pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,23 +20,23 @@ __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendUserArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
username: pulumi.Input[str],
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
username: pulumi.Input[builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a AuthBackendUser resource.
|
29
|
-
:param pulumi.Input[str] username: The LDAP username
|
30
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
30
|
+
:param pulumi.Input[builtins.str] username: The LDAP username
|
31
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
31
32
|
|
32
33
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
34
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
|
35
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
35
36
|
The value should not contain leading or trailing forward slashes.
|
36
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
38
|
*Available only for Vault Enterprise*.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
|
39
40
|
"""
|
40
41
|
pulumi.set(__self__, "username", username)
|
41
42
|
if backend is not None:
|
@@ -49,19 +50,19 @@ class AuthBackendUserArgs:
|
|
49
50
|
|
50
51
|
@property
|
51
52
|
@pulumi.getter
|
52
|
-
def username(self) -> pulumi.Input[str]:
|
53
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
53
54
|
"""
|
54
55
|
The LDAP username
|
55
56
|
"""
|
56
57
|
return pulumi.get(self, "username")
|
57
58
|
|
58
59
|
@username.setter
|
59
|
-
def username(self, value: pulumi.Input[str]):
|
60
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
60
61
|
pulumi.set(self, "username", value)
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
65
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
65
66
|
"""
|
66
67
|
Path to the authentication backend
|
67
68
|
|
@@ -70,24 +71,24 @@ class AuthBackendUserArgs:
|
|
70
71
|
return pulumi.get(self, "backend")
|
71
72
|
|
72
73
|
@backend.setter
|
73
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
74
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
74
75
|
pulumi.set(self, "backend", value)
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter
|
78
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
79
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
79
80
|
"""
|
80
81
|
Override LDAP groups which should be granted to user
|
81
82
|
"""
|
82
83
|
return pulumi.get(self, "groups")
|
83
84
|
|
84
85
|
@groups.setter
|
85
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
86
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
86
87
|
pulumi.set(self, "groups", value)
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter
|
90
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
91
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
91
92
|
"""
|
92
93
|
The namespace to provision the resource in.
|
93
94
|
The value should not contain leading or trailing forward slashes.
|
@@ -97,42 +98,42 @@ class AuthBackendUserArgs:
|
|
97
98
|
return pulumi.get(self, "namespace")
|
98
99
|
|
99
100
|
@namespace.setter
|
100
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
101
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
101
102
|
pulumi.set(self, "namespace", value)
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter
|
105
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
106
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
106
107
|
"""
|
107
108
|
Policies which should be granted to user
|
108
109
|
"""
|
109
110
|
return pulumi.get(self, "policies")
|
110
111
|
|
111
112
|
@policies.setter
|
112
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
113
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
113
114
|
pulumi.set(self, "policies", value)
|
114
115
|
|
115
116
|
|
116
117
|
@pulumi.input_type
|
117
118
|
class _AuthBackendUserState:
|
118
119
|
def __init__(__self__, *,
|
119
|
-
backend: Optional[pulumi.Input[str]] = None,
|
120
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
121
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
122
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
123
|
-
username: Optional[pulumi.Input[str]] = None):
|
120
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
121
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
122
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
123
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
124
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
124
125
|
"""
|
125
126
|
Input properties used for looking up and filtering AuthBackendUser resources.
|
126
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
127
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
127
128
|
|
128
129
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
129
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
130
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
130
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
|
131
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
131
132
|
The value should not contain leading or trailing forward slashes.
|
132
133
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
133
134
|
*Available only for Vault Enterprise*.
|
134
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
135
|
-
:param pulumi.Input[str] username: The LDAP username
|
135
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
|
136
|
+
:param pulumi.Input[builtins.str] username: The LDAP username
|
136
137
|
"""
|
137
138
|
if backend is not None:
|
138
139
|
pulumi.set(__self__, "backend", backend)
|
@@ -147,7 +148,7 @@ class _AuthBackendUserState:
|
|
147
148
|
|
148
149
|
@property
|
149
150
|
@pulumi.getter
|
150
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
151
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
151
152
|
"""
|
152
153
|
Path to the authentication backend
|
153
154
|
|
@@ -156,24 +157,24 @@ class _AuthBackendUserState:
|
|
156
157
|
return pulumi.get(self, "backend")
|
157
158
|
|
158
159
|
@backend.setter
|
159
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
160
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
160
161
|
pulumi.set(self, "backend", value)
|
161
162
|
|
162
163
|
@property
|
163
164
|
@pulumi.getter
|
164
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
165
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
165
166
|
"""
|
166
167
|
Override LDAP groups which should be granted to user
|
167
168
|
"""
|
168
169
|
return pulumi.get(self, "groups")
|
169
170
|
|
170
171
|
@groups.setter
|
171
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
172
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
172
173
|
pulumi.set(self, "groups", value)
|
173
174
|
|
174
175
|
@property
|
175
176
|
@pulumi.getter
|
176
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
177
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
177
178
|
"""
|
178
179
|
The namespace to provision the resource in.
|
179
180
|
The value should not contain leading or trailing forward slashes.
|
@@ -183,31 +184,31 @@ class _AuthBackendUserState:
|
|
183
184
|
return pulumi.get(self, "namespace")
|
184
185
|
|
185
186
|
@namespace.setter
|
186
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
187
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
187
188
|
pulumi.set(self, "namespace", value)
|
188
189
|
|
189
190
|
@property
|
190
191
|
@pulumi.getter
|
191
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
192
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
192
193
|
"""
|
193
194
|
Policies which should be granted to user
|
194
195
|
"""
|
195
196
|
return pulumi.get(self, "policies")
|
196
197
|
|
197
198
|
@policies.setter
|
198
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
199
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
199
200
|
pulumi.set(self, "policies", value)
|
200
201
|
|
201
202
|
@property
|
202
203
|
@pulumi.getter
|
203
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
204
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
204
205
|
"""
|
205
206
|
The LDAP username
|
206
207
|
"""
|
207
208
|
return pulumi.get(self, "username")
|
208
209
|
|
209
210
|
@username.setter
|
210
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
211
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
211
212
|
pulumi.set(self, "username", value)
|
212
213
|
|
213
214
|
|
@@ -216,11 +217,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
216
217
|
def __init__(__self__,
|
217
218
|
resource_name: str,
|
218
219
|
opts: Optional[pulumi.ResourceOptions] = None,
|
219
|
-
backend: Optional[pulumi.Input[str]] = None,
|
220
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
221
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
222
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
223
|
-
username: Optional[pulumi.Input[str]] = None,
|
220
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
221
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
222
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
223
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
224
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
224
225
|
__props__=None):
|
225
226
|
"""
|
226
227
|
Provides a resource to create a user in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -259,16 +260,16 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
259
260
|
|
260
261
|
:param str resource_name: The name of the resource.
|
261
262
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
262
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
263
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
263
264
|
|
264
265
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
265
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
266
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
266
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
|
267
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
267
268
|
The value should not contain leading or trailing forward slashes.
|
268
269
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
269
270
|
*Available only for Vault Enterprise*.
|
270
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
271
|
-
:param pulumi.Input[str] username: The LDAP username
|
271
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
|
272
|
+
:param pulumi.Input[builtins.str] username: The LDAP username
|
272
273
|
"""
|
273
274
|
...
|
274
275
|
@overload
|
@@ -326,11 +327,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
326
327
|
def _internal_init(__self__,
|
327
328
|
resource_name: str,
|
328
329
|
opts: Optional[pulumi.ResourceOptions] = None,
|
329
|
-
backend: Optional[pulumi.Input[str]] = None,
|
330
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
331
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
332
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
333
|
-
username: Optional[pulumi.Input[str]] = None,
|
330
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
331
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
332
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
333
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
334
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
334
335
|
__props__=None):
|
335
336
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
336
337
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -357,11 +358,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
357
358
|
def get(resource_name: str,
|
358
359
|
id: pulumi.Input[str],
|
359
360
|
opts: Optional[pulumi.ResourceOptions] = None,
|
360
|
-
backend: Optional[pulumi.Input[str]] = None,
|
361
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
362
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
363
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
364
|
-
username: Optional[pulumi.Input[str]] = None) -> 'AuthBackendUser':
|
361
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
362
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
363
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
364
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
365
|
+
username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
|
365
366
|
"""
|
366
367
|
Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
|
367
368
|
properties used to qualify the lookup.
|
@@ -369,16 +370,16 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
369
370
|
:param str resource_name: The unique name of the resulting resource.
|
370
371
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
371
372
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
372
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
373
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
373
374
|
|
374
375
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
375
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
376
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
376
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
|
377
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
377
378
|
The value should not contain leading or trailing forward slashes.
|
378
379
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
379
380
|
*Available only for Vault Enterprise*.
|
380
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
381
|
-
:param pulumi.Input[str] username: The LDAP username
|
381
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
|
382
|
+
:param pulumi.Input[builtins.str] username: The LDAP username
|
382
383
|
"""
|
383
384
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
384
385
|
|
@@ -393,7 +394,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
393
394
|
|
394
395
|
@property
|
395
396
|
@pulumi.getter
|
396
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
397
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
397
398
|
"""
|
398
399
|
Path to the authentication backend
|
399
400
|
|
@@ -403,7 +404,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
403
404
|
|
404
405
|
@property
|
405
406
|
@pulumi.getter
|
406
|
-
def groups(self) -> pulumi.Output[Sequence[str]]:
|
407
|
+
def groups(self) -> pulumi.Output[Sequence[builtins.str]]:
|
407
408
|
"""
|
408
409
|
Override LDAP groups which should be granted to user
|
409
410
|
"""
|
@@ -411,7 +412,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
411
412
|
|
412
413
|
@property
|
413
414
|
@pulumi.getter
|
414
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
415
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
415
416
|
"""
|
416
417
|
The namespace to provision the resource in.
|
417
418
|
The value should not contain leading or trailing forward slashes.
|
@@ -422,7 +423,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
422
423
|
|
423
424
|
@property
|
424
425
|
@pulumi.getter
|
425
|
-
def policies(self) -> pulumi.Output[Sequence[str]]:
|
426
|
+
def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
|
426
427
|
"""
|
427
428
|
Policies which should be granted to user
|
428
429
|
"""
|
@@ -430,7 +431,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
430
431
|
|
431
432
|
@property
|
432
433
|
@pulumi.getter
|
433
|
-
def username(self) -> pulumi.Output[str]:
|
434
|
+
def username(self) -> pulumi.Output[builtins.str]:
|
434
435
|
"""
|
435
436
|
The LDAP username
|
436
437
|
"""
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -60,12 +61,12 @@ class GetDynamicCredentialsResult:
|
|
60
61
|
|
61
62
|
@property
|
62
63
|
@pulumi.getter(name="distinguishedNames")
|
63
|
-
def distinguished_names(self) -> Sequence[str]:
|
64
|
+
def distinguished_names(self) -> Sequence[builtins.str]:
|
64
65
|
return pulumi.get(self, "distinguished_names")
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter
|
68
|
-
def id(self) -> str:
|
69
|
+
def id(self) -> builtins.str:
|
69
70
|
"""
|
70
71
|
The provider-assigned unique ID for this managed resource.
|
71
72
|
"""
|
@@ -73,42 +74,42 @@ class GetDynamicCredentialsResult:
|
|
73
74
|
|
74
75
|
@property
|
75
76
|
@pulumi.getter(name="leaseDuration")
|
76
|
-
def lease_duration(self) -> int:
|
77
|
+
def lease_duration(self) -> builtins.int:
|
77
78
|
return pulumi.get(self, "lease_duration")
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter(name="leaseId")
|
81
|
-
def lease_id(self) -> str:
|
82
|
+
def lease_id(self) -> builtins.str:
|
82
83
|
return pulumi.get(self, "lease_id")
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter(name="leaseRenewable")
|
86
|
-
def lease_renewable(self) -> bool:
|
87
|
+
def lease_renewable(self) -> builtins.bool:
|
87
88
|
return pulumi.get(self, "lease_renewable")
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def mount(self) -> str:
|
92
|
+
def mount(self) -> builtins.str:
|
92
93
|
return pulumi.get(self, "mount")
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[str]:
|
97
|
+
def namespace(self) -> Optional[builtins.str]:
|
97
98
|
return pulumi.get(self, "namespace")
|
98
99
|
|
99
100
|
@property
|
100
101
|
@pulumi.getter
|
101
|
-
def password(self) -> str:
|
102
|
+
def password(self) -> builtins.str:
|
102
103
|
return pulumi.get(self, "password")
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="roleName")
|
106
|
-
def role_name(self) -> str:
|
107
|
+
def role_name(self) -> builtins.str:
|
107
108
|
return pulumi.get(self, "role_name")
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter
|
111
|
-
def username(self) -> str:
|
112
|
+
def username(self) -> builtins.str:
|
112
113
|
return pulumi.get(self, "username")
|
113
114
|
|
114
115
|
|
@@ -130,9 +131,9 @@ class AwaitableGetDynamicCredentialsResult(GetDynamicCredentialsResult):
|
|
130
131
|
username=self.username)
|
131
132
|
|
132
133
|
|
133
|
-
def get_dynamic_credentials(mount: Optional[str] = None,
|
134
|
-
namespace: Optional[str] = None,
|
135
|
-
role_name: Optional[str] = None,
|
134
|
+
def get_dynamic_credentials(mount: Optional[builtins.str] = None,
|
135
|
+
namespace: Optional[builtins.str] = None,
|
136
|
+
role_name: Optional[builtins.str] = None,
|
136
137
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDynamicCredentialsResult:
|
137
138
|
"""
|
138
139
|
Use this data source to access information about an existing resource.
|
@@ -155,9 +156,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
155
156
|
password=pulumi.get(__ret__, 'password'),
|
156
157
|
role_name=pulumi.get(__ret__, 'role_name'),
|
157
158
|
username=pulumi.get(__ret__, 'username'))
|
158
|
-
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
159
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
159
|
+
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
|
160
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
161
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
161
162
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
162
163
|
"""
|
163
164
|
Use this data source to access information about an existing resource.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -63,12 +64,12 @@ class GetStaticCredentialsResult:
|
|
63
64
|
|
64
65
|
@property
|
65
66
|
@pulumi.getter
|
66
|
-
def dn(self) -> str:
|
67
|
+
def dn(self) -> builtins.str:
|
67
68
|
return pulumi.get(self, "dn")
|
68
69
|
|
69
70
|
@property
|
70
71
|
@pulumi.getter
|
71
|
-
def id(self) -> str:
|
72
|
+
def id(self) -> builtins.str:
|
72
73
|
"""
|
73
74
|
The provider-assigned unique ID for this managed resource.
|
74
75
|
"""
|
@@ -76,47 +77,47 @@ class GetStaticCredentialsResult:
|
|
76
77
|
|
77
78
|
@property
|
78
79
|
@pulumi.getter(name="lastPassword")
|
79
|
-
def last_password(self) -> str:
|
80
|
+
def last_password(self) -> builtins.str:
|
80
81
|
return pulumi.get(self, "last_password")
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter(name="lastVaultRotation")
|
84
|
-
def last_vault_rotation(self) -> str:
|
85
|
+
def last_vault_rotation(self) -> builtins.str:
|
85
86
|
return pulumi.get(self, "last_vault_rotation")
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def mount(self) -> str:
|
90
|
+
def mount(self) -> builtins.str:
|
90
91
|
return pulumi.get(self, "mount")
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def namespace(self) -> Optional[str]:
|
95
|
+
def namespace(self) -> Optional[builtins.str]:
|
95
96
|
return pulumi.get(self, "namespace")
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter
|
99
|
-
def password(self) -> str:
|
100
|
+
def password(self) -> builtins.str:
|
100
101
|
return pulumi.get(self, "password")
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter(name="roleName")
|
104
|
-
def role_name(self) -> str:
|
105
|
+
def role_name(self) -> builtins.str:
|
105
106
|
return pulumi.get(self, "role_name")
|
106
107
|
|
107
108
|
@property
|
108
109
|
@pulumi.getter(name="rotationPeriod")
|
109
|
-
def rotation_period(self) -> int:
|
110
|
+
def rotation_period(self) -> builtins.int:
|
110
111
|
return pulumi.get(self, "rotation_period")
|
111
112
|
|
112
113
|
@property
|
113
114
|
@pulumi.getter
|
114
|
-
def ttl(self) -> int:
|
115
|
+
def ttl(self) -> builtins.int:
|
115
116
|
return pulumi.get(self, "ttl")
|
116
117
|
|
117
118
|
@property
|
118
119
|
@pulumi.getter
|
119
|
-
def username(self) -> str:
|
120
|
+
def username(self) -> builtins.str:
|
120
121
|
return pulumi.get(self, "username")
|
121
122
|
|
122
123
|
|
@@ -139,9 +140,9 @@ class AwaitableGetStaticCredentialsResult(GetStaticCredentialsResult):
|
|
139
140
|
username=self.username)
|
140
141
|
|
141
142
|
|
142
|
-
def get_static_credentials(mount: Optional[str] = None,
|
143
|
-
namespace: Optional[str] = None,
|
144
|
-
role_name: Optional[str] = None,
|
143
|
+
def get_static_credentials(mount: Optional[builtins.str] = None,
|
144
|
+
namespace: Optional[builtins.str] = None,
|
145
|
+
role_name: Optional[builtins.str] = None,
|
145
146
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticCredentialsResult:
|
146
147
|
"""
|
147
148
|
Use this data source to access information about an existing resource.
|
@@ -165,9 +166,9 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
165
166
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
166
167
|
ttl=pulumi.get(__ret__, 'ttl'),
|
167
168
|
username=pulumi.get(__ret__, 'username'))
|
168
|
-
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
169
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
169
|
+
def get_static_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
|
170
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
171
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
171
172
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
172
173
|
"""
|
173
174
|
Use this data source to access information about an existing resource.
|