pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,32 +19,32 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendStaticRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
rotation_period: pulumi.Input[
|
24
|
-
username: pulumi.Input[
|
25
|
-
assume_role_arn: Optional[pulumi.Input[
|
26
|
-
assume_role_session_name: Optional[pulumi.Input[
|
27
|
-
backend: Optional[pulumi.Input[
|
28
|
-
external_id: Optional[pulumi.Input[
|
29
|
-
name: Optional[pulumi.Input[
|
30
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
rotation_period: pulumi.Input[_builtins.int],
|
23
|
+
username: pulumi.Input[_builtins.str],
|
24
|
+
assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
33
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
34
|
+
:param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
36
35
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
37
36
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
38
37
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
40
39
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
41
40
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
43
42
|
not begin or end with a `/`. Defaults to `aws`
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
45
44
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
47
46
|
Must be unique within the backend.
|
48
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
49
48
|
The value should not contain leading or trailing forward slashes.
|
50
49
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
50
|
*Available only for Vault Enterprise*.
|
@@ -65,33 +64,33 @@ class SecretBackendStaticRoleArgs:
|
|
65
64
|
if namespace is not None:
|
66
65
|
pulumi.set(__self__, "namespace", namespace)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter(name="rotationPeriod")
|
70
|
-
def rotation_period(self) -> pulumi.Input[
|
69
|
+
def rotation_period(self) -> pulumi.Input[_builtins.int]:
|
71
70
|
"""
|
72
71
|
How often Vault should rotate the password of the user entry.
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "rotation_period")
|
75
74
|
|
76
75
|
@rotation_period.setter
|
77
|
-
def rotation_period(self, value: pulumi.Input[
|
76
|
+
def rotation_period(self, value: pulumi.Input[_builtins.int]):
|
78
77
|
pulumi.set(self, "rotation_period", value)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def username(self) -> pulumi.Input[
|
81
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
83
82
|
"""
|
84
83
|
The username of the existing AWS IAM to manage password rotation for.
|
85
84
|
"""
|
86
85
|
return pulumi.get(self, "username")
|
87
86
|
|
88
87
|
@username.setter
|
89
|
-
def username(self, value: pulumi.Input[
|
88
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
90
89
|
pulumi.set(self, "username", value)
|
91
90
|
|
92
|
-
@property
|
91
|
+
@_builtins.property
|
93
92
|
@pulumi.getter(name="assumeRoleArn")
|
94
|
-
def assume_role_arn(self) -> Optional[pulumi.Input[
|
93
|
+
def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
95
94
|
"""
|
96
95
|
Specifies the ARN of the role that Vault should assume.
|
97
96
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -101,12 +100,12 @@ class SecretBackendStaticRoleArgs:
|
|
101
100
|
return pulumi.get(self, "assume_role_arn")
|
102
101
|
|
103
102
|
@assume_role_arn.setter
|
104
|
-
def assume_role_arn(self, value: Optional[pulumi.Input[
|
103
|
+
def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
105
104
|
pulumi.set(self, "assume_role_arn", value)
|
106
105
|
|
107
|
-
@property
|
106
|
+
@_builtins.property
|
108
107
|
@pulumi.getter(name="assumeRoleSessionName")
|
109
|
-
def assume_role_session_name(self) -> Optional[pulumi.Input[
|
108
|
+
def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
110
109
|
"""
|
111
110
|
Specifies the session name to use when assuming the role.
|
112
111
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -115,12 +114,12 @@ class SecretBackendStaticRoleArgs:
|
|
115
114
|
return pulumi.get(self, "assume_role_session_name")
|
116
115
|
|
117
116
|
@assume_role_session_name.setter
|
118
|
-
def assume_role_session_name(self, value: Optional[pulumi.Input[
|
117
|
+
def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
119
118
|
pulumi.set(self, "assume_role_session_name", value)
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter
|
123
|
-
def backend(self) -> Optional[pulumi.Input[
|
122
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
124
123
|
"""
|
125
124
|
The unique path this backend should be mounted at. Must
|
126
125
|
not begin or end with a `/`. Defaults to `aws`
|
@@ -128,12 +127,12 @@ class SecretBackendStaticRoleArgs:
|
|
128
127
|
return pulumi.get(self, "backend")
|
129
128
|
|
130
129
|
@backend.setter
|
131
|
-
def backend(self, value: Optional[pulumi.Input[
|
130
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
132
131
|
pulumi.set(self, "backend", value)
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
@pulumi.getter(name="externalId")
|
136
|
-
def external_id(self) -> Optional[pulumi.Input[
|
135
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
137
136
|
"""
|
138
137
|
Specifies the external ID to use when assuming the role.
|
139
138
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
@@ -141,12 +140,12 @@ class SecretBackendStaticRoleArgs:
|
|
141
140
|
return pulumi.get(self, "external_id")
|
142
141
|
|
143
142
|
@external_id.setter
|
144
|
-
def external_id(self, value: Optional[pulumi.Input[
|
143
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
145
144
|
pulumi.set(self, "external_id", value)
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter
|
149
|
-
def name(self) -> Optional[pulumi.Input[
|
148
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
150
149
|
"""
|
151
150
|
The name to identify this role within the backend.
|
152
151
|
Must be unique within the backend.
|
@@ -154,12 +153,12 @@ class SecretBackendStaticRoleArgs:
|
|
154
153
|
return pulumi.get(self, "name")
|
155
154
|
|
156
155
|
@name.setter
|
157
|
-
def name(self, value: Optional[pulumi.Input[
|
156
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
158
157
|
pulumi.set(self, "name", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter
|
162
|
-
def namespace(self) -> Optional[pulumi.Input[
|
161
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
163
162
|
"""
|
164
163
|
The namespace to provision the resource in.
|
165
164
|
The value should not contain leading or trailing forward slashes.
|
@@ -169,42 +168,42 @@ class SecretBackendStaticRoleArgs:
|
|
169
168
|
return pulumi.get(self, "namespace")
|
170
169
|
|
171
170
|
@namespace.setter
|
172
|
-
def namespace(self, value: Optional[pulumi.Input[
|
171
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
173
172
|
pulumi.set(self, "namespace", value)
|
174
173
|
|
175
174
|
|
176
175
|
@pulumi.input_type
|
177
176
|
class _SecretBackendStaticRoleState:
|
178
177
|
def __init__(__self__, *,
|
179
|
-
assume_role_arn: Optional[pulumi.Input[
|
180
|
-
assume_role_session_name: Optional[pulumi.Input[
|
181
|
-
backend: Optional[pulumi.Input[
|
182
|
-
external_id: Optional[pulumi.Input[
|
183
|
-
name: Optional[pulumi.Input[
|
184
|
-
namespace: Optional[pulumi.Input[
|
185
|
-
rotation_period: Optional[pulumi.Input[
|
186
|
-
username: Optional[pulumi.Input[
|
178
|
+
assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
179
|
+
assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
180
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
181
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
182
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
183
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
184
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
185
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
187
186
|
"""
|
188
187
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
189
|
-
:param pulumi.Input[
|
188
|
+
:param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
190
189
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
191
190
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
192
191
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
193
|
-
:param pulumi.Input[
|
192
|
+
:param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
194
193
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
195
194
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
196
|
-
:param pulumi.Input[
|
195
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
197
196
|
not begin or end with a `/`. Defaults to `aws`
|
198
|
-
:param pulumi.Input[
|
197
|
+
:param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
199
198
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
200
|
-
:param pulumi.Input[
|
199
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
201
200
|
Must be unique within the backend.
|
202
|
-
:param pulumi.Input[
|
201
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
203
202
|
The value should not contain leading or trailing forward slashes.
|
204
203
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
205
204
|
*Available only for Vault Enterprise*.
|
206
|
-
:param pulumi.Input[
|
207
|
-
:param pulumi.Input[
|
205
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
206
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
208
207
|
"""
|
209
208
|
if assume_role_arn is not None:
|
210
209
|
pulumi.set(__self__, "assume_role_arn", assume_role_arn)
|
@@ -223,9 +222,9 @@ class _SecretBackendStaticRoleState:
|
|
223
222
|
if username is not None:
|
224
223
|
pulumi.set(__self__, "username", username)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="assumeRoleArn")
|
228
|
-
def assume_role_arn(self) -> Optional[pulumi.Input[
|
227
|
+
def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
229
228
|
"""
|
230
229
|
Specifies the ARN of the role that Vault should assume.
|
231
230
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -235,12 +234,12 @@ class _SecretBackendStaticRoleState:
|
|
235
234
|
return pulumi.get(self, "assume_role_arn")
|
236
235
|
|
237
236
|
@assume_role_arn.setter
|
238
|
-
def assume_role_arn(self, value: Optional[pulumi.Input[
|
237
|
+
def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
239
238
|
pulumi.set(self, "assume_role_arn", value)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter(name="assumeRoleSessionName")
|
243
|
-
def assume_role_session_name(self) -> Optional[pulumi.Input[
|
242
|
+
def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
244
243
|
"""
|
245
244
|
Specifies the session name to use when assuming the role.
|
246
245
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -249,12 +248,12 @@ class _SecretBackendStaticRoleState:
|
|
249
248
|
return pulumi.get(self, "assume_role_session_name")
|
250
249
|
|
251
250
|
@assume_role_session_name.setter
|
252
|
-
def assume_role_session_name(self, value: Optional[pulumi.Input[
|
251
|
+
def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
252
|
pulumi.set(self, "assume_role_session_name", value)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter
|
257
|
-
def backend(self) -> Optional[pulumi.Input[
|
256
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
258
257
|
"""
|
259
258
|
The unique path this backend should be mounted at. Must
|
260
259
|
not begin or end with a `/`. Defaults to `aws`
|
@@ -262,12 +261,12 @@ class _SecretBackendStaticRoleState:
|
|
262
261
|
return pulumi.get(self, "backend")
|
263
262
|
|
264
263
|
@backend.setter
|
265
|
-
def backend(self, value: Optional[pulumi.Input[
|
264
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
266
265
|
pulumi.set(self, "backend", value)
|
267
266
|
|
268
|
-
@property
|
267
|
+
@_builtins.property
|
269
268
|
@pulumi.getter(name="externalId")
|
270
|
-
def external_id(self) -> Optional[pulumi.Input[
|
269
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
271
270
|
"""
|
272
271
|
Specifies the external ID to use when assuming the role.
|
273
272
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
@@ -275,12 +274,12 @@ class _SecretBackendStaticRoleState:
|
|
275
274
|
return pulumi.get(self, "external_id")
|
276
275
|
|
277
276
|
@external_id.setter
|
278
|
-
def external_id(self, value: Optional[pulumi.Input[
|
277
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
279
278
|
pulumi.set(self, "external_id", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter
|
283
|
-
def name(self) -> Optional[pulumi.Input[
|
282
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
The name to identify this role within the backend.
|
286
285
|
Must be unique within the backend.
|
@@ -288,12 +287,12 @@ class _SecretBackendStaticRoleState:
|
|
288
287
|
return pulumi.get(self, "name")
|
289
288
|
|
290
289
|
@name.setter
|
291
|
-
def name(self, value: Optional[pulumi.Input[
|
290
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
292
291
|
pulumi.set(self, "name", value)
|
293
292
|
|
294
|
-
@property
|
293
|
+
@_builtins.property
|
295
294
|
@pulumi.getter
|
296
|
-
def namespace(self) -> Optional[pulumi.Input[
|
295
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
297
296
|
"""
|
298
297
|
The namespace to provision the resource in.
|
299
298
|
The value should not contain leading or trailing forward slashes.
|
@@ -303,31 +302,31 @@ class _SecretBackendStaticRoleState:
|
|
303
302
|
return pulumi.get(self, "namespace")
|
304
303
|
|
305
304
|
@namespace.setter
|
306
|
-
def namespace(self, value: Optional[pulumi.Input[
|
305
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
307
306
|
pulumi.set(self, "namespace", value)
|
308
307
|
|
309
|
-
@property
|
308
|
+
@_builtins.property
|
310
309
|
@pulumi.getter(name="rotationPeriod")
|
311
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
310
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
312
311
|
"""
|
313
312
|
How often Vault should rotate the password of the user entry.
|
314
313
|
"""
|
315
314
|
return pulumi.get(self, "rotation_period")
|
316
315
|
|
317
316
|
@rotation_period.setter
|
318
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
317
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
319
318
|
pulumi.set(self, "rotation_period", value)
|
320
319
|
|
321
|
-
@property
|
320
|
+
@_builtins.property
|
322
321
|
@pulumi.getter
|
323
|
-
def username(self) -> Optional[pulumi.Input[
|
322
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
324
323
|
"""
|
325
324
|
The username of the existing AWS IAM to manage password rotation for.
|
326
325
|
"""
|
327
326
|
return pulumi.get(self, "username")
|
328
327
|
|
329
328
|
@username.setter
|
330
|
-
def username(self, value: Optional[pulumi.Input[
|
329
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
331
330
|
pulumi.set(self, "username", value)
|
332
331
|
|
333
332
|
|
@@ -337,14 +336,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
337
336
|
def __init__(__self__,
|
338
337
|
resource_name: str,
|
339
338
|
opts: Optional[pulumi.ResourceOptions] = None,
|
340
|
-
assume_role_arn: Optional[pulumi.Input[
|
341
|
-
assume_role_session_name: Optional[pulumi.Input[
|
342
|
-
backend: Optional[pulumi.Input[
|
343
|
-
external_id: Optional[pulumi.Input[
|
344
|
-
name: Optional[pulumi.Input[
|
345
|
-
namespace: Optional[pulumi.Input[
|
346
|
-
rotation_period: Optional[pulumi.Input[
|
347
|
-
username: Optional[pulumi.Input[
|
339
|
+
assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
341
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
343
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
344
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
346
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
348
347
|
__props__=None):
|
349
348
|
"""
|
350
349
|
## Example Usage
|
@@ -391,25 +390,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
391
390
|
|
392
391
|
:param str resource_name: The name of the resource.
|
393
392
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
394
|
-
:param pulumi.Input[
|
393
|
+
:param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
395
394
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
396
395
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
397
396
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
398
|
-
:param pulumi.Input[
|
397
|
+
:param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
399
398
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
400
399
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
401
|
-
:param pulumi.Input[
|
400
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
402
401
|
not begin or end with a `/`. Defaults to `aws`
|
403
|
-
:param pulumi.Input[
|
402
|
+
:param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
404
403
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
405
|
-
:param pulumi.Input[
|
404
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
406
405
|
Must be unique within the backend.
|
407
|
-
:param pulumi.Input[
|
406
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
408
407
|
The value should not contain leading or trailing forward slashes.
|
409
408
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
410
409
|
*Available only for Vault Enterprise*.
|
411
|
-
:param pulumi.Input[
|
412
|
-
:param pulumi.Input[
|
410
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
411
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
413
412
|
"""
|
414
413
|
...
|
415
414
|
@overload
|
@@ -475,14 +474,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
475
474
|
def _internal_init(__self__,
|
476
475
|
resource_name: str,
|
477
476
|
opts: Optional[pulumi.ResourceOptions] = None,
|
478
|
-
assume_role_arn: Optional[pulumi.Input[
|
479
|
-
assume_role_session_name: Optional[pulumi.Input[
|
480
|
-
backend: Optional[pulumi.Input[
|
481
|
-
external_id: Optional[pulumi.Input[
|
482
|
-
name: Optional[pulumi.Input[
|
483
|
-
namespace: Optional[pulumi.Input[
|
484
|
-
rotation_period: Optional[pulumi.Input[
|
485
|
-
username: Optional[pulumi.Input[
|
477
|
+
assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
478
|
+
assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
479
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
480
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
481
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
482
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
484
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
486
485
|
__props__=None):
|
487
486
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
488
487
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -514,14 +513,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
514
513
|
def get(resource_name: str,
|
515
514
|
id: pulumi.Input[str],
|
516
515
|
opts: Optional[pulumi.ResourceOptions] = None,
|
517
|
-
assume_role_arn: Optional[pulumi.Input[
|
518
|
-
assume_role_session_name: Optional[pulumi.Input[
|
519
|
-
backend: Optional[pulumi.Input[
|
520
|
-
external_id: Optional[pulumi.Input[
|
521
|
-
name: Optional[pulumi.Input[
|
522
|
-
namespace: Optional[pulumi.Input[
|
523
|
-
rotation_period: Optional[pulumi.Input[
|
524
|
-
username: Optional[pulumi.Input[
|
516
|
+
assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
517
|
+
assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
518
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
519
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
520
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
521
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
522
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
523
|
+
username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
|
525
524
|
"""
|
526
525
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
527
526
|
properties used to qualify the lookup.
|
@@ -529,25 +528,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
529
528
|
:param str resource_name: The unique name of the resulting resource.
|
530
529
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
531
530
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
532
|
-
:param pulumi.Input[
|
531
|
+
:param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
|
533
532
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
534
533
|
If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
|
535
534
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
536
|
-
:param pulumi.Input[
|
535
|
+
:param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
|
537
536
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
538
537
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
539
|
-
:param pulumi.Input[
|
538
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
|
540
539
|
not begin or end with a `/`. Defaults to `aws`
|
541
|
-
:param pulumi.Input[
|
540
|
+
:param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
|
542
541
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
543
|
-
:param pulumi.Input[
|
542
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
544
543
|
Must be unique within the backend.
|
545
|
-
:param pulumi.Input[
|
544
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
546
545
|
The value should not contain leading or trailing forward slashes.
|
547
546
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
548
547
|
*Available only for Vault Enterprise*.
|
549
|
-
:param pulumi.Input[
|
550
|
-
:param pulumi.Input[
|
548
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
549
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
|
551
550
|
"""
|
552
551
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
553
552
|
|
@@ -563,9 +562,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
563
562
|
__props__.__dict__["username"] = username
|
564
563
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
565
564
|
|
566
|
-
@property
|
565
|
+
@_builtins.property
|
567
566
|
@pulumi.getter(name="assumeRoleArn")
|
568
|
-
def assume_role_arn(self) -> pulumi.Output[Optional[
|
567
|
+
def assume_role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
569
568
|
"""
|
570
569
|
Specifies the ARN of the role that Vault should assume.
|
571
570
|
When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
|
@@ -574,9 +573,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
574
573
|
"""
|
575
574
|
return pulumi.get(self, "assume_role_arn")
|
576
575
|
|
577
|
-
@property
|
576
|
+
@_builtins.property
|
578
577
|
@pulumi.getter(name="assumeRoleSessionName")
|
579
|
-
def assume_role_session_name(self) -> pulumi.Output[Optional[
|
578
|
+
def assume_role_session_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
580
579
|
"""
|
581
580
|
Specifies the session name to use when assuming the role.
|
582
581
|
If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
|
@@ -584,36 +583,36 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
584
583
|
"""
|
585
584
|
return pulumi.get(self, "assume_role_session_name")
|
586
585
|
|
587
|
-
@property
|
586
|
+
@_builtins.property
|
588
587
|
@pulumi.getter
|
589
|
-
def backend(self) -> pulumi.Output[Optional[
|
588
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
590
589
|
"""
|
591
590
|
The unique path this backend should be mounted at. Must
|
592
591
|
not begin or end with a `/`. Defaults to `aws`
|
593
592
|
"""
|
594
593
|
return pulumi.get(self, "backend")
|
595
594
|
|
596
|
-
@property
|
595
|
+
@_builtins.property
|
597
596
|
@pulumi.getter(name="externalId")
|
598
|
-
def external_id(self) -> pulumi.Output[Optional[
|
597
|
+
def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
599
598
|
"""
|
600
599
|
Specifies the external ID to use when assuming the role.
|
601
600
|
Requires Vault 1.19+. *Available only for Vault Enterprise*.
|
602
601
|
"""
|
603
602
|
return pulumi.get(self, "external_id")
|
604
603
|
|
605
|
-
@property
|
604
|
+
@_builtins.property
|
606
605
|
@pulumi.getter
|
607
|
-
def name(self) -> pulumi.Output[
|
606
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
608
607
|
"""
|
609
608
|
The name to identify this role within the backend.
|
610
609
|
Must be unique within the backend.
|
611
610
|
"""
|
612
611
|
return pulumi.get(self, "name")
|
613
612
|
|
614
|
-
@property
|
613
|
+
@_builtins.property
|
615
614
|
@pulumi.getter
|
616
|
-
def namespace(self) -> pulumi.Output[Optional[
|
615
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
617
616
|
"""
|
618
617
|
The namespace to provision the resource in.
|
619
618
|
The value should not contain leading or trailing forward slashes.
|
@@ -622,17 +621,17 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
622
621
|
"""
|
623
622
|
return pulumi.get(self, "namespace")
|
624
623
|
|
625
|
-
@property
|
624
|
+
@_builtins.property
|
626
625
|
@pulumi.getter(name="rotationPeriod")
|
627
|
-
def rotation_period(self) -> pulumi.Output[
|
626
|
+
def rotation_period(self) -> pulumi.Output[_builtins.int]:
|
628
627
|
"""
|
629
628
|
How often Vault should rotate the password of the user entry.
|
630
629
|
"""
|
631
630
|
return pulumi.get(self, "rotation_period")
|
632
631
|
|
633
|
-
@property
|
632
|
+
@_builtins.property
|
634
633
|
@pulumi.getter
|
635
|
-
def username(self) -> pulumi.Output[
|
634
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
636
635
|
"""
|
637
636
|
The username of the existing AWS IAM to manage password rotation for.
|
638
637
|
"""
|
pulumi_vault/azure/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|