pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/approle/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,19 +19,19 @@ __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendLoginArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
role_id: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
secret_id: Optional[pulumi.Input[
|
22
|
+
role_id: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendLogin resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
29
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
30
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
32
31
|
The value should not contain leading or trailing forward slashes.
|
33
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
33
|
*Available only for Vault Enterprise*.
|
35
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
36
35
|
unless `bind_secret_id` is set to false on the role.
|
37
36
|
"""
|
38
37
|
pulumi.set(__self__, "role_id", role_id)
|
@@ -43,33 +42,33 @@ class AuthBackendLoginArgs:
|
|
43
42
|
if secret_id is not None:
|
44
43
|
pulumi.set(__self__, "secret_id", secret_id)
|
45
44
|
|
46
|
-
@property
|
45
|
+
@_builtins.property
|
47
46
|
@pulumi.getter(name="roleId")
|
48
|
-
def role_id(self) -> pulumi.Input[
|
47
|
+
def role_id(self) -> pulumi.Input[_builtins.str]:
|
49
48
|
"""
|
50
49
|
The ID of the role to log in with.
|
51
50
|
"""
|
52
51
|
return pulumi.get(self, "role_id")
|
53
52
|
|
54
53
|
@role_id.setter
|
55
|
-
def role_id(self, value: pulumi.Input[
|
54
|
+
def role_id(self, value: pulumi.Input[_builtins.str]):
|
56
55
|
pulumi.set(self, "role_id", value)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[
|
59
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
61
60
|
"""
|
62
61
|
The unique path of the Vault backend to log in with.
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "backend")
|
65
64
|
|
66
65
|
@backend.setter
|
67
|
-
def backend(self, value: Optional[pulumi.Input[
|
66
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
68
67
|
pulumi.set(self, "backend", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter
|
72
|
-
def namespace(self) -> Optional[pulumi.Input[
|
71
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
73
72
|
"""
|
74
73
|
The namespace to provision the resource in.
|
75
74
|
The value should not contain leading or trailing forward slashes.
|
@@ -79,12 +78,12 @@ class AuthBackendLoginArgs:
|
|
79
78
|
return pulumi.get(self, "namespace")
|
80
79
|
|
81
80
|
@namespace.setter
|
82
|
-
def namespace(self, value: Optional[pulumi.Input[
|
81
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
83
82
|
pulumi.set(self, "namespace", value)
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="secretId")
|
87
|
-
def secret_id(self) -> Optional[pulumi.Input[
|
86
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
88
87
|
"""
|
89
88
|
The secret ID of the role to log in with. Required
|
90
89
|
unless `bind_secret_id` is set to false on the role.
|
@@ -92,40 +91,40 @@ class AuthBackendLoginArgs:
|
|
92
91
|
return pulumi.get(self, "secret_id")
|
93
92
|
|
94
93
|
@secret_id.setter
|
95
|
-
def secret_id(self, value: Optional[pulumi.Input[
|
94
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
96
95
|
pulumi.set(self, "secret_id", value)
|
97
96
|
|
98
97
|
|
99
98
|
@pulumi.input_type
|
100
99
|
class _AuthBackendLoginState:
|
101
100
|
def __init__(__self__, *,
|
102
|
-
accessor: Optional[pulumi.Input[
|
103
|
-
backend: Optional[pulumi.Input[
|
104
|
-
client_token: Optional[pulumi.Input[
|
105
|
-
lease_duration: Optional[pulumi.Input[
|
106
|
-
lease_started: Optional[pulumi.Input[
|
107
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
108
|
-
namespace: Optional[pulumi.Input[
|
109
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
-
renewable: Optional[pulumi.Input[
|
111
|
-
role_id: Optional[pulumi.Input[
|
112
|
-
secret_id: Optional[pulumi.Input[
|
101
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
102
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
103
|
+
client_token: Optional[pulumi.Input[_builtins.str]] = None,
|
104
|
+
lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
|
105
|
+
lease_started: Optional[pulumi.Input[_builtins.str]] = None,
|
106
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
107
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
108
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
109
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
110
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
111
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None):
|
113
112
|
"""
|
114
113
|
Input properties used for looking up and filtering AuthBackendLogin resources.
|
115
|
-
:param pulumi.Input[
|
116
|
-
:param pulumi.Input[
|
117
|
-
:param pulumi.Input[
|
118
|
-
:param pulumi.Input[
|
119
|
-
:param pulumi.Input[
|
120
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
121
|
-
:param pulumi.Input[
|
114
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for the token.
|
115
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
116
|
+
:param pulumi.Input[_builtins.str] client_token: The Vault token created.
|
117
|
+
:param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
|
118
|
+
:param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
|
119
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
|
120
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
122
121
|
The value should not contain leading or trailing forward slashes.
|
123
122
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
124
123
|
*Available only for Vault Enterprise*.
|
125
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
126
|
-
:param pulumi.Input[
|
127
|
-
:param pulumi.Input[
|
128
|
-
:param pulumi.Input[
|
124
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
|
125
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
|
126
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
127
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
129
128
|
unless `bind_secret_id` is set to false on the role.
|
130
129
|
"""
|
131
130
|
if accessor is not None:
|
@@ -151,81 +150,81 @@ class _AuthBackendLoginState:
|
|
151
150
|
if secret_id is not None:
|
152
151
|
pulumi.set(__self__, "secret_id", secret_id)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter
|
156
|
-
def accessor(self) -> Optional[pulumi.Input[
|
155
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
157
156
|
"""
|
158
157
|
The accessor for the token.
|
159
158
|
"""
|
160
159
|
return pulumi.get(self, "accessor")
|
161
160
|
|
162
161
|
@accessor.setter
|
163
|
-
def accessor(self, value: Optional[pulumi.Input[
|
162
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
164
163
|
pulumi.set(self, "accessor", value)
|
165
164
|
|
166
|
-
@property
|
165
|
+
@_builtins.property
|
167
166
|
@pulumi.getter
|
168
|
-
def backend(self) -> Optional[pulumi.Input[
|
167
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
169
168
|
"""
|
170
169
|
The unique path of the Vault backend to log in with.
|
171
170
|
"""
|
172
171
|
return pulumi.get(self, "backend")
|
173
172
|
|
174
173
|
@backend.setter
|
175
|
-
def backend(self, value: Optional[pulumi.Input[
|
174
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
176
175
|
pulumi.set(self, "backend", value)
|
177
176
|
|
178
|
-
@property
|
177
|
+
@_builtins.property
|
179
178
|
@pulumi.getter(name="clientToken")
|
180
|
-
def client_token(self) -> Optional[pulumi.Input[
|
179
|
+
def client_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
181
180
|
"""
|
182
181
|
The Vault token created.
|
183
182
|
"""
|
184
183
|
return pulumi.get(self, "client_token")
|
185
184
|
|
186
185
|
@client_token.setter
|
187
|
-
def client_token(self, value: Optional[pulumi.Input[
|
186
|
+
def client_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
188
187
|
pulumi.set(self, "client_token", value)
|
189
188
|
|
190
|
-
@property
|
189
|
+
@_builtins.property
|
191
190
|
@pulumi.getter(name="leaseDuration")
|
192
|
-
def lease_duration(self) -> Optional[pulumi.Input[
|
191
|
+
def lease_duration(self) -> Optional[pulumi.Input[_builtins.int]]:
|
193
192
|
"""
|
194
193
|
How long the token is valid for, in seconds.
|
195
194
|
"""
|
196
195
|
return pulumi.get(self, "lease_duration")
|
197
196
|
|
198
197
|
@lease_duration.setter
|
199
|
-
def lease_duration(self, value: Optional[pulumi.Input[
|
198
|
+
def lease_duration(self, value: Optional[pulumi.Input[_builtins.int]]):
|
200
199
|
pulumi.set(self, "lease_duration", value)
|
201
200
|
|
202
|
-
@property
|
201
|
+
@_builtins.property
|
203
202
|
@pulumi.getter(name="leaseStarted")
|
204
|
-
def lease_started(self) -> Optional[pulumi.Input[
|
203
|
+
def lease_started(self) -> Optional[pulumi.Input[_builtins.str]]:
|
205
204
|
"""
|
206
205
|
The date and time the lease started, in RFC 3339 format.
|
207
206
|
"""
|
208
207
|
return pulumi.get(self, "lease_started")
|
209
208
|
|
210
209
|
@lease_started.setter
|
211
|
-
def lease_started(self, value: Optional[pulumi.Input[
|
210
|
+
def lease_started(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
211
|
pulumi.set(self, "lease_started", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter
|
216
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
215
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
217
216
|
"""
|
218
217
|
The metadata associated with the token.
|
219
218
|
"""
|
220
219
|
return pulumi.get(self, "metadata")
|
221
220
|
|
222
221
|
@metadata.setter
|
223
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
222
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
224
223
|
pulumi.set(self, "metadata", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter
|
228
|
-
def namespace(self) -> Optional[pulumi.Input[
|
227
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
229
228
|
"""
|
230
229
|
The namespace to provision the resource in.
|
231
230
|
The value should not contain leading or trailing forward slashes.
|
@@ -235,48 +234,48 @@ class _AuthBackendLoginState:
|
|
235
234
|
return pulumi.get(self, "namespace")
|
236
235
|
|
237
236
|
@namespace.setter
|
238
|
-
def namespace(self, value: Optional[pulumi.Input[
|
237
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
239
238
|
pulumi.set(self, "namespace", value)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter
|
243
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
242
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
244
243
|
"""
|
245
244
|
A list of policies applied to the token.
|
246
245
|
"""
|
247
246
|
return pulumi.get(self, "policies")
|
248
247
|
|
249
248
|
@policies.setter
|
250
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
249
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
251
250
|
pulumi.set(self, "policies", value)
|
252
251
|
|
253
|
-
@property
|
252
|
+
@_builtins.property
|
254
253
|
@pulumi.getter
|
255
|
-
def renewable(self) -> Optional[pulumi.Input[
|
254
|
+
def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
256
255
|
"""
|
257
256
|
Whether the token is renewable or not.
|
258
257
|
"""
|
259
258
|
return pulumi.get(self, "renewable")
|
260
259
|
|
261
260
|
@renewable.setter
|
262
|
-
def renewable(self, value: Optional[pulumi.Input[
|
261
|
+
def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
263
262
|
pulumi.set(self, "renewable", value)
|
264
263
|
|
265
|
-
@property
|
264
|
+
@_builtins.property
|
266
265
|
@pulumi.getter(name="roleId")
|
267
|
-
def role_id(self) -> Optional[pulumi.Input[
|
266
|
+
def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
268
267
|
"""
|
269
268
|
The ID of the role to log in with.
|
270
269
|
"""
|
271
270
|
return pulumi.get(self, "role_id")
|
272
271
|
|
273
272
|
@role_id.setter
|
274
|
-
def role_id(self, value: Optional[pulumi.Input[
|
273
|
+
def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
275
274
|
pulumi.set(self, "role_id", value)
|
276
275
|
|
277
|
-
@property
|
276
|
+
@_builtins.property
|
278
277
|
@pulumi.getter(name="secretId")
|
279
|
-
def secret_id(self) -> Optional[pulumi.Input[
|
278
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
280
279
|
"""
|
281
280
|
The secret ID of the role to log in with. Required
|
282
281
|
unless `bind_secret_id` is set to false on the role.
|
@@ -284,7 +283,7 @@ class _AuthBackendLoginState:
|
|
284
283
|
return pulumi.get(self, "secret_id")
|
285
284
|
|
286
285
|
@secret_id.setter
|
287
|
-
def secret_id(self, value: Optional[pulumi.Input[
|
286
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
288
287
|
pulumi.set(self, "secret_id", value)
|
289
288
|
|
290
289
|
|
@@ -294,10 +293,10 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
294
293
|
def __init__(__self__,
|
295
294
|
resource_name: str,
|
296
295
|
opts: Optional[pulumi.ResourceOptions] = None,
|
297
|
-
backend: Optional[pulumi.Input[
|
298
|
-
namespace: Optional[pulumi.Input[
|
299
|
-
role_id: Optional[pulumi.Input[
|
300
|
-
secret_id: Optional[pulumi.Input[
|
296
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
297
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
298
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
299
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
301
300
|
__props__=None):
|
302
301
|
"""
|
303
302
|
Logs into Vault using the AppRole auth backend. See the [Vault
|
@@ -311,7 +310,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
311
310
|
import pulumi_vault as vault
|
312
311
|
|
313
312
|
approle = vault.AuthBackend("approle", type="approle")
|
314
|
-
example = vault.
|
313
|
+
example = vault.approle.AuthBackendRole("example",
|
315
314
|
backend=approle.path,
|
316
315
|
role_name="test-role",
|
317
316
|
token_policies=[
|
@@ -319,10 +318,10 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
319
318
|
"dev",
|
320
319
|
"prod",
|
321
320
|
])
|
322
|
-
id = vault.
|
321
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
323
322
|
backend=approle.path,
|
324
323
|
role_name=example.role_name)
|
325
|
-
login = vault.
|
324
|
+
login = vault.approle.AuthBackendLogin("login",
|
326
325
|
backend=approle.path,
|
327
326
|
role_id=example.role_id,
|
328
327
|
secret_id=id.secret_id)
|
@@ -330,13 +329,13 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
330
329
|
|
331
330
|
:param str resource_name: The name of the resource.
|
332
331
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
333
|
-
:param pulumi.Input[
|
334
|
-
:param pulumi.Input[
|
332
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
333
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
335
334
|
The value should not contain leading or trailing forward slashes.
|
336
335
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
337
336
|
*Available only for Vault Enterprise*.
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
337
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
338
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
340
339
|
unless `bind_secret_id` is set to false on the role.
|
341
340
|
"""
|
342
341
|
...
|
@@ -357,7 +356,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
357
356
|
import pulumi_vault as vault
|
358
357
|
|
359
358
|
approle = vault.AuthBackend("approle", type="approle")
|
360
|
-
example = vault.
|
359
|
+
example = vault.approle.AuthBackendRole("example",
|
361
360
|
backend=approle.path,
|
362
361
|
role_name="test-role",
|
363
362
|
token_policies=[
|
@@ -365,10 +364,10 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
365
364
|
"dev",
|
366
365
|
"prod",
|
367
366
|
])
|
368
|
-
id = vault.
|
367
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
369
368
|
backend=approle.path,
|
370
369
|
role_name=example.role_name)
|
371
|
-
login = vault.
|
370
|
+
login = vault.approle.AuthBackendLogin("login",
|
372
371
|
backend=approle.path,
|
373
372
|
role_id=example.role_id,
|
374
373
|
secret_id=id.secret_id)
|
@@ -389,10 +388,10 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
389
388
|
def _internal_init(__self__,
|
390
389
|
resource_name: str,
|
391
390
|
opts: Optional[pulumi.ResourceOptions] = None,
|
392
|
-
backend: Optional[pulumi.Input[
|
393
|
-
namespace: Optional[pulumi.Input[
|
394
|
-
role_id: Optional[pulumi.Input[
|
395
|
-
secret_id: Optional[pulumi.Input[
|
391
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
392
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
393
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
394
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
396
395
|
__props__=None):
|
397
396
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
398
397
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -427,17 +426,17 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
427
426
|
def get(resource_name: str,
|
428
427
|
id: pulumi.Input[str],
|
429
428
|
opts: Optional[pulumi.ResourceOptions] = None,
|
430
|
-
accessor: Optional[pulumi.Input[
|
431
|
-
backend: Optional[pulumi.Input[
|
432
|
-
client_token: Optional[pulumi.Input[
|
433
|
-
lease_duration: Optional[pulumi.Input[
|
434
|
-
lease_started: Optional[pulumi.Input[
|
435
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
436
|
-
namespace: Optional[pulumi.Input[
|
437
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
438
|
-
renewable: Optional[pulumi.Input[
|
439
|
-
role_id: Optional[pulumi.Input[
|
440
|
-
secret_id: Optional[pulumi.Input[
|
429
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
430
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
431
|
+
client_token: Optional[pulumi.Input[_builtins.str]] = None,
|
432
|
+
lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
|
433
|
+
lease_started: Optional[pulumi.Input[_builtins.str]] = None,
|
434
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
435
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
436
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
437
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
438
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
439
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendLogin':
|
441
440
|
"""
|
442
441
|
Get an existing AuthBackendLogin resource's state with the given name, id, and optional extra
|
443
442
|
properties used to qualify the lookup.
|
@@ -445,20 +444,20 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
445
444
|
:param str resource_name: The unique name of the resulting resource.
|
446
445
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
447
446
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
448
|
-
:param pulumi.Input[
|
449
|
-
:param pulumi.Input[
|
450
|
-
:param pulumi.Input[
|
451
|
-
:param pulumi.Input[
|
452
|
-
:param pulumi.Input[
|
453
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
454
|
-
:param pulumi.Input[
|
447
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for the token.
|
448
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
449
|
+
:param pulumi.Input[_builtins.str] client_token: The Vault token created.
|
450
|
+
:param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
|
451
|
+
:param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
|
452
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
|
453
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
455
454
|
The value should not contain leading or trailing forward slashes.
|
456
455
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
457
456
|
*Available only for Vault Enterprise*.
|
458
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
461
|
-
:param pulumi.Input[
|
457
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
|
458
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
|
459
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
460
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
462
461
|
unless `bind_secret_id` is set to false on the role.
|
463
462
|
"""
|
464
463
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -478,57 +477,57 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
478
477
|
__props__.__dict__["secret_id"] = secret_id
|
479
478
|
return AuthBackendLogin(resource_name, opts=opts, __props__=__props__)
|
480
479
|
|
481
|
-
@property
|
480
|
+
@_builtins.property
|
482
481
|
@pulumi.getter
|
483
|
-
def accessor(self) -> pulumi.Output[
|
482
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
484
483
|
"""
|
485
484
|
The accessor for the token.
|
486
485
|
"""
|
487
486
|
return pulumi.get(self, "accessor")
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter
|
491
|
-
def backend(self) -> pulumi.Output[Optional[
|
490
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
492
491
|
"""
|
493
492
|
The unique path of the Vault backend to log in with.
|
494
493
|
"""
|
495
494
|
return pulumi.get(self, "backend")
|
496
495
|
|
497
|
-
@property
|
496
|
+
@_builtins.property
|
498
497
|
@pulumi.getter(name="clientToken")
|
499
|
-
def client_token(self) -> pulumi.Output[
|
498
|
+
def client_token(self) -> pulumi.Output[_builtins.str]:
|
500
499
|
"""
|
501
500
|
The Vault token created.
|
502
501
|
"""
|
503
502
|
return pulumi.get(self, "client_token")
|
504
503
|
|
505
|
-
@property
|
504
|
+
@_builtins.property
|
506
505
|
@pulumi.getter(name="leaseDuration")
|
507
|
-
def lease_duration(self) -> pulumi.Output[
|
506
|
+
def lease_duration(self) -> pulumi.Output[_builtins.int]:
|
508
507
|
"""
|
509
508
|
How long the token is valid for, in seconds.
|
510
509
|
"""
|
511
510
|
return pulumi.get(self, "lease_duration")
|
512
511
|
|
513
|
-
@property
|
512
|
+
@_builtins.property
|
514
513
|
@pulumi.getter(name="leaseStarted")
|
515
|
-
def lease_started(self) -> pulumi.Output[
|
514
|
+
def lease_started(self) -> pulumi.Output[_builtins.str]:
|
516
515
|
"""
|
517
516
|
The date and time the lease started, in RFC 3339 format.
|
518
517
|
"""
|
519
518
|
return pulumi.get(self, "lease_started")
|
520
519
|
|
521
|
-
@property
|
520
|
+
@_builtins.property
|
522
521
|
@pulumi.getter
|
523
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
522
|
+
def metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
524
523
|
"""
|
525
524
|
The metadata associated with the token.
|
526
525
|
"""
|
527
526
|
return pulumi.get(self, "metadata")
|
528
527
|
|
529
|
-
@property
|
528
|
+
@_builtins.property
|
530
529
|
@pulumi.getter
|
531
|
-
def namespace(self) -> pulumi.Output[Optional[
|
530
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
532
531
|
"""
|
533
532
|
The namespace to provision the resource in.
|
534
533
|
The value should not contain leading or trailing forward slashes.
|
@@ -537,33 +536,33 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
537
536
|
"""
|
538
537
|
return pulumi.get(self, "namespace")
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter
|
542
|
-
def policies(self) -> pulumi.Output[Sequence[
|
541
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
543
542
|
"""
|
544
543
|
A list of policies applied to the token.
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "policies")
|
547
546
|
|
548
|
-
@property
|
547
|
+
@_builtins.property
|
549
548
|
@pulumi.getter
|
550
|
-
def renewable(self) -> pulumi.Output[
|
549
|
+
def renewable(self) -> pulumi.Output[_builtins.bool]:
|
551
550
|
"""
|
552
551
|
Whether the token is renewable or not.
|
553
552
|
"""
|
554
553
|
return pulumi.get(self, "renewable")
|
555
554
|
|
556
|
-
@property
|
555
|
+
@_builtins.property
|
557
556
|
@pulumi.getter(name="roleId")
|
558
|
-
def role_id(self) -> pulumi.Output[
|
557
|
+
def role_id(self) -> pulumi.Output[_builtins.str]:
|
559
558
|
"""
|
560
559
|
The ID of the role to log in with.
|
561
560
|
"""
|
562
561
|
return pulumi.get(self, "role_id")
|
563
562
|
|
564
|
-
@property
|
563
|
+
@_builtins.property
|
565
564
|
@pulumi.getter(name="secretId")
|
566
|
-
def secret_id(self) -> pulumi.Output[Optional[
|
565
|
+
def secret_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
567
566
|
"""
|
568
567
|
The secret ID of the role to log in with. Required
|
569
568
|
unless `bind_secret_id` is set to false on the role.
|