pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,22 +19,22 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
max_ttl: Optional[pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
organization: Optional[pulumi.Input[
|
28
|
-
team_id: Optional[pulumi.Input[
|
29
|
-
ttl: Optional[pulumi.Input[
|
30
|
-
user_id: Optional[pulumi.Input[
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
user_id: Optional[pulumi.Input[_builtins.str]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretRole resource.
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
33
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
35
34
|
The value should not contain leading or trailing forward slashes.
|
36
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
36
|
*Available only for Vault Enterprise*.
|
38
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
|
39
38
|
"""
|
40
39
|
if backend is not None:
|
41
40
|
pulumi.set(__self__, "backend", backend)
|
@@ -54,39 +53,39 @@ class SecretRoleArgs:
|
|
54
53
|
if user_id is not None:
|
55
54
|
pulumi.set(__self__, "user_id", user_id)
|
56
55
|
|
57
|
-
@property
|
56
|
+
@_builtins.property
|
58
57
|
@pulumi.getter
|
59
|
-
def backend(self) -> Optional[pulumi.Input[
|
58
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
60
59
|
return pulumi.get(self, "backend")
|
61
60
|
|
62
61
|
@backend.setter
|
63
|
-
def backend(self, value: Optional[pulumi.Input[
|
62
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
64
63
|
pulumi.set(self, "backend", value)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter(name="maxTtl")
|
68
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
67
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
69
68
|
"""
|
70
69
|
Maximum TTL for leases associated with this role, in seconds.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "max_ttl")
|
73
72
|
|
74
73
|
@max_ttl.setter
|
75
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
74
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
76
75
|
pulumi.set(self, "max_ttl", value)
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter
|
80
|
-
def name(self) -> Optional[pulumi.Input[
|
79
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
81
80
|
return pulumi.get(self, "name")
|
82
81
|
|
83
82
|
@name.setter
|
84
|
-
def name(self, value: Optional[pulumi.Input[
|
83
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
85
84
|
pulumi.set(self, "name", value)
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def namespace(self) -> Optional[pulumi.Input[
|
88
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
90
89
|
"""
|
91
90
|
The namespace to provision the resource in.
|
92
91
|
The value should not contain leading or trailing forward slashes.
|
@@ -96,68 +95,68 @@ class SecretRoleArgs:
|
|
96
95
|
return pulumi.get(self, "namespace")
|
97
96
|
|
98
97
|
@namespace.setter
|
99
|
-
def namespace(self, value: Optional[pulumi.Input[
|
98
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
100
99
|
pulumi.set(self, "namespace", value)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter
|
104
|
-
def organization(self) -> Optional[pulumi.Input[
|
103
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
105
104
|
return pulumi.get(self, "organization")
|
106
105
|
|
107
106
|
@organization.setter
|
108
|
-
def organization(self, value: Optional[pulumi.Input[
|
107
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
109
108
|
pulumi.set(self, "organization", value)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter(name="teamId")
|
113
|
-
def team_id(self) -> Optional[pulumi.Input[
|
112
|
+
def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
114
113
|
return pulumi.get(self, "team_id")
|
115
114
|
|
116
115
|
@team_id.setter
|
117
|
-
def team_id(self, value: Optional[pulumi.Input[
|
116
|
+
def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
118
117
|
pulumi.set(self, "team_id", value)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter
|
122
|
-
def ttl(self) -> Optional[pulumi.Input[
|
121
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
123
122
|
"""
|
124
123
|
Specifies the TTL for this role, in seconds.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "ttl")
|
127
126
|
|
128
127
|
@ttl.setter
|
129
|
-
def ttl(self, value: Optional[pulumi.Input[
|
128
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
130
129
|
pulumi.set(self, "ttl", value)
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter(name="userId")
|
134
|
-
def user_id(self) -> Optional[pulumi.Input[
|
133
|
+
def user_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
135
134
|
return pulumi.get(self, "user_id")
|
136
135
|
|
137
136
|
@user_id.setter
|
138
|
-
def user_id(self, value: Optional[pulumi.Input[
|
137
|
+
def user_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
138
|
pulumi.set(self, "user_id", value)
|
140
139
|
|
141
140
|
|
142
141
|
@pulumi.input_type
|
143
142
|
class _SecretRoleState:
|
144
143
|
def __init__(__self__, *,
|
145
|
-
backend: Optional[pulumi.Input[
|
146
|
-
max_ttl: Optional[pulumi.Input[
|
147
|
-
name: Optional[pulumi.Input[
|
148
|
-
namespace: Optional[pulumi.Input[
|
149
|
-
organization: Optional[pulumi.Input[
|
150
|
-
team_id: Optional[pulumi.Input[
|
151
|
-
ttl: Optional[pulumi.Input[
|
152
|
-
user_id: Optional[pulumi.Input[
|
144
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
145
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
146
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
147
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
148
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
149
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
150
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
151
|
+
user_id: Optional[pulumi.Input[_builtins.str]] = None):
|
153
152
|
"""
|
154
153
|
Input properties used for looking up and filtering SecretRole resources.
|
155
|
-
:param pulumi.Input[
|
156
|
-
:param pulumi.Input[
|
154
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
155
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
158
157
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
159
158
|
*Available only for Vault Enterprise*.
|
160
|
-
:param pulumi.Input[
|
159
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
|
161
160
|
"""
|
162
161
|
if backend is not None:
|
163
162
|
pulumi.set(__self__, "backend", backend)
|
@@ -176,39 +175,39 @@ class _SecretRoleState:
|
|
176
175
|
if user_id is not None:
|
177
176
|
pulumi.set(__self__, "user_id", user_id)
|
178
177
|
|
179
|
-
@property
|
178
|
+
@_builtins.property
|
180
179
|
@pulumi.getter
|
181
|
-
def backend(self) -> Optional[pulumi.Input[
|
180
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
182
181
|
return pulumi.get(self, "backend")
|
183
182
|
|
184
183
|
@backend.setter
|
185
|
-
def backend(self, value: Optional[pulumi.Input[
|
184
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
186
185
|
pulumi.set(self, "backend", value)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter(name="maxTtl")
|
190
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
189
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
191
190
|
"""
|
192
191
|
Maximum TTL for leases associated with this role, in seconds.
|
193
192
|
"""
|
194
193
|
return pulumi.get(self, "max_ttl")
|
195
194
|
|
196
195
|
@max_ttl.setter
|
197
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
196
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
198
197
|
pulumi.set(self, "max_ttl", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter
|
202
|
-
def name(self) -> Optional[pulumi.Input[
|
201
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
203
202
|
return pulumi.get(self, "name")
|
204
203
|
|
205
204
|
@name.setter
|
206
|
-
def name(self, value: Optional[pulumi.Input[
|
205
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
207
206
|
pulumi.set(self, "name", value)
|
208
207
|
|
209
|
-
@property
|
208
|
+
@_builtins.property
|
210
209
|
@pulumi.getter
|
211
|
-
def namespace(self) -> Optional[pulumi.Input[
|
210
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
212
211
|
"""
|
213
212
|
The namespace to provision the resource in.
|
214
213
|
The value should not contain leading or trailing forward slashes.
|
@@ -218,46 +217,46 @@ class _SecretRoleState:
|
|
218
217
|
return pulumi.get(self, "namespace")
|
219
218
|
|
220
219
|
@namespace.setter
|
221
|
-
def namespace(self, value: Optional[pulumi.Input[
|
220
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
222
221
|
pulumi.set(self, "namespace", value)
|
223
222
|
|
224
|
-
@property
|
223
|
+
@_builtins.property
|
225
224
|
@pulumi.getter
|
226
|
-
def organization(self) -> Optional[pulumi.Input[
|
225
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
227
226
|
return pulumi.get(self, "organization")
|
228
227
|
|
229
228
|
@organization.setter
|
230
|
-
def organization(self, value: Optional[pulumi.Input[
|
229
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
231
230
|
pulumi.set(self, "organization", value)
|
232
231
|
|
233
|
-
@property
|
232
|
+
@_builtins.property
|
234
233
|
@pulumi.getter(name="teamId")
|
235
|
-
def team_id(self) -> Optional[pulumi.Input[
|
234
|
+
def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
236
235
|
return pulumi.get(self, "team_id")
|
237
236
|
|
238
237
|
@team_id.setter
|
239
|
-
def team_id(self, value: Optional[pulumi.Input[
|
238
|
+
def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
240
239
|
pulumi.set(self, "team_id", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter
|
244
|
-
def ttl(self) -> Optional[pulumi.Input[
|
243
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
245
244
|
"""
|
246
245
|
Specifies the TTL for this role, in seconds.
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "ttl")
|
249
248
|
|
250
249
|
@ttl.setter
|
251
|
-
def ttl(self, value: Optional[pulumi.Input[
|
250
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
252
251
|
pulumi.set(self, "ttl", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter(name="userId")
|
256
|
-
def user_id(self) -> Optional[pulumi.Input[
|
255
|
+
def user_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
257
256
|
return pulumi.get(self, "user_id")
|
258
257
|
|
259
258
|
@user_id.setter
|
260
|
-
def user_id(self, value: Optional[pulumi.Input[
|
259
|
+
def user_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
261
260
|
pulumi.set(self, "user_id", value)
|
262
261
|
|
263
262
|
|
@@ -267,14 +266,14 @@ class SecretRole(pulumi.CustomResource):
|
|
267
266
|
def __init__(__self__,
|
268
267
|
resource_name: str,
|
269
268
|
opts: Optional[pulumi.ResourceOptions] = None,
|
270
|
-
backend: Optional[pulumi.Input[
|
271
|
-
max_ttl: Optional[pulumi.Input[
|
272
|
-
name: Optional[pulumi.Input[
|
273
|
-
namespace: Optional[pulumi.Input[
|
274
|
-
organization: Optional[pulumi.Input[
|
275
|
-
team_id: Optional[pulumi.Input[
|
276
|
-
ttl: Optional[pulumi.Input[
|
277
|
-
user_id: Optional[pulumi.Input[
|
269
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
270
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
271
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
272
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
273
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
274
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
275
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
276
|
+
user_id: Optional[pulumi.Input[_builtins.str]] = None,
|
278
277
|
__props__=None):
|
279
278
|
"""
|
280
279
|
## Example Usage
|
@@ -304,12 +303,12 @@ class SecretRole(pulumi.CustomResource):
|
|
304
303
|
|
305
304
|
:param str resource_name: The name of the resource.
|
306
305
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
307
|
-
:param pulumi.Input[
|
308
|
-
:param pulumi.Input[
|
306
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
307
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
309
308
|
The value should not contain leading or trailing forward slashes.
|
310
309
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
311
310
|
*Available only for Vault Enterprise*.
|
312
|
-
:param pulumi.Input[
|
311
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
|
313
312
|
"""
|
314
313
|
...
|
315
314
|
@overload
|
@@ -358,14 +357,14 @@ class SecretRole(pulumi.CustomResource):
|
|
358
357
|
def _internal_init(__self__,
|
359
358
|
resource_name: str,
|
360
359
|
opts: Optional[pulumi.ResourceOptions] = None,
|
361
|
-
backend: Optional[pulumi.Input[
|
362
|
-
max_ttl: Optional[pulumi.Input[
|
363
|
-
name: Optional[pulumi.Input[
|
364
|
-
namespace: Optional[pulumi.Input[
|
365
|
-
organization: Optional[pulumi.Input[
|
366
|
-
team_id: Optional[pulumi.Input[
|
367
|
-
ttl: Optional[pulumi.Input[
|
368
|
-
user_id: Optional[pulumi.Input[
|
360
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
361
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
362
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
364
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
365
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
367
|
+
user_id: Optional[pulumi.Input[_builtins.str]] = None,
|
369
368
|
__props__=None):
|
370
369
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
371
370
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -393,14 +392,14 @@ class SecretRole(pulumi.CustomResource):
|
|
393
392
|
def get(resource_name: str,
|
394
393
|
id: pulumi.Input[str],
|
395
394
|
opts: Optional[pulumi.ResourceOptions] = None,
|
396
|
-
backend: Optional[pulumi.Input[
|
397
|
-
max_ttl: Optional[pulumi.Input[
|
398
|
-
name: Optional[pulumi.Input[
|
399
|
-
namespace: Optional[pulumi.Input[
|
400
|
-
organization: Optional[pulumi.Input[
|
401
|
-
team_id: Optional[pulumi.Input[
|
402
|
-
ttl: Optional[pulumi.Input[
|
403
|
-
user_id: Optional[pulumi.Input[
|
395
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
396
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
397
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
398
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
399
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
400
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
402
|
+
user_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretRole':
|
404
403
|
"""
|
405
404
|
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
406
405
|
properties used to qualify the lookup.
|
@@ -408,12 +407,12 @@ class SecretRole(pulumi.CustomResource):
|
|
408
407
|
:param str resource_name: The unique name of the resulting resource.
|
409
408
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
410
409
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
411
|
-
:param pulumi.Input[
|
412
|
-
:param pulumi.Input[
|
410
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
411
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
413
412
|
The value should not contain leading or trailing forward slashes.
|
414
413
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
415
414
|
*Available only for Vault Enterprise*.
|
416
|
-
:param pulumi.Input[
|
415
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
|
417
416
|
"""
|
418
417
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
419
418
|
|
@@ -429,27 +428,27 @@ class SecretRole(pulumi.CustomResource):
|
|
429
428
|
__props__.__dict__["user_id"] = user_id
|
430
429
|
return SecretRole(resource_name, opts=opts, __props__=__props__)
|
431
430
|
|
432
|
-
@property
|
431
|
+
@_builtins.property
|
433
432
|
@pulumi.getter
|
434
|
-
def backend(self) -> pulumi.Output[Optional[
|
433
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
435
434
|
return pulumi.get(self, "backend")
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter(name="maxTtl")
|
439
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
438
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
440
439
|
"""
|
441
440
|
Maximum TTL for leases associated with this role, in seconds.
|
442
441
|
"""
|
443
442
|
return pulumi.get(self, "max_ttl")
|
444
443
|
|
445
|
-
@property
|
444
|
+
@_builtins.property
|
446
445
|
@pulumi.getter
|
447
|
-
def name(self) -> pulumi.Output[
|
446
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
448
447
|
return pulumi.get(self, "name")
|
449
448
|
|
450
|
-
@property
|
449
|
+
@_builtins.property
|
451
450
|
@pulumi.getter
|
452
|
-
def namespace(self) -> pulumi.Output[Optional[
|
451
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
453
452
|
"""
|
454
453
|
The namespace to provision the resource in.
|
455
454
|
The value should not contain leading or trailing forward slashes.
|
@@ -458,26 +457,26 @@ class SecretRole(pulumi.CustomResource):
|
|
458
457
|
"""
|
459
458
|
return pulumi.get(self, "namespace")
|
460
459
|
|
461
|
-
@property
|
460
|
+
@_builtins.property
|
462
461
|
@pulumi.getter
|
463
|
-
def organization(self) -> pulumi.Output[Optional[
|
462
|
+
def organization(self) -> pulumi.Output[Optional[_builtins.str]]:
|
464
463
|
return pulumi.get(self, "organization")
|
465
464
|
|
466
|
-
@property
|
465
|
+
@_builtins.property
|
467
466
|
@pulumi.getter(name="teamId")
|
468
|
-
def team_id(self) -> pulumi.Output[Optional[
|
467
|
+
def team_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
469
468
|
return pulumi.get(self, "team_id")
|
470
469
|
|
471
|
-
@property
|
470
|
+
@_builtins.property
|
472
471
|
@pulumi.getter
|
473
|
-
def ttl(self) -> pulumi.Output[Optional[
|
472
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
474
473
|
"""
|
475
474
|
Specifies the TTL for this role, in seconds.
|
476
475
|
"""
|
477
476
|
return pulumi.get(self, "ttl")
|
478
477
|
|
479
|
-
@property
|
478
|
+
@_builtins.property
|
480
479
|
@pulumi.getter(name="userId")
|
481
|
-
def user_id(self) -> pulumi.Output[Optional[
|
480
|
+
def user_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
482
481
|
return pulumi.get(self, "user_id")
|
483
482
|
|