
393
394
|
|
394
395
|
@max_ttl.setter
|
395
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
396
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
396
397
|
pulumi.set(self, "max_ttl", value)
|
397
398
|
|
398
399
|
@property
|
399
400
|
@pulumi.getter
|
400
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
401
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
401
402
|
"""
|
402
403
|
The name of the Consul secrets engine role to create.
|
403
404
|
"""
|
404
405
|
return pulumi.get(self, "name")
|
405
406
|
|
406
407
|
@name.setter
|
407
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
408
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
408
409
|
pulumi.set(self, "name", value)
|
409
410
|
|
410
411
|
@property
|
411
412
|
@pulumi.getter
|
412
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
413
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
413
414
|
"""
|
414
415
|
The namespace to provision the resource in.
|
415
416
|
The value should not contain leading or trailing forward slashes.
|
@@ -419,12 +420,12 @@ class _SecretBackendRoleState:
|
|
419
420
|
return pulumi.get(self, "namespace")
|
420
421
|
|
421
422
|
@namespace.setter
|
422
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
423
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
423
424
|
pulumi.set(self, "namespace", value)
|
424
425
|
|
425
426
|
@property
|
426
427
|
@pulumi.getter(name="nodeIdentities")
|
427
|
-
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
428
|
+
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
428
429
|
"""
|
429
430
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
430
431
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -432,12 +433,12 @@ class _SecretBackendRoleState:
|
|
432
433
|
return pulumi.get(self, "node_identities")
|
433
434
|
|
434
435
|
@node_identities.setter
|
435
|
-
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
436
|
+
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
436
437
|
pulumi.set(self, "node_identities", value)
|
437
438
|
|
438
439
|
@property
|
439
440
|
@pulumi.getter
|
440
|
-
def partition(self) -> Optional[pulumi.Input[str]]:
|
441
|
+
def partition(self) -> Optional[pulumi.Input[builtins.str]]:
|
441
442
|
"""
|
442
443
|
The admin partition that the token will be created in.
|
443
444
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
@@ -445,12 +446,12 @@ class _SecretBackendRoleState:
|
|
445
446
|
return pulumi.get(self, "partition")
|
446
447
|
|
447
448
|
@partition.setter
|
448
|
-
def partition(self, value: Optional[pulumi.Input[str]]):
|
449
|
+
def partition(self, value: Optional[pulumi.Input[builtins.str]]):
|
449
450
|
pulumi.set(self, "partition", value)
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter
|
453
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
454
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
454
455
|
"""
|
455
456
|
The list of Consul ACL policies to associate with these roles.
|
456
457
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -459,12 +460,12 @@ class _SecretBackendRoleState:
|
|
459
460
|
return pulumi.get(self, "policies")
|
460
461
|
|
461
462
|
@policies.setter
|
462
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
463
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
463
464
|
pulumi.set(self, "policies", value)
|
464
465
|
|
465
466
|
@property
|
466
467
|
@pulumi.getter(name="serviceIdentities")
|
467
|
-
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
468
|
+
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
468
469
|
"""
|
469
470
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
470
471
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
@@ -472,19 +473,19 @@ class _SecretBackendRoleState:
|
|
472
473
|
return pulumi.get(self, "service_identities")
|
473
474
|
|
474
475
|
@service_identities.setter
|
475
|
-
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
476
|
+
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
476
477
|
pulumi.set(self, "service_identities", value)
|
477
478
|
|
478
479
|
@property
|
479
480
|
@pulumi.getter
|
480
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
481
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
481
482
|
"""
|
482
483
|
Specifies the TTL for this role.
|
483
484
|
"""
|
484
485
|
return pulumi.get(self, "ttl")
|
485
486
|
|
486
487
|
@ttl.setter
|
487
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
488
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
488
489
|
pulumi.set(self, "ttl", value)
|
489
490
|
|
490
491
|
|
@@ -493,19 +494,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
493
494
|
def __init__(__self__,
|
494
495
|
resource_name: str,
|
495
496
|
opts: Optional[pulumi.ResourceOptions] = None,
|
496
|
-
backend: Optional[pulumi.Input[str]] = None,
|
497
|
-
consul_namespace: Optional[pulumi.Input[str]] = None,
|
498
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
499
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
500
|
-
local: Optional[pulumi.Input[bool]] = None,
|
501
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
502
|
-
name: Optional[pulumi.Input[str]] = None,
|
503
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
504
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
505
|
-
partition: Optional[pulumi.Input[str]] = None,
|
506
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
507
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
508
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
497
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
498
|
+
consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
499
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
500
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
501
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
502
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
503
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
504
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
505
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
506
|
+
partition: Optional[pulumi.Input[builtins.str]] = None,
|
507
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
508
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
509
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
509
510
|
__props__=None):
|
510
511
|
"""
|
511
512
|
Manages a Consul secrets role for a Consul secrets engine in Vault. Consul secret backends can then issue Consul tokens.
|
@@ -543,29 +544,29 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
543
544
|
|
544
545
|
:param str resource_name: The name of the resource.
|
545
546
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
546
|
-
:param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
547
|
-
:param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
|
547
|
+
:param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
548
|
+
:param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
548
549
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
549
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
550
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
550
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
551
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
551
552
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
552
|
-
:param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
553
|
-
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
554
|
-
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
555
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
553
|
+
:param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
554
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
555
|
+
:param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
|
556
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
556
557
|
The value should not contain leading or trailing forward slashes.
|
557
558
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
558
559
|
*Available only for Vault Enterprise*.
|
559
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
560
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
560
561
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
561
|
-
:param pulumi.Input[str] partition: The admin partition that the token will be created in.
|
562
|
+
:param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
|
562
563
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
563
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
|
564
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
564
565
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
565
566
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
566
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
567
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
567
568
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
568
|
-
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
569
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
|
569
570
|
"""
|
570
571
|
...
|
571
572
|
@overload
|
@@ -622,19 +623,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
622
623
|
def _internal_init(__self__,
|
623
624
|
resource_name: str,
|
624
625
|
opts: Optional[pulumi.ResourceOptions] = None,
|
625
|
-
backend: Optional[pulumi.Input[str]] = None,
|
626
|
-
consul_namespace: Optional[pulumi.Input[str]] = None,
|
627
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
628
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
629
|
-
local: Optional[pulumi.Input[bool]] = None,
|
630
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
631
|
-
name: Optional[pulumi.Input[str]] = None,
|
632
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
633
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
634
|
-
partition: Optional[pulumi.Input[str]] = None,
|
635
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
636
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
637
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
626
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
627
|
+
consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
628
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
629
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
630
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
631
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
632
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
633
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
634
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
635
|
+
partition: Optional[pulumi.Input[builtins.str]] = None,
|
636
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
637
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
638
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
638
639
|
__props__=None):
|
639
640
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
640
641
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -667,19 +668,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
667
668
|
def get(resource_name: str,
|
668
669
|
id: pulumi.Input[str],
|
669
670
|
opts: Optional[pulumi.ResourceOptions] = None,
|
670
|
-
backend: Optional[pulumi.Input[str]] = None,
|
671
|
-
consul_namespace: Optional[pulumi.Input[str]] = None,
|
672
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
673
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
674
|
-
local: Optional[pulumi.Input[bool]] = None,
|
675
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
676
|
-
name: Optional[pulumi.Input[str]] = None,
|
677
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
678
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
679
|
-
partition: Optional[pulumi.Input[str]] = None,
|
680
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
681
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
682
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
|
671
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
672
|
+
consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
673
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
674
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
675
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
676
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
677
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
678
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
679
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
680
|
+
partition: Optional[pulumi.Input[builtins.str]] = None,
|
681
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
682
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
683
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendRole':
|
683
684
|
"""
|
684
685
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
685
686
|
properties used to qualify the lookup.
|
@@ -687,29 +688,29 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
687
688
|
:param str resource_name: The unique name of the resulting resource.
|
688
689
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
689
690
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
690
|
-
:param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
691
|
-
:param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
|
691
|
+
:param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
692
|
+
:param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
692
693
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
693
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
694
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
694
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
695
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
695
696
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
696
|
-
:param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
697
|
-
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
698
|
-
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
699
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
697
|
+
:param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
698
|
+
:param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
699
|
+
:param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
|
700
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
700
701
|
The value should not contain leading or trailing forward slashes.
|
701
702
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
702
703
|
*Available only for Vault Enterprise*.
|
703
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
704
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
704
705
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
705
|
-
:param pulumi.Input[str] partition: The admin partition that the token will be created in.
|
706
|
+
:param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
|
706
707
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
707
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
|
708
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
708
709
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
709
710
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
710
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
711
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
711
712
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
712
|
-
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
713
|
+
:param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
|
713
714
|
"""
|
714
715
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
715
716
|
|
@@ -732,7 +733,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
732
733
|
|
733
734
|
@property
|
734
735
|
@pulumi.getter
|
735
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
736
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
736
737
|
"""
|
737
738
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
738
739
|
"""
|
@@ -740,7 +741,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
740
741
|
|
741
742
|
@property
|
742
743
|
@pulumi.getter(name="consulNamespace")
|
743
|
-
def consul_namespace(self) -> pulumi.Output[str]:
|
744
|
+
def consul_namespace(self) -> pulumi.Output[builtins.str]:
|
744
745
|
"""
|
745
746
|
The Consul namespace that the token will be created in.
|
746
747
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
@@ -749,7 +750,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
749
750
|
|
750
751
|
@property
|
751
752
|
@pulumi.getter(name="consulPolicies")
|
752
|
-
def consul_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
753
|
+
def consul_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
753
754
|
"""
|
754
755
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
755
756
|
"""
|
@@ -757,7 +758,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
757
758
|
|
758
759
|
@property
|
759
760
|
@pulumi.getter(name="consulRoles")
|
760
|
-
def consul_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
761
|
+
def consul_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
761
762
|
"""
|
762
763
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
763
764
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
@@ -766,7 +767,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
766
767
|
|
767
768
|
@property
|
768
769
|
@pulumi.getter
|
769
|
-
def local(self) -> pulumi.Output[Optional[bool]]:
|
770
|
+
def local(self) -> pulumi.Output[Optional[builtins.bool]]:
|
770
771
|
"""
|
771
772
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
772
773
|
"""
|
@@ -774,7 +775,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
774
775
|
|
775
776
|
@property
|
776
777
|
@pulumi.getter(name="maxTtl")
|
777
|
-
def max_ttl(self) -> pulumi.Output[Optional[int]]:
|
778
|
+
def max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
778
779
|
"""
|
779
780
|
Maximum TTL for leases associated with this role, in seconds.
|
780
781
|
"""
|
@@ -782,7 +783,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
782
783
|
|
783
784
|
@property
|
784
785
|
@pulumi.getter
|
785
|
-
def name(self) -> pulumi.Output[str]:
|
786
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
786
787
|
"""
|
787
788
|
The name of the Consul secrets engine role to create.
|
788
789
|
"""
|
@@ -790,7 +791,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
790
791
|
|
791
792
|
@property
|
792
793
|
@pulumi.getter
|
793
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
794
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
794
795
|
"""
|
795
796
|
The namespace to provision the resource in.
|
796
797
|
The value should not contain leading or trailing forward slashes.
|
@@ -801,7 +802,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
801
802
|
|
802
803
|
@property
|
803
804
|
@pulumi.getter(name="nodeIdentities")
|
804
|
-
def node_identities(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
805
|
+
def node_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
805
806
|
"""
|
806
807
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
807
808
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -810,7 +811,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
810
811
|
|
811
812
|
@property
|
812
813
|
@pulumi.getter
|
813
|
-
def partition(self) -> pulumi.Output[str]:
|
814
|
+
def partition(self) -> pulumi.Output[builtins.str]:
|
814
815
|
"""
|
815
816
|
The admin partition that the token will be created in.
|
816
817
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
@@ -819,7 +820,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
819
820
|
|
820
821
|
@property
|
821
822
|
@pulumi.getter
|
822
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
823
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
823
824
|
"""
|
824
825
|
The list of Consul ACL policies to associate with these roles.
|
825
826
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -829,7 +830,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
829
830
|
|
830
831
|
@property
|
831
832
|
@pulumi.getter(name="serviceIdentities")
|
832
|
-
def service_identities(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
833
|
+
def service_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
833
834
|
"""
|
834
835
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
835
836
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
@@ -838,7 +839,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
838
839
|
|
839
840
|
@property
|
840
841
|
@pulumi.getter
|
841
|
-
def ttl(self) -> pulumi.Output[Optional[int]]:
|
842
|
+
def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
842
843
|
"""
|
843
844
|
Specifies the TTL for this role.
|
844
845
|
"""
|