pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,28 +19,28 @@ __all__ = ['SecretLibraryArgs', 'SecretLibrary']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretLibraryArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
service_account_names: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
26
|
-
max_ttl: Optional[pulumi.Input[
|
27
|
-
name: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
30
29
|
"""
|
31
30
|
The set of arguments for constructing a SecretLibrary resource.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
33
32
|
with no leading or trailing `/`s.
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
34
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
35
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
37
36
|
max_ttl if not provided.
|
38
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
39
38
|
Must be unique within the backend.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
41
40
|
The value should not contain leading or trailing forward slashes.
|
42
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
42
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
45
44
|
ttl if not provided.
|
46
45
|
"""
|
47
46
|
pulumi.set(__self__, "backend", backend)
|
@@ -57,9 +56,9 @@ class SecretLibraryArgs:
|
|
57
56
|
if ttl is not None:
|
58
57
|
pulumi.set(__self__, "ttl", ttl)
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def backend(self) -> pulumi.Input[
|
61
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
63
62
|
"""
|
64
63
|
The path the AD secret backend is mounted at,
|
65
64
|
with no leading or trailing `/`s.
|
@@ -67,36 +66,36 @@ class SecretLibraryArgs:
|
|
67
66
|
return pulumi.get(self, "backend")
|
68
67
|
|
69
68
|
@backend.setter
|
70
|
-
def backend(self, value: pulumi.Input[
|
69
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
71
70
|
pulumi.set(self, "backend", value)
|
72
71
|
|
73
|
-
@property
|
72
|
+
@_builtins.property
|
74
73
|
@pulumi.getter(name="serviceAccountNames")
|
75
|
-
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[
|
74
|
+
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
76
75
|
"""
|
77
76
|
Specifies the slice of service accounts mapped to this set.
|
78
77
|
"""
|
79
78
|
return pulumi.get(self, "service_account_names")
|
80
79
|
|
81
80
|
@service_account_names.setter
|
82
|
-
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[
|
81
|
+
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
83
82
|
pulumi.set(self, "service_account_names", value)
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="disableCheckInEnforcement")
|
87
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[
|
86
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
88
87
|
"""
|
89
88
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "disable_check_in_enforcement")
|
92
91
|
|
93
92
|
@disable_check_in_enforcement.setter
|
94
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[
|
93
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
95
94
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
96
95
|
|
97
|
-
@property
|
96
|
+
@_builtins.property
|
98
97
|
@pulumi.getter(name="maxTtl")
|
99
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
98
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
100
99
|
"""
|
101
100
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
102
101
|
max_ttl if not provided.
|
@@ -104,12 +103,12 @@ class SecretLibraryArgs:
|
|
104
103
|
return pulumi.get(self, "max_ttl")
|
105
104
|
|
106
105
|
@max_ttl.setter
|
107
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
106
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
108
107
|
pulumi.set(self, "max_ttl", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def name(self) -> Optional[pulumi.Input[
|
111
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
113
112
|
"""
|
114
113
|
The name to identify this set of service accounts.
|
115
114
|
Must be unique within the backend.
|
@@ -117,12 +116,12 @@ class SecretLibraryArgs:
|
|
117
116
|
return pulumi.get(self, "name")
|
118
117
|
|
119
118
|
@name.setter
|
120
|
-
def name(self, value: Optional[pulumi.Input[
|
119
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
121
120
|
pulumi.set(self, "name", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter
|
125
|
-
def namespace(self) -> Optional[pulumi.Input[
|
124
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
126
125
|
"""
|
127
126
|
The namespace to provision the resource in.
|
128
127
|
The value should not contain leading or trailing forward slashes.
|
@@ -132,12 +131,12 @@ class SecretLibraryArgs:
|
|
132
131
|
return pulumi.get(self, "namespace")
|
133
132
|
|
134
133
|
@namespace.setter
|
135
|
-
def namespace(self, value: Optional[pulumi.Input[
|
134
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
136
135
|
pulumi.set(self, "namespace", value)
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter
|
140
|
-
def ttl(self) -> Optional[pulumi.Input[
|
139
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
141
140
|
"""
|
142
141
|
The password time-to-live in seconds. Defaults to the configuration
|
143
142
|
ttl if not provided.
|
@@ -145,35 +144,35 @@ class SecretLibraryArgs:
|
|
145
144
|
return pulumi.get(self, "ttl")
|
146
145
|
|
147
146
|
@ttl.setter
|
148
|
-
def ttl(self, value: Optional[pulumi.Input[
|
147
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
149
148
|
pulumi.set(self, "ttl", value)
|
150
149
|
|
151
150
|
|
152
151
|
@pulumi.input_type
|
153
152
|
class _SecretLibraryState:
|
154
153
|
def __init__(__self__, *,
|
155
|
-
backend: Optional[pulumi.Input[
|
156
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
157
|
-
max_ttl: Optional[pulumi.Input[
|
158
|
-
name: Optional[pulumi.Input[
|
159
|
-
namespace: Optional[pulumi.Input[
|
160
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
161
|
-
ttl: Optional[pulumi.Input[
|
154
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
155
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
156
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
157
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
158
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
159
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
160
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
162
161
|
"""
|
163
162
|
Input properties used for looking up and filtering SecretLibrary resources.
|
164
|
-
:param pulumi.Input[
|
163
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
165
164
|
with no leading or trailing `/`s.
|
166
|
-
:param pulumi.Input[
|
167
|
-
:param pulumi.Input[
|
165
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
166
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
168
167
|
max_ttl if not provided.
|
169
|
-
:param pulumi.Input[
|
168
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
170
169
|
Must be unique within the backend.
|
171
|
-
:param pulumi.Input[
|
170
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
172
171
|
The value should not contain leading or trailing forward slashes.
|
173
172
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
174
173
|
*Available only for Vault Enterprise*.
|
175
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
176
|
-
:param pulumi.Input[
|
174
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
175
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
177
176
|
ttl if not provided.
|
178
177
|
"""
|
179
178
|
if backend is not None:
|
@@ -191,9 +190,9 @@ class _SecretLibraryState:
|
|
191
190
|
if ttl is not None:
|
192
191
|
pulumi.set(__self__, "ttl", ttl)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter
|
196
|
-
def backend(self) -> Optional[pulumi.Input[
|
195
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
197
196
|
"""
|
198
197
|
The path the AD secret backend is mounted at,
|
199
198
|
with no leading or trailing `/`s.
|
@@ -201,24 +200,24 @@ class _SecretLibraryState:
|
|
201
200
|
return pulumi.get(self, "backend")
|
202
201
|
|
203
202
|
@backend.setter
|
204
|
-
def backend(self, value: Optional[pulumi.Input[
|
203
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "backend", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="disableCheckInEnforcement")
|
209
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[
|
208
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
210
209
|
"""
|
211
210
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
212
211
|
"""
|
213
212
|
return pulumi.get(self, "disable_check_in_enforcement")
|
214
213
|
|
215
214
|
@disable_check_in_enforcement.setter
|
216
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[
|
215
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
217
216
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
218
217
|
|
219
|
-
@property
|
218
|
+
@_builtins.property
|
220
219
|
@pulumi.getter(name="maxTtl")
|
221
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
220
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
222
221
|
"""
|
223
222
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
224
223
|
max_ttl if not provided.
|
@@ -226,12 +225,12 @@ class _SecretLibraryState:
|
|
226
225
|
return pulumi.get(self, "max_ttl")
|
227
226
|
|
228
227
|
@max_ttl.setter
|
229
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
228
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
230
229
|
pulumi.set(self, "max_ttl", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter
|
234
|
-
def name(self) -> Optional[pulumi.Input[
|
233
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
235
234
|
"""
|
236
235
|
The name to identify this set of service accounts.
|
237
236
|
Must be unique within the backend.
|
@@ -239,12 +238,12 @@ class _SecretLibraryState:
|
|
239
238
|
return pulumi.get(self, "name")
|
240
239
|
|
241
240
|
@name.setter
|
242
|
-
def name(self, value: Optional[pulumi.Input[
|
241
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
243
242
|
pulumi.set(self, "name", value)
|
244
243
|
|
245
|
-
@property
|
244
|
+
@_builtins.property
|
246
245
|
@pulumi.getter
|
247
|
-
def namespace(self) -> Optional[pulumi.Input[
|
246
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
248
247
|
"""
|
249
248
|
The namespace to provision the resource in.
|
250
249
|
The value should not contain leading or trailing forward slashes.
|
@@ -254,24 +253,24 @@ class _SecretLibraryState:
|
|
254
253
|
return pulumi.get(self, "namespace")
|
255
254
|
|
256
255
|
@namespace.setter
|
257
|
-
def namespace(self, value: Optional[pulumi.Input[
|
256
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
258
257
|
pulumi.set(self, "namespace", value)
|
259
258
|
|
260
|
-
@property
|
259
|
+
@_builtins.property
|
261
260
|
@pulumi.getter(name="serviceAccountNames")
|
262
|
-
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
261
|
+
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
263
262
|
"""
|
264
263
|
Specifies the slice of service accounts mapped to this set.
|
265
264
|
"""
|
266
265
|
return pulumi.get(self, "service_account_names")
|
267
266
|
|
268
267
|
@service_account_names.setter
|
269
|
-
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
268
|
+
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
270
269
|
pulumi.set(self, "service_account_names", value)
|
271
270
|
|
272
|
-
@property
|
271
|
+
@_builtins.property
|
273
272
|
@pulumi.getter
|
274
|
-
def ttl(self) -> Optional[pulumi.Input[
|
273
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
275
274
|
"""
|
276
275
|
The password time-to-live in seconds. Defaults to the configuration
|
277
276
|
ttl if not provided.
|
@@ -279,7 +278,7 @@ class _SecretLibraryState:
|
|
279
278
|
return pulumi.get(self, "ttl")
|
280
279
|
|
281
280
|
@ttl.setter
|
282
|
-
def ttl(self, value: Optional[pulumi.Input[
|
281
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
283
282
|
pulumi.set(self, "ttl", value)
|
284
283
|
|
285
284
|
|
@@ -289,13 +288,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
289
288
|
def __init__(__self__,
|
290
289
|
resource_name: str,
|
291
290
|
opts: Optional[pulumi.ResourceOptions] = None,
|
292
|
-
backend: Optional[pulumi.Input[
|
293
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
294
|
-
max_ttl: Optional[pulumi.Input[
|
295
|
-
name: Optional[pulumi.Input[
|
296
|
-
namespace: Optional[pulumi.Input[
|
297
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
298
|
-
ttl: Optional[pulumi.Input[
|
291
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
293
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
294
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
296
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
297
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
299
298
|
__props__=None):
|
300
299
|
"""
|
301
300
|
## Example Usage
|
@@ -333,19 +332,19 @@ class SecretLibrary(pulumi.CustomResource):
|
|
333
332
|
|
334
333
|
:param str resource_name: The name of the resource.
|
335
334
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[
|
335
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
337
336
|
with no leading or trailing `/`s.
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
337
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
338
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
340
339
|
max_ttl if not provided.
|
341
|
-
:param pulumi.Input[
|
340
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
342
341
|
Must be unique within the backend.
|
343
|
-
:param pulumi.Input[
|
342
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
344
343
|
The value should not contain leading or trailing forward slashes.
|
345
344
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
346
345
|
*Available only for Vault Enterprise*.
|
347
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
348
|
-
:param pulumi.Input[
|
346
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
347
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
349
348
|
ttl if not provided.
|
350
349
|
"""
|
351
350
|
...
|
@@ -403,13 +402,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
403
402
|
def _internal_init(__self__,
|
404
403
|
resource_name: str,
|
405
404
|
opts: Optional[pulumi.ResourceOptions] = None,
|
406
|
-
backend: Optional[pulumi.Input[
|
407
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
408
|
-
max_ttl: Optional[pulumi.Input[
|
409
|
-
name: Optional[pulumi.Input[
|
410
|
-
namespace: Optional[pulumi.Input[
|
411
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
412
|
-
ttl: Optional[pulumi.Input[
|
405
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
406
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
407
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
408
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
409
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
411
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
413
412
|
__props__=None):
|
414
413
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
415
414
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -440,13 +439,13 @@ class SecretLibrary(pulumi.CustomResource):
|
|
440
439
|
def get(resource_name: str,
|
441
440
|
id: pulumi.Input[str],
|
442
441
|
opts: Optional[pulumi.ResourceOptions] = None,
|
443
|
-
backend: Optional[pulumi.Input[
|
444
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
445
|
-
max_ttl: Optional[pulumi.Input[
|
446
|
-
name: Optional[pulumi.Input[
|
447
|
-
namespace: Optional[pulumi.Input[
|
448
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
449
|
-
ttl: Optional[pulumi.Input[
|
442
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
443
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
444
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
445
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
446
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
447
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
448
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretLibrary':
|
450
449
|
"""
|
451
450
|
Get an existing SecretLibrary resource's state with the given name, id, and optional extra
|
452
451
|
properties used to qualify the lookup.
|
@@ -454,19 +453,19 @@ class SecretLibrary(pulumi.CustomResource):
|
|
454
453
|
:param str resource_name: The unique name of the resulting resource.
|
455
454
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
456
455
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
457
|
-
:param pulumi.Input[
|
456
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
458
457
|
with no leading or trailing `/`s.
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
458
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
459
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults to the configuration
|
461
460
|
max_ttl if not provided.
|
462
|
-
:param pulumi.Input[
|
461
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
463
462
|
Must be unique within the backend.
|
464
|
-
:param pulumi.Input[
|
463
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
465
464
|
The value should not contain leading or trailing forward slashes.
|
466
465
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
467
466
|
*Available only for Vault Enterprise*.
|
468
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
469
|
-
:param pulumi.Input[
|
467
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
468
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
470
469
|
ttl if not provided.
|
471
470
|
"""
|
472
471
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -482,44 +481,44 @@ class SecretLibrary(pulumi.CustomResource):
|
|
482
481
|
__props__.__dict__["ttl"] = ttl
|
483
482
|
return SecretLibrary(resource_name, opts=opts, __props__=__props__)
|
484
483
|
|
485
|
-
@property
|
484
|
+
@_builtins.property
|
486
485
|
@pulumi.getter
|
487
|
-
def backend(self) -> pulumi.Output[
|
486
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
488
487
|
"""
|
489
488
|
The path the AD secret backend is mounted at,
|
490
489
|
with no leading or trailing `/`s.
|
491
490
|
"""
|
492
491
|
return pulumi.get(self, "backend")
|
493
492
|
|
494
|
-
@property
|
493
|
+
@_builtins.property
|
495
494
|
@pulumi.getter(name="disableCheckInEnforcement")
|
496
|
-
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[
|
495
|
+
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
497
496
|
"""
|
498
497
|
Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
499
498
|
"""
|
500
499
|
return pulumi.get(self, "disable_check_in_enforcement")
|
501
500
|
|
502
|
-
@property
|
501
|
+
@_builtins.property
|
503
502
|
@pulumi.getter(name="maxTtl")
|
504
|
-
def max_ttl(self) -> pulumi.Output[
|
503
|
+
def max_ttl(self) -> pulumi.Output[_builtins.int]:
|
505
504
|
"""
|
506
505
|
The maximum password time-to-live in seconds. Defaults to the configuration
|
507
506
|
max_ttl if not provided.
|
508
507
|
"""
|
509
508
|
return pulumi.get(self, "max_ttl")
|
510
509
|
|
511
|
-
@property
|
510
|
+
@_builtins.property
|
512
511
|
@pulumi.getter
|
513
|
-
def name(self) -> pulumi.Output[
|
512
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
514
513
|
"""
|
515
514
|
The name to identify this set of service accounts.
|
516
515
|
Must be unique within the backend.
|
517
516
|
"""
|
518
517
|
return pulumi.get(self, "name")
|
519
518
|
|
520
|
-
@property
|
519
|
+
@_builtins.property
|
521
520
|
@pulumi.getter
|
522
|
-
def namespace(self) -> pulumi.Output[Optional[
|
521
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
523
522
|
"""
|
524
523
|
The namespace to provision the resource in.
|
525
524
|
The value should not contain leading or trailing forward slashes.
|
@@ -528,17 +527,17 @@ class SecretLibrary(pulumi.CustomResource):
|
|
528
527
|
"""
|
529
528
|
return pulumi.get(self, "namespace")
|
530
529
|
|
531
|
-
@property
|
530
|
+
@_builtins.property
|
532
531
|
@pulumi.getter(name="serviceAccountNames")
|
533
|
-
def service_account_names(self) -> pulumi.Output[Sequence[
|
532
|
+
def service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
534
533
|
"""
|
535
534
|
Specifies the slice of service accounts mapped to this set.
|
536
535
|
"""
|
537
536
|
return pulumi.get(self, "service_account_names")
|
538
537
|
|
539
|
-
@property
|
538
|
+
@_builtins.property
|
540
539
|
@pulumi.getter
|
541
|
-
def ttl(self) -> pulumi.Output[
|
540
|
+
def ttl(self) -> pulumi.Output[_builtins.int]:
|
542
541
|
"""
|
543
542
|
The password time-to-live in seconds. Defaults to the configuration
|
544
543
|
ttl if not provided.
|