pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,44 +19,44 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
consul_namespace: Optional[pulumi.Input[
|
25
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
local: Optional[pulumi.Input[
|
28
|
-
max_ttl: Optional[pulumi.Input[
|
29
|
-
name: Optional[pulumi.Input[
|
30
|
-
namespace: Optional[pulumi.Input[
|
31
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
32
|
-
partition: Optional[pulumi.Input[
|
33
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
27
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
31
|
+
partition: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
36
35
|
"""
|
37
36
|
The set of arguments for constructing a SecretBackendRole resource.
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
38
|
+
:param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
40
39
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
42
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
41
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
43
42
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
44
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
45
|
+
:param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
|
46
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
48
47
|
The value should not contain leading or trailing forward slashes.
|
49
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
49
|
*Available only for Vault Enterprise*.
|
51
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
52
51
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
|
54
53
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
55
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
56
55
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
57
56
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
58
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
59
58
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
60
|
-
:param pulumi.Input[
|
59
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
|
61
60
|
"""
|
62
61
|
if backend is not None:
|
63
62
|
pulumi.set(__self__, "backend", backend)
|
@@ -86,21 +85,21 @@ class SecretBackendRoleArgs:
|
|
86
85
|
if ttl is not None:
|
87
86
|
pulumi.set(__self__, "ttl", ttl)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter
|
91
|
-
def backend(self) -> Optional[pulumi.Input[
|
90
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
92
91
|
"""
|
93
92
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
94
93
|
"""
|
95
94
|
return pulumi.get(self, "backend")
|
96
95
|
|
97
96
|
@backend.setter
|
98
|
-
def backend(self, value: Optional[pulumi.Input[
|
97
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
99
98
|
pulumi.set(self, "backend", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="consulNamespace")
|
103
|
-
def consul_namespace(self) -> Optional[pulumi.Input[
|
102
|
+
def consul_namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
104
103
|
"""
|
105
104
|
The Consul namespace that the token will be created in.
|
106
105
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
@@ -108,24 +107,24 @@ class SecretBackendRoleArgs:
|
|
108
107
|
return pulumi.get(self, "consul_namespace")
|
109
108
|
|
110
109
|
@consul_namespace.setter
|
111
|
-
def consul_namespace(self, value: Optional[pulumi.Input[
|
110
|
+
def consul_namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
112
111
|
pulumi.set(self, "consul_namespace", value)
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="consulPolicies")
|
116
|
-
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
115
|
+
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
117
116
|
"""
|
118
117
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
119
118
|
"""
|
120
119
|
return pulumi.get(self, "consul_policies")
|
121
120
|
|
122
121
|
@consul_policies.setter
|
123
|
-
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
122
|
+
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
124
123
|
pulumi.set(self, "consul_policies", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter(name="consulRoles")
|
128
|
-
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
127
|
+
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
129
128
|
"""
|
130
129
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
131
130
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
@@ -133,48 +132,48 @@ class SecretBackendRoleArgs:
|
|
133
132
|
return pulumi.get(self, "consul_roles")
|
134
133
|
|
135
134
|
@consul_roles.setter
|
136
|
-
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
135
|
+
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
137
136
|
pulumi.set(self, "consul_roles", value)
|
138
137
|
|
139
|
-
@property
|
138
|
+
@_builtins.property
|
140
139
|
@pulumi.getter
|
141
|
-
def local(self) -> Optional[pulumi.Input[
|
140
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
142
141
|
"""
|
143
142
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
144
143
|
"""
|
145
144
|
return pulumi.get(self, "local")
|
146
145
|
|
147
146
|
@local.setter
|
148
|
-
def local(self, value: Optional[pulumi.Input[
|
147
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
149
148
|
pulumi.set(self, "local", value)
|
150
149
|
|
151
|
-
@property
|
150
|
+
@_builtins.property
|
152
151
|
@pulumi.getter(name="maxTtl")
|
153
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
152
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
154
153
|
"""
|
155
154
|
Maximum TTL for leases associated with this role, in seconds.
|
156
155
|
"""
|
157
156
|
return pulumi.get(self, "max_ttl")
|
158
157
|
|
159
158
|
@max_ttl.setter
|
160
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
159
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
161
160
|
pulumi.set(self, "max_ttl", value)
|
162
161
|
|
163
|
-
@property
|
162
|
+
@_builtins.property
|
164
163
|
@pulumi.getter
|
165
|
-
def name(self) -> Optional[pulumi.Input[
|
164
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
166
165
|
"""
|
167
166
|
The name of the Consul secrets engine role to create.
|
168
167
|
"""
|
169
168
|
return pulumi.get(self, "name")
|
170
169
|
|
171
170
|
@name.setter
|
172
|
-
def name(self, value: Optional[pulumi.Input[
|
171
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
173
172
|
pulumi.set(self, "name", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter
|
177
|
-
def namespace(self) -> Optional[pulumi.Input[
|
176
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
178
177
|
"""
|
179
178
|
The namespace to provision the resource in.
|
180
179
|
The value should not contain leading or trailing forward slashes.
|
@@ -184,12 +183,12 @@ class SecretBackendRoleArgs:
|
|
184
183
|
return pulumi.get(self, "namespace")
|
185
184
|
|
186
185
|
@namespace.setter
|
187
|
-
def namespace(self, value: Optional[pulumi.Input[
|
186
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
188
187
|
pulumi.set(self, "namespace", value)
|
189
188
|
|
190
|
-
@property
|
189
|
+
@_builtins.property
|
191
190
|
@pulumi.getter(name="nodeIdentities")
|
192
|
-
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
191
|
+
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
193
192
|
"""
|
194
193
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
195
194
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -197,12 +196,12 @@ class SecretBackendRoleArgs:
|
|
197
196
|
return pulumi.get(self, "node_identities")
|
198
197
|
|
199
198
|
@node_identities.setter
|
200
|
-
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
199
|
+
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
201
200
|
pulumi.set(self, "node_identities", value)
|
202
201
|
|
203
|
-
@property
|
202
|
+
@_builtins.property
|
204
203
|
@pulumi.getter
|
205
|
-
def partition(self) -> Optional[pulumi.Input[
|
204
|
+
def partition(self) -> Optional[pulumi.Input[_builtins.str]]:
|
206
205
|
"""
|
207
206
|
The admin partition that the token will be created in.
|
208
207
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
@@ -210,12 +209,12 @@ class SecretBackendRoleArgs:
|
|
210
209
|
return pulumi.get(self, "partition")
|
211
210
|
|
212
211
|
@partition.setter
|
213
|
-
def partition(self, value: Optional[pulumi.Input[
|
212
|
+
def partition(self, value: Optional[pulumi.Input[_builtins.str]]):
|
214
213
|
pulumi.set(self, "partition", value)
|
215
214
|
|
216
|
-
@property
|
215
|
+
@_builtins.property
|
217
216
|
@pulumi.getter
|
218
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
217
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
219
218
|
"""
|
220
219
|
The list of Consul ACL policies to associate with these roles.
|
221
220
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -224,12 +223,12 @@ class SecretBackendRoleArgs:
|
|
224
223
|
return pulumi.get(self, "policies")
|
225
224
|
|
226
225
|
@policies.setter
|
227
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
228
227
|
pulumi.set(self, "policies", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="serviceIdentities")
|
232
|
-
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
231
|
+
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
233
232
|
"""
|
234
233
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
235
234
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
@@ -237,63 +236,63 @@ class SecretBackendRoleArgs:
|
|
237
236
|
return pulumi.get(self, "service_identities")
|
238
237
|
|
239
238
|
@service_identities.setter
|
240
|
-
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
239
|
+
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
241
240
|
pulumi.set(self, "service_identities", value)
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter
|
245
|
-
def ttl(self) -> Optional[pulumi.Input[
|
244
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
246
245
|
"""
|
247
246
|
Specifies the TTL for this role.
|
248
247
|
"""
|
249
248
|
return pulumi.get(self, "ttl")
|
250
249
|
|
251
250
|
@ttl.setter
|
252
|
-
def ttl(self, value: Optional[pulumi.Input[
|
251
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
253
252
|
pulumi.set(self, "ttl", value)
|
254
253
|
|
255
254
|
|
256
255
|
@pulumi.input_type
|
257
256
|
class _SecretBackendRoleState:
|
258
257
|
def __init__(__self__, *,
|
259
|
-
backend: Optional[pulumi.Input[
|
260
|
-
consul_namespace: Optional[pulumi.Input[
|
261
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
262
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
263
|
-
local: Optional[pulumi.Input[
|
264
|
-
max_ttl: Optional[pulumi.Input[
|
265
|
-
name: Optional[pulumi.Input[
|
266
|
-
namespace: Optional[pulumi.Input[
|
267
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
268
|
-
partition: Optional[pulumi.Input[
|
269
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
270
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
271
|
-
ttl: Optional[pulumi.Input[
|
258
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
259
|
+
consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
260
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
261
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
262
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
263
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
264
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
265
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
266
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
267
|
+
partition: Optional[pulumi.Input[_builtins.str]] = None,
|
268
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
269
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
270
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
272
271
|
"""
|
273
272
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
274
|
-
:param pulumi.Input[
|
275
|
-
:param pulumi.Input[
|
273
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
274
|
+
:param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
276
275
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
277
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
278
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
276
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
277
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
279
278
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
280
|
-
:param pulumi.Input[
|
281
|
-
:param pulumi.Input[
|
282
|
-
:param pulumi.Input[
|
283
|
-
:param pulumi.Input[
|
279
|
+
:param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
280
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
281
|
+
:param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
|
282
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
284
283
|
The value should not contain leading or trailing forward slashes.
|
285
284
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
286
285
|
*Available only for Vault Enterprise*.
|
287
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
286
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
288
287
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
289
|
-
:param pulumi.Input[
|
288
|
+
:param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
|
290
289
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
291
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
290
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
292
291
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
293
292
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
294
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
293
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
295
294
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
296
|
-
:param pulumi.Input[
|
295
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
|
297
296
|
"""
|
298
297
|
if backend is not None:
|
299
298
|
pulumi.set(__self__, "backend", backend)
|
@@ -322,21 +321,21 @@ class _SecretBackendRoleState:
|
|
322
321
|
if ttl is not None:
|
323
322
|
pulumi.set(__self__, "ttl", ttl)
|
324
323
|
|
325
|
-
@property
|
324
|
+
@_builtins.property
|
326
325
|
@pulumi.getter
|
327
|
-
def backend(self) -> Optional[pulumi.Input[
|
326
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
328
327
|
"""
|
329
328
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
330
329
|
"""
|
331
330
|
return pulumi.get(self, "backend")
|
332
331
|
|
333
332
|
@backend.setter
|
334
|
-
def backend(self, value: Optional[pulumi.Input[
|
333
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
335
334
|
pulumi.set(self, "backend", value)
|
336
335
|
|
337
|
-
@property
|
336
|
+
@_builtins.property
|
338
337
|
@pulumi.getter(name="consulNamespace")
|
339
|
-
def consul_namespace(self) -> Optional[pulumi.Input[
|
338
|
+
def consul_namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
340
339
|
"""
|
341
340
|
The Consul namespace that the token will be created in.
|
342
341
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
@@ -344,24 +343,24 @@ class _SecretBackendRoleState:
|
|
344
343
|
return pulumi.get(self, "consul_namespace")
|
345
344
|
|
346
345
|
@consul_namespace.setter
|
347
|
-
def consul_namespace(self, value: Optional[pulumi.Input[
|
346
|
+
def consul_namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
347
|
pulumi.set(self, "consul_namespace", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter(name="consulPolicies")
|
352
|
-
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
351
|
+
def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
353
352
|
"""
|
354
353
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "consul_policies")
|
357
356
|
|
358
357
|
@consul_policies.setter
|
359
|
-
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
358
|
+
def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
360
359
|
pulumi.set(self, "consul_policies", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="consulRoles")
|
364
|
-
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
363
|
+
def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
365
364
|
"""
|
366
365
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
367
366
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
@@ -369,48 +368,48 @@ class _SecretBackendRoleState:
|
|
369
368
|
return pulumi.get(self, "consul_roles")
|
370
369
|
|
371
370
|
@consul_roles.setter
|
372
|
-
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
371
|
+
def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
373
372
|
pulumi.set(self, "consul_roles", value)
|
374
373
|
|
375
|
-
@property
|
374
|
+
@_builtins.property
|
376
375
|
@pulumi.getter
|
377
|
-
def local(self) -> Optional[pulumi.Input[
|
376
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
378
377
|
"""
|
379
378
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
380
379
|
"""
|
381
380
|
return pulumi.get(self, "local")
|
382
381
|
|
383
382
|
@local.setter
|
384
|
-
def local(self, value: Optional[pulumi.Input[
|
383
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
385
384
|
pulumi.set(self, "local", value)
|
386
385
|
|
387
|
-
@property
|
386
|
+
@_builtins.property
|
388
387
|
@pulumi.getter(name="maxTtl")
|
389
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
388
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
390
389
|
"""
|
391
390
|
Maximum TTL for leases associated with this role, in seconds.
|
392
391
|
"""
|
393
392
|
return pulumi.get(self, "max_ttl")
|
394
393
|
|
395
394
|
@max_ttl.setter
|
396
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
395
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
397
396
|
pulumi.set(self, "max_ttl", value)
|
398
397
|
|
399
|
-
@property
|
398
|
+
@_builtins.property
|
400
399
|
@pulumi.getter
|
401
|
-
def name(self) -> Optional[pulumi.Input[
|
400
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
402
401
|
"""
|
403
402
|
The name of the Consul secrets engine role to create.
|
404
403
|
"""
|
405
404
|
return pulumi.get(self, "name")
|
406
405
|
|
407
406
|
@name.setter
|
408
|
-
def name(self, value: Optional[pulumi.Input[
|
407
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
409
408
|
pulumi.set(self, "name", value)
|
410
409
|
|
411
|
-
@property
|
410
|
+
@_builtins.property
|
412
411
|
@pulumi.getter
|
413
|
-
def namespace(self) -> Optional[pulumi.Input[
|
412
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
414
413
|
"""
|
415
414
|
The namespace to provision the resource in.
|
416
415
|
The value should not contain leading or trailing forward slashes.
|
@@ -420,12 +419,12 @@ class _SecretBackendRoleState:
|
|
420
419
|
return pulumi.get(self, "namespace")
|
421
420
|
|
422
421
|
@namespace.setter
|
423
|
-
def namespace(self, value: Optional[pulumi.Input[
|
422
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
424
423
|
pulumi.set(self, "namespace", value)
|
425
424
|
|
426
|
-
@property
|
425
|
+
@_builtins.property
|
427
426
|
@pulumi.getter(name="nodeIdentities")
|
428
|
-
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
427
|
+
def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
429
428
|
"""
|
430
429
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
431
430
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -433,12 +432,12 @@ class _SecretBackendRoleState:
|
|
433
432
|
return pulumi.get(self, "node_identities")
|
434
433
|
|
435
434
|
@node_identities.setter
|
436
|
-
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
435
|
+
def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
437
436
|
pulumi.set(self, "node_identities", value)
|
438
437
|
|
439
|
-
@property
|
438
|
+
@_builtins.property
|
440
439
|
@pulumi.getter
|
441
|
-
def partition(self) -> Optional[pulumi.Input[
|
440
|
+
def partition(self) -> Optional[pulumi.Input[_builtins.str]]:
|
442
441
|
"""
|
443
442
|
The admin partition that the token will be created in.
|
444
443
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
@@ -446,12 +445,12 @@ class _SecretBackendRoleState:
|
|
446
445
|
return pulumi.get(self, "partition")
|
447
446
|
|
448
447
|
@partition.setter
|
449
|
-
def partition(self, value: Optional[pulumi.Input[
|
448
|
+
def partition(self, value: Optional[pulumi.Input[_builtins.str]]):
|
450
449
|
pulumi.set(self, "partition", value)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter
|
454
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
453
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
455
454
|
"""
|
456
455
|
The list of Consul ACL policies to associate with these roles.
|
457
456
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -460,12 +459,12 @@ class _SecretBackendRoleState:
|
|
460
459
|
return pulumi.get(self, "policies")
|
461
460
|
|
462
461
|
@policies.setter
|
463
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
462
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
464
463
|
pulumi.set(self, "policies", value)
|
465
464
|
|
466
|
-
@property
|
465
|
+
@_builtins.property
|
467
466
|
@pulumi.getter(name="serviceIdentities")
|
468
|
-
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
467
|
+
def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
469
468
|
"""
|
470
469
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
471
470
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
@@ -473,19 +472,19 @@ class _SecretBackendRoleState:
|
|
473
472
|
return pulumi.get(self, "service_identities")
|
474
473
|
|
475
474
|
@service_identities.setter
|
476
|
-
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
475
|
+
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
477
476
|
pulumi.set(self, "service_identities", value)
|
478
477
|
|
479
|
-
@property
|
478
|
+
@_builtins.property
|
480
479
|
@pulumi.getter
|
481
|
-
def ttl(self) -> Optional[pulumi.Input[
|
480
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
482
481
|
"""
|
483
482
|
Specifies the TTL for this role.
|
484
483
|
"""
|
485
484
|
return pulumi.get(self, "ttl")
|
486
485
|
|
487
486
|
@ttl.setter
|
488
|
-
def ttl(self, value: Optional[pulumi.Input[
|
487
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
489
488
|
pulumi.set(self, "ttl", value)
|
490
489
|
|
491
490
|
|
@@ -495,19 +494,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
495
494
|
def __init__(__self__,
|
496
495
|
resource_name: str,
|
497
496
|
opts: Optional[pulumi.ResourceOptions] = None,
|
498
|
-
backend: Optional[pulumi.Input[
|
499
|
-
consul_namespace: Optional[pulumi.Input[
|
500
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
501
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
502
|
-
local: Optional[pulumi.Input[
|
503
|
-
max_ttl: Optional[pulumi.Input[
|
504
|
-
name: Optional[pulumi.Input[
|
505
|
-
namespace: Optional[pulumi.Input[
|
506
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
507
|
-
partition: Optional[pulumi.Input[
|
508
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
509
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
510
|
-
ttl: Optional[pulumi.Input[
|
497
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
498
|
+
consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
499
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
500
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
501
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
502
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
503
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
504
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
505
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
506
|
+
partition: Optional[pulumi.Input[_builtins.str]] = None,
|
507
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
508
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
509
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
511
510
|
__props__=None):
|
512
511
|
"""
|
513
512
|
Manages a Consul secrets role for a Consul secrets engine in Vault. Consul secret backends can then issue Consul tokens.
|
@@ -545,29 +544,29 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
545
544
|
|
546
545
|
:param str resource_name: The name of the resource.
|
547
546
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
548
|
-
:param pulumi.Input[
|
549
|
-
:param pulumi.Input[
|
547
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
548
|
+
:param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
550
549
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
551
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
552
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
550
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
551
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
553
552
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
554
|
-
:param pulumi.Input[
|
555
|
-
:param pulumi.Input[
|
556
|
-
:param pulumi.Input[
|
557
|
-
:param pulumi.Input[
|
553
|
+
:param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
554
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
555
|
+
:param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
|
556
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
558
557
|
The value should not contain leading or trailing forward slashes.
|
559
558
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
560
559
|
*Available only for Vault Enterprise*.
|
561
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
560
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
562
561
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
563
|
-
:param pulumi.Input[
|
562
|
+
:param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
|
564
563
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
565
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
564
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
566
565
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
567
566
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
568
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
567
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
569
568
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
570
|
-
:param pulumi.Input[
|
569
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
|
571
570
|
"""
|
572
571
|
...
|
573
572
|
@overload
|
@@ -624,19 +623,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
624
623
|
def _internal_init(__self__,
|
625
624
|
resource_name: str,
|
626
625
|
opts: Optional[pulumi.ResourceOptions] = None,
|
627
|
-
backend: Optional[pulumi.Input[
|
628
|
-
consul_namespace: Optional[pulumi.Input[
|
629
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
630
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
631
|
-
local: Optional[pulumi.Input[
|
632
|
-
max_ttl: Optional[pulumi.Input[
|
633
|
-
name: Optional[pulumi.Input[
|
634
|
-
namespace: Optional[pulumi.Input[
|
635
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
636
|
-
partition: Optional[pulumi.Input[
|
637
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
638
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
639
|
-
ttl: Optional[pulumi.Input[
|
626
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
627
|
+
consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
628
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
629
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
630
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
631
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
632
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
633
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
634
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
635
|
+
partition: Optional[pulumi.Input[_builtins.str]] = None,
|
636
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
637
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
638
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
640
639
|
__props__=None):
|
641
640
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
642
641
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -669,19 +668,19 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
669
668
|
def get(resource_name: str,
|
670
669
|
id: pulumi.Input[str],
|
671
670
|
opts: Optional[pulumi.ResourceOptions] = None,
|
672
|
-
backend: Optional[pulumi.Input[
|
673
|
-
consul_namespace: Optional[pulumi.Input[
|
674
|
-
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
675
|
-
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
676
|
-
local: Optional[pulumi.Input[
|
677
|
-
max_ttl: Optional[pulumi.Input[
|
678
|
-
name: Optional[pulumi.Input[
|
679
|
-
namespace: Optional[pulumi.Input[
|
680
|
-
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
681
|
-
partition: Optional[pulumi.Input[
|
682
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
683
|
-
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[
|
684
|
-
ttl: Optional[pulumi.Input[
|
671
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
672
|
+
consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
673
|
+
consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
674
|
+
consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
675
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
676
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
677
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
678
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
679
|
+
node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
680
|
+
partition: Optional[pulumi.Input[_builtins.str]] = None,
|
681
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
682
|
+
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
683
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendRole':
|
685
684
|
"""
|
686
685
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
687
686
|
properties used to qualify the lookup.
|
@@ -689,29 +688,29 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
689
688
|
:param str resource_name: The unique name of the resulting resource.
|
690
689
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
691
690
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
692
|
-
:param pulumi.Input[
|
693
|
-
:param pulumi.Input[
|
691
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
692
|
+
:param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
|
694
693
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
695
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
696
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
694
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
695
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
697
696
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
698
|
-
:param pulumi.Input[
|
699
|
-
:param pulumi.Input[
|
700
|
-
:param pulumi.Input[
|
701
|
-
:param pulumi.Input[
|
697
|
+
:param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
698
|
+
:param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
699
|
+
:param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
|
700
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
702
701
|
The value should not contain leading or trailing forward slashes.
|
703
702
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
704
703
|
*Available only for Vault Enterprise*.
|
705
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
704
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
706
705
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
707
|
-
:param pulumi.Input[
|
706
|
+
:param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
|
708
707
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
709
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
708
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
|
710
709
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
711
710
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
712
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
711
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
713
712
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
714
|
-
:param pulumi.Input[
|
713
|
+
:param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
|
715
714
|
"""
|
716
715
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
717
716
|
|
@@ -732,67 +731,67 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
732
731
|
__props__.__dict__["ttl"] = ttl
|
733
732
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
734
733
|
|
735
|
-
@property
|
734
|
+
@_builtins.property
|
736
735
|
@pulumi.getter
|
737
|
-
def backend(self) -> pulumi.Output[Optional[
|
736
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
738
737
|
"""
|
739
738
|
The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
740
739
|
"""
|
741
740
|
return pulumi.get(self, "backend")
|
742
741
|
|
743
|
-
@property
|
742
|
+
@_builtins.property
|
744
743
|
@pulumi.getter(name="consulNamespace")
|
745
|
-
def consul_namespace(self) -> pulumi.Output[
|
744
|
+
def consul_namespace(self) -> pulumi.Output[_builtins.str]:
|
746
745
|
"""
|
747
746
|
The Consul namespace that the token will be created in.
|
748
747
|
Applicable for Vault 1.10+ and Consul 1.7+".
|
749
748
|
"""
|
750
749
|
return pulumi.get(self, "consul_namespace")
|
751
750
|
|
752
|
-
@property
|
751
|
+
@_builtins.property
|
753
752
|
@pulumi.getter(name="consulPolicies")
|
754
|
-
def consul_policies(self) -> pulumi.Output[Optional[Sequence[
|
753
|
+
def consul_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
755
754
|
"""
|
756
755
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
757
756
|
"""
|
758
757
|
return pulumi.get(self, "consul_policies")
|
759
758
|
|
760
|
-
@property
|
759
|
+
@_builtins.property
|
761
760
|
@pulumi.getter(name="consulRoles")
|
762
|
-
def consul_roles(self) -> pulumi.Output[Optional[Sequence[
|
761
|
+
def consul_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
763
762
|
"""
|
764
763
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
765
764
|
Applicable for Vault 1.10+ with Consul 1.5+.
|
766
765
|
"""
|
767
766
|
return pulumi.get(self, "consul_roles")
|
768
767
|
|
769
|
-
@property
|
768
|
+
@_builtins.property
|
770
769
|
@pulumi.getter
|
771
|
-
def local(self) -> pulumi.Output[Optional[
|
770
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
772
771
|
"""
|
773
772
|
Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
774
773
|
"""
|
775
774
|
return pulumi.get(self, "local")
|
776
775
|
|
777
|
-
@property
|
776
|
+
@_builtins.property
|
778
777
|
@pulumi.getter(name="maxTtl")
|
779
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
778
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
780
779
|
"""
|
781
780
|
Maximum TTL for leases associated with this role, in seconds.
|
782
781
|
"""
|
783
782
|
return pulumi.get(self, "max_ttl")
|
784
783
|
|
785
|
-
@property
|
784
|
+
@_builtins.property
|
786
785
|
@pulumi.getter
|
787
|
-
def name(self) -> pulumi.Output[
|
786
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
788
787
|
"""
|
789
788
|
The name of the Consul secrets engine role to create.
|
790
789
|
"""
|
791
790
|
return pulumi.get(self, "name")
|
792
791
|
|
793
|
-
@property
|
792
|
+
@_builtins.property
|
794
793
|
@pulumi.getter
|
795
|
-
def namespace(self) -> pulumi.Output[Optional[
|
794
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
796
795
|
"""
|
797
796
|
The namespace to provision the resource in.
|
798
797
|
The value should not contain leading or trailing forward slashes.
|
@@ -801,27 +800,27 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
801
800
|
"""
|
802
801
|
return pulumi.get(self, "namespace")
|
803
802
|
|
804
|
-
@property
|
803
|
+
@_builtins.property
|
805
804
|
@pulumi.getter(name="nodeIdentities")
|
806
|
-
def node_identities(self) -> pulumi.Output[Optional[Sequence[
|
805
|
+
def node_identities(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
807
806
|
"""
|
808
807
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
809
808
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
810
809
|
"""
|
811
810
|
return pulumi.get(self, "node_identities")
|
812
811
|
|
813
|
-
@property
|
812
|
+
@_builtins.property
|
814
813
|
@pulumi.getter
|
815
|
-
def partition(self) -> pulumi.Output[
|
814
|
+
def partition(self) -> pulumi.Output[_builtins.str]:
|
816
815
|
"""
|
817
816
|
The admin partition that the token will be created in.
|
818
817
|
Applicable for Vault 1.10+ and Consul 1.11+".
|
819
818
|
"""
|
820
819
|
return pulumi.get(self, "partition")
|
821
820
|
|
822
|
-
@property
|
821
|
+
@_builtins.property
|
823
822
|
@pulumi.getter
|
824
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
823
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
825
824
|
"""
|
826
825
|
The list of Consul ACL policies to associate with these roles.
|
827
826
|
**NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
|
@@ -829,18 +828,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
829
828
|
"""
|
830
829
|
return pulumi.get(self, "policies")
|
831
830
|
|
832
|
-
@property
|
831
|
+
@_builtins.property
|
833
832
|
@pulumi.getter(name="serviceIdentities")
|
834
|
-
def service_identities(self) -> pulumi.Output[Optional[Sequence[
|
833
|
+
def service_identities(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
835
834
|
"""
|
836
835
|
<sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
837
836
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
838
837
|
"""
|
839
838
|
return pulumi.get(self, "service_identities")
|
840
839
|
|
841
|
-
@property
|
840
|
+
@_builtins.property
|
842
841
|
@pulumi.getter
|
843
|
-
def ttl(self) -> pulumi.Output[Optional[
|
842
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
844
843
|
"""
|
845
844
|
Specifies the TTL for this role.
|
846
845
|
"""
|