pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,36 +19,36 @@ __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendRoleSecretIdArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
role_name: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
metadata: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
num_uses: Optional[pulumi.Input[
|
29
|
-
secret_id: Optional[pulumi.Input[
|
30
|
-
ttl: Optional[pulumi.Input[
|
31
|
-
with_wrapped_accessor: Optional[pulumi.Input[
|
32
|
-
wrapping_ttl: Optional[pulumi.Input[
|
22
|
+
role_name: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
33
32
|
"""
|
34
33
|
The set of arguments for constructing a AuthBackendRoleSecretId resource.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
35
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
38
37
|
perform the login operation using this SecretID.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
40
39
|
key-value pairs to be set on tokens issued with this SecretID.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
42
41
|
The value should not contain leading or trailing forward slashes.
|
43
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
43
|
*Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
45
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
47
46
|
mode. Defaults to Vault auto-generating SecretIDs.
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
48
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
50
49
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
51
50
|
invalidated through unwrapping.
|
52
|
-
:param pulumi.Input[
|
51
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
53
52
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
54
53
|
and available for the duration specified. Only a single unwrapping of the
|
55
54
|
token is allowed.
|
@@ -74,33 +73,33 @@ class AuthBackendRoleSecretIdArgs:
|
|
74
73
|
if wrapping_ttl is not None:
|
75
74
|
pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter(name="roleName")
|
79
|
-
def role_name(self) -> pulumi.Input[
|
78
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
80
79
|
"""
|
81
80
|
The name of the role to create the SecretID for.
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "role_name")
|
84
83
|
|
85
84
|
@role_name.setter
|
86
|
-
def role_name(self, value: pulumi.Input[
|
85
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
87
86
|
pulumi.set(self, "role_name", value)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter
|
91
|
-
def backend(self) -> Optional[pulumi.Input[
|
90
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
92
91
|
"""
|
93
92
|
Unique name of the auth backend to configure.
|
94
93
|
"""
|
95
94
|
return pulumi.get(self, "backend")
|
96
95
|
|
97
96
|
@backend.setter
|
98
|
-
def backend(self, value: Optional[pulumi.Input[
|
97
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
99
98
|
pulumi.set(self, "backend", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="cidrLists")
|
103
|
-
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
102
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
104
103
|
"""
|
105
104
|
If set, specifies blocks of IP addresses which can
|
106
105
|
perform the login operation using this SecretID.
|
@@ -108,12 +107,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
108
107
|
return pulumi.get(self, "cidr_lists")
|
109
108
|
|
110
109
|
@cidr_lists.setter
|
111
|
-
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
112
111
|
pulumi.set(self, "cidr_lists", value)
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter
|
116
|
-
def metadata(self) -> Optional[pulumi.Input[
|
115
|
+
def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
117
116
|
"""
|
118
117
|
A JSON-encoded string containing metadata in
|
119
118
|
key-value pairs to be set on tokens issued with this SecretID.
|
@@ -121,12 +120,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
121
120
|
return pulumi.get(self, "metadata")
|
122
121
|
|
123
122
|
@metadata.setter
|
124
|
-
def metadata(self, value: Optional[pulumi.Input[
|
123
|
+
def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
125
124
|
pulumi.set(self, "metadata", value)
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter
|
129
|
-
def namespace(self) -> Optional[pulumi.Input[
|
128
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
130
129
|
"""
|
131
130
|
The namespace to provision the resource in.
|
132
131
|
The value should not contain leading or trailing forward slashes.
|
@@ -136,24 +135,24 @@ class AuthBackendRoleSecretIdArgs:
|
|
136
135
|
return pulumi.get(self, "namespace")
|
137
136
|
|
138
137
|
@namespace.setter
|
139
|
-
def namespace(self, value: Optional[pulumi.Input[
|
138
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
140
139
|
pulumi.set(self, "namespace", value)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter(name="numUses")
|
144
|
-
def num_uses(self) -> Optional[pulumi.Input[
|
143
|
+
def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
145
144
|
"""
|
146
145
|
The number of uses for the secret-id.
|
147
146
|
"""
|
148
147
|
return pulumi.get(self, "num_uses")
|
149
148
|
|
150
149
|
@num_uses.setter
|
151
|
-
def num_uses(self, value: Optional[pulumi.Input[
|
150
|
+
def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
152
151
|
pulumi.set(self, "num_uses", value)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="secretId")
|
156
|
-
def secret_id(self) -> Optional[pulumi.Input[
|
155
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
157
156
|
"""
|
158
157
|
The SecretID to be created. If set, uses "Push"
|
159
158
|
mode. Defaults to Vault auto-generating SecretIDs.
|
@@ -161,24 +160,24 @@ class AuthBackendRoleSecretIdArgs:
|
|
161
160
|
return pulumi.get(self, "secret_id")
|
162
161
|
|
163
162
|
@secret_id.setter
|
164
|
-
def secret_id(self, value: Optional[pulumi.Input[
|
163
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
165
164
|
pulumi.set(self, "secret_id", value)
|
166
165
|
|
167
|
-
@property
|
166
|
+
@_builtins.property
|
168
167
|
@pulumi.getter
|
169
|
-
def ttl(self) -> Optional[pulumi.Input[
|
168
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
170
169
|
"""
|
171
170
|
The TTL duration of the SecretID.
|
172
171
|
"""
|
173
172
|
return pulumi.get(self, "ttl")
|
174
173
|
|
175
174
|
@ttl.setter
|
176
|
-
def ttl(self, value: Optional[pulumi.Input[
|
175
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
177
176
|
pulumi.set(self, "ttl", value)
|
178
177
|
|
179
|
-
@property
|
178
|
+
@_builtins.property
|
180
179
|
@pulumi.getter(name="withWrappedAccessor")
|
181
|
-
def with_wrapped_accessor(self) -> Optional[pulumi.Input[
|
180
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
182
181
|
"""
|
183
182
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
184
183
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -187,12 +186,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
187
186
|
return pulumi.get(self, "with_wrapped_accessor")
|
188
187
|
|
189
188
|
@with_wrapped_accessor.setter
|
190
|
-
def with_wrapped_accessor(self, value: Optional[pulumi.Input[
|
189
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
191
190
|
pulumi.set(self, "with_wrapped_accessor", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter(name="wrappingTtl")
|
195
|
-
def wrapping_ttl(self) -> Optional[pulumi.Input[
|
194
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
195
|
"""
|
197
196
|
If set, the SecretID response will be
|
198
197
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
@@ -202,50 +201,50 @@ class AuthBackendRoleSecretIdArgs:
|
|
202
201
|
return pulumi.get(self, "wrapping_ttl")
|
203
202
|
|
204
203
|
@wrapping_ttl.setter
|
205
|
-
def wrapping_ttl(self, value: Optional[pulumi.Input[
|
204
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
206
205
|
pulumi.set(self, "wrapping_ttl", value)
|
207
206
|
|
208
207
|
|
209
208
|
@pulumi.input_type
|
210
209
|
class _AuthBackendRoleSecretIdState:
|
211
210
|
def __init__(__self__, *,
|
212
|
-
accessor: Optional[pulumi.Input[
|
213
|
-
backend: Optional[pulumi.Input[
|
214
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[
|
215
|
-
metadata: Optional[pulumi.Input[
|
216
|
-
namespace: Optional[pulumi.Input[
|
217
|
-
num_uses: Optional[pulumi.Input[
|
218
|
-
role_name: Optional[pulumi.Input[
|
219
|
-
secret_id: Optional[pulumi.Input[
|
220
|
-
ttl: Optional[pulumi.Input[
|
221
|
-
with_wrapped_accessor: Optional[pulumi.Input[
|
222
|
-
wrapping_accessor: Optional[pulumi.Input[
|
223
|
-
wrapping_token: Optional[pulumi.Input[
|
224
|
-
wrapping_ttl: Optional[pulumi.Input[
|
211
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
212
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
213
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
214
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
215
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
216
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
217
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
218
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
219
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
220
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
221
|
+
wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
|
223
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
225
224
|
"""
|
226
225
|
Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
|
227
|
-
:param pulumi.Input[
|
228
|
-
:param pulumi.Input[
|
229
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
:param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
227
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
228
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
230
229
|
perform the login operation using this SecretID.
|
231
|
-
:param pulumi.Input[
|
230
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
232
231
|
key-value pairs to be set on tokens issued with this SecretID.
|
233
|
-
:param pulumi.Input[
|
232
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
234
233
|
The value should not contain leading or trailing forward slashes.
|
235
234
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
236
235
|
*Available only for Vault Enterprise*.
|
237
|
-
:param pulumi.Input[
|
238
|
-
:param pulumi.Input[
|
239
|
-
:param pulumi.Input[
|
236
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
237
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
238
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
240
239
|
mode. Defaults to Vault auto-generating SecretIDs.
|
241
|
-
:param pulumi.Input[
|
242
|
-
:param pulumi.Input[
|
240
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
241
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
243
242
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
244
243
|
invalidated through unwrapping.
|
245
|
-
:param pulumi.Input[
|
244
|
+
:param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
246
245
|
be safely logged.
|
247
|
-
:param pulumi.Input[
|
248
|
-
:param pulumi.Input[
|
246
|
+
:param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
247
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
249
248
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
250
249
|
and available for the duration specified. Only a single unwrapping of the
|
251
250
|
token is allowed.
|
@@ -277,33 +276,33 @@ class _AuthBackendRoleSecretIdState:
|
|
277
276
|
if wrapping_ttl is not None:
|
278
277
|
pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
|
279
278
|
|
280
|
-
@property
|
279
|
+
@_builtins.property
|
281
280
|
@pulumi.getter
|
282
|
-
def accessor(self) -> Optional[pulumi.Input[
|
281
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
283
282
|
"""
|
284
283
|
The unique ID for this SecretID that can be safely logged.
|
285
284
|
"""
|
286
285
|
return pulumi.get(self, "accessor")
|
287
286
|
|
288
287
|
@accessor.setter
|
289
|
-
def accessor(self, value: Optional[pulumi.Input[
|
288
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
290
289
|
pulumi.set(self, "accessor", value)
|
291
290
|
|
292
|
-
@property
|
291
|
+
@_builtins.property
|
293
292
|
@pulumi.getter
|
294
|
-
def backend(self) -> Optional[pulumi.Input[
|
293
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
295
294
|
"""
|
296
295
|
Unique name of the auth backend to configure.
|
297
296
|
"""
|
298
297
|
return pulumi.get(self, "backend")
|
299
298
|
|
300
299
|
@backend.setter
|
301
|
-
def backend(self, value: Optional[pulumi.Input[
|
300
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
302
301
|
pulumi.set(self, "backend", value)
|
303
302
|
|
304
|
-
@property
|
303
|
+
@_builtins.property
|
305
304
|
@pulumi.getter(name="cidrLists")
|
306
|
-
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
305
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
307
306
|
"""
|
308
307
|
If set, specifies blocks of IP addresses which can
|
309
308
|
perform the login operation using this SecretID.
|
@@ -311,12 +310,12 @@ class _AuthBackendRoleSecretIdState:
|
|
311
310
|
return pulumi.get(self, "cidr_lists")
|
312
311
|
|
313
312
|
@cidr_lists.setter
|
314
|
-
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
313
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
315
314
|
pulumi.set(self, "cidr_lists", value)
|
316
315
|
|
317
|
-
@property
|
316
|
+
@_builtins.property
|
318
317
|
@pulumi.getter
|
319
|
-
def metadata(self) -> Optional[pulumi.Input[
|
318
|
+
def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
320
319
|
"""
|
321
320
|
A JSON-encoded string containing metadata in
|
322
321
|
key-value pairs to be set on tokens issued with this SecretID.
|
@@ -324,12 +323,12 @@ class _AuthBackendRoleSecretIdState:
|
|
324
323
|
return pulumi.get(self, "metadata")
|
325
324
|
|
326
325
|
@metadata.setter
|
327
|
-
def metadata(self, value: Optional[pulumi.Input[
|
326
|
+
def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
328
327
|
pulumi.set(self, "metadata", value)
|
329
328
|
|
330
|
-
@property
|
329
|
+
@_builtins.property
|
331
330
|
@pulumi.getter
|
332
|
-
def namespace(self) -> Optional[pulumi.Input[
|
331
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
333
332
|
"""
|
334
333
|
The namespace to provision the resource in.
|
335
334
|
The value should not contain leading or trailing forward slashes.
|
@@ -339,36 +338,36 @@ class _AuthBackendRoleSecretIdState:
|
|
339
338
|
return pulumi.get(self, "namespace")
|
340
339
|
|
341
340
|
@namespace.setter
|
342
|
-
def namespace(self, value: Optional[pulumi.Input[
|
341
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
343
342
|
pulumi.set(self, "namespace", value)
|
344
343
|
|
345
|
-
@property
|
344
|
+
@_builtins.property
|
346
345
|
@pulumi.getter(name="numUses")
|
347
|
-
def num_uses(self) -> Optional[pulumi.Input[
|
346
|
+
def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
348
347
|
"""
|
349
348
|
The number of uses for the secret-id.
|
350
349
|
"""
|
351
350
|
return pulumi.get(self, "num_uses")
|
352
351
|
|
353
352
|
@num_uses.setter
|
354
|
-
def num_uses(self, value: Optional[pulumi.Input[
|
353
|
+
def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
355
354
|
pulumi.set(self, "num_uses", value)
|
356
355
|
|
357
|
-
@property
|
356
|
+
@_builtins.property
|
358
357
|
@pulumi.getter(name="roleName")
|
359
|
-
def role_name(self) -> Optional[pulumi.Input[
|
358
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
360
359
|
"""
|
361
360
|
The name of the role to create the SecretID for.
|
362
361
|
"""
|
363
362
|
return pulumi.get(self, "role_name")
|
364
363
|
|
365
364
|
@role_name.setter
|
366
|
-
def role_name(self, value: Optional[pulumi.Input[
|
365
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
367
366
|
pulumi.set(self, "role_name", value)
|
368
367
|
|
369
|
-
@property
|
368
|
+
@_builtins.property
|
370
369
|
@pulumi.getter(name="secretId")
|
371
|
-
def secret_id(self) -> Optional[pulumi.Input[
|
370
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
372
371
|
"""
|
373
372
|
The SecretID to be created. If set, uses "Push"
|
374
373
|
mode. Defaults to Vault auto-generating SecretIDs.
|
@@ -376,24 +375,24 @@ class _AuthBackendRoleSecretIdState:
|
|
376
375
|
return pulumi.get(self, "secret_id")
|
377
376
|
|
378
377
|
@secret_id.setter
|
379
|
-
def secret_id(self, value: Optional[pulumi.Input[
|
378
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
380
379
|
pulumi.set(self, "secret_id", value)
|
381
380
|
|
382
|
-
@property
|
381
|
+
@_builtins.property
|
383
382
|
@pulumi.getter
|
384
|
-
def ttl(self) -> Optional[pulumi.Input[
|
383
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
385
384
|
"""
|
386
385
|
The TTL duration of the SecretID.
|
387
386
|
"""
|
388
387
|
return pulumi.get(self, "ttl")
|
389
388
|
|
390
389
|
@ttl.setter
|
391
|
-
def ttl(self, value: Optional[pulumi.Input[
|
390
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
392
391
|
pulumi.set(self, "ttl", value)
|
393
392
|
|
394
|
-
@property
|
393
|
+
@_builtins.property
|
395
394
|
@pulumi.getter(name="withWrappedAccessor")
|
396
|
-
def with_wrapped_accessor(self) -> Optional[pulumi.Input[
|
395
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
397
396
|
"""
|
398
397
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
399
398
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -402,12 +401,12 @@ class _AuthBackendRoleSecretIdState:
|
|
402
401
|
return pulumi.get(self, "with_wrapped_accessor")
|
403
402
|
|
404
403
|
@with_wrapped_accessor.setter
|
405
|
-
def with_wrapped_accessor(self, value: Optional[pulumi.Input[
|
404
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
406
405
|
pulumi.set(self, "with_wrapped_accessor", value)
|
407
406
|
|
408
|
-
@property
|
407
|
+
@_builtins.property
|
409
408
|
@pulumi.getter(name="wrappingAccessor")
|
410
|
-
def wrapping_accessor(self) -> Optional[pulumi.Input[
|
409
|
+
def wrapping_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
411
410
|
"""
|
412
411
|
The unique ID for the response-wrapped SecretID that can
|
413
412
|
be safely logged.
|
@@ -415,24 +414,24 @@ class _AuthBackendRoleSecretIdState:
|
|
415
414
|
return pulumi.get(self, "wrapping_accessor")
|
416
415
|
|
417
416
|
@wrapping_accessor.setter
|
418
|
-
def wrapping_accessor(self, value: Optional[pulumi.Input[
|
417
|
+
def wrapping_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
419
418
|
pulumi.set(self, "wrapping_accessor", value)
|
420
419
|
|
421
|
-
@property
|
420
|
+
@_builtins.property
|
422
421
|
@pulumi.getter(name="wrappingToken")
|
423
|
-
def wrapping_token(self) -> Optional[pulumi.Input[
|
422
|
+
def wrapping_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
424
423
|
"""
|
425
424
|
The token used to retrieve a response-wrapped SecretID.
|
426
425
|
"""
|
427
426
|
return pulumi.get(self, "wrapping_token")
|
428
427
|
|
429
428
|
@wrapping_token.setter
|
430
|
-
def wrapping_token(self, value: Optional[pulumi.Input[
|
429
|
+
def wrapping_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
431
430
|
pulumi.set(self, "wrapping_token", value)
|
432
431
|
|
433
|
-
@property
|
432
|
+
@_builtins.property
|
434
433
|
@pulumi.getter(name="wrappingTtl")
|
435
|
-
def wrapping_ttl(self) -> Optional[pulumi.Input[
|
434
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
436
435
|
"""
|
437
436
|
If set, the SecretID response will be
|
438
437
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
@@ -442,7 +441,7 @@ class _AuthBackendRoleSecretIdState:
|
|
442
441
|
return pulumi.get(self, "wrapping_ttl")
|
443
442
|
|
444
443
|
@wrapping_ttl.setter
|
445
|
-
def wrapping_ttl(self, value: Optional[pulumi.Input[
|
444
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
446
445
|
pulumi.set(self, "wrapping_ttl", value)
|
447
446
|
|
448
447
|
|
@@ -452,16 +451,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
452
451
|
def __init__(__self__,
|
453
452
|
resource_name: str,
|
454
453
|
opts: Optional[pulumi.ResourceOptions] = None,
|
455
|
-
backend: Optional[pulumi.Input[
|
456
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[
|
457
|
-
metadata: Optional[pulumi.Input[
|
458
|
-
namespace: Optional[pulumi.Input[
|
459
|
-
num_uses: Optional[pulumi.Input[
|
460
|
-
role_name: Optional[pulumi.Input[
|
461
|
-
secret_id: Optional[pulumi.Input[
|
462
|
-
ttl: Optional[pulumi.Input[
|
463
|
-
with_wrapped_accessor: Optional[pulumi.Input[
|
464
|
-
wrapping_ttl: Optional[pulumi.Input[
|
454
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
455
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
456
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
458
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
459
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
460
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
461
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
462
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
463
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
465
464
|
__props__=None):
|
466
465
|
"""
|
467
466
|
Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
|
@@ -476,7 +475,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
476
475
|
import pulumi_vault as vault
|
477
476
|
|
478
477
|
approle = vault.AuthBackend("approle", type="approle")
|
479
|
-
example = vault.
|
478
|
+
example = vault.approle.AuthBackendRole("example",
|
480
479
|
backend=approle.path,
|
481
480
|
role_name="test-role",
|
482
481
|
token_policies=[
|
@@ -484,7 +483,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
484
483
|
"dev",
|
485
484
|
"prod",
|
486
485
|
])
|
487
|
-
id = vault.
|
486
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
488
487
|
backend=approle.path,
|
489
488
|
role_name=example.role_name,
|
490
489
|
metadata=json.dumps({
|
@@ -494,24 +493,24 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
494
493
|
|
495
494
|
:param str resource_name: The name of the resource.
|
496
495
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
497
|
-
:param pulumi.Input[
|
498
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
496
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
497
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
499
498
|
perform the login operation using this SecretID.
|
500
|
-
:param pulumi.Input[
|
499
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
501
500
|
key-value pairs to be set on tokens issued with this SecretID.
|
502
|
-
:param pulumi.Input[
|
501
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
503
502
|
The value should not contain leading or trailing forward slashes.
|
504
503
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
505
504
|
*Available only for Vault Enterprise*.
|
506
|
-
:param pulumi.Input[
|
507
|
-
:param pulumi.Input[
|
508
|
-
:param pulumi.Input[
|
505
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
506
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
507
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
509
508
|
mode. Defaults to Vault auto-generating SecretIDs.
|
510
|
-
:param pulumi.Input[
|
511
|
-
:param pulumi.Input[
|
509
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
510
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
512
511
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
513
512
|
invalidated through unwrapping.
|
514
|
-
:param pulumi.Input[
|
513
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
515
514
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
516
515
|
and available for the duration specified. Only a single unwrapping of the
|
517
516
|
token is allowed.
|
@@ -535,7 +534,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
535
534
|
import pulumi_vault as vault
|
536
535
|
|
537
536
|
approle = vault.AuthBackend("approle", type="approle")
|
538
|
-
example = vault.
|
537
|
+
example = vault.approle.AuthBackendRole("example",
|
539
538
|
backend=approle.path,
|
540
539
|
role_name="test-role",
|
541
540
|
token_policies=[
|
@@ -543,7 +542,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
543
542
|
"dev",
|
544
543
|
"prod",
|
545
544
|
])
|
546
|
-
id = vault.
|
545
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
547
546
|
backend=approle.path,
|
548
547
|
role_name=example.role_name,
|
549
548
|
metadata=json.dumps({
|
@@ -566,16 +565,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
566
565
|
def _internal_init(__self__,
|
567
566
|
resource_name: str,
|
568
567
|
opts: Optional[pulumi.ResourceOptions] = None,
|
569
|
-
backend: Optional[pulumi.Input[
|
570
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[
|
571
|
-
metadata: Optional[pulumi.Input[
|
572
|
-
namespace: Optional[pulumi.Input[
|
573
|
-
num_uses: Optional[pulumi.Input[
|
574
|
-
role_name: Optional[pulumi.Input[
|
575
|
-
secret_id: Optional[pulumi.Input[
|
576
|
-
ttl: Optional[pulumi.Input[
|
577
|
-
with_wrapped_accessor: Optional[pulumi.Input[
|
578
|
-
wrapping_ttl: Optional[pulumi.Input[
|
568
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
569
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
570
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
571
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
572
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
573
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
574
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
575
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
576
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
577
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
579
578
|
__props__=None):
|
580
579
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
581
580
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -614,19 +613,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
614
613
|
def get(resource_name: str,
|
615
614
|
id: pulumi.Input[str],
|
616
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
617
|
-
accessor: Optional[pulumi.Input[
|
618
|
-
backend: Optional[pulumi.Input[
|
619
|
-
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[
|
620
|
-
metadata: Optional[pulumi.Input[
|
621
|
-
namespace: Optional[pulumi.Input[
|
622
|
-
num_uses: Optional[pulumi.Input[
|
623
|
-
role_name: Optional[pulumi.Input[
|
624
|
-
secret_id: Optional[pulumi.Input[
|
625
|
-
ttl: Optional[pulumi.Input[
|
626
|
-
with_wrapped_accessor: Optional[pulumi.Input[
|
627
|
-
wrapping_accessor: Optional[pulumi.Input[
|
628
|
-
wrapping_token: Optional[pulumi.Input[
|
629
|
-
wrapping_ttl: Optional[pulumi.Input[
|
616
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
617
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
618
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
619
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
620
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
621
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
622
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
623
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
624
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
625
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
626
|
+
wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
627
|
+
wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
|
628
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleSecretId':
|
630
629
|
"""
|
631
630
|
Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
|
632
631
|
properties used to qualify the lookup.
|
@@ -634,28 +633,28 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
634
633
|
:param str resource_name: The unique name of the resulting resource.
|
635
634
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
636
635
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
637
|
-
:param pulumi.Input[
|
638
|
-
:param pulumi.Input[
|
639
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
636
|
+
:param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
637
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
638
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
640
639
|
perform the login operation using this SecretID.
|
641
|
-
:param pulumi.Input[
|
640
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
642
641
|
key-value pairs to be set on tokens issued with this SecretID.
|
643
|
-
:param pulumi.Input[
|
642
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
644
643
|
The value should not contain leading or trailing forward slashes.
|
645
644
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
646
645
|
*Available only for Vault Enterprise*.
|
647
|
-
:param pulumi.Input[
|
648
|
-
:param pulumi.Input[
|
649
|
-
:param pulumi.Input[
|
646
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
647
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
648
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
650
649
|
mode. Defaults to Vault auto-generating SecretIDs.
|
651
|
-
:param pulumi.Input[
|
652
|
-
:param pulumi.Input[
|
650
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
651
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
653
652
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
654
653
|
invalidated through unwrapping.
|
655
|
-
:param pulumi.Input[
|
654
|
+
:param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
656
655
|
be safely logged.
|
657
|
-
:param pulumi.Input[
|
658
|
-
:param pulumi.Input[
|
656
|
+
:param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
657
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
659
658
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
660
659
|
and available for the duration specified. Only a single unwrapping of the
|
661
660
|
token is allowed.
|
@@ -679,43 +678,43 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
679
678
|
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
680
679
|
return AuthBackendRoleSecretId(resource_name, opts=opts, __props__=__props__)
|
681
680
|
|
682
|
-
@property
|
681
|
+
@_builtins.property
|
683
682
|
@pulumi.getter
|
684
|
-
def accessor(self) -> pulumi.Output[
|
683
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
685
684
|
"""
|
686
685
|
The unique ID for this SecretID that can be safely logged.
|
687
686
|
"""
|
688
687
|
return pulumi.get(self, "accessor")
|
689
688
|
|
690
|
-
@property
|
689
|
+
@_builtins.property
|
691
690
|
@pulumi.getter
|
692
|
-
def backend(self) -> pulumi.Output[Optional[
|
691
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
693
692
|
"""
|
694
693
|
Unique name of the auth backend to configure.
|
695
694
|
"""
|
696
695
|
return pulumi.get(self, "backend")
|
697
696
|
|
698
|
-
@property
|
697
|
+
@_builtins.property
|
699
698
|
@pulumi.getter(name="cidrLists")
|
700
|
-
def cidr_lists(self) -> pulumi.Output[Optional[Sequence[
|
699
|
+
def cidr_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
701
700
|
"""
|
702
701
|
If set, specifies blocks of IP addresses which can
|
703
702
|
perform the login operation using this SecretID.
|
704
703
|
"""
|
705
704
|
return pulumi.get(self, "cidr_lists")
|
706
705
|
|
707
|
-
@property
|
706
|
+
@_builtins.property
|
708
707
|
@pulumi.getter
|
709
|
-
def metadata(self) -> pulumi.Output[Optional[
|
708
|
+
def metadata(self) -> pulumi.Output[Optional[_builtins.str]]:
|
710
709
|
"""
|
711
710
|
A JSON-encoded string containing metadata in
|
712
711
|
key-value pairs to be set on tokens issued with this SecretID.
|
713
712
|
"""
|
714
713
|
return pulumi.get(self, "metadata")
|
715
714
|
|
716
|
-
@property
|
715
|
+
@_builtins.property
|
717
716
|
@pulumi.getter
|
718
|
-
def namespace(self) -> pulumi.Output[Optional[
|
717
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
719
718
|
"""
|
720
719
|
The namespace to provision the resource in.
|
721
720
|
The value should not contain leading or trailing forward slashes.
|
@@ -724,42 +723,42 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
724
723
|
"""
|
725
724
|
return pulumi.get(self, "namespace")
|
726
725
|
|
727
|
-
@property
|
726
|
+
@_builtins.property
|
728
727
|
@pulumi.getter(name="numUses")
|
729
|
-
def num_uses(self) -> pulumi.Output[Optional[
|
728
|
+
def num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
730
729
|
"""
|
731
730
|
The number of uses for the secret-id.
|
732
731
|
"""
|
733
732
|
return pulumi.get(self, "num_uses")
|
734
733
|
|
735
|
-
@property
|
734
|
+
@_builtins.property
|
736
735
|
@pulumi.getter(name="roleName")
|
737
|
-
def role_name(self) -> pulumi.Output[
|
736
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
738
737
|
"""
|
739
738
|
The name of the role to create the SecretID for.
|
740
739
|
"""
|
741
740
|
return pulumi.get(self, "role_name")
|
742
741
|
|
743
|
-
@property
|
742
|
+
@_builtins.property
|
744
743
|
@pulumi.getter(name="secretId")
|
745
|
-
def secret_id(self) -> pulumi.Output[
|
744
|
+
def secret_id(self) -> pulumi.Output[_builtins.str]:
|
746
745
|
"""
|
747
746
|
The SecretID to be created. If set, uses "Push"
|
748
747
|
mode. Defaults to Vault auto-generating SecretIDs.
|
749
748
|
"""
|
750
749
|
return pulumi.get(self, "secret_id")
|
751
750
|
|
752
|
-
@property
|
751
|
+
@_builtins.property
|
753
752
|
@pulumi.getter
|
754
|
-
def ttl(self) -> pulumi.Output[Optional[
|
753
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
755
754
|
"""
|
756
755
|
The TTL duration of the SecretID.
|
757
756
|
"""
|
758
757
|
return pulumi.get(self, "ttl")
|
759
758
|
|
760
|
-
@property
|
759
|
+
@_builtins.property
|
761
760
|
@pulumi.getter(name="withWrappedAccessor")
|
762
|
-
def with_wrapped_accessor(self) -> pulumi.Output[Optional[
|
761
|
+
def with_wrapped_accessor(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
763
762
|
"""
|
764
763
|
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
765
764
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
@@ -767,26 +766,26 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
767
766
|
"""
|
768
767
|
return pulumi.get(self, "with_wrapped_accessor")
|
769
768
|
|
770
|
-
@property
|
769
|
+
@_builtins.property
|
771
770
|
@pulumi.getter(name="wrappingAccessor")
|
772
|
-
def wrapping_accessor(self) -> pulumi.Output[
|
771
|
+
def wrapping_accessor(self) -> pulumi.Output[_builtins.str]:
|
773
772
|
"""
|
774
773
|
The unique ID for the response-wrapped SecretID that can
|
775
774
|
be safely logged.
|
776
775
|
"""
|
777
776
|
return pulumi.get(self, "wrapping_accessor")
|
778
777
|
|
779
|
-
@property
|
778
|
+
@_builtins.property
|
780
779
|
@pulumi.getter(name="wrappingToken")
|
781
|
-
def wrapping_token(self) -> pulumi.Output[
|
780
|
+
def wrapping_token(self) -> pulumi.Output[_builtins.str]:
|
782
781
|
"""
|
783
782
|
The token used to retrieve a response-wrapped SecretID.
|
784
783
|
"""
|
785
784
|
return pulumi.get(self, "wrapping_token")
|
786
785
|
|
787
|
-
@property
|
786
|
+
@_builtins.property
|
788
787
|
@pulumi.getter(name="wrappingTtl")
|
789
|
-
def wrapping_ttl(self) -> pulumi.Output[Optional[
|
788
|
+
def wrapping_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
790
789
|
"""
|
791
790
|
If set, the SecretID response will be
|
792
791
|
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|