pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,23 +19,23 @@ __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendUserArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
username: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
username: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a AuthBackendUser resource.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] username: The LDAP username
|
30
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
32
31
|
|
33
32
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
|
34
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
36
35
|
The value should not contain leading or trailing forward slashes.
|
37
36
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
37
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
|
40
39
|
"""
|
41
40
|
pulumi.set(__self__, "username", username)
|
42
41
|
if backend is not None:
|
@@ -48,21 +47,21 @@ class AuthBackendUserArgs:
|
|
48
47
|
if policies is not None:
|
49
48
|
pulumi.set(__self__, "policies", policies)
|
50
49
|
|
51
|
-
@property
|
50
|
+
@_builtins.property
|
52
51
|
@pulumi.getter
|
53
|
-
def username(self) -> pulumi.Input[
|
52
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
54
53
|
"""
|
55
54
|
The LDAP username
|
56
55
|
"""
|
57
56
|
return pulumi.get(self, "username")
|
58
57
|
|
59
58
|
@username.setter
|
60
|
-
def username(self, value: pulumi.Input[
|
59
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
61
60
|
pulumi.set(self, "username", value)
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter
|
65
|
-
def backend(self) -> Optional[pulumi.Input[
|
64
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
66
65
|
"""
|
67
66
|
Path to the authentication backend
|
68
67
|
|
@@ -71,24 +70,24 @@ class AuthBackendUserArgs:
|
|
71
70
|
return pulumi.get(self, "backend")
|
72
71
|
|
73
72
|
@backend.setter
|
74
|
-
def backend(self, value: Optional[pulumi.Input[
|
73
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
75
74
|
pulumi.set(self, "backend", value)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter
|
79
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
78
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
80
79
|
"""
|
81
80
|
Override LDAP groups which should be granted to user
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "groups")
|
84
83
|
|
85
84
|
@groups.setter
|
86
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
85
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
87
86
|
pulumi.set(self, "groups", value)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter
|
91
|
-
def namespace(self) -> Optional[pulumi.Input[
|
90
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
92
91
|
"""
|
93
92
|
The namespace to provision the resource in.
|
94
93
|
The value should not contain leading or trailing forward slashes.
|
@@ -98,42 +97,42 @@ class AuthBackendUserArgs:
|
|
98
97
|
return pulumi.get(self, "namespace")
|
99
98
|
|
100
99
|
@namespace.setter
|
101
|
-
def namespace(self, value: Optional[pulumi.Input[
|
100
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
102
101
|
pulumi.set(self, "namespace", value)
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
105
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
107
106
|
"""
|
108
107
|
Policies which should be granted to user
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "policies")
|
111
110
|
|
112
111
|
@policies.setter
|
113
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
112
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
114
113
|
pulumi.set(self, "policies", value)
|
115
114
|
|
116
115
|
|
117
116
|
@pulumi.input_type
|
118
117
|
class _AuthBackendUserState:
|
119
118
|
def __init__(__self__, *,
|
120
|
-
backend: Optional[pulumi.Input[
|
121
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
122
|
-
namespace: Optional[pulumi.Input[
|
123
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
124
|
-
username: Optional[pulumi.Input[
|
119
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
120
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
121
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
122
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
123
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
125
124
|
"""
|
126
125
|
Input properties used for looking up and filtering AuthBackendUser resources.
|
127
|
-
:param pulumi.Input[
|
126
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
128
127
|
|
129
128
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
130
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
131
|
-
:param pulumi.Input[
|
129
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
|
130
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
132
131
|
The value should not contain leading or trailing forward slashes.
|
133
132
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
134
133
|
*Available only for Vault Enterprise*.
|
135
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
136
|
-
:param pulumi.Input[
|
134
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
|
135
|
+
:param pulumi.Input[_builtins.str] username: The LDAP username
|
137
136
|
"""
|
138
137
|
if backend is not None:
|
139
138
|
pulumi.set(__self__, "backend", backend)
|
@@ -146,9 +145,9 @@ class _AuthBackendUserState:
|
|
146
145
|
if username is not None:
|
147
146
|
pulumi.set(__self__, "username", username)
|
148
147
|
|
149
|
-
@property
|
148
|
+
@_builtins.property
|
150
149
|
@pulumi.getter
|
151
|
-
def backend(self) -> Optional[pulumi.Input[
|
150
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
152
151
|
"""
|
153
152
|
Path to the authentication backend
|
154
153
|
|
@@ -157,24 +156,24 @@ class _AuthBackendUserState:
|
|
157
156
|
return pulumi.get(self, "backend")
|
158
157
|
|
159
158
|
@backend.setter
|
160
|
-
def backend(self, value: Optional[pulumi.Input[
|
159
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
161
160
|
pulumi.set(self, "backend", value)
|
162
161
|
|
163
|
-
@property
|
162
|
+
@_builtins.property
|
164
163
|
@pulumi.getter
|
165
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
164
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
166
165
|
"""
|
167
166
|
Override LDAP groups which should be granted to user
|
168
167
|
"""
|
169
168
|
return pulumi.get(self, "groups")
|
170
169
|
|
171
170
|
@groups.setter
|
172
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
171
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
173
172
|
pulumi.set(self, "groups", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter
|
177
|
-
def namespace(self) -> Optional[pulumi.Input[
|
176
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
178
177
|
"""
|
179
178
|
The namespace to provision the resource in.
|
180
179
|
The value should not contain leading or trailing forward slashes.
|
@@ -184,31 +183,31 @@ class _AuthBackendUserState:
|
|
184
183
|
return pulumi.get(self, "namespace")
|
185
184
|
|
186
185
|
@namespace.setter
|
187
|
-
def namespace(self, value: Optional[pulumi.Input[
|
186
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
188
187
|
pulumi.set(self, "namespace", value)
|
189
188
|
|
190
|
-
@property
|
189
|
+
@_builtins.property
|
191
190
|
@pulumi.getter
|
192
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
191
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
193
192
|
"""
|
194
193
|
Policies which should be granted to user
|
195
194
|
"""
|
196
195
|
return pulumi.get(self, "policies")
|
197
196
|
|
198
197
|
@policies.setter
|
199
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
198
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
200
199
|
pulumi.set(self, "policies", value)
|
201
200
|
|
202
|
-
@property
|
201
|
+
@_builtins.property
|
203
202
|
@pulumi.getter
|
204
|
-
def username(self) -> Optional[pulumi.Input[
|
203
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
205
204
|
"""
|
206
205
|
The LDAP username
|
207
206
|
"""
|
208
207
|
return pulumi.get(self, "username")
|
209
208
|
|
210
209
|
@username.setter
|
211
|
-
def username(self, value: Optional[pulumi.Input[
|
210
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
211
|
pulumi.set(self, "username", value)
|
213
212
|
|
214
213
|
|
@@ -218,11 +217,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
218
217
|
def __init__(__self__,
|
219
218
|
resource_name: str,
|
220
219
|
opts: Optional[pulumi.ResourceOptions] = None,
|
221
|
-
backend: Optional[pulumi.Input[
|
222
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
223
|
-
namespace: Optional[pulumi.Input[
|
224
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
225
|
-
username: Optional[pulumi.Input[
|
220
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
221
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
222
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
223
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
224
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
226
225
|
__props__=None):
|
227
226
|
"""
|
228
227
|
Provides a resource to create a user in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -261,16 +260,16 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
261
260
|
|
262
261
|
:param str resource_name: The name of the resource.
|
263
262
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
264
|
-
:param pulumi.Input[
|
263
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
265
264
|
|
266
265
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
267
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
268
|
-
:param pulumi.Input[
|
266
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
|
267
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
269
268
|
The value should not contain leading or trailing forward slashes.
|
270
269
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
270
|
*Available only for Vault Enterprise*.
|
272
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
273
|
-
:param pulumi.Input[
|
271
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
|
272
|
+
:param pulumi.Input[_builtins.str] username: The LDAP username
|
274
273
|
"""
|
275
274
|
...
|
276
275
|
@overload
|
@@ -328,11 +327,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
328
327
|
def _internal_init(__self__,
|
329
328
|
resource_name: str,
|
330
329
|
opts: Optional[pulumi.ResourceOptions] = None,
|
331
|
-
backend: Optional[pulumi.Input[
|
332
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
333
|
-
namespace: Optional[pulumi.Input[
|
334
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
335
|
-
username: Optional[pulumi.Input[
|
330
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
331
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
332
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
333
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
334
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
336
335
|
__props__=None):
|
337
336
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
338
337
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -359,11 +358,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
359
358
|
def get(resource_name: str,
|
360
359
|
id: pulumi.Input[str],
|
361
360
|
opts: Optional[pulumi.ResourceOptions] = None,
|
362
|
-
backend: Optional[pulumi.Input[
|
363
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
364
|
-
namespace: Optional[pulumi.Input[
|
365
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
366
|
-
username: Optional[pulumi.Input[
|
361
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
362
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
364
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
365
|
+
username: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendUser':
|
367
366
|
"""
|
368
367
|
Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
|
369
368
|
properties used to qualify the lookup.
|
@@ -371,16 +370,16 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
371
370
|
:param str resource_name: The unique name of the resulting resource.
|
372
371
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
373
372
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
374
|
-
:param pulumi.Input[
|
373
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
375
374
|
|
376
375
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
377
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
378
|
-
:param pulumi.Input[
|
376
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
|
377
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
379
378
|
The value should not contain leading or trailing forward slashes.
|
380
379
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
381
380
|
*Available only for Vault Enterprise*.
|
382
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
383
|
-
:param pulumi.Input[
|
381
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
|
382
|
+
:param pulumi.Input[_builtins.str] username: The LDAP username
|
384
383
|
"""
|
385
384
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
386
385
|
|
@@ -393,9 +392,9 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
393
392
|
__props__.__dict__["username"] = username
|
394
393
|
return AuthBackendUser(resource_name, opts=opts, __props__=__props__)
|
395
394
|
|
396
|
-
@property
|
395
|
+
@_builtins.property
|
397
396
|
@pulumi.getter
|
398
|
-
def backend(self) -> pulumi.Output[Optional[
|
397
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
399
398
|
"""
|
400
399
|
Path to the authentication backend
|
401
400
|
|
@@ -403,17 +402,17 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
403
402
|
"""
|
404
403
|
return pulumi.get(self, "backend")
|
405
404
|
|
406
|
-
@property
|
405
|
+
@_builtins.property
|
407
406
|
@pulumi.getter
|
408
|
-
def groups(self) -> pulumi.Output[Sequence[
|
407
|
+
def groups(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
409
408
|
"""
|
410
409
|
Override LDAP groups which should be granted to user
|
411
410
|
"""
|
412
411
|
return pulumi.get(self, "groups")
|
413
412
|
|
414
|
-
@property
|
413
|
+
@_builtins.property
|
415
414
|
@pulumi.getter
|
416
|
-
def namespace(self) -> pulumi.Output[Optional[
|
415
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
417
416
|
"""
|
418
417
|
The namespace to provision the resource in.
|
419
418
|
The value should not contain leading or trailing forward slashes.
|
@@ -422,17 +421,17 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
422
421
|
"""
|
423
422
|
return pulumi.get(self, "namespace")
|
424
423
|
|
425
|
-
@property
|
424
|
+
@_builtins.property
|
426
425
|
@pulumi.getter
|
427
|
-
def policies(self) -> pulumi.Output[Sequence[
|
426
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
428
427
|
"""
|
429
428
|
Policies which should be granted to user
|
430
429
|
"""
|
431
430
|
return pulumi.get(self, "policies")
|
432
431
|
|
433
|
-
@property
|
432
|
+
@_builtins.property
|
434
433
|
@pulumi.getter
|
435
|
-
def username(self) -> pulumi.Output[
|
434
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
436
435
|
"""
|
437
436
|
The LDAP username
|
438
437
|
"""
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -59,57 +58,57 @@ class GetDynamicCredentialsResult:
|
|
59
58
|
raise TypeError("Expected argument 'username' to be a str")
|
60
59
|
pulumi.set(__self__, "username", username)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter(name="distinguishedNames")
|
64
|
-
def distinguished_names(self) -> Sequence[
|
63
|
+
def distinguished_names(self) -> Sequence[_builtins.str]:
|
65
64
|
return pulumi.get(self, "distinguished_names")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter
|
69
|
-
def id(self) ->
|
68
|
+
def id(self) -> _builtins.str:
|
70
69
|
"""
|
71
70
|
The provider-assigned unique ID for this managed resource.
|
72
71
|
"""
|
73
72
|
return pulumi.get(self, "id")
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter(name="leaseDuration")
|
77
|
-
def lease_duration(self) ->
|
76
|
+
def lease_duration(self) -> _builtins.int:
|
78
77
|
return pulumi.get(self, "lease_duration")
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter(name="leaseId")
|
82
|
-
def lease_id(self) ->
|
81
|
+
def lease_id(self) -> _builtins.str:
|
83
82
|
return pulumi.get(self, "lease_id")
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="leaseRenewable")
|
87
|
-
def lease_renewable(self) ->
|
86
|
+
def lease_renewable(self) -> _builtins.bool:
|
88
87
|
return pulumi.get(self, "lease_renewable")
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def mount(self) ->
|
91
|
+
def mount(self) -> _builtins.str:
|
93
92
|
return pulumi.get(self, "mount")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[
|
96
|
+
def namespace(self) -> Optional[_builtins.str]:
|
98
97
|
return pulumi.get(self, "namespace")
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter
|
102
|
-
def password(self) ->
|
101
|
+
def password(self) -> _builtins.str:
|
103
102
|
return pulumi.get(self, "password")
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="roleName")
|
107
|
-
def role_name(self) ->
|
106
|
+
def role_name(self) -> _builtins.str:
|
108
107
|
return pulumi.get(self, "role_name")
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def username(self) ->
|
111
|
+
def username(self) -> _builtins.str:
|
113
112
|
return pulumi.get(self, "username")
|
114
113
|
|
115
114
|
|
@@ -131,9 +130,9 @@ class AwaitableGetDynamicCredentialsResult(GetDynamicCredentialsResult):
|
|
131
130
|
username=self.username)
|
132
131
|
|
133
132
|
|
134
|
-
def get_dynamic_credentials(mount: Optional[
|
135
|
-
namespace: Optional[
|
136
|
-
role_name: Optional[
|
133
|
+
def get_dynamic_credentials(mount: Optional[_builtins.str] = None,
|
134
|
+
namespace: Optional[_builtins.str] = None,
|
135
|
+
role_name: Optional[_builtins.str] = None,
|
137
136
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDynamicCredentialsResult:
|
138
137
|
"""
|
139
138
|
Use this data source to access information about an existing resource.
|
@@ -156,9 +155,9 @@ def get_dynamic_credentials(mount: Optional[builtins.str] = None,
|
|
156
155
|
password=pulumi.get(__ret__, 'password'),
|
157
156
|
role_name=pulumi.get(__ret__, 'role_name'),
|
158
157
|
username=pulumi.get(__ret__, 'username'))
|
159
|
-
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[
|
160
|
-
namespace: Optional[pulumi.Input[Optional[
|
161
|
-
role_name: Optional[pulumi.Input[
|
158
|
+
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
|
159
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
160
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
162
161
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
163
162
|
"""
|
164
163
|
Use this data source to access information about an existing resource.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -62,62 +61,62 @@ class GetStaticCredentialsResult:
|
|
62
61
|
raise TypeError("Expected argument 'username' to be a str")
|
63
62
|
pulumi.set(__self__, "username", username)
|
64
63
|
|
65
|
-
@property
|
64
|
+
@_builtins.property
|
66
65
|
@pulumi.getter
|
67
|
-
def dn(self) ->
|
66
|
+
def dn(self) -> _builtins.str:
|
68
67
|
return pulumi.get(self, "dn")
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter
|
72
|
-
def id(self) ->
|
71
|
+
def id(self) -> _builtins.str:
|
73
72
|
"""
|
74
73
|
The provider-assigned unique ID for this managed resource.
|
75
74
|
"""
|
76
75
|
return pulumi.get(self, "id")
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter(name="lastPassword")
|
80
|
-
def last_password(self) ->
|
79
|
+
def last_password(self) -> _builtins.str:
|
81
80
|
return pulumi.get(self, "last_password")
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="lastVaultRotation")
|
85
|
-
def last_vault_rotation(self) ->
|
84
|
+
def last_vault_rotation(self) -> _builtins.str:
|
86
85
|
return pulumi.get(self, "last_vault_rotation")
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def mount(self) ->
|
89
|
+
def mount(self) -> _builtins.str:
|
91
90
|
return pulumi.get(self, "mount")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def namespace(self) -> Optional[
|
94
|
+
def namespace(self) -> Optional[_builtins.str]:
|
96
95
|
return pulumi.get(self, "namespace")
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter
|
100
|
-
def password(self) ->
|
99
|
+
def password(self) -> _builtins.str:
|
101
100
|
return pulumi.get(self, "password")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="roleName")
|
105
|
-
def role_name(self) ->
|
104
|
+
def role_name(self) -> _builtins.str:
|
106
105
|
return pulumi.get(self, "role_name")
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter(name="rotationPeriod")
|
110
|
-
def rotation_period(self) ->
|
109
|
+
def rotation_period(self) -> _builtins.int:
|
111
110
|
return pulumi.get(self, "rotation_period")
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter
|
115
|
-
def ttl(self) ->
|
114
|
+
def ttl(self) -> _builtins.int:
|
116
115
|
return pulumi.get(self, "ttl")
|
117
116
|
|
118
|
-
@property
|
117
|
+
@_builtins.property
|
119
118
|
@pulumi.getter
|
120
|
-
def username(self) ->
|
119
|
+
def username(self) -> _builtins.str:
|
121
120
|
return pulumi.get(self, "username")
|
122
121
|
|
123
122
|
|
@@ -140,9 +139,9 @@ class AwaitableGetStaticCredentialsResult(GetStaticCredentialsResult):
|
|
140
139
|
username=self.username)
|
141
140
|
|
142
141
|
|
143
|
-
def get_static_credentials(mount: Optional[
|
144
|
-
namespace: Optional[
|
145
|
-
role_name: Optional[
|
142
|
+
def get_static_credentials(mount: Optional[_builtins.str] = None,
|
143
|
+
namespace: Optional[_builtins.str] = None,
|
144
|
+
role_name: Optional[_builtins.str] = None,
|
146
145
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticCredentialsResult:
|
147
146
|
"""
|
148
147
|
Use this data source to access information about an existing resource.
|
@@ -166,9 +165,9 @@ def get_static_credentials(mount: Optional[builtins.str] = None,
|
|
166
165
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
167
166
|
ttl=pulumi.get(__ret__, 'ttl'),
|
168
167
|
username=pulumi.get(__ret__, 'username'))
|
169
|
-
def get_static_credentials_output(mount: Optional[pulumi.Input[
|
170
|
-
namespace: Optional[pulumi.Input[Optional[
|
171
|
-
role_name: Optional[pulumi.Input[
|
168
|
+
def get_static_credentials_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
|
169
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
170
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
172
171
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
173
172
|
"""
|
174
173
|
Use this data source to access information about an existing resource.
|