pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,20 +20,20 @@ __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretImpersonatedAccountArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
impersonated_account: pulumi.Input[str],
|
24
|
-
service_account_email: pulumi.Input[str],
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
impersonated_account: pulumi.Input[builtins.str],
|
25
|
+
service_account_email: pulumi.Input[builtins.str],
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
28
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a SecretImpersonatedAccount resource.
|
30
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
31
|
-
:param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
|
32
|
-
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
33
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
35
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
31
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
32
|
+
:param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
|
33
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
34
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
35
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
36
|
+
:param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
36
37
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
37
38
|
"""
|
38
39
|
pulumi.set(__self__, "backend", backend)
|
@@ -47,67 +48,67 @@ class SecretImpersonatedAccountArgs:
|
|
47
48
|
|
48
49
|
@property
|
49
50
|
@pulumi.getter
|
50
|
-
def backend(self) -> pulumi.Input[str]:
|
51
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
51
52
|
"""
|
52
53
|
Path where the GCP Secrets Engine is mounted
|
53
54
|
"""
|
54
55
|
return pulumi.get(self, "backend")
|
55
56
|
|
56
57
|
@backend.setter
|
57
|
-
def backend(self, value: pulumi.Input[str]):
|
58
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
58
59
|
pulumi.set(self, "backend", value)
|
59
60
|
|
60
61
|
@property
|
61
62
|
@pulumi.getter(name="impersonatedAccount")
|
62
|
-
def impersonated_account(self) -> pulumi.Input[str]:
|
63
|
+
def impersonated_account(self) -> pulumi.Input[builtins.str]:
|
63
64
|
"""
|
64
65
|
Name of the Impersonated Account to create
|
65
66
|
"""
|
66
67
|
return pulumi.get(self, "impersonated_account")
|
67
68
|
|
68
69
|
@impersonated_account.setter
|
69
|
-
def impersonated_account(self, value: pulumi.Input[str]):
|
70
|
+
def impersonated_account(self, value: pulumi.Input[builtins.str]):
|
70
71
|
pulumi.set(self, "impersonated_account", value)
|
71
72
|
|
72
73
|
@property
|
73
74
|
@pulumi.getter(name="serviceAccountEmail")
|
74
|
-
def service_account_email(self) -> pulumi.Input[str]:
|
75
|
+
def service_account_email(self) -> pulumi.Input[builtins.str]:
|
75
76
|
"""
|
76
77
|
Email of the GCP service account to impersonate.
|
77
78
|
"""
|
78
79
|
return pulumi.get(self, "service_account_email")
|
79
80
|
|
80
81
|
@service_account_email.setter
|
81
|
-
def service_account_email(self, value: pulumi.Input[str]):
|
82
|
+
def service_account_email(self, value: pulumi.Input[builtins.str]):
|
82
83
|
pulumi.set(self, "service_account_email", value)
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter
|
86
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
87
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
87
88
|
"""
|
88
89
|
Target namespace. (requires Enterprise)
|
89
90
|
"""
|
90
91
|
return pulumi.get(self, "namespace")
|
91
92
|
|
92
93
|
@namespace.setter
|
93
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
94
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
94
95
|
pulumi.set(self, "namespace", value)
|
95
96
|
|
96
97
|
@property
|
97
98
|
@pulumi.getter(name="tokenScopes")
|
98
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
99
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
99
100
|
"""
|
100
101
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
101
102
|
"""
|
102
103
|
return pulumi.get(self, "token_scopes")
|
103
104
|
|
104
105
|
@token_scopes.setter
|
105
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
106
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
106
107
|
pulumi.set(self, "token_scopes", value)
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
111
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
111
112
|
"""
|
112
113
|
Specifies the default TTL for service principals generated using this role.
|
113
114
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -115,29 +116,29 @@ class SecretImpersonatedAccountArgs:
|
|
115
116
|
return pulumi.get(self, "ttl")
|
116
117
|
|
117
118
|
@ttl.setter
|
118
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
119
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
119
120
|
pulumi.set(self, "ttl", value)
|
120
121
|
|
121
122
|
|
122
123
|
@pulumi.input_type
|
123
124
|
class _SecretImpersonatedAccountState:
|
124
125
|
def __init__(__self__, *,
|
125
|
-
backend: Optional[pulumi.Input[str]] = None,
|
126
|
-
impersonated_account: Optional[pulumi.Input[str]] = None,
|
127
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
128
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
129
|
-
service_account_project: Optional[pulumi.Input[str]] = None,
|
130
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
131
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
126
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
127
|
+
impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
|
128
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
129
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
130
|
+
service_account_project: Optional[pulumi.Input[builtins.str]] = None,
|
131
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
132
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None):
|
132
133
|
"""
|
133
134
|
Input properties used for looking up and filtering SecretImpersonatedAccount resources.
|
134
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
135
|
-
:param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
|
136
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
137
|
-
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
138
|
-
:param pulumi.Input[str] service_account_project: Project the service account belongs to.
|
139
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
140
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
135
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
136
|
+
:param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
|
137
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
138
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
139
|
+
:param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
|
140
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
141
|
+
:param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
141
142
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
142
143
|
"""
|
143
144
|
if backend is not None:
|
@@ -157,79 +158,79 @@ class _SecretImpersonatedAccountState:
|
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter
|
160
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
161
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
161
162
|
"""
|
162
163
|
Path where the GCP Secrets Engine is mounted
|
163
164
|
"""
|
164
165
|
return pulumi.get(self, "backend")
|
165
166
|
|
166
167
|
@backend.setter
|
167
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
168
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
168
169
|
pulumi.set(self, "backend", value)
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter(name="impersonatedAccount")
|
172
|
-
def impersonated_account(self) -> Optional[pulumi.Input[str]]:
|
173
|
+
def impersonated_account(self) -> Optional[pulumi.Input[builtins.str]]:
|
173
174
|
"""
|
174
175
|
Name of the Impersonated Account to create
|
175
176
|
"""
|
176
177
|
return pulumi.get(self, "impersonated_account")
|
177
178
|
|
178
179
|
@impersonated_account.setter
|
179
|
-
def impersonated_account(self, value: Optional[pulumi.Input[str]]):
|
180
|
+
def impersonated_account(self, value: Optional[pulumi.Input[builtins.str]]):
|
180
181
|
pulumi.set(self, "impersonated_account", value)
|
181
182
|
|
182
183
|
@property
|
183
184
|
@pulumi.getter
|
184
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
185
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
185
186
|
"""
|
186
187
|
Target namespace. (requires Enterprise)
|
187
188
|
"""
|
188
189
|
return pulumi.get(self, "namespace")
|
189
190
|
|
190
191
|
@namespace.setter
|
191
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
192
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
192
193
|
pulumi.set(self, "namespace", value)
|
193
194
|
|
194
195
|
@property
|
195
196
|
@pulumi.getter(name="serviceAccountEmail")
|
196
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
197
|
+
def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
|
197
198
|
"""
|
198
199
|
Email of the GCP service account to impersonate.
|
199
200
|
"""
|
200
201
|
return pulumi.get(self, "service_account_email")
|
201
202
|
|
202
203
|
@service_account_email.setter
|
203
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "service_account_email", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="serviceAccountProject")
|
208
|
-
def service_account_project(self) -> Optional[pulumi.Input[str]]:
|
209
|
+
def service_account_project(self) -> Optional[pulumi.Input[builtins.str]]:
|
209
210
|
"""
|
210
211
|
Project the service account belongs to.
|
211
212
|
"""
|
212
213
|
return pulumi.get(self, "service_account_project")
|
213
214
|
|
214
215
|
@service_account_project.setter
|
215
|
-
def service_account_project(self, value: Optional[pulumi.Input[str]]):
|
216
|
+
def service_account_project(self, value: Optional[pulumi.Input[builtins.str]]):
|
216
217
|
pulumi.set(self, "service_account_project", value)
|
217
218
|
|
218
219
|
@property
|
219
220
|
@pulumi.getter(name="tokenScopes")
|
220
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
221
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
221
222
|
"""
|
222
223
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
223
224
|
"""
|
224
225
|
return pulumi.get(self, "token_scopes")
|
225
226
|
|
226
227
|
@token_scopes.setter
|
227
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
228
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
228
229
|
pulumi.set(self, "token_scopes", value)
|
229
230
|
|
230
231
|
@property
|
231
232
|
@pulumi.getter
|
232
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
233
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
233
234
|
"""
|
234
235
|
Specifies the default TTL for service principals generated using this role.
|
235
236
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -237,7 +238,7 @@ class _SecretImpersonatedAccountState:
|
|
237
238
|
return pulumi.get(self, "ttl")
|
238
239
|
|
239
240
|
@ttl.setter
|
240
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
241
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
241
242
|
pulumi.set(self, "ttl", value)
|
242
243
|
|
243
244
|
|
@@ -246,12 +247,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
246
247
|
def __init__(__self__,
|
247
248
|
resource_name: str,
|
248
249
|
opts: Optional[pulumi.ResourceOptions] = None,
|
249
|
-
backend: Optional[pulumi.Input[str]] = None,
|
250
|
-
impersonated_account: Optional[pulumi.Input[str]] = None,
|
251
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
252
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
253
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
254
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
250
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
251
|
+
impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
|
252
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
253
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
254
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
255
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
255
256
|
__props__=None):
|
256
257
|
"""
|
257
258
|
Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
|
@@ -288,12 +289,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
288
289
|
|
289
290
|
:param str resource_name: The name of the resource.
|
290
291
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
291
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
292
|
-
:param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
|
293
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
294
|
-
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
295
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
296
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
292
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
293
|
+
:param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
|
294
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
295
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
296
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
297
|
+
:param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
297
298
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
298
299
|
"""
|
299
300
|
...
|
@@ -350,12 +351,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
350
351
|
def _internal_init(__self__,
|
351
352
|
resource_name: str,
|
352
353
|
opts: Optional[pulumi.ResourceOptions] = None,
|
353
|
-
backend: Optional[pulumi.Input[str]] = None,
|
354
|
-
impersonated_account: Optional[pulumi.Input[str]] = None,
|
355
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
356
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
357
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
358
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
354
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
355
|
+
impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
|
356
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
357
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
358
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
359
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
359
360
|
__props__=None):
|
360
361
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
361
362
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -388,13 +389,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
388
389
|
def get(resource_name: str,
|
389
390
|
id: pulumi.Input[str],
|
390
391
|
opts: Optional[pulumi.ResourceOptions] = None,
|
391
|
-
backend: Optional[pulumi.Input[str]] = None,
|
392
|
-
impersonated_account: Optional[pulumi.Input[str]] = None,
|
393
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
394
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
395
|
-
service_account_project: Optional[pulumi.Input[str]] = None,
|
396
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
397
|
-
ttl: Optional[pulumi.Input[str]] = None) -> 'SecretImpersonatedAccount':
|
392
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
393
|
+
impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
|
394
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
395
|
+
service_account_email: Optional[pulumi.Input[builtins.str]] = None,
|
396
|
+
service_account_project: Optional[pulumi.Input[builtins.str]] = None,
|
397
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
398
|
+
ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretImpersonatedAccount':
|
398
399
|
"""
|
399
400
|
Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
|
400
401
|
properties used to qualify the lookup.
|
@@ -402,13 +403,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
402
403
|
:param str resource_name: The unique name of the resulting resource.
|
403
404
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
404
405
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
405
|
-
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
406
|
-
:param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
|
407
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
408
|
-
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
409
|
-
:param pulumi.Input[str] service_account_project: Project the service account belongs to.
|
410
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
411
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
406
|
+
:param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
407
|
+
:param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
|
408
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
409
|
+
:param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
410
|
+
:param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
|
411
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
412
|
+
:param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
412
413
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
413
414
|
"""
|
414
415
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -426,7 +427,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
426
427
|
|
427
428
|
@property
|
428
429
|
@pulumi.getter
|
429
|
-
def backend(self) -> pulumi.Output[str]:
|
430
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
430
431
|
"""
|
431
432
|
Path where the GCP Secrets Engine is mounted
|
432
433
|
"""
|
@@ -434,7 +435,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
434
435
|
|
435
436
|
@property
|
436
437
|
@pulumi.getter(name="impersonatedAccount")
|
437
|
-
def impersonated_account(self) -> pulumi.Output[str]:
|
438
|
+
def impersonated_account(self) -> pulumi.Output[builtins.str]:
|
438
439
|
"""
|
439
440
|
Name of the Impersonated Account to create
|
440
441
|
"""
|
@@ -442,7 +443,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
442
443
|
|
443
444
|
@property
|
444
445
|
@pulumi.getter
|
445
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
446
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
446
447
|
"""
|
447
448
|
Target namespace. (requires Enterprise)
|
448
449
|
"""
|
@@ -450,7 +451,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter(name="serviceAccountEmail")
|
453
|
-
def service_account_email(self) -> pulumi.Output[str]:
|
454
|
+
def service_account_email(self) -> pulumi.Output[builtins.str]:
|
454
455
|
"""
|
455
456
|
Email of the GCP service account to impersonate.
|
456
457
|
"""
|
@@ -458,7 +459,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
458
459
|
|
459
460
|
@property
|
460
461
|
@pulumi.getter(name="serviceAccountProject")
|
461
|
-
def service_account_project(self) -> pulumi.Output[str]:
|
462
|
+
def service_account_project(self) -> pulumi.Output[builtins.str]:
|
462
463
|
"""
|
463
464
|
Project the service account belongs to.
|
464
465
|
"""
|
@@ -466,7 +467,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
466
467
|
|
467
468
|
@property
|
468
469
|
@pulumi.getter(name="tokenScopes")
|
469
|
-
def token_scopes(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
470
|
+
def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
470
471
|
"""
|
471
472
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
472
473
|
"""
|
@@ -474,7 +475,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
474
475
|
|
475
476
|
@property
|
476
477
|
@pulumi.getter
|
477
|
-
def ttl(self) -> pulumi.Output[str]:
|
478
|
+
def ttl(self) -> pulumi.Output[builtins.str]:
|
478
479
|
"""
|
479
480
|
Specifies the default TTL for service principals generated using this role.
|
480
481
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|