pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/ad/secret_role.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,24 +20,24 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
role: pulumi.Input[str],
|
24
|
-
service_account_name: pulumi.Input[str],
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
role: pulumi.Input[builtins.str],
|
25
|
+
service_account_name: pulumi.Input[builtins.str],
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a SecretRole resource.
|
29
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
30
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
30
31
|
with no leading or trailing `/`s.
|
31
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
32
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
32
33
|
Must be unique within the backend.
|
33
|
-
:param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
|
34
|
+
:param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
|
34
35
|
account mapped to this role.
|
35
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
36
37
|
The value should not contain leading or trailing forward slashes.
|
37
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
39
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
40
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
40
41
|
ttl if not provided.
|
41
42
|
"""
|
42
43
|
pulumi.set(__self__, "backend", backend)
|
@@ -49,7 +50,7 @@ class SecretRoleArgs:
|
|
49
50
|
|
50
51
|
@property
|
51
52
|
@pulumi.getter
|
52
|
-
def backend(self) -> pulumi.Input[str]:
|
53
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
53
54
|
"""
|
54
55
|
The path the AD secret backend is mounted at,
|
55
56
|
with no leading or trailing `/`s.
|
@@ -57,12 +58,12 @@ class SecretRoleArgs:
|
|
57
58
|
return pulumi.get(self, "backend")
|
58
59
|
|
59
60
|
@backend.setter
|
60
|
-
def backend(self, value: pulumi.Input[str]):
|
61
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
61
62
|
pulumi.set(self, "backend", value)
|
62
63
|
|
63
64
|
@property
|
64
65
|
@pulumi.getter
|
65
|
-
def role(self) -> pulumi.Input[str]:
|
66
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
66
67
|
"""
|
67
68
|
The name to identify this role within the backend.
|
68
69
|
Must be unique within the backend.
|
@@ -70,12 +71,12 @@ class SecretRoleArgs:
|
|
70
71
|
return pulumi.get(self, "role")
|
71
72
|
|
72
73
|
@role.setter
|
73
|
-
def role(self, value: pulumi.Input[str]):
|
74
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
74
75
|
pulumi.set(self, "role", value)
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter(name="serviceAccountName")
|
78
|
-
def service_account_name(self) -> pulumi.Input[str]:
|
79
|
+
def service_account_name(self) -> pulumi.Input[builtins.str]:
|
79
80
|
"""
|
80
81
|
Specifies the name of the Active Directory service
|
81
82
|
account mapped to this role.
|
@@ -83,12 +84,12 @@ class SecretRoleArgs:
|
|
83
84
|
return pulumi.get(self, "service_account_name")
|
84
85
|
|
85
86
|
@service_account_name.setter
|
86
|
-
def service_account_name(self, value: pulumi.Input[str]):
|
87
|
+
def service_account_name(self, value: pulumi.Input[builtins.str]):
|
87
88
|
pulumi.set(self, "service_account_name", value)
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
92
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
92
93
|
"""
|
93
94
|
The namespace to provision the resource in.
|
94
95
|
The value should not contain leading or trailing forward slashes.
|
@@ -98,12 +99,12 @@ class SecretRoleArgs:
|
|
98
99
|
return pulumi.get(self, "namespace")
|
99
100
|
|
100
101
|
@namespace.setter
|
101
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
102
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
102
103
|
pulumi.set(self, "namespace", value)
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter
|
106
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
107
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
107
108
|
"""
|
108
109
|
The password time-to-live in seconds. Defaults to the configuration
|
109
110
|
ttl if not provided.
|
@@ -111,35 +112,35 @@ class SecretRoleArgs:
|
|
111
112
|
return pulumi.get(self, "ttl")
|
112
113
|
|
113
114
|
@ttl.setter
|
114
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
115
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
115
116
|
pulumi.set(self, "ttl", value)
|
116
117
|
|
117
118
|
|
118
119
|
@pulumi.input_type
|
119
120
|
class _SecretRoleState:
|
120
121
|
def __init__(__self__, *,
|
121
|
-
backend: Optional[pulumi.Input[str]] = None,
|
122
|
-
last_vault_rotation: Optional[pulumi.Input[str]] = None,
|
123
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
124
|
-
password_last_set: Optional[pulumi.Input[str]] = None,
|
125
|
-
role: Optional[pulumi.Input[str]] = None,
|
126
|
-
service_account_name: Optional[pulumi.Input[str]] = None,
|
127
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
122
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
123
|
+
last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
|
124
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
125
|
+
password_last_set: Optional[pulumi.Input[builtins.str]] = None,
|
126
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
127
|
+
service_account_name: Optional[pulumi.Input[builtins.str]] = None,
|
128
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
128
129
|
"""
|
129
130
|
Input properties used for looking up and filtering SecretRole resources.
|
130
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
131
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
131
132
|
with no leading or trailing `/`s.
|
132
|
-
:param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
133
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
133
|
+
:param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
134
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
134
135
|
The value should not contain leading or trailing forward slashes.
|
135
136
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
136
137
|
*Available only for Vault Enterprise*.
|
137
|
-
:param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
|
138
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
138
|
+
:param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
|
139
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
139
140
|
Must be unique within the backend.
|
140
|
-
:param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
|
141
|
+
:param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
|
141
142
|
account mapped to this role.
|
142
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
143
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
143
144
|
ttl if not provided.
|
144
145
|
"""
|
145
146
|
if backend is not None:
|
@@ -159,7 +160,7 @@ class _SecretRoleState:
|
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter
|
162
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
163
164
|
"""
|
164
165
|
The path the AD secret backend is mounted at,
|
165
166
|
with no leading or trailing `/`s.
|
@@ -167,24 +168,24 @@ class _SecretRoleState:
|
|
167
168
|
return pulumi.get(self, "backend")
|
168
169
|
|
169
170
|
@backend.setter
|
170
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
171
172
|
pulumi.set(self, "backend", value)
|
172
173
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter(name="lastVaultRotation")
|
175
|
-
def last_vault_rotation(self) -> Optional[pulumi.Input[str]]:
|
176
|
+
def last_vault_rotation(self) -> Optional[pulumi.Input[builtins.str]]:
|
176
177
|
"""
|
177
178
|
Timestamp of the last password rotation by Vault.
|
178
179
|
"""
|
179
180
|
return pulumi.get(self, "last_vault_rotation")
|
180
181
|
|
181
182
|
@last_vault_rotation.setter
|
182
|
-
def last_vault_rotation(self, value: Optional[pulumi.Input[str]]):
|
183
|
+
def last_vault_rotation(self, value: Optional[pulumi.Input[builtins.str]]):
|
183
184
|
pulumi.set(self, "last_vault_rotation", value)
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter
|
187
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
188
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
188
189
|
"""
|
189
190
|
The namespace to provision the resource in.
|
190
191
|
The value should not contain leading or trailing forward slashes.
|
@@ -194,24 +195,24 @@ class _SecretRoleState:
|
|
194
195
|
return pulumi.get(self, "namespace")
|
195
196
|
|
196
197
|
@namespace.setter
|
197
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
198
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
198
199
|
pulumi.set(self, "namespace", value)
|
199
200
|
|
200
201
|
@property
|
201
202
|
@pulumi.getter(name="passwordLastSet")
|
202
|
-
def password_last_set(self) -> Optional[pulumi.Input[str]]:
|
203
|
+
def password_last_set(self) -> Optional[pulumi.Input[builtins.str]]:
|
203
204
|
"""
|
204
205
|
Timestamp of the last password set by Vault.
|
205
206
|
"""
|
206
207
|
return pulumi.get(self, "password_last_set")
|
207
208
|
|
208
209
|
@password_last_set.setter
|
209
|
-
def password_last_set(self, value: Optional[pulumi.Input[str]]):
|
210
|
+
def password_last_set(self, value: Optional[pulumi.Input[builtins.str]]):
|
210
211
|
pulumi.set(self, "password_last_set", value)
|
211
212
|
|
212
213
|
@property
|
213
214
|
@pulumi.getter
|
214
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
215
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
215
216
|
"""
|
216
217
|
The name to identify this role within the backend.
|
217
218
|
Must be unique within the backend.
|
@@ -219,12 +220,12 @@ class _SecretRoleState:
|
|
219
220
|
return pulumi.get(self, "role")
|
220
221
|
|
221
222
|
@role.setter
|
222
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
223
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
223
224
|
pulumi.set(self, "role", value)
|
224
225
|
|
225
226
|
@property
|
226
227
|
@pulumi.getter(name="serviceAccountName")
|
227
|
-
def service_account_name(self) -> Optional[pulumi.Input[str]]:
|
228
|
+
def service_account_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
228
229
|
"""
|
229
230
|
Specifies the name of the Active Directory service
|
230
231
|
account mapped to this role.
|
@@ -232,12 +233,12 @@ class _SecretRoleState:
|
|
232
233
|
return pulumi.get(self, "service_account_name")
|
233
234
|
|
234
235
|
@service_account_name.setter
|
235
|
-
def service_account_name(self, value: Optional[pulumi.Input[str]]):
|
236
|
+
def service_account_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
236
237
|
pulumi.set(self, "service_account_name", value)
|
237
238
|
|
238
239
|
@property
|
239
240
|
@pulumi.getter
|
240
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
241
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
241
242
|
"""
|
242
243
|
The password time-to-live in seconds. Defaults to the configuration
|
243
244
|
ttl if not provided.
|
@@ -245,7 +246,7 @@ class _SecretRoleState:
|
|
245
246
|
return pulumi.get(self, "ttl")
|
246
247
|
|
247
248
|
@ttl.setter
|
248
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
249
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
249
250
|
pulumi.set(self, "ttl", value)
|
250
251
|
|
251
252
|
|
@@ -254,11 +255,11 @@ class SecretRole(pulumi.CustomResource):
|
|
254
255
|
def __init__(__self__,
|
255
256
|
resource_name: str,
|
256
257
|
opts: Optional[pulumi.ResourceOptions] = None,
|
257
|
-
backend: Optional[pulumi.Input[str]] = None,
|
258
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
259
|
-
role: Optional[pulumi.Input[str]] = None,
|
260
|
-
service_account_name: Optional[pulumi.Input[str]] = None,
|
261
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
258
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
259
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
260
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
261
|
+
service_account_name: Optional[pulumi.Input[builtins.str]] = None,
|
262
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
262
263
|
__props__=None):
|
263
264
|
"""
|
264
265
|
## Example Usage
|
@@ -291,17 +292,17 @@ class SecretRole(pulumi.CustomResource):
|
|
291
292
|
|
292
293
|
:param str resource_name: The name of the resource.
|
293
294
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
294
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
295
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
295
296
|
with no leading or trailing `/`s.
|
296
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
297
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
297
298
|
The value should not contain leading or trailing forward slashes.
|
298
299
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
299
300
|
*Available only for Vault Enterprise*.
|
300
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
301
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
301
302
|
Must be unique within the backend.
|
302
|
-
:param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
|
303
|
+
:param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
|
303
304
|
account mapped to this role.
|
304
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
305
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
305
306
|
ttl if not provided.
|
306
307
|
"""
|
307
308
|
...
|
@@ -354,11 +355,11 @@ class SecretRole(pulumi.CustomResource):
|
|
354
355
|
def _internal_init(__self__,
|
355
356
|
resource_name: str,
|
356
357
|
opts: Optional[pulumi.ResourceOptions] = None,
|
357
|
-
backend: Optional[pulumi.Input[str]] = None,
|
358
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
359
|
-
role: Optional[pulumi.Input[str]] = None,
|
360
|
-
service_account_name: Optional[pulumi.Input[str]] = None,
|
361
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
358
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
359
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
360
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
361
|
+
service_account_name: Optional[pulumi.Input[builtins.str]] = None,
|
362
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
362
363
|
__props__=None):
|
363
364
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
364
365
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -391,13 +392,13 @@ class SecretRole(pulumi.CustomResource):
|
|
391
392
|
def get(resource_name: str,
|
392
393
|
id: pulumi.Input[str],
|
393
394
|
opts: Optional[pulumi.ResourceOptions] = None,
|
394
|
-
backend: Optional[pulumi.Input[str]] = None,
|
395
|
-
last_vault_rotation: Optional[pulumi.Input[str]] = None,
|
396
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
397
|
-
password_last_set: Optional[pulumi.Input[str]] = None,
|
398
|
-
role: Optional[pulumi.Input[str]] = None,
|
399
|
-
service_account_name: Optional[pulumi.Input[str]] = None,
|
400
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretRole':
|
395
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
396
|
+
last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
|
397
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
398
|
+
password_last_set: Optional[pulumi.Input[builtins.str]] = None,
|
399
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
400
|
+
service_account_name: Optional[pulumi.Input[builtins.str]] = None,
|
401
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretRole':
|
401
402
|
"""
|
402
403
|
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
403
404
|
properties used to qualify the lookup.
|
@@ -405,19 +406,19 @@ class SecretRole(pulumi.CustomResource):
|
|
405
406
|
:param str resource_name: The unique name of the resulting resource.
|
406
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
407
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
408
|
-
:param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
|
409
|
+
:param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
|
409
410
|
with no leading or trailing `/`s.
|
410
|
-
:param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
411
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
411
|
+
:param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
412
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
412
413
|
The value should not contain leading or trailing forward slashes.
|
413
414
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
414
415
|
*Available only for Vault Enterprise*.
|
415
|
-
:param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
|
416
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
416
|
+
:param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
|
417
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
417
418
|
Must be unique within the backend.
|
418
|
-
:param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
|
419
|
+
:param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
|
419
420
|
account mapped to this role.
|
420
|
-
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
421
|
+
:param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
421
422
|
ttl if not provided.
|
422
423
|
"""
|
423
424
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -435,7 +436,7 @@ class SecretRole(pulumi.CustomResource):
|
|
435
436
|
|
436
437
|
@property
|
437
438
|
@pulumi.getter
|
438
|
-
def backend(self) -> pulumi.Output[str]:
|
439
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
439
440
|
"""
|
440
441
|
The path the AD secret backend is mounted at,
|
441
442
|
with no leading or trailing `/`s.
|
@@ -444,7 +445,7 @@ class SecretRole(pulumi.CustomResource):
|
|
444
445
|
|
445
446
|
@property
|
446
447
|
@pulumi.getter(name="lastVaultRotation")
|
447
|
-
def last_vault_rotation(self) -> pulumi.Output[str]:
|
448
|
+
def last_vault_rotation(self) -> pulumi.Output[builtins.str]:
|
448
449
|
"""
|
449
450
|
Timestamp of the last password rotation by Vault.
|
450
451
|
"""
|
@@ -452,7 +453,7 @@ class SecretRole(pulumi.CustomResource):
|
|
452
453
|
|
453
454
|
@property
|
454
455
|
@pulumi.getter
|
455
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
456
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
456
457
|
"""
|
457
458
|
The namespace to provision the resource in.
|
458
459
|
The value should not contain leading or trailing forward slashes.
|
@@ -463,7 +464,7 @@ class SecretRole(pulumi.CustomResource):
|
|
463
464
|
|
464
465
|
@property
|
465
466
|
@pulumi.getter(name="passwordLastSet")
|
466
|
-
def password_last_set(self) -> pulumi.Output[str]:
|
467
|
+
def password_last_set(self) -> pulumi.Output[builtins.str]:
|
467
468
|
"""
|
468
469
|
Timestamp of the last password set by Vault.
|
469
470
|
"""
|
@@ -471,7 +472,7 @@ class SecretRole(pulumi.CustomResource):
|
|
471
472
|
|
472
473
|
@property
|
473
474
|
@pulumi.getter
|
474
|
-
def role(self) -> pulumi.Output[str]:
|
475
|
+
def role(self) -> pulumi.Output[builtins.str]:
|
475
476
|
"""
|
476
477
|
The name to identify this role within the backend.
|
477
478
|
Must be unique within the backend.
|
@@ -480,7 +481,7 @@ class SecretRole(pulumi.CustomResource):
|
|
480
481
|
|
481
482
|
@property
|
482
483
|
@pulumi.getter(name="serviceAccountName")
|
483
|
-
def service_account_name(self) -> pulumi.Output[str]:
|
484
|
+
def service_account_name(self) -> pulumi.Output[builtins.str]:
|
484
485
|
"""
|
485
486
|
Specifies the name of the Active Directory service
|
486
487
|
account mapped to this role.
|
@@ -489,7 +490,7 @@ class SecretRole(pulumi.CustomResource):
|
|
489
490
|
|
490
491
|
@property
|
491
492
|
@pulumi.getter
|
492
|
-
def ttl(self) -> pulumi.Output[Optional[int]]:
|
493
|
+
def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
493
494
|
"""
|
494
495
|
The password time-to-live in seconds. Defaults to the configuration
|
495
496
|
ttl if not provided.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|