pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,13 +19,13 @@ __all__ = ['SecretCredsArgs', 'SecretCreds']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretCredsArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
role: pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
role: pulumi.Input[_builtins.str],
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
26
25
|
"""
|
27
26
|
The set of arguments for constructing a SecretCreds resource.
|
28
|
-
:param pulumi.Input[
|
29
|
-
:param pulumi.Input[
|
27
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
28
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
30
29
|
The value should not contain leading or trailing forward slashes.
|
31
30
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
31
|
*Available only for Vault Enterprise*.
|
@@ -36,30 +35,30 @@ class SecretCredsArgs:
|
|
36
35
|
if namespace is not None:
|
37
36
|
pulumi.set(__self__, "namespace", namespace)
|
38
37
|
|
39
|
-
@property
|
38
|
+
@_builtins.property
|
40
39
|
@pulumi.getter
|
41
|
-
def backend(self) -> pulumi.Input[
|
40
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
42
41
|
return pulumi.get(self, "backend")
|
43
42
|
|
44
43
|
@backend.setter
|
45
|
-
def backend(self, value: pulumi.Input[
|
44
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
46
45
|
pulumi.set(self, "backend", value)
|
47
46
|
|
48
|
-
@property
|
47
|
+
@_builtins.property
|
49
48
|
@pulumi.getter
|
50
|
-
def role(self) -> pulumi.Input[
|
49
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
51
50
|
"""
|
52
51
|
Name of the role.
|
53
52
|
"""
|
54
53
|
return pulumi.get(self, "role")
|
55
54
|
|
56
55
|
@role.setter
|
57
|
-
def role(self, value: pulumi.Input[
|
56
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
58
57
|
pulumi.set(self, "role", value)
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def namespace(self) -> Optional[pulumi.Input[
|
61
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
63
62
|
"""
|
64
63
|
The namespace to provision the resource in.
|
65
64
|
The value should not contain leading or trailing forward slashes.
|
@@ -69,35 +68,35 @@ class SecretCredsArgs:
|
|
69
68
|
return pulumi.get(self, "namespace")
|
70
69
|
|
71
70
|
@namespace.setter
|
72
|
-
def namespace(self, value: Optional[pulumi.Input[
|
71
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
73
72
|
pulumi.set(self, "namespace", value)
|
74
73
|
|
75
74
|
|
76
75
|
@pulumi.input_type
|
77
76
|
class _SecretCredsState:
|
78
77
|
def __init__(__self__, *,
|
79
|
-
backend: Optional[pulumi.Input[
|
80
|
-
lease_id: Optional[pulumi.Input[
|
81
|
-
namespace: Optional[pulumi.Input[
|
82
|
-
organization: Optional[pulumi.Input[
|
83
|
-
role: Optional[pulumi.Input[
|
84
|
-
team_id: Optional[pulumi.Input[
|
85
|
-
token: Optional[pulumi.Input[
|
86
|
-
token_id: Optional[pulumi.Input[
|
78
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
79
|
+
lease_id: Optional[pulumi.Input[_builtins.str]] = None,
|
80
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
81
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
82
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
83
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
84
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
85
|
+
token_id: Optional[pulumi.Input[_builtins.str]] = None):
|
87
86
|
"""
|
88
87
|
Input properties used for looking up and filtering SecretCreds resources.
|
89
|
-
:param pulumi.Input[
|
88
|
+
:param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
|
90
89
|
Vault lease associated with them.
|
91
|
-
:param pulumi.Input[
|
90
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
92
91
|
The value should not contain leading or trailing forward slashes.
|
93
92
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
94
93
|
*Available only for Vault Enterprise*.
|
95
|
-
:param pulumi.Input[
|
96
|
-
:param pulumi.Input[
|
97
|
-
:param pulumi.Input[
|
98
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
|
95
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
96
|
+
:param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
|
97
|
+
:param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
|
99
98
|
to identify the user of the call.
|
100
|
-
:param pulumi.Input[
|
99
|
+
:param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
|
101
100
|
to look up information about a token or to revoke a token.
|
102
101
|
"""
|
103
102
|
if backend is not None:
|
@@ -117,18 +116,18 @@ class _SecretCredsState:
|
|
117
116
|
if token_id is not None:
|
118
117
|
pulumi.set(__self__, "token_id", token_id)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter
|
122
|
-
def backend(self) -> Optional[pulumi.Input[
|
121
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
123
122
|
return pulumi.get(self, "backend")
|
124
123
|
|
125
124
|
@backend.setter
|
126
|
-
def backend(self, value: Optional[pulumi.Input[
|
125
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
127
126
|
pulumi.set(self, "backend", value)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="leaseId")
|
131
|
-
def lease_id(self) -> Optional[pulumi.Input[
|
130
|
+
def lease_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
The lease associated with the token. Only user tokens will have a
|
134
133
|
Vault lease associated with them.
|
@@ -136,12 +135,12 @@ class _SecretCredsState:
|
|
136
135
|
return pulumi.get(self, "lease_id")
|
137
136
|
|
138
137
|
@lease_id.setter
|
139
|
-
def lease_id(self, value: Optional[pulumi.Input[
|
138
|
+
def lease_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
140
139
|
pulumi.set(self, "lease_id", value)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter
|
144
|
-
def namespace(self) -> Optional[pulumi.Input[
|
143
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
145
144
|
"""
|
146
145
|
The namespace to provision the resource in.
|
147
146
|
The value should not contain leading or trailing forward slashes.
|
@@ -151,48 +150,48 @@ class _SecretCredsState:
|
|
151
150
|
return pulumi.get(self, "namespace")
|
152
151
|
|
153
152
|
@namespace.setter
|
154
|
-
def namespace(self, value: Optional[pulumi.Input[
|
153
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "namespace", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter
|
159
|
-
def organization(self) -> Optional[pulumi.Input[
|
158
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
160
159
|
"""
|
161
160
|
The organization associated with the token provided.
|
162
161
|
"""
|
163
162
|
return pulumi.get(self, "organization")
|
164
163
|
|
165
164
|
@organization.setter
|
166
|
-
def organization(self, value: Optional[pulumi.Input[
|
165
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
167
166
|
pulumi.set(self, "organization", value)
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
@pulumi.getter
|
171
|
-
def role(self) -> Optional[pulumi.Input[
|
170
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
172
171
|
"""
|
173
172
|
Name of the role.
|
174
173
|
"""
|
175
174
|
return pulumi.get(self, "role")
|
176
175
|
|
177
176
|
@role.setter
|
178
|
-
def role(self, value: Optional[pulumi.Input[
|
177
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
179
178
|
pulumi.set(self, "role", value)
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter(name="teamId")
|
183
|
-
def team_id(self) -> Optional[pulumi.Input[
|
182
|
+
def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
184
183
|
"""
|
185
184
|
The team id associated with the token provided.
|
186
185
|
"""
|
187
186
|
return pulumi.get(self, "team_id")
|
188
187
|
|
189
188
|
@team_id.setter
|
190
|
-
def team_id(self, value: Optional[pulumi.Input[
|
189
|
+
def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
191
190
|
pulumi.set(self, "team_id", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter
|
195
|
-
def token(self) -> Optional[pulumi.Input[
|
194
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
195
|
"""
|
197
196
|
The actual token that was generated and can be used with API calls
|
198
197
|
to identify the user of the call.
|
@@ -200,12 +199,12 @@ class _SecretCredsState:
|
|
200
199
|
return pulumi.get(self, "token")
|
201
200
|
|
202
201
|
@token.setter
|
203
|
-
def token(self, value: Optional[pulumi.Input[
|
202
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
204
203
|
pulumi.set(self, "token", value)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter(name="tokenId")
|
208
|
-
def token_id(self) -> Optional[pulumi.Input[
|
207
|
+
def token_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
209
208
|
"""
|
210
209
|
The public identifier for a specific token. It can be used
|
211
210
|
to look up information about a token or to revoke a token.
|
@@ -213,7 +212,7 @@ class _SecretCredsState:
|
|
213
212
|
return pulumi.get(self, "token_id")
|
214
213
|
|
215
214
|
@token_id.setter
|
216
|
-
def token_id(self, value: Optional[pulumi.Input[
|
215
|
+
def token_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
216
|
pulumi.set(self, "token_id", value)
|
218
217
|
|
219
218
|
|
@@ -223,9 +222,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
223
222
|
def __init__(__self__,
|
224
223
|
resource_name: str,
|
225
224
|
opts: Optional[pulumi.ResourceOptions] = None,
|
226
|
-
backend: Optional[pulumi.Input[
|
227
|
-
namespace: Optional[pulumi.Input[
|
228
|
-
role: Optional[pulumi.Input[
|
225
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
226
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
227
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
229
228
|
__props__=None):
|
230
229
|
"""
|
231
230
|
## Example Usage
|
@@ -250,11 +249,11 @@ class SecretCreds(pulumi.CustomResource):
|
|
250
249
|
|
251
250
|
:param str resource_name: The name of the resource.
|
252
251
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
253
|
-
:param pulumi.Input[
|
252
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
254
253
|
The value should not contain leading or trailing forward slashes.
|
255
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
256
255
|
*Available only for Vault Enterprise*.
|
257
|
-
:param pulumi.Input[
|
256
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
258
257
|
"""
|
259
258
|
...
|
260
259
|
@overload
|
@@ -298,9 +297,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
298
297
|
def _internal_init(__self__,
|
299
298
|
resource_name: str,
|
300
299
|
opts: Optional[pulumi.ResourceOptions] = None,
|
301
|
-
backend: Optional[pulumi.Input[
|
302
|
-
namespace: Optional[pulumi.Input[
|
303
|
-
role: Optional[pulumi.Input[
|
300
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
301
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
302
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
304
303
|
__props__=None):
|
305
304
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
306
305
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -334,14 +333,14 @@ class SecretCreds(pulumi.CustomResource):
|
|
334
333
|
def get(resource_name: str,
|
335
334
|
id: pulumi.Input[str],
|
336
335
|
opts: Optional[pulumi.ResourceOptions] = None,
|
337
|
-
backend: Optional[pulumi.Input[
|
338
|
-
lease_id: Optional[pulumi.Input[
|
339
|
-
namespace: Optional[pulumi.Input[
|
340
|
-
organization: Optional[pulumi.Input[
|
341
|
-
role: Optional[pulumi.Input[
|
342
|
-
team_id: Optional[pulumi.Input[
|
343
|
-
token: Optional[pulumi.Input[
|
344
|
-
token_id: Optional[pulumi.Input[
|
336
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
337
|
+
lease_id: Optional[pulumi.Input[_builtins.str]] = None,
|
338
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
339
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
341
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
343
|
+
token_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretCreds':
|
345
344
|
"""
|
346
345
|
Get an existing SecretCreds resource's state with the given name, id, and optional extra
|
347
346
|
properties used to qualify the lookup.
|
@@ -349,18 +348,18 @@ class SecretCreds(pulumi.CustomResource):
|
|
349
348
|
:param str resource_name: The unique name of the resulting resource.
|
350
349
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
351
350
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
352
|
-
:param pulumi.Input[
|
351
|
+
:param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
|
353
352
|
Vault lease associated with them.
|
354
|
-
:param pulumi.Input[
|
353
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
355
354
|
The value should not contain leading or trailing forward slashes.
|
356
355
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
357
356
|
*Available only for Vault Enterprise*.
|
358
|
-
:param pulumi.Input[
|
359
|
-
:param pulumi.Input[
|
360
|
-
:param pulumi.Input[
|
361
|
-
:param pulumi.Input[
|
357
|
+
:param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
|
358
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
359
|
+
:param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
|
360
|
+
:param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
|
362
361
|
to identify the user of the call.
|
363
|
-
:param pulumi.Input[
|
362
|
+
:param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
|
364
363
|
to look up information about a token or to revoke a token.
|
365
364
|
"""
|
366
365
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -377,23 +376,23 @@ class SecretCreds(pulumi.CustomResource):
|
|
377
376
|
__props__.__dict__["token_id"] = token_id
|
378
377
|
return SecretCreds(resource_name, opts=opts, __props__=__props__)
|
379
378
|
|
380
|
-
@property
|
379
|
+
@_builtins.property
|
381
380
|
@pulumi.getter
|
382
|
-
def backend(self) -> pulumi.Output[
|
381
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
383
382
|
return pulumi.get(self, "backend")
|
384
383
|
|
385
|
-
@property
|
384
|
+
@_builtins.property
|
386
385
|
@pulumi.getter(name="leaseId")
|
387
|
-
def lease_id(self) -> pulumi.Output[
|
386
|
+
def lease_id(self) -> pulumi.Output[_builtins.str]:
|
388
387
|
"""
|
389
388
|
The lease associated with the token. Only user tokens will have a
|
390
389
|
Vault lease associated with them.
|
391
390
|
"""
|
392
391
|
return pulumi.get(self, "lease_id")
|
393
392
|
|
394
|
-
@property
|
393
|
+
@_builtins.property
|
395
394
|
@pulumi.getter
|
396
|
-
def namespace(self) -> pulumi.Output[Optional[
|
395
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
397
396
|
"""
|
398
397
|
The namespace to provision the resource in.
|
399
398
|
The value should not contain leading or trailing forward slashes.
|
@@ -402,42 +401,42 @@ class SecretCreds(pulumi.CustomResource):
|
|
402
401
|
"""
|
403
402
|
return pulumi.get(self, "namespace")
|
404
403
|
|
405
|
-
@property
|
404
|
+
@_builtins.property
|
406
405
|
@pulumi.getter
|
407
|
-
def organization(self) -> pulumi.Output[
|
406
|
+
def organization(self) -> pulumi.Output[_builtins.str]:
|
408
407
|
"""
|
409
408
|
The organization associated with the token provided.
|
410
409
|
"""
|
411
410
|
return pulumi.get(self, "organization")
|
412
411
|
|
413
|
-
@property
|
412
|
+
@_builtins.property
|
414
413
|
@pulumi.getter
|
415
|
-
def role(self) -> pulumi.Output[
|
414
|
+
def role(self) -> pulumi.Output[_builtins.str]:
|
416
415
|
"""
|
417
416
|
Name of the role.
|
418
417
|
"""
|
419
418
|
return pulumi.get(self, "role")
|
420
419
|
|
421
|
-
@property
|
420
|
+
@_builtins.property
|
422
421
|
@pulumi.getter(name="teamId")
|
423
|
-
def team_id(self) -> pulumi.Output[
|
422
|
+
def team_id(self) -> pulumi.Output[_builtins.str]:
|
424
423
|
"""
|
425
424
|
The team id associated with the token provided.
|
426
425
|
"""
|
427
426
|
return pulumi.get(self, "team_id")
|
428
427
|
|
429
|
-
@property
|
428
|
+
@_builtins.property
|
430
429
|
@pulumi.getter
|
431
|
-
def token(self) -> pulumi.Output[
|
430
|
+
def token(self) -> pulumi.Output[_builtins.str]:
|
432
431
|
"""
|
433
432
|
The actual token that was generated and can be used with API calls
|
434
433
|
to identify the user of the call.
|
435
434
|
"""
|
436
435
|
return pulumi.get(self, "token")
|
437
436
|
|
438
|
-
@property
|
437
|
+
@_builtins.property
|
439
438
|
@pulumi.getter(name="tokenId")
|
440
|
-
def token_id(self) -> pulumi.Output[
|
439
|
+
def token_id(self) -> pulumi.Output[_builtins.str]:
|
441
440
|
"""
|
442
441
|
The public identifier for a specific token. It can be used
|
443
442
|
to look up information about a token or to revoke a token.
|