pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretImpersonatedAccountArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
impersonated_account: pulumi.Input[
|
25
|
-
service_account_email: pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
impersonated_account: pulumi.Input[_builtins.str],
|
24
|
+
service_account_email: pulumi.Input[_builtins.str],
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a SecretImpersonatedAccount resource.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
31
|
+
:param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
|
32
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
33
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
35
|
+
:param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
37
36
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
38
37
|
"""
|
39
38
|
pulumi.set(__self__, "backend", backend)
|
@@ -46,69 +45,69 @@ class SecretImpersonatedAccountArgs:
|
|
46
45
|
if ttl is not None:
|
47
46
|
pulumi.set(__self__, "ttl", ttl)
|
48
47
|
|
49
|
-
@property
|
48
|
+
@_builtins.property
|
50
49
|
@pulumi.getter
|
51
|
-
def backend(self) -> pulumi.Input[
|
50
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
52
51
|
"""
|
53
52
|
Path where the GCP Secrets Engine is mounted
|
54
53
|
"""
|
55
54
|
return pulumi.get(self, "backend")
|
56
55
|
|
57
56
|
@backend.setter
|
58
|
-
def backend(self, value: pulumi.Input[
|
57
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
59
58
|
pulumi.set(self, "backend", value)
|
60
59
|
|
61
|
-
@property
|
60
|
+
@_builtins.property
|
62
61
|
@pulumi.getter(name="impersonatedAccount")
|
63
|
-
def impersonated_account(self) -> pulumi.Input[
|
62
|
+
def impersonated_account(self) -> pulumi.Input[_builtins.str]:
|
64
63
|
"""
|
65
64
|
Name of the Impersonated Account to create
|
66
65
|
"""
|
67
66
|
return pulumi.get(self, "impersonated_account")
|
68
67
|
|
69
68
|
@impersonated_account.setter
|
70
|
-
def impersonated_account(self, value: pulumi.Input[
|
69
|
+
def impersonated_account(self, value: pulumi.Input[_builtins.str]):
|
71
70
|
pulumi.set(self, "impersonated_account", value)
|
72
71
|
|
73
|
-
@property
|
72
|
+
@_builtins.property
|
74
73
|
@pulumi.getter(name="serviceAccountEmail")
|
75
|
-
def service_account_email(self) -> pulumi.Input[
|
74
|
+
def service_account_email(self) -> pulumi.Input[_builtins.str]:
|
76
75
|
"""
|
77
76
|
Email of the GCP service account to impersonate.
|
78
77
|
"""
|
79
78
|
return pulumi.get(self, "service_account_email")
|
80
79
|
|
81
80
|
@service_account_email.setter
|
82
|
-
def service_account_email(self, value: pulumi.Input[
|
81
|
+
def service_account_email(self, value: pulumi.Input[_builtins.str]):
|
83
82
|
pulumi.set(self, "service_account_email", value)
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter
|
87
|
-
def namespace(self) -> Optional[pulumi.Input[
|
86
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
88
87
|
"""
|
89
88
|
Target namespace. (requires Enterprise)
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "namespace")
|
92
91
|
|
93
92
|
@namespace.setter
|
94
|
-
def namespace(self, value: Optional[pulumi.Input[
|
93
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
95
94
|
pulumi.set(self, "namespace", value)
|
96
95
|
|
97
|
-
@property
|
96
|
+
@_builtins.property
|
98
97
|
@pulumi.getter(name="tokenScopes")
|
99
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
98
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
100
99
|
"""
|
101
100
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
102
101
|
"""
|
103
102
|
return pulumi.get(self, "token_scopes")
|
104
103
|
|
105
104
|
@token_scopes.setter
|
106
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
105
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
107
106
|
pulumi.set(self, "token_scopes", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def ttl(self) -> Optional[pulumi.Input[
|
110
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
112
111
|
"""
|
113
112
|
Specifies the default TTL for service principals generated using this role.
|
114
113
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -116,29 +115,29 @@ class SecretImpersonatedAccountArgs:
|
|
116
115
|
return pulumi.get(self, "ttl")
|
117
116
|
|
118
117
|
@ttl.setter
|
119
|
-
def ttl(self, value: Optional[pulumi.Input[
|
118
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
120
119
|
pulumi.set(self, "ttl", value)
|
121
120
|
|
122
121
|
|
123
122
|
@pulumi.input_type
|
124
123
|
class _SecretImpersonatedAccountState:
|
125
124
|
def __init__(__self__, *,
|
126
|
-
backend: Optional[pulumi.Input[
|
127
|
-
impersonated_account: Optional[pulumi.Input[
|
128
|
-
namespace: Optional[pulumi.Input[
|
129
|
-
service_account_email: Optional[pulumi.Input[
|
130
|
-
service_account_project: Optional[pulumi.Input[
|
131
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
132
|
-
ttl: Optional[pulumi.Input[
|
125
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
126
|
+
impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
|
127
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
128
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
129
|
+
service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
|
130
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
131
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
133
132
|
"""
|
134
133
|
Input properties used for looking up and filtering SecretImpersonatedAccount resources.
|
135
|
-
:param pulumi.Input[
|
136
|
-
:param pulumi.Input[
|
137
|
-
:param pulumi.Input[
|
138
|
-
:param pulumi.Input[
|
139
|
-
:param pulumi.Input[
|
140
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
141
|
-
:param pulumi.Input[
|
134
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
135
|
+
:param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
|
136
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
137
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
138
|
+
:param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
|
139
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
140
|
+
:param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
142
141
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
143
142
|
"""
|
144
143
|
if backend is not None:
|
@@ -156,81 +155,81 @@ class _SecretImpersonatedAccountState:
|
|
156
155
|
if ttl is not None:
|
157
156
|
pulumi.set(__self__, "ttl", ttl)
|
158
157
|
|
159
|
-
@property
|
158
|
+
@_builtins.property
|
160
159
|
@pulumi.getter
|
161
|
-
def backend(self) -> Optional[pulumi.Input[
|
160
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
162
161
|
"""
|
163
162
|
Path where the GCP Secrets Engine is mounted
|
164
163
|
"""
|
165
164
|
return pulumi.get(self, "backend")
|
166
165
|
|
167
166
|
@backend.setter
|
168
|
-
def backend(self, value: Optional[pulumi.Input[
|
167
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
169
168
|
pulumi.set(self, "backend", value)
|
170
169
|
|
171
|
-
@property
|
170
|
+
@_builtins.property
|
172
171
|
@pulumi.getter(name="impersonatedAccount")
|
173
|
-
def impersonated_account(self) -> Optional[pulumi.Input[
|
172
|
+
def impersonated_account(self) -> Optional[pulumi.Input[_builtins.str]]:
|
174
173
|
"""
|
175
174
|
Name of the Impersonated Account to create
|
176
175
|
"""
|
177
176
|
return pulumi.get(self, "impersonated_account")
|
178
177
|
|
179
178
|
@impersonated_account.setter
|
180
|
-
def impersonated_account(self, value: Optional[pulumi.Input[
|
179
|
+
def impersonated_account(self, value: Optional[pulumi.Input[_builtins.str]]):
|
181
180
|
pulumi.set(self, "impersonated_account", value)
|
182
181
|
|
183
|
-
@property
|
182
|
+
@_builtins.property
|
184
183
|
@pulumi.getter
|
185
|
-
def namespace(self) -> Optional[pulumi.Input[
|
184
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
186
185
|
"""
|
187
186
|
Target namespace. (requires Enterprise)
|
188
187
|
"""
|
189
188
|
return pulumi.get(self, "namespace")
|
190
189
|
|
191
190
|
@namespace.setter
|
192
|
-
def namespace(self, value: Optional[pulumi.Input[
|
191
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
193
192
|
pulumi.set(self, "namespace", value)
|
194
193
|
|
195
|
-
@property
|
194
|
+
@_builtins.property
|
196
195
|
@pulumi.getter(name="serviceAccountEmail")
|
197
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
196
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
198
197
|
"""
|
199
198
|
Email of the GCP service account to impersonate.
|
200
199
|
"""
|
201
200
|
return pulumi.get(self, "service_account_email")
|
202
201
|
|
203
202
|
@service_account_email.setter
|
204
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
203
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "service_account_email", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="serviceAccountProject")
|
209
|
-
def service_account_project(self) -> Optional[pulumi.Input[
|
208
|
+
def service_account_project(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
209
|
"""
|
211
210
|
Project the service account belongs to.
|
212
211
|
"""
|
213
212
|
return pulumi.get(self, "service_account_project")
|
214
213
|
|
215
214
|
@service_account_project.setter
|
216
|
-
def service_account_project(self, value: Optional[pulumi.Input[
|
215
|
+
def service_account_project(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
216
|
pulumi.set(self, "service_account_project", value)
|
218
217
|
|
219
|
-
@property
|
218
|
+
@_builtins.property
|
220
219
|
@pulumi.getter(name="tokenScopes")
|
221
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
220
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
222
221
|
"""
|
223
222
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
224
223
|
"""
|
225
224
|
return pulumi.get(self, "token_scopes")
|
226
225
|
|
227
226
|
@token_scopes.setter
|
228
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
227
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
229
228
|
pulumi.set(self, "token_scopes", value)
|
230
229
|
|
231
|
-
@property
|
230
|
+
@_builtins.property
|
232
231
|
@pulumi.getter
|
233
|
-
def ttl(self) -> Optional[pulumi.Input[
|
232
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
234
233
|
"""
|
235
234
|
Specifies the default TTL for service principals generated using this role.
|
236
235
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -238,7 +237,7 @@ class _SecretImpersonatedAccountState:
|
|
238
237
|
return pulumi.get(self, "ttl")
|
239
238
|
|
240
239
|
@ttl.setter
|
241
|
-
def ttl(self, value: Optional[pulumi.Input[
|
240
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
242
241
|
pulumi.set(self, "ttl", value)
|
243
242
|
|
244
243
|
|
@@ -248,12 +247,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
248
247
|
def __init__(__self__,
|
249
248
|
resource_name: str,
|
250
249
|
opts: Optional[pulumi.ResourceOptions] = None,
|
251
|
-
backend: Optional[pulumi.Input[
|
252
|
-
impersonated_account: Optional[pulumi.Input[
|
253
|
-
namespace: Optional[pulumi.Input[
|
254
|
-
service_account_email: Optional[pulumi.Input[
|
255
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
256
|
-
ttl: Optional[pulumi.Input[
|
250
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
251
|
+
impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
|
252
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
253
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
254
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
255
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
257
256
|
__props__=None):
|
258
257
|
"""
|
259
258
|
Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
|
@@ -290,12 +289,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
290
289
|
|
291
290
|
:param str resource_name: The name of the resource.
|
292
291
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
293
|
-
:param pulumi.Input[
|
294
|
-
:param pulumi.Input[
|
295
|
-
:param pulumi.Input[
|
296
|
-
:param pulumi.Input[
|
297
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
298
|
-
:param pulumi.Input[
|
292
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
293
|
+
:param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
|
294
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
295
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
296
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
297
|
+
:param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
299
298
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
300
299
|
"""
|
301
300
|
...
|
@@ -352,12 +351,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
352
351
|
def _internal_init(__self__,
|
353
352
|
resource_name: str,
|
354
353
|
opts: Optional[pulumi.ResourceOptions] = None,
|
355
|
-
backend: Optional[pulumi.Input[
|
356
|
-
impersonated_account: Optional[pulumi.Input[
|
357
|
-
namespace: Optional[pulumi.Input[
|
358
|
-
service_account_email: Optional[pulumi.Input[
|
359
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
360
|
-
ttl: Optional[pulumi.Input[
|
354
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
355
|
+
impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
|
356
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
357
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
358
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
359
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
361
360
|
__props__=None):
|
362
361
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
363
362
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -390,13 +389,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
390
389
|
def get(resource_name: str,
|
391
390
|
id: pulumi.Input[str],
|
392
391
|
opts: Optional[pulumi.ResourceOptions] = None,
|
393
|
-
backend: Optional[pulumi.Input[
|
394
|
-
impersonated_account: Optional[pulumi.Input[
|
395
|
-
namespace: Optional[pulumi.Input[
|
396
|
-
service_account_email: Optional[pulumi.Input[
|
397
|
-
service_account_project: Optional[pulumi.Input[
|
398
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
399
|
-
ttl: Optional[pulumi.Input[
|
392
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
393
|
+
impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
|
394
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
395
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
396
|
+
service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
|
397
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
398
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretImpersonatedAccount':
|
400
399
|
"""
|
401
400
|
Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
|
402
401
|
properties used to qualify the lookup.
|
@@ -404,13 +403,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
404
403
|
:param str resource_name: The unique name of the resulting resource.
|
405
404
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
406
405
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
407
|
-
:param pulumi.Input[
|
408
|
-
:param pulumi.Input[
|
409
|
-
:param pulumi.Input[
|
410
|
-
:param pulumi.Input[
|
411
|
-
:param pulumi.Input[
|
412
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
413
|
-
:param pulumi.Input[
|
406
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
407
|
+
:param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
|
408
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
409
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
|
410
|
+
:param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
|
411
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
412
|
+
:param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
|
414
413
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
415
414
|
"""
|
416
415
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -426,57 +425,57 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
426
425
|
__props__.__dict__["ttl"] = ttl
|
427
426
|
return SecretImpersonatedAccount(resource_name, opts=opts, __props__=__props__)
|
428
427
|
|
429
|
-
@property
|
428
|
+
@_builtins.property
|
430
429
|
@pulumi.getter
|
431
|
-
def backend(self) -> pulumi.Output[
|
430
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
432
431
|
"""
|
433
432
|
Path where the GCP Secrets Engine is mounted
|
434
433
|
"""
|
435
434
|
return pulumi.get(self, "backend")
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter(name="impersonatedAccount")
|
439
|
-
def impersonated_account(self) -> pulumi.Output[
|
438
|
+
def impersonated_account(self) -> pulumi.Output[_builtins.str]:
|
440
439
|
"""
|
441
440
|
Name of the Impersonated Account to create
|
442
441
|
"""
|
443
442
|
return pulumi.get(self, "impersonated_account")
|
444
443
|
|
445
|
-
@property
|
444
|
+
@_builtins.property
|
446
445
|
@pulumi.getter
|
447
|
-
def namespace(self) -> pulumi.Output[Optional[
|
446
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
448
447
|
"""
|
449
448
|
Target namespace. (requires Enterprise)
|
450
449
|
"""
|
451
450
|
return pulumi.get(self, "namespace")
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter(name="serviceAccountEmail")
|
455
|
-
def service_account_email(self) -> pulumi.Output[
|
454
|
+
def service_account_email(self) -> pulumi.Output[_builtins.str]:
|
456
455
|
"""
|
457
456
|
Email of the GCP service account to impersonate.
|
458
457
|
"""
|
459
458
|
return pulumi.get(self, "service_account_email")
|
460
459
|
|
461
|
-
@property
|
460
|
+
@_builtins.property
|
462
461
|
@pulumi.getter(name="serviceAccountProject")
|
463
|
-
def service_account_project(self) -> pulumi.Output[
|
462
|
+
def service_account_project(self) -> pulumi.Output[_builtins.str]:
|
464
463
|
"""
|
465
464
|
Project the service account belongs to.
|
466
465
|
"""
|
467
466
|
return pulumi.get(self, "service_account_project")
|
468
467
|
|
469
|
-
@property
|
468
|
+
@_builtins.property
|
470
469
|
@pulumi.getter(name="tokenScopes")
|
471
|
-
def token_scopes(self) -> pulumi.Output[Optional[Sequence[
|
470
|
+
def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
472
471
|
"""
|
473
472
|
List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
474
473
|
"""
|
475
474
|
return pulumi.get(self, "token_scopes")
|
476
475
|
|
477
|
-
@property
|
476
|
+
@_builtins.property
|
478
477
|
@pulumi.getter
|
479
|
-
def ttl(self) -> pulumi.Output[
|
478
|
+
def ttl(self) -> pulumi.Output[_builtins.str]:
|
480
479
|
"""
|
481
480
|
Specifies the default TTL for service principals generated using this role.
|
482
481
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|