pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,25 +21,25 @@ __all__ = ['SecretRolesetArgs', 'SecretRoleset']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SecretRolesetArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
26
25
|
bindings: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]],
|
27
|
-
project: pulumi.Input[
|
28
|
-
roleset: pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
secret_type: Optional[pulumi.Input[
|
31
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
+
project: pulumi.Input[_builtins.str],
|
27
|
+
roleset: pulumi.Input[_builtins.str],
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
secret_type: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
32
31
|
"""
|
33
32
|
The set of arguments for constructing a SecretRoleset resource.
|
34
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
35
34
|
:param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
36
|
+
:param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
|
37
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
39
38
|
The value should not contain leading or trailing forward slashes.
|
40
39
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
40
|
*Available only for Vault Enterprise*.
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
42
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
44
43
|
"""
|
45
44
|
pulumi.set(__self__, "backend", backend)
|
46
45
|
pulumi.set(__self__, "bindings", bindings)
|
@@ -53,19 +52,19 @@ class SecretRolesetArgs:
|
|
53
52
|
if token_scopes is not None:
|
54
53
|
pulumi.set(__self__, "token_scopes", token_scopes)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def backend(self) -> pulumi.Input[
|
57
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
59
58
|
"""
|
60
59
|
Path where the GCP Secrets Engine is mounted
|
61
60
|
"""
|
62
61
|
return pulumi.get(self, "backend")
|
63
62
|
|
64
63
|
@backend.setter
|
65
|
-
def backend(self, value: pulumi.Input[
|
64
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
66
65
|
pulumi.set(self, "backend", value)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
69
|
def bindings(self) -> pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]:
|
71
70
|
"""
|
@@ -77,33 +76,33 @@ class SecretRolesetArgs:
|
|
77
76
|
def bindings(self, value: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]):
|
78
77
|
pulumi.set(self, "bindings", value)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def project(self) -> pulumi.Input[
|
81
|
+
def project(self) -> pulumi.Input[_builtins.str]:
|
83
82
|
"""
|
84
83
|
Name of the GCP project that this roleset's service account will belong to.
|
85
84
|
"""
|
86
85
|
return pulumi.get(self, "project")
|
87
86
|
|
88
87
|
@project.setter
|
89
|
-
def project(self, value: pulumi.Input[
|
88
|
+
def project(self, value: pulumi.Input[_builtins.str]):
|
90
89
|
pulumi.set(self, "project", value)
|
91
90
|
|
92
|
-
@property
|
91
|
+
@_builtins.property
|
93
92
|
@pulumi.getter
|
94
|
-
def roleset(self) -> pulumi.Input[
|
93
|
+
def roleset(self) -> pulumi.Input[_builtins.str]:
|
95
94
|
"""
|
96
95
|
Name of the Roleset to create
|
97
96
|
"""
|
98
97
|
return pulumi.get(self, "roleset")
|
99
98
|
|
100
99
|
@roleset.setter
|
101
|
-
def roleset(self, value: pulumi.Input[
|
100
|
+
def roleset(self, value: pulumi.Input[_builtins.str]):
|
102
101
|
pulumi.set(self, "roleset", value)
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def namespace(self) -> Optional[pulumi.Input[
|
105
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
107
106
|
"""
|
108
107
|
The namespace to provision the resource in.
|
109
108
|
The value should not contain leading or trailing forward slashes.
|
@@ -113,58 +112,58 @@ class SecretRolesetArgs:
|
|
113
112
|
return pulumi.get(self, "namespace")
|
114
113
|
|
115
114
|
@namespace.setter
|
116
|
-
def namespace(self, value: Optional[pulumi.Input[
|
115
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
117
116
|
pulumi.set(self, "namespace", value)
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter(name="secretType")
|
121
|
-
def secret_type(self) -> Optional[pulumi.Input[
|
120
|
+
def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
122
121
|
"""
|
123
122
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "secret_type")
|
126
125
|
|
127
126
|
@secret_type.setter
|
128
|
-
def secret_type(self, value: Optional[pulumi.Input[
|
127
|
+
def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
129
128
|
pulumi.set(self, "secret_type", value)
|
130
129
|
|
131
|
-
@property
|
130
|
+
@_builtins.property
|
132
131
|
@pulumi.getter(name="tokenScopes")
|
133
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
132
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
134
133
|
"""
|
135
134
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
136
135
|
"""
|
137
136
|
return pulumi.get(self, "token_scopes")
|
138
137
|
|
139
138
|
@token_scopes.setter
|
140
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
139
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
141
140
|
pulumi.set(self, "token_scopes", value)
|
142
141
|
|
143
142
|
|
144
143
|
@pulumi.input_type
|
145
144
|
class _SecretRolesetState:
|
146
145
|
def __init__(__self__, *,
|
147
|
-
backend: Optional[pulumi.Input[
|
146
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
148
147
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]] = None,
|
149
|
-
namespace: Optional[pulumi.Input[
|
150
|
-
project: Optional[pulumi.Input[
|
151
|
-
roleset: Optional[pulumi.Input[
|
152
|
-
secret_type: Optional[pulumi.Input[
|
153
|
-
service_account_email: Optional[pulumi.Input[
|
154
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
148
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
149
|
+
project: Optional[pulumi.Input[_builtins.str]] = None,
|
150
|
+
roleset: Optional[pulumi.Input[_builtins.str]] = None,
|
151
|
+
secret_type: Optional[pulumi.Input[_builtins.str]] = None,
|
152
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
153
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
155
154
|
"""
|
156
155
|
Input properties used for looking up and filtering SecretRoleset resources.
|
157
|
-
:param pulumi.Input[
|
156
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
158
157
|
:param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
159
|
-
:param pulumi.Input[
|
158
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
160
159
|
The value should not contain leading or trailing forward slashes.
|
161
160
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
162
161
|
*Available only for Vault Enterprise*.
|
163
|
-
:param pulumi.Input[
|
164
|
-
:param pulumi.Input[
|
165
|
-
:param pulumi.Input[
|
166
|
-
:param pulumi.Input[
|
167
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
162
|
+
:param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
163
|
+
:param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
|
164
|
+
:param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
165
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
|
166
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
168
167
|
"""
|
169
168
|
if backend is not None:
|
170
169
|
pulumi.set(__self__, "backend", backend)
|
@@ -183,19 +182,19 @@ class _SecretRolesetState:
|
|
183
182
|
if token_scopes is not None:
|
184
183
|
pulumi.set(__self__, "token_scopes", token_scopes)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter
|
188
|
-
def backend(self) -> Optional[pulumi.Input[
|
187
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
189
188
|
"""
|
190
189
|
Path where the GCP Secrets Engine is mounted
|
191
190
|
"""
|
192
191
|
return pulumi.get(self, "backend")
|
193
192
|
|
194
193
|
@backend.setter
|
195
|
-
def backend(self, value: Optional[pulumi.Input[
|
194
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
196
195
|
pulumi.set(self, "backend", value)
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
@pulumi.getter
|
200
199
|
def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]]:
|
201
200
|
"""
|
@@ -207,9 +206,9 @@ class _SecretRolesetState:
|
|
207
206
|
def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]]):
|
208
207
|
pulumi.set(self, "bindings", value)
|
209
208
|
|
210
|
-
@property
|
209
|
+
@_builtins.property
|
211
210
|
@pulumi.getter
|
212
|
-
def namespace(self) -> Optional[pulumi.Input[
|
211
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
213
212
|
"""
|
214
213
|
The namespace to provision the resource in.
|
215
214
|
The value should not contain leading or trailing forward slashes.
|
@@ -219,67 +218,67 @@ class _SecretRolesetState:
|
|
219
218
|
return pulumi.get(self, "namespace")
|
220
219
|
|
221
220
|
@namespace.setter
|
222
|
-
def namespace(self, value: Optional[pulumi.Input[
|
221
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
223
222
|
pulumi.set(self, "namespace", value)
|
224
223
|
|
225
|
-
@property
|
224
|
+
@_builtins.property
|
226
225
|
@pulumi.getter
|
227
|
-
def project(self) -> Optional[pulumi.Input[
|
226
|
+
def project(self) -> Optional[pulumi.Input[_builtins.str]]:
|
228
227
|
"""
|
229
228
|
Name of the GCP project that this roleset's service account will belong to.
|
230
229
|
"""
|
231
230
|
return pulumi.get(self, "project")
|
232
231
|
|
233
232
|
@project.setter
|
234
|
-
def project(self, value: Optional[pulumi.Input[
|
233
|
+
def project(self, value: Optional[pulumi.Input[_builtins.str]]):
|
235
234
|
pulumi.set(self, "project", value)
|
236
235
|
|
237
|
-
@property
|
236
|
+
@_builtins.property
|
238
237
|
@pulumi.getter
|
239
|
-
def roleset(self) -> Optional[pulumi.Input[
|
238
|
+
def roleset(self) -> Optional[pulumi.Input[_builtins.str]]:
|
240
239
|
"""
|
241
240
|
Name of the Roleset to create
|
242
241
|
"""
|
243
242
|
return pulumi.get(self, "roleset")
|
244
243
|
|
245
244
|
@roleset.setter
|
246
|
-
def roleset(self, value: Optional[pulumi.Input[
|
245
|
+
def roleset(self, value: Optional[pulumi.Input[_builtins.str]]):
|
247
246
|
pulumi.set(self, "roleset", value)
|
248
247
|
|
249
|
-
@property
|
248
|
+
@_builtins.property
|
250
249
|
@pulumi.getter(name="secretType")
|
251
|
-
def secret_type(self) -> Optional[pulumi.Input[
|
250
|
+
def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
252
251
|
"""
|
253
252
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
254
253
|
"""
|
255
254
|
return pulumi.get(self, "secret_type")
|
256
255
|
|
257
256
|
@secret_type.setter
|
258
|
-
def secret_type(self, value: Optional[pulumi.Input[
|
257
|
+
def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
259
258
|
pulumi.set(self, "secret_type", value)
|
260
259
|
|
261
|
-
@property
|
260
|
+
@_builtins.property
|
262
261
|
@pulumi.getter(name="serviceAccountEmail")
|
263
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
262
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
264
263
|
"""
|
265
264
|
Email of the service account created by Vault for this Roleset.
|
266
265
|
"""
|
267
266
|
return pulumi.get(self, "service_account_email")
|
268
267
|
|
269
268
|
@service_account_email.setter
|
270
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
269
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
271
270
|
pulumi.set(self, "service_account_email", value)
|
272
271
|
|
273
|
-
@property
|
272
|
+
@_builtins.property
|
274
273
|
@pulumi.getter(name="tokenScopes")
|
275
|
-
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
274
|
+
def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
276
275
|
"""
|
277
276
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
278
277
|
"""
|
279
278
|
return pulumi.get(self, "token_scopes")
|
280
279
|
|
281
280
|
@token_scopes.setter
|
282
|
-
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
281
|
+
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
283
282
|
pulumi.set(self, "token_scopes", value)
|
284
283
|
|
285
284
|
|
@@ -289,13 +288,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
289
288
|
def __init__(__self__,
|
290
289
|
resource_name: str,
|
291
290
|
opts: Optional[pulumi.ResourceOptions] = None,
|
292
|
-
backend: Optional[pulumi.Input[
|
291
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
293
292
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
294
|
-
namespace: Optional[pulumi.Input[
|
295
|
-
project: Optional[pulumi.Input[
|
296
|
-
roleset: Optional[pulumi.Input[
|
297
|
-
secret_type: Optional[pulumi.Input[
|
298
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
293
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
294
|
+
project: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
roleset: Optional[pulumi.Input[_builtins.str]] = None,
|
296
|
+
secret_type: Optional[pulumi.Input[_builtins.str]] = None,
|
297
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
299
298
|
__props__=None):
|
300
299
|
"""
|
301
300
|
Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
|
@@ -335,16 +334,16 @@ class SecretRoleset(pulumi.CustomResource):
|
|
335
334
|
|
336
335
|
:param str resource_name: The name of the resource.
|
337
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
338
|
-
:param pulumi.Input[
|
337
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
339
338
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
340
|
-
:param pulumi.Input[
|
339
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
341
340
|
The value should not contain leading or trailing forward slashes.
|
342
341
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
343
342
|
*Available only for Vault Enterprise*.
|
344
|
-
:param pulumi.Input[
|
345
|
-
:param pulumi.Input[
|
346
|
-
:param pulumi.Input[
|
347
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
343
|
+
:param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
344
|
+
:param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
|
345
|
+
:param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
346
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
348
347
|
"""
|
349
348
|
...
|
350
349
|
@overload
|
@@ -403,13 +402,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
403
402
|
def _internal_init(__self__,
|
404
403
|
resource_name: str,
|
405
404
|
opts: Optional[pulumi.ResourceOptions] = None,
|
406
|
-
backend: Optional[pulumi.Input[
|
405
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
407
406
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
408
|
-
namespace: Optional[pulumi.Input[
|
409
|
-
project: Optional[pulumi.Input[
|
410
|
-
roleset: Optional[pulumi.Input[
|
411
|
-
secret_type: Optional[pulumi.Input[
|
412
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
407
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
408
|
+
project: Optional[pulumi.Input[_builtins.str]] = None,
|
409
|
+
roleset: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
secret_type: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
413
412
|
__props__=None):
|
414
413
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
415
414
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -445,14 +444,14 @@ class SecretRoleset(pulumi.CustomResource):
|
|
445
444
|
def get(resource_name: str,
|
446
445
|
id: pulumi.Input[str],
|
447
446
|
opts: Optional[pulumi.ResourceOptions] = None,
|
448
|
-
backend: Optional[pulumi.Input[
|
447
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
449
448
|
bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
|
450
|
-
namespace: Optional[pulumi.Input[
|
451
|
-
project: Optional[pulumi.Input[
|
452
|
-
roleset: Optional[pulumi.Input[
|
453
|
-
secret_type: Optional[pulumi.Input[
|
454
|
-
service_account_email: Optional[pulumi.Input[
|
455
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
449
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
project: Optional[pulumi.Input[_builtins.str]] = None,
|
451
|
+
roleset: Optional[pulumi.Input[_builtins.str]] = None,
|
452
|
+
secret_type: Optional[pulumi.Input[_builtins.str]] = None,
|
453
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
454
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretRoleset':
|
456
455
|
"""
|
457
456
|
Get an existing SecretRoleset resource's state with the given name, id, and optional extra
|
458
457
|
properties used to qualify the lookup.
|
@@ -460,17 +459,17 @@ class SecretRoleset(pulumi.CustomResource):
|
|
460
459
|
:param str resource_name: The unique name of the resulting resource.
|
461
460
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
462
461
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
463
|
-
:param pulumi.Input[
|
462
|
+
:param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
|
464
463
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
|
465
|
-
:param pulumi.Input[
|
464
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
466
465
|
The value should not contain leading or trailing forward slashes.
|
467
466
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
468
467
|
*Available only for Vault Enterprise*.
|
469
|
-
:param pulumi.Input[
|
470
|
-
:param pulumi.Input[
|
471
|
-
:param pulumi.Input[
|
472
|
-
:param pulumi.Input[
|
473
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
468
|
+
:param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
|
469
|
+
:param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
|
470
|
+
:param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
471
|
+
:param pulumi.Input[_builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
|
472
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
474
473
|
"""
|
475
474
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
476
475
|
|
@@ -486,15 +485,15 @@ class SecretRoleset(pulumi.CustomResource):
|
|
486
485
|
__props__.__dict__["token_scopes"] = token_scopes
|
487
486
|
return SecretRoleset(resource_name, opts=opts, __props__=__props__)
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter
|
491
|
-
def backend(self) -> pulumi.Output[
|
490
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
492
491
|
"""
|
493
492
|
Path where the GCP Secrets Engine is mounted
|
494
493
|
"""
|
495
494
|
return pulumi.get(self, "backend")
|
496
495
|
|
497
|
-
@property
|
496
|
+
@_builtins.property
|
498
497
|
@pulumi.getter
|
499
498
|
def bindings(self) -> pulumi.Output[Sequence['outputs.SecretRolesetBinding']]:
|
500
499
|
"""
|
@@ -502,9 +501,9 @@ class SecretRoleset(pulumi.CustomResource):
|
|
502
501
|
"""
|
503
502
|
return pulumi.get(self, "bindings")
|
504
503
|
|
505
|
-
@property
|
504
|
+
@_builtins.property
|
506
505
|
@pulumi.getter
|
507
|
-
def namespace(self) -> pulumi.Output[Optional[
|
506
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
508
507
|
"""
|
509
508
|
The namespace to provision the resource in.
|
510
509
|
The value should not contain leading or trailing forward slashes.
|
@@ -513,41 +512,41 @@ class SecretRoleset(pulumi.CustomResource):
|
|
513
512
|
"""
|
514
513
|
return pulumi.get(self, "namespace")
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter
|
518
|
-
def project(self) -> pulumi.Output[
|
517
|
+
def project(self) -> pulumi.Output[_builtins.str]:
|
519
518
|
"""
|
520
519
|
Name of the GCP project that this roleset's service account will belong to.
|
521
520
|
"""
|
522
521
|
return pulumi.get(self, "project")
|
523
522
|
|
524
|
-
@property
|
523
|
+
@_builtins.property
|
525
524
|
@pulumi.getter
|
526
|
-
def roleset(self) -> pulumi.Output[
|
525
|
+
def roleset(self) -> pulumi.Output[_builtins.str]:
|
527
526
|
"""
|
528
527
|
Name of the Roleset to create
|
529
528
|
"""
|
530
529
|
return pulumi.get(self, "roleset")
|
531
530
|
|
532
|
-
@property
|
531
|
+
@_builtins.property
|
533
532
|
@pulumi.getter(name="secretType")
|
534
|
-
def secret_type(self) -> pulumi.Output[
|
533
|
+
def secret_type(self) -> pulumi.Output[_builtins.str]:
|
535
534
|
"""
|
536
535
|
Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
|
537
536
|
"""
|
538
537
|
return pulumi.get(self, "secret_type")
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter(name="serviceAccountEmail")
|
542
|
-
def service_account_email(self) -> pulumi.Output[
|
541
|
+
def service_account_email(self) -> pulumi.Output[_builtins.str]:
|
543
542
|
"""
|
544
543
|
Email of the service account created by Vault for this Roleset.
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "service_account_email")
|
547
546
|
|
548
|
-
@property
|
547
|
+
@_builtins.property
|
549
548
|
@pulumi.getter(name="tokenScopes")
|
550
|
-
def token_scopes(self) -> pulumi.Output[Optional[Sequence[
|
549
|
+
def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
551
550
|
"""
|
552
551
|
List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
|
553
552
|
"""
|