pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,46 +19,46 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
creation_statements: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
db_name: pulumi.Input[
|
26
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
27
|
-
credential_type: Optional[pulumi.Input[
|
28
|
-
default_ttl: Optional[pulumi.Input[
|
29
|
-
max_ttl: Optional[pulumi.Input[
|
30
|
-
name: Optional[pulumi.Input[
|
31
|
-
namespace: Optional[pulumi.Input[
|
32
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
creation_statements: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
db_name: pulumi.Input[_builtins.str],
|
25
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
33
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
35
34
|
"""
|
36
35
|
The set of arguments for constructing a SecretBackendRole resource.
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] creation_statements: The database statements to execute when
|
39
38
|
creating a user.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for
|
41
40
|
the role.
|
42
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
41
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] credential_config: Specifies the configuration
|
43
42
|
for the given `credential_type`.
|
44
43
|
|
45
44
|
The following options are available for each `credential_type` value:
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] credential_type: Specifies the type of credential that
|
47
46
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
48
47
|
See the plugin's API page for credential types supported by individual databases.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.int] default_ttl: The default number of seconds for leases for this
|
50
49
|
role.
|
51
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum number of seconds for leases for this
|
52
51
|
role.
|
53
|
-
:param pulumi.Input[
|
54
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the role.
|
53
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
55
54
|
The value should not contain leading or trailing forward slashes.
|
56
55
|
The `namespace` is always relative to the provider's configured namespace.
|
57
56
|
*Available only for Vault Enterprise*.
|
58
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] renew_statements: The database statements to execute when
|
59
58
|
renewing a user.
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] revocation_statements: The database statements to execute when
|
61
60
|
revoking a user.
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rollback_statements: The database statements to execute when
|
63
62
|
rolling back creation due to an error.
|
64
63
|
"""
|
65
64
|
pulumi.set(__self__, "backend", backend)
|
@@ -84,21 +83,21 @@ class SecretBackendRoleArgs:
|
|
84
83
|
if rollback_statements is not None:
|
85
84
|
pulumi.set(__self__, "rollback_statements", rollback_statements)
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def backend(self) -> pulumi.Input[
|
88
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
90
89
|
"""
|
91
90
|
The unique name of the Vault mount to configure.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "backend")
|
94
93
|
|
95
94
|
@backend.setter
|
96
|
-
def backend(self, value: pulumi.Input[
|
95
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
97
96
|
pulumi.set(self, "backend", value)
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter(name="creationStatements")
|
101
|
-
def creation_statements(self) -> pulumi.Input[Sequence[pulumi.Input[
|
100
|
+
def creation_statements(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
102
101
|
"""
|
103
102
|
The database statements to execute when
|
104
103
|
creating a user.
|
@@ -106,12 +105,12 @@ class SecretBackendRoleArgs:
|
|
106
105
|
return pulumi.get(self, "creation_statements")
|
107
106
|
|
108
107
|
@creation_statements.setter
|
109
|
-
def creation_statements(self, value: pulumi.Input[Sequence[pulumi.Input[
|
108
|
+
def creation_statements(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
110
109
|
pulumi.set(self, "creation_statements", value)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter(name="dbName")
|
114
|
-
def db_name(self) -> pulumi.Input[
|
113
|
+
def db_name(self) -> pulumi.Input[_builtins.str]:
|
115
114
|
"""
|
116
115
|
The unique name of the database connection to use for
|
117
116
|
the role.
|
@@ -119,12 +118,12 @@ class SecretBackendRoleArgs:
|
|
119
118
|
return pulumi.get(self, "db_name")
|
120
119
|
|
121
120
|
@db_name.setter
|
122
|
-
def db_name(self, value: pulumi.Input[
|
121
|
+
def db_name(self, value: pulumi.Input[_builtins.str]):
|
123
122
|
pulumi.set(self, "db_name", value)
|
124
123
|
|
125
|
-
@property
|
124
|
+
@_builtins.property
|
126
125
|
@pulumi.getter(name="credentialConfig")
|
127
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
126
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
128
127
|
"""
|
129
128
|
Specifies the configuration
|
130
129
|
for the given `credential_type`.
|
@@ -134,12 +133,12 @@ class SecretBackendRoleArgs:
|
|
134
133
|
return pulumi.get(self, "credential_config")
|
135
134
|
|
136
135
|
@credential_config.setter
|
137
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
136
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
138
137
|
pulumi.set(self, "credential_config", value)
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="credentialType")
|
142
|
-
def credential_type(self) -> Optional[pulumi.Input[
|
141
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
143
142
|
"""
|
144
143
|
Specifies the type of credential that
|
145
144
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -148,12 +147,12 @@ class SecretBackendRoleArgs:
|
|
148
147
|
return pulumi.get(self, "credential_type")
|
149
148
|
|
150
149
|
@credential_type.setter
|
151
|
-
def credential_type(self, value: Optional[pulumi.Input[
|
150
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
152
151
|
pulumi.set(self, "credential_type", value)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="defaultTtl")
|
156
|
-
def default_ttl(self) -> Optional[pulumi.Input[
|
155
|
+
def default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
157
156
|
"""
|
158
157
|
The default number of seconds for leases for this
|
159
158
|
role.
|
@@ -161,12 +160,12 @@ class SecretBackendRoleArgs:
|
|
161
160
|
return pulumi.get(self, "default_ttl")
|
162
161
|
|
163
162
|
@default_ttl.setter
|
164
|
-
def default_ttl(self, value: Optional[pulumi.Input[
|
163
|
+
def default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
165
164
|
pulumi.set(self, "default_ttl", value)
|
166
165
|
|
167
|
-
@property
|
166
|
+
@_builtins.property
|
168
167
|
@pulumi.getter(name="maxTtl")
|
169
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
168
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
170
169
|
"""
|
171
170
|
The maximum number of seconds for leases for this
|
172
171
|
role.
|
@@ -174,24 +173,24 @@ class SecretBackendRoleArgs:
|
|
174
173
|
return pulumi.get(self, "max_ttl")
|
175
174
|
|
176
175
|
@max_ttl.setter
|
177
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
176
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
178
177
|
pulumi.set(self, "max_ttl", value)
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter
|
182
|
-
def name(self) -> Optional[pulumi.Input[
|
181
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
183
182
|
"""
|
184
183
|
A unique name to give the role.
|
185
184
|
"""
|
186
185
|
return pulumi.get(self, "name")
|
187
186
|
|
188
187
|
@name.setter
|
189
|
-
def name(self, value: Optional[pulumi.Input[
|
188
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
190
189
|
pulumi.set(self, "name", value)
|
191
190
|
|
192
|
-
@property
|
191
|
+
@_builtins.property
|
193
192
|
@pulumi.getter
|
194
|
-
def namespace(self) -> Optional[pulumi.Input[
|
193
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
195
194
|
"""
|
196
195
|
The namespace to provision the resource in.
|
197
196
|
The value should not contain leading or trailing forward slashes.
|
@@ -201,12 +200,12 @@ class SecretBackendRoleArgs:
|
|
201
200
|
return pulumi.get(self, "namespace")
|
202
201
|
|
203
202
|
@namespace.setter
|
204
|
-
def namespace(self, value: Optional[pulumi.Input[
|
203
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "namespace", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="renewStatements")
|
209
|
-
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
208
|
+
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
210
209
|
"""
|
211
210
|
The database statements to execute when
|
212
211
|
renewing a user.
|
@@ -214,12 +213,12 @@ class SecretBackendRoleArgs:
|
|
214
213
|
return pulumi.get(self, "renew_statements")
|
215
214
|
|
216
215
|
@renew_statements.setter
|
217
|
-
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
216
|
+
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
218
217
|
pulumi.set(self, "renew_statements", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="revocationStatements")
|
222
|
-
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
221
|
+
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
223
222
|
"""
|
224
223
|
The database statements to execute when
|
225
224
|
revoking a user.
|
@@ -227,12 +226,12 @@ class SecretBackendRoleArgs:
|
|
227
226
|
return pulumi.get(self, "revocation_statements")
|
228
227
|
|
229
228
|
@revocation_statements.setter
|
230
|
-
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
229
|
+
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
231
230
|
pulumi.set(self, "revocation_statements", value)
|
232
231
|
|
233
|
-
@property
|
232
|
+
@_builtins.property
|
234
233
|
@pulumi.getter(name="rollbackStatements")
|
235
|
-
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
234
|
+
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
236
235
|
"""
|
237
236
|
The database statements to execute when
|
238
237
|
rolling back creation due to an error.
|
@@ -240,53 +239,53 @@ class SecretBackendRoleArgs:
|
|
240
239
|
return pulumi.get(self, "rollback_statements")
|
241
240
|
|
242
241
|
@rollback_statements.setter
|
243
|
-
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
242
|
+
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
244
243
|
pulumi.set(self, "rollback_statements", value)
|
245
244
|
|
246
245
|
|
247
246
|
@pulumi.input_type
|
248
247
|
class _SecretBackendRoleState:
|
249
248
|
def __init__(__self__, *,
|
250
|
-
backend: Optional[pulumi.Input[
|
251
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
252
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
253
|
-
credential_type: Optional[pulumi.Input[
|
254
|
-
db_name: Optional[pulumi.Input[
|
255
|
-
default_ttl: Optional[pulumi.Input[
|
256
|
-
max_ttl: Optional[pulumi.Input[
|
257
|
-
name: Optional[pulumi.Input[
|
258
|
-
namespace: Optional[pulumi.Input[
|
259
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
260
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
261
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
249
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
250
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
251
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
252
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
253
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
254
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
255
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
256
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
257
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
258
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
259
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
260
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
262
261
|
"""
|
263
262
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
264
|
-
:param pulumi.Input[
|
265
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
263
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
264
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] creation_statements: The database statements to execute when
|
266
265
|
creating a user.
|
267
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
266
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] credential_config: Specifies the configuration
|
268
267
|
for the given `credential_type`.
|
269
268
|
|
270
269
|
The following options are available for each `credential_type` value:
|
271
|
-
:param pulumi.Input[
|
270
|
+
:param pulumi.Input[_builtins.str] credential_type: Specifies the type of credential that
|
272
271
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
273
272
|
See the plugin's API page for credential types supported by individual databases.
|
274
|
-
:param pulumi.Input[
|
273
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for
|
275
274
|
the role.
|
276
|
-
:param pulumi.Input[
|
275
|
+
:param pulumi.Input[_builtins.int] default_ttl: The default number of seconds for leases for this
|
277
276
|
role.
|
278
|
-
:param pulumi.Input[
|
277
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum number of seconds for leases for this
|
279
278
|
role.
|
280
|
-
:param pulumi.Input[
|
281
|
-
:param pulumi.Input[
|
279
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the role.
|
280
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
282
281
|
The value should not contain leading or trailing forward slashes.
|
283
282
|
The `namespace` is always relative to the provider's configured namespace.
|
284
283
|
*Available only for Vault Enterprise*.
|
285
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
284
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] renew_statements: The database statements to execute when
|
286
285
|
renewing a user.
|
287
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
286
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] revocation_statements: The database statements to execute when
|
288
287
|
revoking a user.
|
289
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
288
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rollback_statements: The database statements to execute when
|
290
289
|
rolling back creation due to an error.
|
291
290
|
"""
|
292
291
|
if backend is not None:
|
@@ -314,21 +313,21 @@ class _SecretBackendRoleState:
|
|
314
313
|
if rollback_statements is not None:
|
315
314
|
pulumi.set(__self__, "rollback_statements", rollback_statements)
|
316
315
|
|
317
|
-
@property
|
316
|
+
@_builtins.property
|
318
317
|
@pulumi.getter
|
319
|
-
def backend(self) -> Optional[pulumi.Input[
|
318
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
320
319
|
"""
|
321
320
|
The unique name of the Vault mount to configure.
|
322
321
|
"""
|
323
322
|
return pulumi.get(self, "backend")
|
324
323
|
|
325
324
|
@backend.setter
|
326
|
-
def backend(self, value: Optional[pulumi.Input[
|
325
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
327
326
|
pulumi.set(self, "backend", value)
|
328
327
|
|
329
|
-
@property
|
328
|
+
@_builtins.property
|
330
329
|
@pulumi.getter(name="creationStatements")
|
331
|
-
def creation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
330
|
+
def creation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
332
331
|
"""
|
333
332
|
The database statements to execute when
|
334
333
|
creating a user.
|
@@ -336,12 +335,12 @@ class _SecretBackendRoleState:
|
|
336
335
|
return pulumi.get(self, "creation_statements")
|
337
336
|
|
338
337
|
@creation_statements.setter
|
339
|
-
def creation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
338
|
+
def creation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
340
339
|
pulumi.set(self, "creation_statements", value)
|
341
340
|
|
342
|
-
@property
|
341
|
+
@_builtins.property
|
343
342
|
@pulumi.getter(name="credentialConfig")
|
344
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
343
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
345
344
|
"""
|
346
345
|
Specifies the configuration
|
347
346
|
for the given `credential_type`.
|
@@ -351,12 +350,12 @@ class _SecretBackendRoleState:
|
|
351
350
|
return pulumi.get(self, "credential_config")
|
352
351
|
|
353
352
|
@credential_config.setter
|
354
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
353
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
355
354
|
pulumi.set(self, "credential_config", value)
|
356
355
|
|
357
|
-
@property
|
356
|
+
@_builtins.property
|
358
357
|
@pulumi.getter(name="credentialType")
|
359
|
-
def credential_type(self) -> Optional[pulumi.Input[
|
358
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
360
359
|
"""
|
361
360
|
Specifies the type of credential that
|
362
361
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -365,12 +364,12 @@ class _SecretBackendRoleState:
|
|
365
364
|
return pulumi.get(self, "credential_type")
|
366
365
|
|
367
366
|
@credential_type.setter
|
368
|
-
def credential_type(self, value: Optional[pulumi.Input[
|
367
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
369
368
|
pulumi.set(self, "credential_type", value)
|
370
369
|
|
371
|
-
@property
|
370
|
+
@_builtins.property
|
372
371
|
@pulumi.getter(name="dbName")
|
373
|
-
def db_name(self) -> Optional[pulumi.Input[
|
372
|
+
def db_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
374
373
|
"""
|
375
374
|
The unique name of the database connection to use for
|
376
375
|
the role.
|
@@ -378,12 +377,12 @@ class _SecretBackendRoleState:
|
|
378
377
|
return pulumi.get(self, "db_name")
|
379
378
|
|
380
379
|
@db_name.setter
|
381
|
-
def db_name(self, value: Optional[pulumi.Input[
|
380
|
+
def db_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
382
381
|
pulumi.set(self, "db_name", value)
|
383
382
|
|
384
|
-
@property
|
383
|
+
@_builtins.property
|
385
384
|
@pulumi.getter(name="defaultTtl")
|
386
|
-
def default_ttl(self) -> Optional[pulumi.Input[
|
385
|
+
def default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
387
386
|
"""
|
388
387
|
The default number of seconds for leases for this
|
389
388
|
role.
|
@@ -391,12 +390,12 @@ class _SecretBackendRoleState:
|
|
391
390
|
return pulumi.get(self, "default_ttl")
|
392
391
|
|
393
392
|
@default_ttl.setter
|
394
|
-
def default_ttl(self, value: Optional[pulumi.Input[
|
393
|
+
def default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
395
394
|
pulumi.set(self, "default_ttl", value)
|
396
395
|
|
397
|
-
@property
|
396
|
+
@_builtins.property
|
398
397
|
@pulumi.getter(name="maxTtl")
|
399
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
398
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
400
399
|
"""
|
401
400
|
The maximum number of seconds for leases for this
|
402
401
|
role.
|
@@ -404,24 +403,24 @@ class _SecretBackendRoleState:
|
|
404
403
|
return pulumi.get(self, "max_ttl")
|
405
404
|
|
406
405
|
@max_ttl.setter
|
407
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
406
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
408
407
|
pulumi.set(self, "max_ttl", value)
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter
|
412
|
-
def name(self) -> Optional[pulumi.Input[
|
411
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
413
412
|
"""
|
414
413
|
A unique name to give the role.
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "name")
|
417
416
|
|
418
417
|
@name.setter
|
419
|
-
def name(self, value: Optional[pulumi.Input[
|
418
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
420
419
|
pulumi.set(self, "name", value)
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter
|
424
|
-
def namespace(self) -> Optional[pulumi.Input[
|
423
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
425
424
|
"""
|
426
425
|
The namespace to provision the resource in.
|
427
426
|
The value should not contain leading or trailing forward slashes.
|
@@ -431,12 +430,12 @@ class _SecretBackendRoleState:
|
|
431
430
|
return pulumi.get(self, "namespace")
|
432
431
|
|
433
432
|
@namespace.setter
|
434
|
-
def namespace(self, value: Optional[pulumi.Input[
|
433
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
435
434
|
pulumi.set(self, "namespace", value)
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter(name="renewStatements")
|
439
|
-
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
438
|
+
def renew_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
440
439
|
"""
|
441
440
|
The database statements to execute when
|
442
441
|
renewing a user.
|
@@ -444,12 +443,12 @@ class _SecretBackendRoleState:
|
|
444
443
|
return pulumi.get(self, "renew_statements")
|
445
444
|
|
446
445
|
@renew_statements.setter
|
447
|
-
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
446
|
+
def renew_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
448
447
|
pulumi.set(self, "renew_statements", value)
|
449
448
|
|
450
|
-
@property
|
449
|
+
@_builtins.property
|
451
450
|
@pulumi.getter(name="revocationStatements")
|
452
|
-
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
451
|
+
def revocation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
453
452
|
"""
|
454
453
|
The database statements to execute when
|
455
454
|
revoking a user.
|
@@ -457,12 +456,12 @@ class _SecretBackendRoleState:
|
|
457
456
|
return pulumi.get(self, "revocation_statements")
|
458
457
|
|
459
458
|
@revocation_statements.setter
|
460
|
-
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
459
|
+
def revocation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
461
460
|
pulumi.set(self, "revocation_statements", value)
|
462
461
|
|
463
|
-
@property
|
462
|
+
@_builtins.property
|
464
463
|
@pulumi.getter(name="rollbackStatements")
|
465
|
-
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
464
|
+
def rollback_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
466
465
|
"""
|
467
466
|
The database statements to execute when
|
468
467
|
rolling back creation due to an error.
|
@@ -470,7 +469,7 @@ class _SecretBackendRoleState:
|
|
470
469
|
return pulumi.get(self, "rollback_statements")
|
471
470
|
|
472
471
|
@rollback_statements.setter
|
473
|
-
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
472
|
+
def rollback_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
474
473
|
pulumi.set(self, "rollback_statements", value)
|
475
474
|
|
476
475
|
|
@@ -480,18 +479,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
480
479
|
def __init__(__self__,
|
481
480
|
resource_name: str,
|
482
481
|
opts: Optional[pulumi.ResourceOptions] = None,
|
483
|
-
backend: Optional[pulumi.Input[
|
484
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
485
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
486
|
-
credential_type: Optional[pulumi.Input[
|
487
|
-
db_name: Optional[pulumi.Input[
|
488
|
-
default_ttl: Optional[pulumi.Input[
|
489
|
-
max_ttl: Optional[pulumi.Input[
|
490
|
-
name: Optional[pulumi.Input[
|
491
|
-
namespace: Optional[pulumi.Input[
|
492
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
493
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
494
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
482
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
484
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
485
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
486
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
487
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
488
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
489
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
490
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
491
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
492
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
493
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
495
494
|
__props__=None):
|
496
495
|
"""
|
497
496
|
## Example Usage
|
@@ -530,32 +529,32 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
530
529
|
|
531
530
|
:param str resource_name: The name of the resource.
|
532
531
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
533
|
-
:param pulumi.Input[
|
534
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
532
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] creation_statements: The database statements to execute when
|
535
534
|
creating a user.
|
536
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
535
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] credential_config: Specifies the configuration
|
537
536
|
for the given `credential_type`.
|
538
537
|
|
539
538
|
The following options are available for each `credential_type` value:
|
540
|
-
:param pulumi.Input[
|
539
|
+
:param pulumi.Input[_builtins.str] credential_type: Specifies the type of credential that
|
541
540
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
542
541
|
See the plugin's API page for credential types supported by individual databases.
|
543
|
-
:param pulumi.Input[
|
542
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for
|
544
543
|
the role.
|
545
|
-
:param pulumi.Input[
|
544
|
+
:param pulumi.Input[_builtins.int] default_ttl: The default number of seconds for leases for this
|
546
545
|
role.
|
547
|
-
:param pulumi.Input[
|
546
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum number of seconds for leases for this
|
548
547
|
role.
|
549
|
-
:param pulumi.Input[
|
550
|
-
:param pulumi.Input[
|
548
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the role.
|
549
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
551
550
|
The value should not contain leading or trailing forward slashes.
|
552
551
|
The `namespace` is always relative to the provider's configured namespace.
|
553
552
|
*Available only for Vault Enterprise*.
|
554
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
553
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] renew_statements: The database statements to execute when
|
555
554
|
renewing a user.
|
556
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
555
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] revocation_statements: The database statements to execute when
|
557
556
|
revoking a user.
|
558
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
557
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rollback_statements: The database statements to execute when
|
559
558
|
rolling back creation due to an error.
|
560
559
|
"""
|
561
560
|
...
|
@@ -614,18 +613,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
614
613
|
def _internal_init(__self__,
|
615
614
|
resource_name: str,
|
616
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
617
|
-
backend: Optional[pulumi.Input[
|
618
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
619
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
620
|
-
credential_type: Optional[pulumi.Input[
|
621
|
-
db_name: Optional[pulumi.Input[
|
622
|
-
default_ttl: Optional[pulumi.Input[
|
623
|
-
max_ttl: Optional[pulumi.Input[
|
624
|
-
name: Optional[pulumi.Input[
|
625
|
-
namespace: Optional[pulumi.Input[
|
626
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
627
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
628
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
616
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
617
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
618
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
619
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
620
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
621
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
622
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
623
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
624
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
625
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
626
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
627
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
629
628
|
__props__=None):
|
630
629
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
631
630
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -663,18 +662,18 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
663
662
|
def get(resource_name: str,
|
664
663
|
id: pulumi.Input[str],
|
665
664
|
opts: Optional[pulumi.ResourceOptions] = None,
|
666
|
-
backend: Optional[pulumi.Input[
|
667
|
-
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
668
|
-
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
669
|
-
credential_type: Optional[pulumi.Input[
|
670
|
-
db_name: Optional[pulumi.Input[
|
671
|
-
default_ttl: Optional[pulumi.Input[
|
672
|
-
max_ttl: Optional[pulumi.Input[
|
673
|
-
name: Optional[pulumi.Input[
|
674
|
-
namespace: Optional[pulumi.Input[
|
675
|
-
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
676
|
-
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
677
|
-
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[
|
665
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
666
|
+
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
667
|
+
credential_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
668
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
669
|
+
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
670
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
671
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
672
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
673
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
674
|
+
renew_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
675
|
+
revocation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
676
|
+
rollback_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretBackendRole':
|
678
677
|
"""
|
679
678
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
680
679
|
properties used to qualify the lookup.
|
@@ -682,32 +681,32 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
682
681
|
:param str resource_name: The unique name of the resulting resource.
|
683
682
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
684
683
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
685
|
-
:param pulumi.Input[
|
686
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
684
|
+
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
685
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] creation_statements: The database statements to execute when
|
687
686
|
creating a user.
|
688
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
687
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] credential_config: Specifies the configuration
|
689
688
|
for the given `credential_type`.
|
690
689
|
|
691
690
|
The following options are available for each `credential_type` value:
|
692
|
-
:param pulumi.Input[
|
691
|
+
:param pulumi.Input[_builtins.str] credential_type: Specifies the type of credential that
|
693
692
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
694
693
|
See the plugin's API page for credential types supported by individual databases.
|
695
|
-
:param pulumi.Input[
|
694
|
+
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for
|
696
695
|
the role.
|
697
|
-
:param pulumi.Input[
|
696
|
+
:param pulumi.Input[_builtins.int] default_ttl: The default number of seconds for leases for this
|
698
697
|
role.
|
699
|
-
:param pulumi.Input[
|
698
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum number of seconds for leases for this
|
700
699
|
role.
|
701
|
-
:param pulumi.Input[
|
702
|
-
:param pulumi.Input[
|
700
|
+
:param pulumi.Input[_builtins.str] name: A unique name to give the role.
|
701
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
703
702
|
The value should not contain leading or trailing forward slashes.
|
704
703
|
The `namespace` is always relative to the provider's configured namespace.
|
705
704
|
*Available only for Vault Enterprise*.
|
706
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
705
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] renew_statements: The database statements to execute when
|
707
706
|
renewing a user.
|
708
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
707
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] revocation_statements: The database statements to execute when
|
709
708
|
revoking a user.
|
710
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
709
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] rollback_statements: The database statements to execute when
|
711
710
|
rolling back creation due to an error.
|
712
711
|
"""
|
713
712
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -728,26 +727,26 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
728
727
|
__props__.__dict__["rollback_statements"] = rollback_statements
|
729
728
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
730
729
|
|
731
|
-
@property
|
730
|
+
@_builtins.property
|
732
731
|
@pulumi.getter
|
733
|
-
def backend(self) -> pulumi.Output[
|
732
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
734
733
|
"""
|
735
734
|
The unique name of the Vault mount to configure.
|
736
735
|
"""
|
737
736
|
return pulumi.get(self, "backend")
|
738
737
|
|
739
|
-
@property
|
738
|
+
@_builtins.property
|
740
739
|
@pulumi.getter(name="creationStatements")
|
741
|
-
def creation_statements(self) -> pulumi.Output[Sequence[
|
740
|
+
def creation_statements(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
742
741
|
"""
|
743
742
|
The database statements to execute when
|
744
743
|
creating a user.
|
745
744
|
"""
|
746
745
|
return pulumi.get(self, "creation_statements")
|
747
746
|
|
748
|
-
@property
|
747
|
+
@_builtins.property
|
749
748
|
@pulumi.getter(name="credentialConfig")
|
750
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str,
|
749
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
751
750
|
"""
|
752
751
|
Specifies the configuration
|
753
752
|
for the given `credential_type`.
|
@@ -756,9 +755,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
756
755
|
"""
|
757
756
|
return pulumi.get(self, "credential_config")
|
758
757
|
|
759
|
-
@property
|
758
|
+
@_builtins.property
|
760
759
|
@pulumi.getter(name="credentialType")
|
761
|
-
def credential_type(self) -> pulumi.Output[
|
760
|
+
def credential_type(self) -> pulumi.Output[_builtins.str]:
|
762
761
|
"""
|
763
762
|
Specifies the type of credential that
|
764
763
|
will be generated for the role. Options include: `password`, `rsa_private_key`, `client_certificate`.
|
@@ -766,44 +765,44 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
766
765
|
"""
|
767
766
|
return pulumi.get(self, "credential_type")
|
768
767
|
|
769
|
-
@property
|
768
|
+
@_builtins.property
|
770
769
|
@pulumi.getter(name="dbName")
|
771
|
-
def db_name(self) -> pulumi.Output[
|
770
|
+
def db_name(self) -> pulumi.Output[_builtins.str]:
|
772
771
|
"""
|
773
772
|
The unique name of the database connection to use for
|
774
773
|
the role.
|
775
774
|
"""
|
776
775
|
return pulumi.get(self, "db_name")
|
777
776
|
|
778
|
-
@property
|
777
|
+
@_builtins.property
|
779
778
|
@pulumi.getter(name="defaultTtl")
|
780
|
-
def default_ttl(self) -> pulumi.Output[Optional[
|
779
|
+
def default_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
781
780
|
"""
|
782
781
|
The default number of seconds for leases for this
|
783
782
|
role.
|
784
783
|
"""
|
785
784
|
return pulumi.get(self, "default_ttl")
|
786
785
|
|
787
|
-
@property
|
786
|
+
@_builtins.property
|
788
787
|
@pulumi.getter(name="maxTtl")
|
789
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
788
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
790
789
|
"""
|
791
790
|
The maximum number of seconds for leases for this
|
792
791
|
role.
|
793
792
|
"""
|
794
793
|
return pulumi.get(self, "max_ttl")
|
795
794
|
|
796
|
-
@property
|
795
|
+
@_builtins.property
|
797
796
|
@pulumi.getter
|
798
|
-
def name(self) -> pulumi.Output[
|
797
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
799
798
|
"""
|
800
799
|
A unique name to give the role.
|
801
800
|
"""
|
802
801
|
return pulumi.get(self, "name")
|
803
802
|
|
804
|
-
@property
|
803
|
+
@_builtins.property
|
805
804
|
@pulumi.getter
|
806
|
-
def namespace(self) -> pulumi.Output[Optional[
|
805
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
807
806
|
"""
|
808
807
|
The namespace to provision the resource in.
|
809
808
|
The value should not contain leading or trailing forward slashes.
|
@@ -812,27 +811,27 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
812
811
|
"""
|
813
812
|
return pulumi.get(self, "namespace")
|
814
813
|
|
815
|
-
@property
|
814
|
+
@_builtins.property
|
816
815
|
@pulumi.getter(name="renewStatements")
|
817
|
-
def renew_statements(self) -> pulumi.Output[Optional[Sequence[
|
816
|
+
def renew_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
818
817
|
"""
|
819
818
|
The database statements to execute when
|
820
819
|
renewing a user.
|
821
820
|
"""
|
822
821
|
return pulumi.get(self, "renew_statements")
|
823
822
|
|
824
|
-
@property
|
823
|
+
@_builtins.property
|
825
824
|
@pulumi.getter(name="revocationStatements")
|
826
|
-
def revocation_statements(self) -> pulumi.Output[Optional[Sequence[
|
825
|
+
def revocation_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
827
826
|
"""
|
828
827
|
The database statements to execute when
|
829
828
|
revoking a user.
|
830
829
|
"""
|
831
830
|
return pulumi.get(self, "revocation_statements")
|
832
831
|
|
833
|
-
@property
|
832
|
+
@_builtins.property
|
834
833
|
@pulumi.getter(name="rollbackStatements")
|
835
|
-
def rollback_statements(self) -> pulumi.Output[Optional[Sequence[
|
834
|
+
def rollback_statements(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
836
835
|
"""
|
837
836
|
The database statements to execute when
|
838
837
|
rolling back creation due to an error.
|