pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/ad/secret_role.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,24 +19,24 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
role: pulumi.Input[
|
25
|
-
service_account_name: pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
role: pulumi.Input[_builtins.str],
|
24
|
+
service_account_name: pulumi.Input[_builtins.str],
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a SecretRole resource.
|
30
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
31
30
|
with no leading or trailing `/`s.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
33
32
|
Must be unique within the backend.
|
34
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
|
35
34
|
account mapped to this role.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
41
40
|
ttl if not provided.
|
42
41
|
"""
|
43
42
|
pulumi.set(__self__, "backend", backend)
|
@@ -48,9 +47,9 @@ class SecretRoleArgs:
|
|
48
47
|
if ttl is not None:
|
49
48
|
pulumi.set(__self__, "ttl", ttl)
|
50
49
|
|
51
|
-
@property
|
50
|
+
@_builtins.property
|
52
51
|
@pulumi.getter
|
53
|
-
def backend(self) -> pulumi.Input[
|
52
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
54
53
|
"""
|
55
54
|
The path the AD secret backend is mounted at,
|
56
55
|
with no leading or trailing `/`s.
|
@@ -58,12 +57,12 @@ class SecretRoleArgs:
|
|
58
57
|
return pulumi.get(self, "backend")
|
59
58
|
|
60
59
|
@backend.setter
|
61
|
-
def backend(self, value: pulumi.Input[
|
60
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
62
61
|
pulumi.set(self, "backend", value)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def role(self) -> pulumi.Input[
|
65
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
67
66
|
"""
|
68
67
|
The name to identify this role within the backend.
|
69
68
|
Must be unique within the backend.
|
@@ -71,12 +70,12 @@ class SecretRoleArgs:
|
|
71
70
|
return pulumi.get(self, "role")
|
72
71
|
|
73
72
|
@role.setter
|
74
|
-
def role(self, value: pulumi.Input[
|
73
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
75
74
|
pulumi.set(self, "role", value)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter(name="serviceAccountName")
|
79
|
-
def service_account_name(self) -> pulumi.Input[
|
78
|
+
def service_account_name(self) -> pulumi.Input[_builtins.str]:
|
80
79
|
"""
|
81
80
|
Specifies the name of the Active Directory service
|
82
81
|
account mapped to this role.
|
@@ -84,12 +83,12 @@ class SecretRoleArgs:
|
|
84
83
|
return pulumi.get(self, "service_account_name")
|
85
84
|
|
86
85
|
@service_account_name.setter
|
87
|
-
def service_account_name(self, value: pulumi.Input[
|
86
|
+
def service_account_name(self, value: pulumi.Input[_builtins.str]):
|
88
87
|
pulumi.set(self, "service_account_name", value)
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def namespace(self) -> Optional[pulumi.Input[
|
91
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
93
92
|
"""
|
94
93
|
The namespace to provision the resource in.
|
95
94
|
The value should not contain leading or trailing forward slashes.
|
@@ -99,12 +98,12 @@ class SecretRoleArgs:
|
|
99
98
|
return pulumi.get(self, "namespace")
|
100
99
|
|
101
100
|
@namespace.setter
|
102
|
-
def namespace(self, value: Optional[pulumi.Input[
|
101
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
103
102
|
pulumi.set(self, "namespace", value)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter
|
107
|
-
def ttl(self) -> Optional[pulumi.Input[
|
106
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
108
107
|
"""
|
109
108
|
The password time-to-live in seconds. Defaults to the configuration
|
110
109
|
ttl if not provided.
|
@@ -112,35 +111,35 @@ class SecretRoleArgs:
|
|
112
111
|
return pulumi.get(self, "ttl")
|
113
112
|
|
114
113
|
@ttl.setter
|
115
|
-
def ttl(self, value: Optional[pulumi.Input[
|
114
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
116
115
|
pulumi.set(self, "ttl", value)
|
117
116
|
|
118
117
|
|
119
118
|
@pulumi.input_type
|
120
119
|
class _SecretRoleState:
|
121
120
|
def __init__(__self__, *,
|
122
|
-
backend: Optional[pulumi.Input[
|
123
|
-
last_vault_rotation: Optional[pulumi.Input[
|
124
|
-
namespace: Optional[pulumi.Input[
|
125
|
-
password_last_set: Optional[pulumi.Input[
|
126
|
-
role: Optional[pulumi.Input[
|
127
|
-
service_account_name: Optional[pulumi.Input[
|
128
|
-
ttl: Optional[pulumi.Input[
|
121
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
122
|
+
last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
|
123
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
124
|
+
password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
|
125
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
126
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
127
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
129
128
|
"""
|
130
129
|
Input properties used for looking up and filtering SecretRole resources.
|
131
|
-
:param pulumi.Input[
|
130
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
132
131
|
with no leading or trailing `/`s.
|
133
|
-
:param pulumi.Input[
|
134
|
-
:param pulumi.Input[
|
132
|
+
:param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
133
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
135
134
|
The value should not contain leading or trailing forward slashes.
|
136
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
137
136
|
*Available only for Vault Enterprise*.
|
138
|
-
:param pulumi.Input[
|
139
|
-
:param pulumi.Input[
|
137
|
+
:param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
|
138
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
140
139
|
Must be unique within the backend.
|
141
|
-
:param pulumi.Input[
|
140
|
+
:param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
|
142
141
|
account mapped to this role.
|
143
|
-
:param pulumi.Input[
|
142
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
144
143
|
ttl if not provided.
|
145
144
|
"""
|
146
145
|
if backend is not None:
|
@@ -158,9 +157,9 @@ class _SecretRoleState:
|
|
158
157
|
if ttl is not None:
|
159
158
|
pulumi.set(__self__, "ttl", ttl)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter
|
163
|
-
def backend(self) -> Optional[pulumi.Input[
|
162
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
The path the AD secret backend is mounted at,
|
166
165
|
with no leading or trailing `/`s.
|
@@ -168,24 +167,24 @@ class _SecretRoleState:
|
|
168
167
|
return pulumi.get(self, "backend")
|
169
168
|
|
170
169
|
@backend.setter
|
171
|
-
def backend(self, value: Optional[pulumi.Input[
|
170
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
172
171
|
pulumi.set(self, "backend", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter(name="lastVaultRotation")
|
176
|
-
def last_vault_rotation(self) -> Optional[pulumi.Input[
|
175
|
+
def last_vault_rotation(self) -> Optional[pulumi.Input[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
Timestamp of the last password rotation by Vault.
|
179
178
|
"""
|
180
179
|
return pulumi.get(self, "last_vault_rotation")
|
181
180
|
|
182
181
|
@last_vault_rotation.setter
|
183
|
-
def last_vault_rotation(self, value: Optional[pulumi.Input[
|
182
|
+
def last_vault_rotation(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "last_vault_rotation", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter
|
188
|
-
def namespace(self) -> Optional[pulumi.Input[
|
187
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
189
188
|
"""
|
190
189
|
The namespace to provision the resource in.
|
191
190
|
The value should not contain leading or trailing forward slashes.
|
@@ -195,24 +194,24 @@ class _SecretRoleState:
|
|
195
194
|
return pulumi.get(self, "namespace")
|
196
195
|
|
197
196
|
@namespace.setter
|
198
|
-
def namespace(self, value: Optional[pulumi.Input[
|
197
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
199
198
|
pulumi.set(self, "namespace", value)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter(name="passwordLastSet")
|
203
|
-
def password_last_set(self) -> Optional[pulumi.Input[
|
202
|
+
def password_last_set(self) -> Optional[pulumi.Input[_builtins.str]]:
|
204
203
|
"""
|
205
204
|
Timestamp of the last password set by Vault.
|
206
205
|
"""
|
207
206
|
return pulumi.get(self, "password_last_set")
|
208
207
|
|
209
208
|
@password_last_set.setter
|
210
|
-
def password_last_set(self, value: Optional[pulumi.Input[
|
209
|
+
def password_last_set(self, value: Optional[pulumi.Input[_builtins.str]]):
|
211
210
|
pulumi.set(self, "password_last_set", value)
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter
|
215
|
-
def role(self) -> Optional[pulumi.Input[
|
214
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
215
|
"""
|
217
216
|
The name to identify this role within the backend.
|
218
217
|
Must be unique within the backend.
|
@@ -220,12 +219,12 @@ class _SecretRoleState:
|
|
220
219
|
return pulumi.get(self, "role")
|
221
220
|
|
222
221
|
@role.setter
|
223
|
-
def role(self, value: Optional[pulumi.Input[
|
222
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
224
223
|
pulumi.set(self, "role", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="serviceAccountName")
|
228
|
-
def service_account_name(self) -> Optional[pulumi.Input[
|
227
|
+
def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
229
228
|
"""
|
230
229
|
Specifies the name of the Active Directory service
|
231
230
|
account mapped to this role.
|
@@ -233,12 +232,12 @@ class _SecretRoleState:
|
|
233
232
|
return pulumi.get(self, "service_account_name")
|
234
233
|
|
235
234
|
@service_account_name.setter
|
236
|
-
def service_account_name(self, value: Optional[pulumi.Input[
|
235
|
+
def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
237
236
|
pulumi.set(self, "service_account_name", value)
|
238
237
|
|
239
|
-
@property
|
238
|
+
@_builtins.property
|
240
239
|
@pulumi.getter
|
241
|
-
def ttl(self) -> Optional[pulumi.Input[
|
240
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
242
241
|
"""
|
243
242
|
The password time-to-live in seconds. Defaults to the configuration
|
244
243
|
ttl if not provided.
|
@@ -246,7 +245,7 @@ class _SecretRoleState:
|
|
246
245
|
return pulumi.get(self, "ttl")
|
247
246
|
|
248
247
|
@ttl.setter
|
249
|
-
def ttl(self, value: Optional[pulumi.Input[
|
248
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
250
249
|
pulumi.set(self, "ttl", value)
|
251
250
|
|
252
251
|
|
@@ -256,11 +255,11 @@ class SecretRole(pulumi.CustomResource):
|
|
256
255
|
def __init__(__self__,
|
257
256
|
resource_name: str,
|
258
257
|
opts: Optional[pulumi.ResourceOptions] = None,
|
259
|
-
backend: Optional[pulumi.Input[
|
260
|
-
namespace: Optional[pulumi.Input[
|
261
|
-
role: Optional[pulumi.Input[
|
262
|
-
service_account_name: Optional[pulumi.Input[
|
263
|
-
ttl: Optional[pulumi.Input[
|
258
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
259
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
260
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
261
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
262
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
264
263
|
__props__=None):
|
265
264
|
"""
|
266
265
|
## Example Usage
|
@@ -293,17 +292,17 @@ class SecretRole(pulumi.CustomResource):
|
|
293
292
|
|
294
293
|
:param str resource_name: The name of the resource.
|
295
294
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
296
|
-
:param pulumi.Input[
|
295
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
297
296
|
with no leading or trailing `/`s.
|
298
|
-
:param pulumi.Input[
|
297
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
299
298
|
The value should not contain leading or trailing forward slashes.
|
300
299
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
301
300
|
*Available only for Vault Enterprise*.
|
302
|
-
:param pulumi.Input[
|
301
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
303
302
|
Must be unique within the backend.
|
304
|
-
:param pulumi.Input[
|
303
|
+
:param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
|
305
304
|
account mapped to this role.
|
306
|
-
:param pulumi.Input[
|
305
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
307
306
|
ttl if not provided.
|
308
307
|
"""
|
309
308
|
...
|
@@ -356,11 +355,11 @@ class SecretRole(pulumi.CustomResource):
|
|
356
355
|
def _internal_init(__self__,
|
357
356
|
resource_name: str,
|
358
357
|
opts: Optional[pulumi.ResourceOptions] = None,
|
359
|
-
backend: Optional[pulumi.Input[
|
360
|
-
namespace: Optional[pulumi.Input[
|
361
|
-
role: Optional[pulumi.Input[
|
362
|
-
service_account_name: Optional[pulumi.Input[
|
363
|
-
ttl: Optional[pulumi.Input[
|
358
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
359
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
360
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
361
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
362
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
364
363
|
__props__=None):
|
365
364
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
366
365
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -393,13 +392,13 @@ class SecretRole(pulumi.CustomResource):
|
|
393
392
|
def get(resource_name: str,
|
394
393
|
id: pulumi.Input[str],
|
395
394
|
opts: Optional[pulumi.ResourceOptions] = None,
|
396
|
-
backend: Optional[pulumi.Input[
|
397
|
-
last_vault_rotation: Optional[pulumi.Input[
|
398
|
-
namespace: Optional[pulumi.Input[
|
399
|
-
password_last_set: Optional[pulumi.Input[
|
400
|
-
role: Optional[pulumi.Input[
|
401
|
-
service_account_name: Optional[pulumi.Input[
|
402
|
-
ttl: Optional[pulumi.Input[
|
395
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
396
|
+
last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
|
397
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
398
|
+
password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
|
399
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
400
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretRole':
|
403
402
|
"""
|
404
403
|
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
405
404
|
properties used to qualify the lookup.
|
@@ -407,19 +406,19 @@ class SecretRole(pulumi.CustomResource):
|
|
407
406
|
:param str resource_name: The unique name of the resulting resource.
|
408
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
409
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
410
|
-
:param pulumi.Input[
|
409
|
+
:param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
|
411
410
|
with no leading or trailing `/`s.
|
412
|
-
:param pulumi.Input[
|
413
|
-
:param pulumi.Input[
|
411
|
+
:param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
|
412
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
414
413
|
The value should not contain leading or trailing forward slashes.
|
415
414
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
416
415
|
*Available only for Vault Enterprise*.
|
417
|
-
:param pulumi.Input[
|
418
|
-
:param pulumi.Input[
|
416
|
+
:param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
|
417
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
419
418
|
Must be unique within the backend.
|
420
|
-
:param pulumi.Input[
|
419
|
+
:param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
|
421
420
|
account mapped to this role.
|
422
|
-
:param pulumi.Input[
|
421
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
423
422
|
ttl if not provided.
|
424
423
|
"""
|
425
424
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -435,26 +434,26 @@ class SecretRole(pulumi.CustomResource):
|
|
435
434
|
__props__.__dict__["ttl"] = ttl
|
436
435
|
return SecretRole(resource_name, opts=opts, __props__=__props__)
|
437
436
|
|
438
|
-
@property
|
437
|
+
@_builtins.property
|
439
438
|
@pulumi.getter
|
440
|
-
def backend(self) -> pulumi.Output[
|
439
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
441
440
|
"""
|
442
441
|
The path the AD secret backend is mounted at,
|
443
442
|
with no leading or trailing `/`s.
|
444
443
|
"""
|
445
444
|
return pulumi.get(self, "backend")
|
446
445
|
|
447
|
-
@property
|
446
|
+
@_builtins.property
|
448
447
|
@pulumi.getter(name="lastVaultRotation")
|
449
|
-
def last_vault_rotation(self) -> pulumi.Output[
|
448
|
+
def last_vault_rotation(self) -> pulumi.Output[_builtins.str]:
|
450
449
|
"""
|
451
450
|
Timestamp of the last password rotation by Vault.
|
452
451
|
"""
|
453
452
|
return pulumi.get(self, "last_vault_rotation")
|
454
453
|
|
455
|
-
@property
|
454
|
+
@_builtins.property
|
456
455
|
@pulumi.getter
|
457
|
-
def namespace(self) -> pulumi.Output[Optional[
|
456
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
458
457
|
"""
|
459
458
|
The namespace to provision the resource in.
|
460
459
|
The value should not contain leading or trailing forward slashes.
|
@@ -463,35 +462,35 @@ class SecretRole(pulumi.CustomResource):
|
|
463
462
|
"""
|
464
463
|
return pulumi.get(self, "namespace")
|
465
464
|
|
466
|
-
@property
|
465
|
+
@_builtins.property
|
467
466
|
@pulumi.getter(name="passwordLastSet")
|
468
|
-
def password_last_set(self) -> pulumi.Output[
|
467
|
+
def password_last_set(self) -> pulumi.Output[_builtins.str]:
|
469
468
|
"""
|
470
469
|
Timestamp of the last password set by Vault.
|
471
470
|
"""
|
472
471
|
return pulumi.get(self, "password_last_set")
|
473
472
|
|
474
|
-
@property
|
473
|
+
@_builtins.property
|
475
474
|
@pulumi.getter
|
476
|
-
def role(self) -> pulumi.Output[
|
475
|
+
def role(self) -> pulumi.Output[_builtins.str]:
|
477
476
|
"""
|
478
477
|
The name to identify this role within the backend.
|
479
478
|
Must be unique within the backend.
|
480
479
|
"""
|
481
480
|
return pulumi.get(self, "role")
|
482
481
|
|
483
|
-
@property
|
482
|
+
@_builtins.property
|
484
483
|
@pulumi.getter(name="serviceAccountName")
|
485
|
-
def service_account_name(self) -> pulumi.Output[
|
484
|
+
def service_account_name(self) -> pulumi.Output[_builtins.str]:
|
486
485
|
"""
|
487
486
|
Specifies the name of the Active Directory service
|
488
487
|
account mapped to this role.
|
489
488
|
"""
|
490
489
|
return pulumi.get(self, "service_account_name")
|
491
490
|
|
492
|
-
@property
|
491
|
+
@_builtins.property
|
493
492
|
@pulumi.getter
|
494
|
-
def ttl(self) -> pulumi.Output[Optional[
|
493
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
495
494
|
"""
|
496
495
|
The password time-to-live in seconds. Defaults to the configuration
|
497
496
|
ttl if not provided.
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|