pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,29 +19,29 @@ __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendLibrarySetArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
service_account_names: pulumi.Input[Sequence[pulumi.Input[
|
24
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
25
|
-
max_ttl: Optional[pulumi.Input[
|
26
|
-
mount: Optional[pulumi.Input[
|
27
|
-
name: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
23
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
25
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
30
29
|
"""
|
31
30
|
The set of arguments for constructing a SecretBackendLibrarySet resource.
|
32
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
32
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
34
33
|
accounts must be checked in by the entity or client token that checked them
|
35
34
|
out. Defaults to false.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
37
36
|
to the configuration max_ttl if not provided.
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
38
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
40
39
|
Must be unique within the backend.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
42
41
|
The value should not contain leading or trailing forward slashes.
|
43
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
43
|
*Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
46
45
|
ttl if not provided.
|
47
46
|
"""
|
48
47
|
pulumi.set(__self__, "service_account_names", service_account_names)
|
@@ -59,21 +58,21 @@ class SecretBackendLibrarySetArgs:
|
|
59
58
|
if ttl is not None:
|
60
59
|
pulumi.set(__self__, "ttl", ttl)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter(name="serviceAccountNames")
|
64
|
-
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[
|
63
|
+
def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
65
64
|
"""
|
66
65
|
Specifies the slice of service accounts mapped to this set.
|
67
66
|
"""
|
68
67
|
return pulumi.get(self, "service_account_names")
|
69
68
|
|
70
69
|
@service_account_names.setter
|
71
|
-
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[
|
70
|
+
def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
72
71
|
pulumi.set(self, "service_account_names", value)
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter(name="disableCheckInEnforcement")
|
76
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[
|
75
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
77
76
|
"""
|
78
77
|
Disable enforcing that service
|
79
78
|
accounts must be checked in by the entity or client token that checked them
|
@@ -82,12 +81,12 @@ class SecretBackendLibrarySetArgs:
|
|
82
81
|
return pulumi.get(self, "disable_check_in_enforcement")
|
83
82
|
|
84
83
|
@disable_check_in_enforcement.setter
|
85
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[
|
84
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
86
85
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="maxTtl")
|
90
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
89
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
91
90
|
"""
|
92
91
|
The maximum password time-to-live in seconds. Defaults
|
93
92
|
to the configuration max_ttl if not provided.
|
@@ -95,24 +94,24 @@ class SecretBackendLibrarySetArgs:
|
|
95
94
|
return pulumi.get(self, "max_ttl")
|
96
95
|
|
97
96
|
@max_ttl.setter
|
98
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
97
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
99
98
|
pulumi.set(self, "max_ttl", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter
|
103
|
-
def mount(self) -> Optional[pulumi.Input[
|
102
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
104
103
|
"""
|
105
104
|
The path where the LDAP secrets backend is mounted.
|
106
105
|
"""
|
107
106
|
return pulumi.get(self, "mount")
|
108
107
|
|
109
108
|
@mount.setter
|
110
|
-
def mount(self, value: Optional[pulumi.Input[
|
109
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
111
110
|
pulumi.set(self, "mount", value)
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter
|
115
|
-
def name(self) -> Optional[pulumi.Input[
|
114
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
116
115
|
"""
|
117
116
|
The name to identify this set of service accounts.
|
118
117
|
Must be unique within the backend.
|
@@ -120,12 +119,12 @@ class SecretBackendLibrarySetArgs:
|
|
120
119
|
return pulumi.get(self, "name")
|
121
120
|
|
122
121
|
@name.setter
|
123
|
-
def name(self, value: Optional[pulumi.Input[
|
122
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
124
123
|
pulumi.set(self, "name", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter
|
128
|
-
def namespace(self) -> Optional[pulumi.Input[
|
127
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
129
128
|
"""
|
130
129
|
The namespace to provision the resource in.
|
131
130
|
The value should not contain leading or trailing forward slashes.
|
@@ -135,12 +134,12 @@ class SecretBackendLibrarySetArgs:
|
|
135
134
|
return pulumi.get(self, "namespace")
|
136
135
|
|
137
136
|
@namespace.setter
|
138
|
-
def namespace(self, value: Optional[pulumi.Input[
|
137
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
138
|
pulumi.set(self, "namespace", value)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter
|
143
|
-
def ttl(self) -> Optional[pulumi.Input[
|
142
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
144
143
|
"""
|
145
144
|
The password time-to-live in seconds. Defaults to the configuration
|
146
145
|
ttl if not provided.
|
@@ -148,36 +147,36 @@ class SecretBackendLibrarySetArgs:
|
|
148
147
|
return pulumi.get(self, "ttl")
|
149
148
|
|
150
149
|
@ttl.setter
|
151
|
-
def ttl(self, value: Optional[pulumi.Input[
|
150
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
152
151
|
pulumi.set(self, "ttl", value)
|
153
152
|
|
154
153
|
|
155
154
|
@pulumi.input_type
|
156
155
|
class _SecretBackendLibrarySetState:
|
157
156
|
def __init__(__self__, *,
|
158
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
159
|
-
max_ttl: Optional[pulumi.Input[
|
160
|
-
mount: Optional[pulumi.Input[
|
161
|
-
name: Optional[pulumi.Input[
|
162
|
-
namespace: Optional[pulumi.Input[
|
163
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
164
|
-
ttl: Optional[pulumi.Input[
|
157
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
158
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
159
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
160
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
161
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
162
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
163
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
165
164
|
"""
|
166
165
|
Input properties used for looking up and filtering SecretBackendLibrarySet resources.
|
167
|
-
:param pulumi.Input[
|
166
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
168
167
|
accounts must be checked in by the entity or client token that checked them
|
169
168
|
out. Defaults to false.
|
170
|
-
:param pulumi.Input[
|
169
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
171
170
|
to the configuration max_ttl if not provided.
|
172
|
-
:param pulumi.Input[
|
173
|
-
:param pulumi.Input[
|
171
|
+
:param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
172
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
174
173
|
Must be unique within the backend.
|
175
|
-
:param pulumi.Input[
|
174
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
176
175
|
The value should not contain leading or trailing forward slashes.
|
177
176
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
178
177
|
*Available only for Vault Enterprise*.
|
179
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
180
|
-
:param pulumi.Input[
|
178
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
179
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
181
180
|
ttl if not provided.
|
182
181
|
"""
|
183
182
|
if disable_check_in_enforcement is not None:
|
@@ -195,9 +194,9 @@ class _SecretBackendLibrarySetState:
|
|
195
194
|
if ttl is not None:
|
196
195
|
pulumi.set(__self__, "ttl", ttl)
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
@pulumi.getter(name="disableCheckInEnforcement")
|
200
|
-
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[
|
199
|
+
def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
201
200
|
"""
|
202
201
|
Disable enforcing that service
|
203
202
|
accounts must be checked in by the entity or client token that checked them
|
@@ -206,12 +205,12 @@ class _SecretBackendLibrarySetState:
|
|
206
205
|
return pulumi.get(self, "disable_check_in_enforcement")
|
207
206
|
|
208
207
|
@disable_check_in_enforcement.setter
|
209
|
-
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[
|
208
|
+
def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
210
209
|
pulumi.set(self, "disable_check_in_enforcement", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter(name="maxTtl")
|
214
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
213
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
215
214
|
"""
|
216
215
|
The maximum password time-to-live in seconds. Defaults
|
217
216
|
to the configuration max_ttl if not provided.
|
@@ -219,24 +218,24 @@ class _SecretBackendLibrarySetState:
|
|
219
218
|
return pulumi.get(self, "max_ttl")
|
220
219
|
|
221
220
|
@max_ttl.setter
|
222
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
221
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
223
222
|
pulumi.set(self, "max_ttl", value)
|
224
223
|
|
225
|
-
@property
|
224
|
+
@_builtins.property
|
226
225
|
@pulumi.getter
|
227
|
-
def mount(self) -> Optional[pulumi.Input[
|
226
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
228
227
|
"""
|
229
228
|
The path where the LDAP secrets backend is mounted.
|
230
229
|
"""
|
231
230
|
return pulumi.get(self, "mount")
|
232
231
|
|
233
232
|
@mount.setter
|
234
|
-
def mount(self, value: Optional[pulumi.Input[
|
233
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
235
234
|
pulumi.set(self, "mount", value)
|
236
235
|
|
237
|
-
@property
|
236
|
+
@_builtins.property
|
238
237
|
@pulumi.getter
|
239
|
-
def name(self) -> Optional[pulumi.Input[
|
238
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
240
239
|
"""
|
241
240
|
The name to identify this set of service accounts.
|
242
241
|
Must be unique within the backend.
|
@@ -244,12 +243,12 @@ class _SecretBackendLibrarySetState:
|
|
244
243
|
return pulumi.get(self, "name")
|
245
244
|
|
246
245
|
@name.setter
|
247
|
-
def name(self, value: Optional[pulumi.Input[
|
246
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
248
247
|
pulumi.set(self, "name", value)
|
249
248
|
|
250
|
-
@property
|
249
|
+
@_builtins.property
|
251
250
|
@pulumi.getter
|
252
|
-
def namespace(self) -> Optional[pulumi.Input[
|
251
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
253
252
|
"""
|
254
253
|
The namespace to provision the resource in.
|
255
254
|
The value should not contain leading or trailing forward slashes.
|
@@ -259,24 +258,24 @@ class _SecretBackendLibrarySetState:
|
|
259
258
|
return pulumi.get(self, "namespace")
|
260
259
|
|
261
260
|
@namespace.setter
|
262
|
-
def namespace(self, value: Optional[pulumi.Input[
|
261
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
263
262
|
pulumi.set(self, "namespace", value)
|
264
263
|
|
265
|
-
@property
|
264
|
+
@_builtins.property
|
266
265
|
@pulumi.getter(name="serviceAccountNames")
|
267
|
-
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
266
|
+
def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
268
267
|
"""
|
269
268
|
Specifies the slice of service accounts mapped to this set.
|
270
269
|
"""
|
271
270
|
return pulumi.get(self, "service_account_names")
|
272
271
|
|
273
272
|
@service_account_names.setter
|
274
|
-
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
273
|
+
def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
275
274
|
pulumi.set(self, "service_account_names", value)
|
276
275
|
|
277
|
-
@property
|
276
|
+
@_builtins.property
|
278
277
|
@pulumi.getter
|
279
|
-
def ttl(self) -> Optional[pulumi.Input[
|
278
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
280
279
|
"""
|
281
280
|
The password time-to-live in seconds. Defaults to the configuration
|
282
281
|
ttl if not provided.
|
@@ -284,7 +283,7 @@ class _SecretBackendLibrarySetState:
|
|
284
283
|
return pulumi.get(self, "ttl")
|
285
284
|
|
286
285
|
@ttl.setter
|
287
|
-
def ttl(self, value: Optional[pulumi.Input[
|
286
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
288
287
|
pulumi.set(self, "ttl", value)
|
289
288
|
|
290
289
|
|
@@ -294,13 +293,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
294
293
|
def __init__(__self__,
|
295
294
|
resource_name: str,
|
296
295
|
opts: Optional[pulumi.ResourceOptions] = None,
|
297
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
298
|
-
max_ttl: Optional[pulumi.Input[
|
299
|
-
mount: Optional[pulumi.Input[
|
300
|
-
name: Optional[pulumi.Input[
|
301
|
-
namespace: Optional[pulumi.Input[
|
302
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
303
|
-
ttl: Optional[pulumi.Input[
|
296
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
297
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
298
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
299
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
300
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
301
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
302
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
304
303
|
__props__=None):
|
305
304
|
"""
|
306
305
|
## Example Usage
|
@@ -338,20 +337,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
338
337
|
|
339
338
|
:param str resource_name: The name of the resource.
|
340
339
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
341
|
-
:param pulumi.Input[
|
340
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
342
341
|
accounts must be checked in by the entity or client token that checked them
|
343
342
|
out. Defaults to false.
|
344
|
-
:param pulumi.Input[
|
343
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
345
344
|
to the configuration max_ttl if not provided.
|
346
|
-
:param pulumi.Input[
|
347
|
-
:param pulumi.Input[
|
345
|
+
:param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
346
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
348
347
|
Must be unique within the backend.
|
349
|
-
:param pulumi.Input[
|
348
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
350
349
|
The value should not contain leading or trailing forward slashes.
|
351
350
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
352
351
|
*Available only for Vault Enterprise*.
|
353
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
354
|
-
:param pulumi.Input[
|
352
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
353
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
355
354
|
ttl if not provided.
|
356
355
|
"""
|
357
356
|
...
|
@@ -409,13 +408,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
409
408
|
def _internal_init(__self__,
|
410
409
|
resource_name: str,
|
411
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
412
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
413
|
-
max_ttl: Optional[pulumi.Input[
|
414
|
-
mount: Optional[pulumi.Input[
|
415
|
-
name: Optional[pulumi.Input[
|
416
|
-
namespace: Optional[pulumi.Input[
|
417
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
418
|
-
ttl: Optional[pulumi.Input[
|
411
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
412
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
413
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
416
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
417
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
419
418
|
__props__=None):
|
420
419
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
421
420
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -444,13 +443,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
444
443
|
def get(resource_name: str,
|
445
444
|
id: pulumi.Input[str],
|
446
445
|
opts: Optional[pulumi.ResourceOptions] = None,
|
447
|
-
disable_check_in_enforcement: Optional[pulumi.Input[
|
448
|
-
max_ttl: Optional[pulumi.Input[
|
449
|
-
mount: Optional[pulumi.Input[
|
450
|
-
name: Optional[pulumi.Input[
|
451
|
-
namespace: Optional[pulumi.Input[
|
452
|
-
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
453
|
-
ttl: Optional[pulumi.Input[
|
446
|
+
disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
|
447
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
448
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
449
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
451
|
+
service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
452
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendLibrarySet':
|
454
453
|
"""
|
455
454
|
Get an existing SecretBackendLibrarySet resource's state with the given name, id, and optional extra
|
456
455
|
properties used to qualify the lookup.
|
@@ -458,20 +457,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
458
457
|
:param str resource_name: The unique name of the resulting resource.
|
459
458
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
460
459
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
461
|
-
:param pulumi.Input[
|
460
|
+
:param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
|
462
461
|
accounts must be checked in by the entity or client token that checked them
|
463
462
|
out. Defaults to false.
|
464
|
-
:param pulumi.Input[
|
463
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
|
465
464
|
to the configuration max_ttl if not provided.
|
466
|
-
:param pulumi.Input[
|
467
|
-
:param pulumi.Input[
|
465
|
+
:param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
|
466
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
|
468
467
|
Must be unique within the backend.
|
469
|
-
:param pulumi.Input[
|
468
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
470
469
|
The value should not contain leading or trailing forward slashes.
|
471
470
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
472
471
|
*Available only for Vault Enterprise*.
|
473
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
474
|
-
:param pulumi.Input[
|
472
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
473
|
+
:param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
475
474
|
ttl if not provided.
|
476
475
|
"""
|
477
476
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -487,9 +486,9 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
487
486
|
__props__.__dict__["ttl"] = ttl
|
488
487
|
return SecretBackendLibrarySet(resource_name, opts=opts, __props__=__props__)
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter(name="disableCheckInEnforcement")
|
492
|
-
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[
|
491
|
+
def disable_check_in_enforcement(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
493
492
|
"""
|
494
493
|
Disable enforcing that service
|
495
494
|
accounts must be checked in by the entity or client token that checked them
|
@@ -497,35 +496,35 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
497
496
|
"""
|
498
497
|
return pulumi.get(self, "disable_check_in_enforcement")
|
499
498
|
|
500
|
-
@property
|
499
|
+
@_builtins.property
|
501
500
|
@pulumi.getter(name="maxTtl")
|
502
|
-
def max_ttl(self) -> pulumi.Output[
|
501
|
+
def max_ttl(self) -> pulumi.Output[_builtins.int]:
|
503
502
|
"""
|
504
503
|
The maximum password time-to-live in seconds. Defaults
|
505
504
|
to the configuration max_ttl if not provided.
|
506
505
|
"""
|
507
506
|
return pulumi.get(self, "max_ttl")
|
508
507
|
|
509
|
-
@property
|
508
|
+
@_builtins.property
|
510
509
|
@pulumi.getter
|
511
|
-
def mount(self) -> pulumi.Output[Optional[
|
510
|
+
def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
|
512
511
|
"""
|
513
512
|
The path where the LDAP secrets backend is mounted.
|
514
513
|
"""
|
515
514
|
return pulumi.get(self, "mount")
|
516
515
|
|
517
|
-
@property
|
516
|
+
@_builtins.property
|
518
517
|
@pulumi.getter
|
519
|
-
def name(self) -> pulumi.Output[
|
518
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
520
519
|
"""
|
521
520
|
The name to identify this set of service accounts.
|
522
521
|
Must be unique within the backend.
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "name")
|
525
524
|
|
526
|
-
@property
|
525
|
+
@_builtins.property
|
527
526
|
@pulumi.getter
|
528
|
-
def namespace(self) -> pulumi.Output[Optional[
|
527
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
529
528
|
"""
|
530
529
|
The namespace to provision the resource in.
|
531
530
|
The value should not contain leading or trailing forward slashes.
|
@@ -534,17 +533,17 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
534
533
|
"""
|
535
534
|
return pulumi.get(self, "namespace")
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter(name="serviceAccountNames")
|
539
|
-
def service_account_names(self) -> pulumi.Output[Sequence[
|
538
|
+
def service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
540
539
|
"""
|
541
540
|
Specifies the slice of service accounts mapped to this set.
|
542
541
|
"""
|
543
542
|
return pulumi.get(self, "service_account_names")
|
544
543
|
|
545
|
-
@property
|
544
|
+
@_builtins.property
|
546
545
|
@pulumi.getter
|
547
|
-
def ttl(self) -> pulumi.Output[
|
546
|
+
def ttl(self) -> pulumi.Output[_builtins.int]:
|
548
547
|
"""
|
549
548
|
The password time-to-live in seconds. Defaults to the configuration
|
550
549
|
ttl if not provided.
|