pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,35 +19,35 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
mount: pulumi.Input[
|
24
|
-
roles: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
max_ttl: Optional[pulumi.Input[
|
28
|
-
name: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
organization_id: Optional[pulumi.Input[
|
31
|
-
project_id: Optional[pulumi.Input[
|
32
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
mount: pulumi.Input[_builtins.str],
|
23
|
+
roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
organization_id: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
34
33
|
"""
|
35
34
|
The set of arguments for constructing a SecretRole resource.
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
39
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
40
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
41
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
43
42
|
The value should not contain leading or trailing forward slashes.
|
44
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
45
44
|
*Available only for Vault Enterprise*.
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
47
46
|
Required if `project_id` is not set.
|
48
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
49
48
|
Required if `organization_id` is not set.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
50
|
+
:param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
52
51
|
"""
|
53
52
|
pulumi.set(__self__, "mount", mount)
|
54
53
|
pulumi.set(__self__, "roles", roles)
|
@@ -71,81 +70,81 @@ class SecretRoleArgs:
|
|
71
70
|
if ttl is not None:
|
72
71
|
pulumi.set(__self__, "ttl", ttl)
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter
|
76
|
-
def mount(self) -> pulumi.Input[
|
75
|
+
def mount(self) -> pulumi.Input[_builtins.str]:
|
77
76
|
"""
|
78
77
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "mount")
|
81
80
|
|
82
81
|
@mount.setter
|
83
|
-
def mount(self, value: pulumi.Input[
|
82
|
+
def mount(self, value: pulumi.Input[_builtins.str]):
|
84
83
|
pulumi.set(self, "mount", value)
|
85
84
|
|
86
|
-
@property
|
85
|
+
@_builtins.property
|
87
86
|
@pulumi.getter
|
88
|
-
def roles(self) -> pulumi.Input[Sequence[pulumi.Input[
|
87
|
+
def roles(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
89
88
|
"""
|
90
89
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
91
90
|
"""
|
92
91
|
return pulumi.get(self, "roles")
|
93
92
|
|
94
93
|
@roles.setter
|
95
|
-
def roles(self, value: pulumi.Input[Sequence[pulumi.Input[
|
94
|
+
def roles(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
96
95
|
pulumi.set(self, "roles", value)
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter(name="cidrBlocks")
|
100
|
-
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
99
|
+
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
101
100
|
"""
|
102
101
|
Whitelist entry in CIDR notation to be added for the API key.
|
103
102
|
"""
|
104
103
|
return pulumi.get(self, "cidr_blocks")
|
105
104
|
|
106
105
|
@cidr_blocks.setter
|
107
|
-
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
106
|
+
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
108
107
|
pulumi.set(self, "cidr_blocks", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter(name="ipAddresses")
|
112
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
111
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
113
112
|
"""
|
114
113
|
IP address to be added to the whitelist for the API key.
|
115
114
|
"""
|
116
115
|
return pulumi.get(self, "ip_addresses")
|
117
116
|
|
118
117
|
@ip_addresses.setter
|
119
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
118
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
120
119
|
pulumi.set(self, "ip_addresses", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="maxTtl")
|
124
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
123
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
The maximum allowed lifetime of credentials issued using this role.
|
127
126
|
"""
|
128
127
|
return pulumi.get(self, "max_ttl")
|
129
128
|
|
130
129
|
@max_ttl.setter
|
131
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
130
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
132
131
|
pulumi.set(self, "max_ttl", value)
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
@pulumi.getter
|
136
|
-
def name(self) -> Optional[pulumi.Input[
|
135
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
137
136
|
"""
|
138
137
|
The name of the role.
|
139
138
|
"""
|
140
139
|
return pulumi.get(self, "name")
|
141
140
|
|
142
141
|
@name.setter
|
143
|
-
def name(self, value: Optional[pulumi.Input[
|
142
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
144
143
|
pulumi.set(self, "name", value)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter
|
148
|
-
def namespace(self) -> Optional[pulumi.Input[
|
147
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
149
148
|
"""
|
150
149
|
The namespace to provision the resource in.
|
151
150
|
The value should not contain leading or trailing forward slashes.
|
@@ -155,12 +154,12 @@ class SecretRoleArgs:
|
|
155
154
|
return pulumi.get(self, "namespace")
|
156
155
|
|
157
156
|
@namespace.setter
|
158
|
-
def namespace(self, value: Optional[pulumi.Input[
|
157
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "namespace", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="organizationId")
|
163
|
-
def organization_id(self) -> Optional[pulumi.Input[
|
162
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
Unique identifier for the organization to which the target API Key belongs.
|
166
165
|
Required if `project_id` is not set.
|
@@ -168,12 +167,12 @@ class SecretRoleArgs:
|
|
168
167
|
return pulumi.get(self, "organization_id")
|
169
168
|
|
170
169
|
@organization_id.setter
|
171
|
-
def organization_id(self, value: Optional[pulumi.Input[
|
170
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
172
171
|
pulumi.set(self, "organization_id", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter(name="projectId")
|
176
|
-
def project_id(self) -> Optional[pulumi.Input[
|
175
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
Unique identifier for the project to which the target API Key belongs.
|
179
178
|
Required if `organization_id` is not set.
|
@@ -181,66 +180,66 @@ class SecretRoleArgs:
|
|
181
180
|
return pulumi.get(self, "project_id")
|
182
181
|
|
183
182
|
@project_id.setter
|
184
|
-
def project_id(self, value: Optional[pulumi.Input[
|
183
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
185
184
|
pulumi.set(self, "project_id", value)
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter(name="projectRoles")
|
189
|
-
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
188
|
+
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
190
189
|
"""
|
191
190
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
192
191
|
"""
|
193
192
|
return pulumi.get(self, "project_roles")
|
194
193
|
|
195
194
|
@project_roles.setter
|
196
|
-
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
195
|
+
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
197
196
|
pulumi.set(self, "project_roles", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter
|
201
|
-
def ttl(self) -> Optional[pulumi.Input[
|
200
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
202
201
|
"""
|
203
202
|
Duration in seconds after which the issued credential should expire.
|
204
203
|
"""
|
205
204
|
return pulumi.get(self, "ttl")
|
206
205
|
|
207
206
|
@ttl.setter
|
208
|
-
def ttl(self, value: Optional[pulumi.Input[
|
207
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
209
208
|
pulumi.set(self, "ttl", value)
|
210
209
|
|
211
210
|
|
212
211
|
@pulumi.input_type
|
213
212
|
class _SecretRoleState:
|
214
213
|
def __init__(__self__, *,
|
215
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[
|
216
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
217
|
-
max_ttl: Optional[pulumi.Input[
|
218
|
-
mount: Optional[pulumi.Input[
|
219
|
-
name: Optional[pulumi.Input[
|
220
|
-
namespace: Optional[pulumi.Input[
|
221
|
-
organization_id: Optional[pulumi.Input[
|
222
|
-
project_id: Optional[pulumi.Input[
|
223
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
224
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
225
|
-
ttl: Optional[pulumi.Input[
|
214
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
215
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
216
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
217
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
218
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
219
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
220
|
+
organization_id: Optional[pulumi.Input[_builtins.str]] = None,
|
221
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
223
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
224
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
226
225
|
"""
|
227
226
|
Input properties used for looking up and filtering SecretRole resources.
|
228
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
229
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
230
|
-
:param pulumi.Input[
|
231
|
-
:param pulumi.Input[
|
232
|
-
:param pulumi.Input[
|
233
|
-
:param pulumi.Input[
|
227
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
228
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
229
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
230
|
+
:param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
231
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
232
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
234
233
|
The value should not contain leading or trailing forward slashes.
|
235
234
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
236
235
|
*Available only for Vault Enterprise*.
|
237
|
-
:param pulumi.Input[
|
236
|
+
:param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
238
237
|
Required if `project_id` is not set.
|
239
|
-
:param pulumi.Input[
|
238
|
+
:param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
240
239
|
Required if `organization_id` is not set.
|
241
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
242
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
243
|
-
:param pulumi.Input[
|
240
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
241
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
242
|
+
:param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
244
243
|
"""
|
245
244
|
if cidr_blocks is not None:
|
246
245
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
@@ -265,69 +264,69 @@ class _SecretRoleState:
|
|
265
264
|
if ttl is not None:
|
266
265
|
pulumi.set(__self__, "ttl", ttl)
|
267
266
|
|
268
|
-
@property
|
267
|
+
@_builtins.property
|
269
268
|
@pulumi.getter(name="cidrBlocks")
|
270
|
-
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
269
|
+
def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
271
270
|
"""
|
272
271
|
Whitelist entry in CIDR notation to be added for the API key.
|
273
272
|
"""
|
274
273
|
return pulumi.get(self, "cidr_blocks")
|
275
274
|
|
276
275
|
@cidr_blocks.setter
|
277
|
-
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
276
|
+
def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
278
277
|
pulumi.set(self, "cidr_blocks", value)
|
279
278
|
|
280
|
-
@property
|
279
|
+
@_builtins.property
|
281
280
|
@pulumi.getter(name="ipAddresses")
|
282
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
281
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
283
282
|
"""
|
284
283
|
IP address to be added to the whitelist for the API key.
|
285
284
|
"""
|
286
285
|
return pulumi.get(self, "ip_addresses")
|
287
286
|
|
288
287
|
@ip_addresses.setter
|
289
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
288
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
290
289
|
pulumi.set(self, "ip_addresses", value)
|
291
290
|
|
292
|
-
@property
|
291
|
+
@_builtins.property
|
293
292
|
@pulumi.getter(name="maxTtl")
|
294
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
293
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
295
294
|
"""
|
296
295
|
The maximum allowed lifetime of credentials issued using this role.
|
297
296
|
"""
|
298
297
|
return pulumi.get(self, "max_ttl")
|
299
298
|
|
300
299
|
@max_ttl.setter
|
301
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
300
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
302
301
|
pulumi.set(self, "max_ttl", value)
|
303
302
|
|
304
|
-
@property
|
303
|
+
@_builtins.property
|
305
304
|
@pulumi.getter
|
306
|
-
def mount(self) -> Optional[pulumi.Input[
|
305
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
307
306
|
"""
|
308
307
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
309
308
|
"""
|
310
309
|
return pulumi.get(self, "mount")
|
311
310
|
|
312
311
|
@mount.setter
|
313
|
-
def mount(self, value: Optional[pulumi.Input[
|
312
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
314
313
|
pulumi.set(self, "mount", value)
|
315
314
|
|
316
|
-
@property
|
315
|
+
@_builtins.property
|
317
316
|
@pulumi.getter
|
318
|
-
def name(self) -> Optional[pulumi.Input[
|
317
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
319
318
|
"""
|
320
319
|
The name of the role.
|
321
320
|
"""
|
322
321
|
return pulumi.get(self, "name")
|
323
322
|
|
324
323
|
@name.setter
|
325
|
-
def name(self, value: Optional[pulumi.Input[
|
324
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
326
325
|
pulumi.set(self, "name", value)
|
327
326
|
|
328
|
-
@property
|
327
|
+
@_builtins.property
|
329
328
|
@pulumi.getter
|
330
|
-
def namespace(self) -> Optional[pulumi.Input[
|
329
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
331
330
|
"""
|
332
331
|
The namespace to provision the resource in.
|
333
332
|
The value should not contain leading or trailing forward slashes.
|
@@ -337,12 +336,12 @@ class _SecretRoleState:
|
|
337
336
|
return pulumi.get(self, "namespace")
|
338
337
|
|
339
338
|
@namespace.setter
|
340
|
-
def namespace(self, value: Optional[pulumi.Input[
|
339
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
341
340
|
pulumi.set(self, "namespace", value)
|
342
341
|
|
343
|
-
@property
|
342
|
+
@_builtins.property
|
344
343
|
@pulumi.getter(name="organizationId")
|
345
|
-
def organization_id(self) -> Optional[pulumi.Input[
|
344
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
346
345
|
"""
|
347
346
|
Unique identifier for the organization to which the target API Key belongs.
|
348
347
|
Required if `project_id` is not set.
|
@@ -350,12 +349,12 @@ class _SecretRoleState:
|
|
350
349
|
return pulumi.get(self, "organization_id")
|
351
350
|
|
352
351
|
@organization_id.setter
|
353
|
-
def organization_id(self, value: Optional[pulumi.Input[
|
352
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
354
353
|
pulumi.set(self, "organization_id", value)
|
355
354
|
|
356
|
-
@property
|
355
|
+
@_builtins.property
|
357
356
|
@pulumi.getter(name="projectId")
|
358
|
-
def project_id(self) -> Optional[pulumi.Input[
|
357
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
359
358
|
"""
|
360
359
|
Unique identifier for the project to which the target API Key belongs.
|
361
360
|
Required if `organization_id` is not set.
|
@@ -363,43 +362,43 @@ class _SecretRoleState:
|
|
363
362
|
return pulumi.get(self, "project_id")
|
364
363
|
|
365
364
|
@project_id.setter
|
366
|
-
def project_id(self, value: Optional[pulumi.Input[
|
365
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
367
366
|
pulumi.set(self, "project_id", value)
|
368
367
|
|
369
|
-
@property
|
368
|
+
@_builtins.property
|
370
369
|
@pulumi.getter(name="projectRoles")
|
371
|
-
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
370
|
+
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
372
371
|
"""
|
373
372
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
374
373
|
"""
|
375
374
|
return pulumi.get(self, "project_roles")
|
376
375
|
|
377
376
|
@project_roles.setter
|
378
|
-
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
377
|
+
def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
379
378
|
pulumi.set(self, "project_roles", value)
|
380
379
|
|
381
|
-
@property
|
380
|
+
@_builtins.property
|
382
381
|
@pulumi.getter
|
383
|
-
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
382
|
+
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
384
383
|
"""
|
385
384
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
386
385
|
"""
|
387
386
|
return pulumi.get(self, "roles")
|
388
387
|
|
389
388
|
@roles.setter
|
390
|
-
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
389
|
+
def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
391
390
|
pulumi.set(self, "roles", value)
|
392
391
|
|
393
|
-
@property
|
392
|
+
@_builtins.property
|
394
393
|
@pulumi.getter
|
395
|
-
def ttl(self) -> Optional[pulumi.Input[
|
394
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
396
395
|
"""
|
397
396
|
Duration in seconds after which the issued credential should expire.
|
398
397
|
"""
|
399
398
|
return pulumi.get(self, "ttl")
|
400
399
|
|
401
400
|
@ttl.setter
|
402
|
-
def ttl(self, value: Optional[pulumi.Input[
|
401
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
403
402
|
pulumi.set(self, "ttl", value)
|
404
403
|
|
405
404
|
|
@@ -409,17 +408,17 @@ class SecretRole(pulumi.CustomResource):
|
|
409
408
|
def __init__(__self__,
|
410
409
|
resource_name: str,
|
411
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
412
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[
|
413
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
414
|
-
max_ttl: Optional[pulumi.Input[
|
415
|
-
mount: Optional[pulumi.Input[
|
416
|
-
name: Optional[pulumi.Input[
|
417
|
-
namespace: Optional[pulumi.Input[
|
418
|
-
organization_id: Optional[pulumi.Input[
|
419
|
-
project_id: Optional[pulumi.Input[
|
420
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
421
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
422
|
-
ttl: Optional[pulumi.Input[
|
411
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
412
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
413
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
416
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
417
|
+
organization_id: Optional[pulumi.Input[_builtins.str]] = None,
|
418
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
419
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
420
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
421
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
423
422
|
__props__=None):
|
424
423
|
"""
|
425
424
|
## Example Usage
|
@@ -460,22 +459,22 @@ class SecretRole(pulumi.CustomResource):
|
|
460
459
|
|
461
460
|
:param str resource_name: The name of the resource.
|
462
461
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
463
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
464
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
465
|
-
:param pulumi.Input[
|
466
|
-
:param pulumi.Input[
|
467
|
-
:param pulumi.Input[
|
468
|
-
:param pulumi.Input[
|
462
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
463
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
464
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
465
|
+
:param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
466
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
467
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
469
468
|
The value should not contain leading or trailing forward slashes.
|
470
469
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
471
470
|
*Available only for Vault Enterprise*.
|
472
|
-
:param pulumi.Input[
|
471
|
+
:param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
473
472
|
Required if `project_id` is not set.
|
474
|
-
:param pulumi.Input[
|
473
|
+
:param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
475
474
|
Required if `organization_id` is not set.
|
476
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
477
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
478
|
-
:param pulumi.Input[
|
475
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
476
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
477
|
+
:param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
479
478
|
"""
|
480
479
|
...
|
481
480
|
@overload
|
@@ -535,17 +534,17 @@ class SecretRole(pulumi.CustomResource):
|
|
535
534
|
def _internal_init(__self__,
|
536
535
|
resource_name: str,
|
537
536
|
opts: Optional[pulumi.ResourceOptions] = None,
|
538
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[
|
539
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
540
|
-
max_ttl: Optional[pulumi.Input[
|
541
|
-
mount: Optional[pulumi.Input[
|
542
|
-
name: Optional[pulumi.Input[
|
543
|
-
namespace: Optional[pulumi.Input[
|
544
|
-
organization_id: Optional[pulumi.Input[
|
545
|
-
project_id: Optional[pulumi.Input[
|
546
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
547
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
548
|
-
ttl: Optional[pulumi.Input[
|
537
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
538
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
539
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
540
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
541
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
542
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
543
|
+
organization_id: Optional[pulumi.Input[_builtins.str]] = None,
|
544
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
545
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
546
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
547
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
549
548
|
__props__=None):
|
550
549
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
551
550
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -580,17 +579,17 @@ class SecretRole(pulumi.CustomResource):
|
|
580
579
|
def get(resource_name: str,
|
581
580
|
id: pulumi.Input[str],
|
582
581
|
opts: Optional[pulumi.ResourceOptions] = None,
|
583
|
-
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[
|
584
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
585
|
-
max_ttl: Optional[pulumi.Input[
|
586
|
-
mount: Optional[pulumi.Input[
|
587
|
-
name: Optional[pulumi.Input[
|
588
|
-
namespace: Optional[pulumi.Input[
|
589
|
-
organization_id: Optional[pulumi.Input[
|
590
|
-
project_id: Optional[pulumi.Input[
|
591
|
-
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
592
|
-
roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
593
|
-
ttl: Optional[pulumi.Input[
|
582
|
+
cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
583
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
584
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
585
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
586
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
587
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
588
|
+
organization_id: Optional[pulumi.Input[_builtins.str]] = None,
|
589
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
590
|
+
project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
591
|
+
roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
592
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretRole':
|
594
593
|
"""
|
595
594
|
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
596
595
|
properties used to qualify the lookup.
|
@@ -598,22 +597,22 @@ class SecretRole(pulumi.CustomResource):
|
|
598
597
|
:param str resource_name: The unique name of the resulting resource.
|
599
598
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
600
599
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
601
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
602
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
603
|
-
:param pulumi.Input[
|
604
|
-
:param pulumi.Input[
|
605
|
-
:param pulumi.Input[
|
606
|
-
:param pulumi.Input[
|
600
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
601
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
602
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
603
|
+
:param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
604
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
605
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
607
606
|
The value should not contain leading or trailing forward slashes.
|
608
607
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
609
608
|
*Available only for Vault Enterprise*.
|
610
|
-
:param pulumi.Input[
|
609
|
+
:param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
611
610
|
Required if `project_id` is not set.
|
612
|
-
:param pulumi.Input[
|
611
|
+
:param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
|
613
612
|
Required if `organization_id` is not set.
|
614
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
615
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
616
|
-
:param pulumi.Input[
|
613
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
614
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
615
|
+
:param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
|
617
616
|
"""
|
618
617
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
619
618
|
|
@@ -632,49 +631,49 @@ class SecretRole(pulumi.CustomResource):
|
|
632
631
|
__props__.__dict__["ttl"] = ttl
|
633
632
|
return SecretRole(resource_name, opts=opts, __props__=__props__)
|
634
633
|
|
635
|
-
@property
|
634
|
+
@_builtins.property
|
636
635
|
@pulumi.getter(name="cidrBlocks")
|
637
|
-
def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[
|
636
|
+
def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
638
637
|
"""
|
639
638
|
Whitelist entry in CIDR notation to be added for the API key.
|
640
639
|
"""
|
641
640
|
return pulumi.get(self, "cidr_blocks")
|
642
641
|
|
643
|
-
@property
|
642
|
+
@_builtins.property
|
644
643
|
@pulumi.getter(name="ipAddresses")
|
645
|
-
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[
|
644
|
+
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
646
645
|
"""
|
647
646
|
IP address to be added to the whitelist for the API key.
|
648
647
|
"""
|
649
648
|
return pulumi.get(self, "ip_addresses")
|
650
649
|
|
651
|
-
@property
|
650
|
+
@_builtins.property
|
652
651
|
@pulumi.getter(name="maxTtl")
|
653
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
652
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
654
653
|
"""
|
655
654
|
The maximum allowed lifetime of credentials issued using this role.
|
656
655
|
"""
|
657
656
|
return pulumi.get(self, "max_ttl")
|
658
657
|
|
659
|
-
@property
|
658
|
+
@_builtins.property
|
660
659
|
@pulumi.getter
|
661
|
-
def mount(self) -> pulumi.Output[
|
660
|
+
def mount(self) -> pulumi.Output[_builtins.str]:
|
662
661
|
"""
|
663
662
|
Path where the MongoDB Atlas Secrets Engine is mounted.
|
664
663
|
"""
|
665
664
|
return pulumi.get(self, "mount")
|
666
665
|
|
667
|
-
@property
|
666
|
+
@_builtins.property
|
668
667
|
@pulumi.getter
|
669
|
-
def name(self) -> pulumi.Output[
|
668
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
670
669
|
"""
|
671
670
|
The name of the role.
|
672
671
|
"""
|
673
672
|
return pulumi.get(self, "name")
|
674
673
|
|
675
|
-
@property
|
674
|
+
@_builtins.property
|
676
675
|
@pulumi.getter
|
677
|
-
def namespace(self) -> pulumi.Output[Optional[
|
676
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
678
677
|
"""
|
679
678
|
The namespace to provision the resource in.
|
680
679
|
The value should not contain leading or trailing forward slashes.
|
@@ -683,43 +682,43 @@ class SecretRole(pulumi.CustomResource):
|
|
683
682
|
"""
|
684
683
|
return pulumi.get(self, "namespace")
|
685
684
|
|
686
|
-
@property
|
685
|
+
@_builtins.property
|
687
686
|
@pulumi.getter(name="organizationId")
|
688
|
-
def organization_id(self) -> pulumi.Output[Optional[
|
687
|
+
def organization_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
689
688
|
"""
|
690
689
|
Unique identifier for the organization to which the target API Key belongs.
|
691
690
|
Required if `project_id` is not set.
|
692
691
|
"""
|
693
692
|
return pulumi.get(self, "organization_id")
|
694
693
|
|
695
|
-
@property
|
694
|
+
@_builtins.property
|
696
695
|
@pulumi.getter(name="projectId")
|
697
|
-
def project_id(self) -> pulumi.Output[Optional[
|
696
|
+
def project_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
698
697
|
"""
|
699
698
|
Unique identifier for the project to which the target API Key belongs.
|
700
699
|
Required if `organization_id` is not set.
|
701
700
|
"""
|
702
701
|
return pulumi.get(self, "project_id")
|
703
702
|
|
704
|
-
@property
|
703
|
+
@_builtins.property
|
705
704
|
@pulumi.getter(name="projectRoles")
|
706
|
-
def project_roles(self) -> pulumi.Output[Optional[Sequence[
|
705
|
+
def project_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
707
706
|
"""
|
708
707
|
Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
|
709
708
|
"""
|
710
709
|
return pulumi.get(self, "project_roles")
|
711
710
|
|
712
|
-
@property
|
711
|
+
@_builtins.property
|
713
712
|
@pulumi.getter
|
714
|
-
def roles(self) -> pulumi.Output[Sequence[
|
713
|
+
def roles(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
715
714
|
"""
|
716
715
|
List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
|
717
716
|
"""
|
718
717
|
return pulumi.get(self, "roles")
|
719
718
|
|
720
|
-
@property
|
719
|
+
@_builtins.property
|
721
720
|
@pulumi.getter
|
722
|
-
def ttl(self) -> pulumi.Output[Optional[
|
721
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
723
722
|
"""
|
724
723
|
Duration in seconds after which the issued credential should expire.
|
725
724
|
"""
|