pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -80,43 +79,43 @@ class GetAccessCredentialsResult:
|
|
80
79
|
raise TypeError("Expected argument 'validate_creds' to be a bool")
|
81
80
|
pulumi.set(__self__, "validate_creds", validate_creds)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def backend(self) ->
|
84
|
+
def backend(self) -> _builtins.str:
|
86
85
|
return pulumi.get(self, "backend")
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="clientId")
|
90
|
-
def client_id(self) ->
|
89
|
+
def client_id(self) -> _builtins.str:
|
91
90
|
"""
|
92
91
|
The client id for credentials to query the Azure APIs.
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "client_id")
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter(name="clientSecret")
|
98
|
-
def client_secret(self) ->
|
97
|
+
def client_secret(self) -> _builtins.str:
|
99
98
|
"""
|
100
99
|
The client secret for credentials to query the Azure APIs.
|
101
100
|
"""
|
102
101
|
return pulumi.get(self, "client_secret")
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def environment(self) -> Optional[
|
105
|
+
def environment(self) -> Optional[_builtins.str]:
|
107
106
|
return pulumi.get(self, "environment")
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def id(self) ->
|
110
|
+
def id(self) -> _builtins.str:
|
112
111
|
"""
|
113
112
|
The provider-assigned unique ID for this managed resource.
|
114
113
|
"""
|
115
114
|
return pulumi.get(self, "id")
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter(name="leaseDuration")
|
119
|
-
def lease_duration(self) ->
|
118
|
+
def lease_duration(self) -> _builtins.int:
|
120
119
|
"""
|
121
120
|
The duration of the secret lease, in seconds relative
|
122
121
|
to the time the data was requested. Once this time has passed any plan
|
@@ -124,62 +123,62 @@ class GetAccessCredentialsResult:
|
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "lease_duration")
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter(name="leaseId")
|
129
|
-
def lease_id(self) ->
|
128
|
+
def lease_id(self) -> _builtins.str:
|
130
129
|
"""
|
131
130
|
The lease identifier assigned by Vault.
|
132
131
|
"""
|
133
132
|
return pulumi.get(self, "lease_id")
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="leaseRenewable")
|
137
|
-
def lease_renewable(self) ->
|
136
|
+
def lease_renewable(self) -> _builtins.bool:
|
138
137
|
return pulumi.get(self, "lease_renewable")
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="leaseStartTime")
|
142
|
-
def lease_start_time(self) ->
|
141
|
+
def lease_start_time(self) -> _builtins.str:
|
143
142
|
return pulumi.get(self, "lease_start_time")
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter(name="maxCredValidationSeconds")
|
147
|
-
def max_cred_validation_seconds(self) -> Optional[
|
146
|
+
def max_cred_validation_seconds(self) -> Optional[_builtins.int]:
|
148
147
|
return pulumi.get(self, "max_cred_validation_seconds")
|
149
148
|
|
150
|
-
@property
|
149
|
+
@_builtins.property
|
151
150
|
@pulumi.getter
|
152
|
-
def namespace(self) -> Optional[
|
151
|
+
def namespace(self) -> Optional[_builtins.str]:
|
153
152
|
return pulumi.get(self, "namespace")
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
@pulumi.getter(name="numSecondsBetweenTests")
|
157
|
-
def num_seconds_between_tests(self) -> Optional[
|
156
|
+
def num_seconds_between_tests(self) -> Optional[_builtins.int]:
|
158
157
|
return pulumi.get(self, "num_seconds_between_tests")
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="numSequentialSuccesses")
|
162
|
-
def num_sequential_successes(self) -> Optional[
|
161
|
+
def num_sequential_successes(self) -> Optional[_builtins.int]:
|
163
162
|
return pulumi.get(self, "num_sequential_successes")
|
164
163
|
|
165
|
-
@property
|
164
|
+
@_builtins.property
|
166
165
|
@pulumi.getter
|
167
|
-
def role(self) ->
|
166
|
+
def role(self) -> _builtins.str:
|
168
167
|
return pulumi.get(self, "role")
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter(name="subscriptionId")
|
172
|
-
def subscription_id(self) -> Optional[
|
171
|
+
def subscription_id(self) -> Optional[_builtins.str]:
|
173
172
|
return pulumi.get(self, "subscription_id")
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter(name="tenantId")
|
177
|
-
def tenant_id(self) -> Optional[
|
176
|
+
def tenant_id(self) -> Optional[_builtins.str]:
|
178
177
|
return pulumi.get(self, "tenant_id")
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter(name="validateCreds")
|
182
|
-
def validate_creds(self) -> Optional[
|
181
|
+
def validate_creds(self) -> Optional[_builtins.bool]:
|
183
182
|
return pulumi.get(self, "validate_creds")
|
184
183
|
|
185
184
|
|
@@ -208,16 +207,16 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
|
|
208
207
|
validate_creds=self.validate_creds)
|
209
208
|
|
210
209
|
|
211
|
-
def get_access_credentials(backend: Optional[
|
212
|
-
environment: Optional[
|
213
|
-
max_cred_validation_seconds: Optional[
|
214
|
-
namespace: Optional[
|
215
|
-
num_seconds_between_tests: Optional[
|
216
|
-
num_sequential_successes: Optional[
|
217
|
-
role: Optional[
|
218
|
-
subscription_id: Optional[
|
219
|
-
tenant_id: Optional[
|
220
|
-
validate_creds: Optional[
|
210
|
+
def get_access_credentials(backend: Optional[_builtins.str] = None,
|
211
|
+
environment: Optional[_builtins.str] = None,
|
212
|
+
max_cred_validation_seconds: Optional[_builtins.int] = None,
|
213
|
+
namespace: Optional[_builtins.str] = None,
|
214
|
+
num_seconds_between_tests: Optional[_builtins.int] = None,
|
215
|
+
num_sequential_successes: Optional[_builtins.int] = None,
|
216
|
+
role: Optional[_builtins.str] = None,
|
217
|
+
subscription_id: Optional[_builtins.str] = None,
|
218
|
+
tenant_id: Optional[_builtins.str] = None,
|
219
|
+
validate_creds: Optional[_builtins.bool] = None,
|
221
220
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
|
222
221
|
"""
|
223
222
|
## Example Usage
|
@@ -240,34 +239,34 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
|
|
240
239
|
are required to be set for: `subscription_id`, `tenant_id`, `environment`.
|
241
240
|
|
242
241
|
|
243
|
-
:param
|
242
|
+
:param _builtins.str backend: The path to the Azure secret backend to
|
244
243
|
read credentials from, with no leading or trailing `/`s.
|
245
|
-
:param
|
244
|
+
:param _builtins.str environment: The Azure environment to use during credential validation.
|
246
245
|
Defaults to the environment configured in the Vault backend.
|
247
246
|
Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
|
248
247
|
*See the caveats section for more information on this field.*
|
249
|
-
:param
|
248
|
+
:param _builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
|
250
249
|
the number of seconds after which to give up validating credentials. Defaults
|
251
250
|
to 300.
|
252
|
-
:param
|
251
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
253
252
|
The value should not contain leading or trailing forward slashes.
|
254
253
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
254
|
*Available only for Vault Enterprise*.
|
256
|
-
:param
|
255
|
+
:param _builtins.int num_seconds_between_tests: If 'validate_creds' is true,
|
257
256
|
the number of seconds to wait between each test of generated credentials.
|
258
257
|
Defaults to 1.
|
259
|
-
:param
|
258
|
+
:param _builtins.int num_sequential_successes: If 'validate_creds' is true,
|
260
259
|
the number of sequential successes required to validate generated
|
261
260
|
credentials. Defaults to 8.
|
262
|
-
:param
|
261
|
+
:param _builtins.str role: The name of the Azure secret backend role to read
|
263
262
|
credentials from, with no leading or trailing `/`s.
|
264
|
-
:param
|
263
|
+
:param _builtins.str subscription_id: The subscription ID to use during credential
|
265
264
|
validation. Defaults to the subscription ID configured in the Vault `backend`.
|
266
265
|
*See the caveats section for more information on this field.*
|
267
|
-
:param
|
266
|
+
:param _builtins.str tenant_id: The tenant ID to use during credential validation.
|
268
267
|
Defaults to the tenant ID configured in the Vault `backend`.
|
269
268
|
*See the caveats section for more information on this field.*
|
270
|
-
:param
|
269
|
+
:param _builtins.bool validate_creds: Whether generated credentials should be
|
271
270
|
validated before being returned. Defaults to `false`, which returns
|
272
271
|
credentials without checking whether they have fully propagated throughout
|
273
272
|
Azure Active Directory. Designating `true` activates testing.
|
@@ -304,16 +303,16 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
|
|
304
303
|
subscription_id=pulumi.get(__ret__, 'subscription_id'),
|
305
304
|
tenant_id=pulumi.get(__ret__, 'tenant_id'),
|
306
305
|
validate_creds=pulumi.get(__ret__, 'validate_creds'))
|
307
|
-
def get_access_credentials_output(backend: Optional[pulumi.Input[
|
308
|
-
environment: Optional[pulumi.Input[Optional[
|
309
|
-
max_cred_validation_seconds: Optional[pulumi.Input[Optional[
|
310
|
-
namespace: Optional[pulumi.Input[Optional[
|
311
|
-
num_seconds_between_tests: Optional[pulumi.Input[Optional[
|
312
|
-
num_sequential_successes: Optional[pulumi.Input[Optional[
|
313
|
-
role: Optional[pulumi.Input[
|
314
|
-
subscription_id: Optional[pulumi.Input[Optional[
|
315
|
-
tenant_id: Optional[pulumi.Input[Optional[
|
316
|
-
validate_creds: Optional[pulumi.Input[Optional[
|
306
|
+
def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
307
|
+
environment: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
308
|
+
max_cred_validation_seconds: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
309
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
310
|
+
num_seconds_between_tests: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
311
|
+
num_sequential_successes: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
312
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
313
|
+
subscription_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
314
|
+
tenant_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
315
|
+
validate_creds: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
317
316
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
318
317
|
"""
|
319
318
|
## Example Usage
|
@@ -336,34 +335,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]]
|
|
336
335
|
are required to be set for: `subscription_id`, `tenant_id`, `environment`.
|
337
336
|
|
338
337
|
|
339
|
-
:param
|
338
|
+
:param _builtins.str backend: The path to the Azure secret backend to
|
340
339
|
read credentials from, with no leading or trailing `/`s.
|
341
|
-
:param
|
340
|
+
:param _builtins.str environment: The Azure environment to use during credential validation.
|
342
341
|
Defaults to the environment configured in the Vault backend.
|
343
342
|
Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
|
344
343
|
*See the caveats section for more information on this field.*
|
345
|
-
:param
|
344
|
+
:param _builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
|
346
345
|
the number of seconds after which to give up validating credentials. Defaults
|
347
346
|
to 300.
|
348
|
-
:param
|
347
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
349
348
|
The value should not contain leading or trailing forward slashes.
|
350
349
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
351
350
|
*Available only for Vault Enterprise*.
|
352
|
-
:param
|
351
|
+
:param _builtins.int num_seconds_between_tests: If 'validate_creds' is true,
|
353
352
|
the number of seconds to wait between each test of generated credentials.
|
354
353
|
Defaults to 1.
|
355
|
-
:param
|
354
|
+
:param _builtins.int num_sequential_successes: If 'validate_creds' is true,
|
356
355
|
the number of sequential successes required to validate generated
|
357
356
|
credentials. Defaults to 8.
|
358
|
-
:param
|
357
|
+
:param _builtins.str role: The name of the Azure secret backend role to read
|
359
358
|
credentials from, with no leading or trailing `/`s.
|
360
|
-
:param
|
359
|
+
:param _builtins.str subscription_id: The subscription ID to use during credential
|
361
360
|
validation. Defaults to the subscription ID configured in the Vault `backend`.
|
362
361
|
*See the caveats section for more information on this field.*
|
363
|
-
:param
|
362
|
+
:param _builtins.str tenant_id: The tenant ID to use during credential validation.
|
364
363
|
Defaults to the tenant ID configured in the Vault `backend`.
|
365
364
|
*See the caveats section for more information on this field.*
|
366
|
-
:param
|
365
|
+
:param _builtins.bool validate_creds: Whether generated credentials should be
|
367
366
|
validated before being returned. Defaults to `false`, which returns
|
368
367
|
credentials without checking whether they have fully propagated throughout
|
369
368
|
Azure Active Directory. Designating `true` activates testing.
|
pulumi_vault/azure/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -42,20 +41,20 @@ class BackendRoleAzureGroup(dict):
|
|
42
41
|
return super().get(key, default)
|
43
42
|
|
44
43
|
def __init__(__self__, *,
|
45
|
-
group_name:
|
46
|
-
object_id: Optional[
|
44
|
+
group_name: _builtins.str,
|
45
|
+
object_id: Optional[_builtins.str] = None):
|
47
46
|
pulumi.set(__self__, "group_name", group_name)
|
48
47
|
if object_id is not None:
|
49
48
|
pulumi.set(__self__, "object_id", object_id)
|
50
49
|
|
51
|
-
@property
|
50
|
+
@_builtins.property
|
52
51
|
@pulumi.getter(name="groupName")
|
53
|
-
def group_name(self) ->
|
52
|
+
def group_name(self) -> _builtins.str:
|
54
53
|
return pulumi.get(self, "group_name")
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter(name="objectId")
|
58
|
-
def object_id(self) -> Optional[
|
57
|
+
def object_id(self) -> Optional[_builtins.str]:
|
59
58
|
return pulumi.get(self, "object_id")
|
60
59
|
|
61
60
|
|
@@ -81,28 +80,28 @@ class BackendRoleAzureRole(dict):
|
|
81
80
|
return super().get(key, default)
|
82
81
|
|
83
82
|
def __init__(__self__, *,
|
84
|
-
scope:
|
85
|
-
role_id: Optional[
|
86
|
-
role_name: Optional[
|
83
|
+
scope: _builtins.str,
|
84
|
+
role_id: Optional[_builtins.str] = None,
|
85
|
+
role_name: Optional[_builtins.str] = None):
|
87
86
|
pulumi.set(__self__, "scope", scope)
|
88
87
|
if role_id is not None:
|
89
88
|
pulumi.set(__self__, "role_id", role_id)
|
90
89
|
if role_name is not None:
|
91
90
|
pulumi.set(__self__, "role_name", role_name)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def scope(self) ->
|
94
|
+
def scope(self) -> _builtins.str:
|
96
95
|
return pulumi.get(self, "scope")
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter(name="roleId")
|
100
|
-
def role_id(self) -> Optional[
|
99
|
+
def role_id(self) -> Optional[_builtins.str]:
|
101
100
|
return pulumi.get(self, "role_id")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="roleName")
|
105
|
-
def role_name(self) -> Optional[
|
104
|
+
def role_name(self) -> Optional[_builtins.str]:
|
106
105
|
return pulumi.get(self, "role_name")
|
107
106
|
|
108
107
|
|