pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,18 +19,18 @@ __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendDynamicRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
creation_ldif: pulumi.Input[
|
24
|
-
deletion_ldif: pulumi.Input[
|
25
|
-
role_name: pulumi.Input[
|
26
|
-
default_ttl: Optional[pulumi.Input[
|
27
|
-
max_ttl: Optional[pulumi.Input[
|
28
|
-
mount: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
rollback_ldif: Optional[pulumi.Input[
|
31
|
-
username_template: Optional[pulumi.Input[
|
22
|
+
creation_ldif: pulumi.Input[_builtins.str],
|
23
|
+
deletion_ldif: pulumi.Input[_builtins.str],
|
24
|
+
role_name: pulumi.Input[_builtins.str],
|
25
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
26
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
27
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
rollback_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
32
31
|
"""
|
33
32
|
The set of arguments for constructing a SecretBackendDynamicRole resource.
|
34
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.str] creation_ldif: A templatized LDIF string used to create a user
|
35
34
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
36
35
|
be used to add the user account to an existing group. All LDIF entries are
|
37
36
|
performed in order. If Vault encounters an error while executing the
|
@@ -39,28 +38,28 @@ class SecretBackendDynamicRoleArgs:
|
|
39
38
|
LDIF entries. If an error occurs and `rollback_ldif` is specified, the LDIF
|
40
39
|
entries in `rollback_ldif` will be executed. See `rollback_ldif` for more
|
41
40
|
details. This field may optionally be provided as a base64 encoded string.
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] deletion_ldif: A templatized LDIF string used to delete the
|
43
42
|
user account once its TTL has expired. This may contain multiple LDIF
|
44
43
|
entries. All LDIF entries are performed in order. If Vault encounters an
|
45
44
|
error while executing an entry in the `deletion_ldif` it will attempt to
|
46
45
|
continue executing any remaining entries. This field may optionally be
|
47
46
|
provided as a base64 encoded string.
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
50
|
-
:param pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
48
|
+
:param pulumi.Input[_builtins.int] default_ttl: Specifies the TTL for the leases associated with this role.
|
49
|
+
:param pulumi.Input[_builtins.int] max_ttl: Specifies the maximum TTL for the leases associated with this role.
|
50
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
52
51
|
not begin or end with a `/`. Defaults to `ldap`.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
54
53
|
The value should not contain leading or trailing forward slashes.
|
55
54
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
55
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] rollback_ldif: A templatized LDIF string used to attempt to
|
58
57
|
rollback any changes in the event that execution of the `creation_ldif` results
|
59
58
|
in an error. This may contain multiple LDIF entries. All LDIF entries are
|
60
59
|
performed in order. If Vault encounters an error while executing an entry in
|
61
60
|
the `rollback_ldif` it will attempt to continue executing any remaining
|
62
61
|
entries. This field may optionally be provided as a base64 encoded string.
|
63
|
-
:param pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] username_template: A template used to generate a dynamic
|
64
63
|
username. This will be used to fill in the `.Username` field within the
|
65
64
|
`creation_ldif` string.
|
66
65
|
"""
|
@@ -80,9 +79,9 @@ class SecretBackendDynamicRoleArgs:
|
|
80
79
|
if username_template is not None:
|
81
80
|
pulumi.set(__self__, "username_template", username_template)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="creationLdif")
|
85
|
-
def creation_ldif(self) -> pulumi.Input[
|
84
|
+
def creation_ldif(self) -> pulumi.Input[_builtins.str]:
|
86
85
|
"""
|
87
86
|
A templatized LDIF string used to create a user
|
88
87
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
@@ -96,12 +95,12 @@ class SecretBackendDynamicRoleArgs:
|
|
96
95
|
return pulumi.get(self, "creation_ldif")
|
97
96
|
|
98
97
|
@creation_ldif.setter
|
99
|
-
def creation_ldif(self, value: pulumi.Input[
|
98
|
+
def creation_ldif(self, value: pulumi.Input[_builtins.str]):
|
100
99
|
pulumi.set(self, "creation_ldif", value)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter(name="deletionLdif")
|
104
|
-
def deletion_ldif(self) -> pulumi.Input[
|
103
|
+
def deletion_ldif(self) -> pulumi.Input[_builtins.str]:
|
105
104
|
"""
|
106
105
|
A templatized LDIF string used to delete the
|
107
106
|
user account once its TTL has expired. This may contain multiple LDIF
|
@@ -113,48 +112,48 @@ class SecretBackendDynamicRoleArgs:
|
|
113
112
|
return pulumi.get(self, "deletion_ldif")
|
114
113
|
|
115
114
|
@deletion_ldif.setter
|
116
|
-
def deletion_ldif(self, value: pulumi.Input[
|
115
|
+
def deletion_ldif(self, value: pulumi.Input[_builtins.str]):
|
117
116
|
pulumi.set(self, "deletion_ldif", value)
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter(name="roleName")
|
121
|
-
def role_name(self) -> pulumi.Input[
|
120
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
122
121
|
"""
|
123
122
|
Name of the role.
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "role_name")
|
126
125
|
|
127
126
|
@role_name.setter
|
128
|
-
def role_name(self, value: pulumi.Input[
|
127
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
129
128
|
pulumi.set(self, "role_name", value)
|
130
129
|
|
131
|
-
@property
|
130
|
+
@_builtins.property
|
132
131
|
@pulumi.getter(name="defaultTtl")
|
133
|
-
def default_ttl(self) -> Optional[pulumi.Input[
|
132
|
+
def default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
134
133
|
"""
|
135
134
|
Specifies the TTL for the leases associated with this role.
|
136
135
|
"""
|
137
136
|
return pulumi.get(self, "default_ttl")
|
138
137
|
|
139
138
|
@default_ttl.setter
|
140
|
-
def default_ttl(self, value: Optional[pulumi.Input[
|
139
|
+
def default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
141
140
|
pulumi.set(self, "default_ttl", value)
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter(name="maxTtl")
|
145
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
144
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
146
145
|
"""
|
147
146
|
Specifies the maximum TTL for the leases associated with this role.
|
148
147
|
"""
|
149
148
|
return pulumi.get(self, "max_ttl")
|
150
149
|
|
151
150
|
@max_ttl.setter
|
152
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
151
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
153
152
|
pulumi.set(self, "max_ttl", value)
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
@pulumi.getter
|
157
|
-
def mount(self) -> Optional[pulumi.Input[
|
156
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
158
157
|
"""
|
159
158
|
The unique path this backend should be mounted at. Must
|
160
159
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -162,12 +161,12 @@ class SecretBackendDynamicRoleArgs:
|
|
162
161
|
return pulumi.get(self, "mount")
|
163
162
|
|
164
163
|
@mount.setter
|
165
|
-
def mount(self, value: Optional[pulumi.Input[
|
164
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
166
165
|
pulumi.set(self, "mount", value)
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter
|
170
|
-
def namespace(self) -> Optional[pulumi.Input[
|
169
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
171
170
|
"""
|
172
171
|
The namespace to provision the resource in.
|
173
172
|
The value should not contain leading or trailing forward slashes.
|
@@ -177,12 +176,12 @@ class SecretBackendDynamicRoleArgs:
|
|
177
176
|
return pulumi.get(self, "namespace")
|
178
177
|
|
179
178
|
@namespace.setter
|
180
|
-
def namespace(self, value: Optional[pulumi.Input[
|
179
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
181
180
|
pulumi.set(self, "namespace", value)
|
182
181
|
|
183
|
-
@property
|
182
|
+
@_builtins.property
|
184
183
|
@pulumi.getter(name="rollbackLdif")
|
185
|
-
def rollback_ldif(self) -> Optional[pulumi.Input[
|
184
|
+
def rollback_ldif(self) -> Optional[pulumi.Input[_builtins.str]]:
|
186
185
|
"""
|
187
186
|
A templatized LDIF string used to attempt to
|
188
187
|
rollback any changes in the event that execution of the `creation_ldif` results
|
@@ -194,12 +193,12 @@ class SecretBackendDynamicRoleArgs:
|
|
194
193
|
return pulumi.get(self, "rollback_ldif")
|
195
194
|
|
196
195
|
@rollback_ldif.setter
|
197
|
-
def rollback_ldif(self, value: Optional[pulumi.Input[
|
196
|
+
def rollback_ldif(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
197
|
pulumi.set(self, "rollback_ldif", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter(name="usernameTemplate")
|
202
|
-
def username_template(self) -> Optional[pulumi.Input[
|
201
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
203
202
|
"""
|
204
203
|
A template used to generate a dynamic
|
205
204
|
username. This will be used to fill in the `.Username` field within the
|
@@ -208,25 +207,25 @@ class SecretBackendDynamicRoleArgs:
|
|
208
207
|
return pulumi.get(self, "username_template")
|
209
208
|
|
210
209
|
@username_template.setter
|
211
|
-
def username_template(self, value: Optional[pulumi.Input[
|
210
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
211
|
pulumi.set(self, "username_template", value)
|
213
212
|
|
214
213
|
|
215
214
|
@pulumi.input_type
|
216
215
|
class _SecretBackendDynamicRoleState:
|
217
216
|
def __init__(__self__, *,
|
218
|
-
creation_ldif: Optional[pulumi.Input[
|
219
|
-
default_ttl: Optional[pulumi.Input[
|
220
|
-
deletion_ldif: Optional[pulumi.Input[
|
221
|
-
max_ttl: Optional[pulumi.Input[
|
222
|
-
mount: Optional[pulumi.Input[
|
223
|
-
namespace: Optional[pulumi.Input[
|
224
|
-
role_name: Optional[pulumi.Input[
|
225
|
-
rollback_ldif: Optional[pulumi.Input[
|
226
|
-
username_template: Optional[pulumi.Input[
|
217
|
+
creation_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
218
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
219
|
+
deletion_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
220
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
221
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
223
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
224
|
+
rollback_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
225
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
227
226
|
"""
|
228
227
|
Input properties used for looking up and filtering SecretBackendDynamicRole resources.
|
229
|
-
:param pulumi.Input[
|
228
|
+
:param pulumi.Input[_builtins.str] creation_ldif: A templatized LDIF string used to create a user
|
230
229
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
231
230
|
be used to add the user account to an existing group. All LDIF entries are
|
232
231
|
performed in order. If Vault encounters an error while executing the
|
@@ -234,28 +233,28 @@ class _SecretBackendDynamicRoleState:
|
|
234
233
|
LDIF entries. If an error occurs and `rollback_ldif` is specified, the LDIF
|
235
234
|
entries in `rollback_ldif` will be executed. See `rollback_ldif` for more
|
236
235
|
details. This field may optionally be provided as a base64 encoded string.
|
237
|
-
:param pulumi.Input[
|
238
|
-
:param pulumi.Input[
|
236
|
+
:param pulumi.Input[_builtins.int] default_ttl: Specifies the TTL for the leases associated with this role.
|
237
|
+
:param pulumi.Input[_builtins.str] deletion_ldif: A templatized LDIF string used to delete the
|
239
238
|
user account once its TTL has expired. This may contain multiple LDIF
|
240
239
|
entries. All LDIF entries are performed in order. If Vault encounters an
|
241
240
|
error while executing an entry in the `deletion_ldif` it will attempt to
|
242
241
|
continue executing any remaining entries. This field may optionally be
|
243
242
|
provided as a base64 encoded string.
|
244
|
-
:param pulumi.Input[
|
245
|
-
:param pulumi.Input[
|
243
|
+
:param pulumi.Input[_builtins.int] max_ttl: Specifies the maximum TTL for the leases associated with this role.
|
244
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
246
245
|
not begin or end with a `/`. Defaults to `ldap`.
|
247
|
-
:param pulumi.Input[
|
246
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
248
247
|
The value should not contain leading or trailing forward slashes.
|
249
248
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
250
249
|
*Available only for Vault Enterprise*.
|
251
|
-
:param pulumi.Input[
|
252
|
-
:param pulumi.Input[
|
250
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
251
|
+
:param pulumi.Input[_builtins.str] rollback_ldif: A templatized LDIF string used to attempt to
|
253
252
|
rollback any changes in the event that execution of the `creation_ldif` results
|
254
253
|
in an error. This may contain multiple LDIF entries. All LDIF entries are
|
255
254
|
performed in order. If Vault encounters an error while executing an entry in
|
256
255
|
the `rollback_ldif` it will attempt to continue executing any remaining
|
257
256
|
entries. This field may optionally be provided as a base64 encoded string.
|
258
|
-
:param pulumi.Input[
|
257
|
+
:param pulumi.Input[_builtins.str] username_template: A template used to generate a dynamic
|
259
258
|
username. This will be used to fill in the `.Username` field within the
|
260
259
|
`creation_ldif` string.
|
261
260
|
"""
|
@@ -278,9 +277,9 @@ class _SecretBackendDynamicRoleState:
|
|
278
277
|
if username_template is not None:
|
279
278
|
pulumi.set(__self__, "username_template", username_template)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="creationLdif")
|
283
|
-
def creation_ldif(self) -> Optional[pulumi.Input[
|
282
|
+
def creation_ldif(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
A templatized LDIF string used to create a user
|
286
285
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
@@ -294,24 +293,24 @@ class _SecretBackendDynamicRoleState:
|
|
294
293
|
return pulumi.get(self, "creation_ldif")
|
295
294
|
|
296
295
|
@creation_ldif.setter
|
297
|
-
def creation_ldif(self, value: Optional[pulumi.Input[
|
296
|
+
def creation_ldif(self, value: Optional[pulumi.Input[_builtins.str]]):
|
298
297
|
pulumi.set(self, "creation_ldif", value)
|
299
298
|
|
300
|
-
@property
|
299
|
+
@_builtins.property
|
301
300
|
@pulumi.getter(name="defaultTtl")
|
302
|
-
def default_ttl(self) -> Optional[pulumi.Input[
|
301
|
+
def default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
303
302
|
"""
|
304
303
|
Specifies the TTL for the leases associated with this role.
|
305
304
|
"""
|
306
305
|
return pulumi.get(self, "default_ttl")
|
307
306
|
|
308
307
|
@default_ttl.setter
|
309
|
-
def default_ttl(self, value: Optional[pulumi.Input[
|
308
|
+
def default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
310
309
|
pulumi.set(self, "default_ttl", value)
|
311
310
|
|
312
|
-
@property
|
311
|
+
@_builtins.property
|
313
312
|
@pulumi.getter(name="deletionLdif")
|
314
|
-
def deletion_ldif(self) -> Optional[pulumi.Input[
|
313
|
+
def deletion_ldif(self) -> Optional[pulumi.Input[_builtins.str]]:
|
315
314
|
"""
|
316
315
|
A templatized LDIF string used to delete the
|
317
316
|
user account once its TTL has expired. This may contain multiple LDIF
|
@@ -323,24 +322,24 @@ class _SecretBackendDynamicRoleState:
|
|
323
322
|
return pulumi.get(self, "deletion_ldif")
|
324
323
|
|
325
324
|
@deletion_ldif.setter
|
326
|
-
def deletion_ldif(self, value: Optional[pulumi.Input[
|
325
|
+
def deletion_ldif(self, value: Optional[pulumi.Input[_builtins.str]]):
|
327
326
|
pulumi.set(self, "deletion_ldif", value)
|
328
327
|
|
329
|
-
@property
|
328
|
+
@_builtins.property
|
330
329
|
@pulumi.getter(name="maxTtl")
|
331
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
330
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
332
331
|
"""
|
333
332
|
Specifies the maximum TTL for the leases associated with this role.
|
334
333
|
"""
|
335
334
|
return pulumi.get(self, "max_ttl")
|
336
335
|
|
337
336
|
@max_ttl.setter
|
338
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
337
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
339
338
|
pulumi.set(self, "max_ttl", value)
|
340
339
|
|
341
|
-
@property
|
340
|
+
@_builtins.property
|
342
341
|
@pulumi.getter
|
343
|
-
def mount(self) -> Optional[pulumi.Input[
|
342
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
344
343
|
"""
|
345
344
|
The unique path this backend should be mounted at. Must
|
346
345
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -348,12 +347,12 @@ class _SecretBackendDynamicRoleState:
|
|
348
347
|
return pulumi.get(self, "mount")
|
349
348
|
|
350
349
|
@mount.setter
|
351
|
-
def mount(self, value: Optional[pulumi.Input[
|
350
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
352
351
|
pulumi.set(self, "mount", value)
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter
|
356
|
-
def namespace(self) -> Optional[pulumi.Input[
|
355
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
357
356
|
"""
|
358
357
|
The namespace to provision the resource in.
|
359
358
|
The value should not contain leading or trailing forward slashes.
|
@@ -363,24 +362,24 @@ class _SecretBackendDynamicRoleState:
|
|
363
362
|
return pulumi.get(self, "namespace")
|
364
363
|
|
365
364
|
@namespace.setter
|
366
|
-
def namespace(self, value: Optional[pulumi.Input[
|
365
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
367
366
|
pulumi.set(self, "namespace", value)
|
368
367
|
|
369
|
-
@property
|
368
|
+
@_builtins.property
|
370
369
|
@pulumi.getter(name="roleName")
|
371
|
-
def role_name(self) -> Optional[pulumi.Input[
|
370
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
372
371
|
"""
|
373
372
|
Name of the role.
|
374
373
|
"""
|
375
374
|
return pulumi.get(self, "role_name")
|
376
375
|
|
377
376
|
@role_name.setter
|
378
|
-
def role_name(self, value: Optional[pulumi.Input[
|
377
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
379
378
|
pulumi.set(self, "role_name", value)
|
380
379
|
|
381
|
-
@property
|
380
|
+
@_builtins.property
|
382
381
|
@pulumi.getter(name="rollbackLdif")
|
383
|
-
def rollback_ldif(self) -> Optional[pulumi.Input[
|
382
|
+
def rollback_ldif(self) -> Optional[pulumi.Input[_builtins.str]]:
|
384
383
|
"""
|
385
384
|
A templatized LDIF string used to attempt to
|
386
385
|
rollback any changes in the event that execution of the `creation_ldif` results
|
@@ -392,12 +391,12 @@ class _SecretBackendDynamicRoleState:
|
|
392
391
|
return pulumi.get(self, "rollback_ldif")
|
393
392
|
|
394
393
|
@rollback_ldif.setter
|
395
|
-
def rollback_ldif(self, value: Optional[pulumi.Input[
|
394
|
+
def rollback_ldif(self, value: Optional[pulumi.Input[_builtins.str]]):
|
396
395
|
pulumi.set(self, "rollback_ldif", value)
|
397
396
|
|
398
|
-
@property
|
397
|
+
@_builtins.property
|
399
398
|
@pulumi.getter(name="usernameTemplate")
|
400
|
-
def username_template(self) -> Optional[pulumi.Input[
|
399
|
+
def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
401
400
|
"""
|
402
401
|
A template used to generate a dynamic
|
403
402
|
username. This will be used to fill in the `.Username` field within the
|
@@ -406,7 +405,7 @@ class _SecretBackendDynamicRoleState:
|
|
406
405
|
return pulumi.get(self, "username_template")
|
407
406
|
|
408
407
|
@username_template.setter
|
409
|
-
def username_template(self, value: Optional[pulumi.Input[
|
408
|
+
def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
410
409
|
pulumi.set(self, "username_template", value)
|
411
410
|
|
412
411
|
|
@@ -416,15 +415,15 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
416
415
|
def __init__(__self__,
|
417
416
|
resource_name: str,
|
418
417
|
opts: Optional[pulumi.ResourceOptions] = None,
|
419
|
-
creation_ldif: Optional[pulumi.Input[
|
420
|
-
default_ttl: Optional[pulumi.Input[
|
421
|
-
deletion_ldif: Optional[pulumi.Input[
|
422
|
-
max_ttl: Optional[pulumi.Input[
|
423
|
-
mount: Optional[pulumi.Input[
|
424
|
-
namespace: Optional[pulumi.Input[
|
425
|
-
role_name: Optional[pulumi.Input[
|
426
|
-
rollback_ldif: Optional[pulumi.Input[
|
427
|
-
username_template: Optional[pulumi.Input[
|
418
|
+
creation_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
419
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
420
|
+
deletion_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
421
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
422
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
423
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
424
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
425
|
+
rollback_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
426
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
428
427
|
__props__=None):
|
429
428
|
"""
|
430
429
|
## Example Usage
|
@@ -469,7 +468,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
469
468
|
|
470
469
|
:param str resource_name: The name of the resource.
|
471
470
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
472
|
-
:param pulumi.Input[
|
471
|
+
:param pulumi.Input[_builtins.str] creation_ldif: A templatized LDIF string used to create a user
|
473
472
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
474
473
|
be used to add the user account to an existing group. All LDIF entries are
|
475
474
|
performed in order. If Vault encounters an error while executing the
|
@@ -477,28 +476,28 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
477
476
|
LDIF entries. If an error occurs and `rollback_ldif` is specified, the LDIF
|
478
477
|
entries in `rollback_ldif` will be executed. See `rollback_ldif` for more
|
479
478
|
details. This field may optionally be provided as a base64 encoded string.
|
480
|
-
:param pulumi.Input[
|
481
|
-
:param pulumi.Input[
|
479
|
+
:param pulumi.Input[_builtins.int] default_ttl: Specifies the TTL for the leases associated with this role.
|
480
|
+
:param pulumi.Input[_builtins.str] deletion_ldif: A templatized LDIF string used to delete the
|
482
481
|
user account once its TTL has expired. This may contain multiple LDIF
|
483
482
|
entries. All LDIF entries are performed in order. If Vault encounters an
|
484
483
|
error while executing an entry in the `deletion_ldif` it will attempt to
|
485
484
|
continue executing any remaining entries. This field may optionally be
|
486
485
|
provided as a base64 encoded string.
|
487
|
-
:param pulumi.Input[
|
488
|
-
:param pulumi.Input[
|
486
|
+
:param pulumi.Input[_builtins.int] max_ttl: Specifies the maximum TTL for the leases associated with this role.
|
487
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
489
488
|
not begin or end with a `/`. Defaults to `ldap`.
|
490
|
-
:param pulumi.Input[
|
489
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
491
490
|
The value should not contain leading or trailing forward slashes.
|
492
491
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
493
492
|
*Available only for Vault Enterprise*.
|
494
|
-
:param pulumi.Input[
|
495
|
-
:param pulumi.Input[
|
493
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
494
|
+
:param pulumi.Input[_builtins.str] rollback_ldif: A templatized LDIF string used to attempt to
|
496
495
|
rollback any changes in the event that execution of the `creation_ldif` results
|
497
496
|
in an error. This may contain multiple LDIF entries. All LDIF entries are
|
498
497
|
performed in order. If Vault encounters an error while executing an entry in
|
499
498
|
the `rollback_ldif` it will attempt to continue executing any remaining
|
500
499
|
entries. This field may optionally be provided as a base64 encoded string.
|
501
|
-
:param pulumi.Input[
|
500
|
+
:param pulumi.Input[_builtins.str] username_template: A template used to generate a dynamic
|
502
501
|
username. This will be used to fill in the `.Username` field within the
|
503
502
|
`creation_ldif` string.
|
504
503
|
"""
|
@@ -564,15 +563,15 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
564
563
|
def _internal_init(__self__,
|
565
564
|
resource_name: str,
|
566
565
|
opts: Optional[pulumi.ResourceOptions] = None,
|
567
|
-
creation_ldif: Optional[pulumi.Input[
|
568
|
-
default_ttl: Optional[pulumi.Input[
|
569
|
-
deletion_ldif: Optional[pulumi.Input[
|
570
|
-
max_ttl: Optional[pulumi.Input[
|
571
|
-
mount: Optional[pulumi.Input[
|
572
|
-
namespace: Optional[pulumi.Input[
|
573
|
-
role_name: Optional[pulumi.Input[
|
574
|
-
rollback_ldif: Optional[pulumi.Input[
|
575
|
-
username_template: Optional[pulumi.Input[
|
566
|
+
creation_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
567
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
568
|
+
deletion_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
569
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
570
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
571
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
572
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
573
|
+
rollback_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
574
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
576
575
|
__props__=None):
|
577
576
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
578
577
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -607,15 +606,15 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
607
606
|
def get(resource_name: str,
|
608
607
|
id: pulumi.Input[str],
|
609
608
|
opts: Optional[pulumi.ResourceOptions] = None,
|
610
|
-
creation_ldif: Optional[pulumi.Input[
|
611
|
-
default_ttl: Optional[pulumi.Input[
|
612
|
-
deletion_ldif: Optional[pulumi.Input[
|
613
|
-
max_ttl: Optional[pulumi.Input[
|
614
|
-
mount: Optional[pulumi.Input[
|
615
|
-
namespace: Optional[pulumi.Input[
|
616
|
-
role_name: Optional[pulumi.Input[
|
617
|
-
rollback_ldif: Optional[pulumi.Input[
|
618
|
-
username_template: Optional[pulumi.Input[
|
609
|
+
creation_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
610
|
+
default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
611
|
+
deletion_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
612
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
613
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
614
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
615
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
616
|
+
rollback_ldif: Optional[pulumi.Input[_builtins.str]] = None,
|
617
|
+
username_template: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendDynamicRole':
|
619
618
|
"""
|
620
619
|
Get an existing SecretBackendDynamicRole resource's state with the given name, id, and optional extra
|
621
620
|
properties used to qualify the lookup.
|
@@ -623,7 +622,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
623
622
|
:param str resource_name: The unique name of the resulting resource.
|
624
623
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
625
624
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
626
|
-
:param pulumi.Input[
|
625
|
+
:param pulumi.Input[_builtins.str] creation_ldif: A templatized LDIF string used to create a user
|
627
626
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
628
627
|
be used to add the user account to an existing group. All LDIF entries are
|
629
628
|
performed in order. If Vault encounters an error while executing the
|
@@ -631,28 +630,28 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
631
630
|
LDIF entries. If an error occurs and `rollback_ldif` is specified, the LDIF
|
632
631
|
entries in `rollback_ldif` will be executed. See `rollback_ldif` for more
|
633
632
|
details. This field may optionally be provided as a base64 encoded string.
|
634
|
-
:param pulumi.Input[
|
635
|
-
:param pulumi.Input[
|
633
|
+
:param pulumi.Input[_builtins.int] default_ttl: Specifies the TTL for the leases associated with this role.
|
634
|
+
:param pulumi.Input[_builtins.str] deletion_ldif: A templatized LDIF string used to delete the
|
636
635
|
user account once its TTL has expired. This may contain multiple LDIF
|
637
636
|
entries. All LDIF entries are performed in order. If Vault encounters an
|
638
637
|
error while executing an entry in the `deletion_ldif` it will attempt to
|
639
638
|
continue executing any remaining entries. This field may optionally be
|
640
639
|
provided as a base64 encoded string.
|
641
|
-
:param pulumi.Input[
|
642
|
-
:param pulumi.Input[
|
640
|
+
:param pulumi.Input[_builtins.int] max_ttl: Specifies the maximum TTL for the leases associated with this role.
|
641
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
643
642
|
not begin or end with a `/`. Defaults to `ldap`.
|
644
|
-
:param pulumi.Input[
|
643
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
645
644
|
The value should not contain leading or trailing forward slashes.
|
646
645
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
647
646
|
*Available only for Vault Enterprise*.
|
648
|
-
:param pulumi.Input[
|
649
|
-
:param pulumi.Input[
|
647
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
648
|
+
:param pulumi.Input[_builtins.str] rollback_ldif: A templatized LDIF string used to attempt to
|
650
649
|
rollback any changes in the event that execution of the `creation_ldif` results
|
651
650
|
in an error. This may contain multiple LDIF entries. All LDIF entries are
|
652
651
|
performed in order. If Vault encounters an error while executing an entry in
|
653
652
|
the `rollback_ldif` it will attempt to continue executing any remaining
|
654
653
|
entries. This field may optionally be provided as a base64 encoded string.
|
655
|
-
:param pulumi.Input[
|
654
|
+
:param pulumi.Input[_builtins.str] username_template: A template used to generate a dynamic
|
656
655
|
username. This will be used to fill in the `.Username` field within the
|
657
656
|
`creation_ldif` string.
|
658
657
|
"""
|
@@ -671,9 +670,9 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
671
670
|
__props__.__dict__["username_template"] = username_template
|
672
671
|
return SecretBackendDynamicRole(resource_name, opts=opts, __props__=__props__)
|
673
672
|
|
674
|
-
@property
|
673
|
+
@_builtins.property
|
675
674
|
@pulumi.getter(name="creationLdif")
|
676
|
-
def creation_ldif(self) -> pulumi.Output[
|
675
|
+
def creation_ldif(self) -> pulumi.Output[_builtins.str]:
|
677
676
|
"""
|
678
677
|
A templatized LDIF string used to create a user
|
679
678
|
account. This may contain multiple LDIF entries. The `creation_ldif` can also
|
@@ -686,17 +685,17 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
686
685
|
"""
|
687
686
|
return pulumi.get(self, "creation_ldif")
|
688
687
|
|
689
|
-
@property
|
688
|
+
@_builtins.property
|
690
689
|
@pulumi.getter(name="defaultTtl")
|
691
|
-
def default_ttl(self) -> pulumi.Output[Optional[
|
690
|
+
def default_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
692
691
|
"""
|
693
692
|
Specifies the TTL for the leases associated with this role.
|
694
693
|
"""
|
695
694
|
return pulumi.get(self, "default_ttl")
|
696
695
|
|
697
|
-
@property
|
696
|
+
@_builtins.property
|
698
697
|
@pulumi.getter(name="deletionLdif")
|
699
|
-
def deletion_ldif(self) -> pulumi.Output[
|
698
|
+
def deletion_ldif(self) -> pulumi.Output[_builtins.str]:
|
700
699
|
"""
|
701
700
|
A templatized LDIF string used to delete the
|
702
701
|
user account once its TTL has expired. This may contain multiple LDIF
|
@@ -707,26 +706,26 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
707
706
|
"""
|
708
707
|
return pulumi.get(self, "deletion_ldif")
|
709
708
|
|
710
|
-
@property
|
709
|
+
@_builtins.property
|
711
710
|
@pulumi.getter(name="maxTtl")
|
712
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
711
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
713
712
|
"""
|
714
713
|
Specifies the maximum TTL for the leases associated with this role.
|
715
714
|
"""
|
716
715
|
return pulumi.get(self, "max_ttl")
|
717
716
|
|
718
|
-
@property
|
717
|
+
@_builtins.property
|
719
718
|
@pulumi.getter
|
720
|
-
def mount(self) -> pulumi.Output[Optional[
|
719
|
+
def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
|
721
720
|
"""
|
722
721
|
The unique path this backend should be mounted at. Must
|
723
722
|
not begin or end with a `/`. Defaults to `ldap`.
|
724
723
|
"""
|
725
724
|
return pulumi.get(self, "mount")
|
726
725
|
|
727
|
-
@property
|
726
|
+
@_builtins.property
|
728
727
|
@pulumi.getter
|
729
|
-
def namespace(self) -> pulumi.Output[Optional[
|
728
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
730
729
|
"""
|
731
730
|
The namespace to provision the resource in.
|
732
731
|
The value should not contain leading or trailing forward slashes.
|
@@ -735,17 +734,17 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
735
734
|
"""
|
736
735
|
return pulumi.get(self, "namespace")
|
737
736
|
|
738
|
-
@property
|
737
|
+
@_builtins.property
|
739
738
|
@pulumi.getter(name="roleName")
|
740
|
-
def role_name(self) -> pulumi.Output[
|
739
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
741
740
|
"""
|
742
741
|
Name of the role.
|
743
742
|
"""
|
744
743
|
return pulumi.get(self, "role_name")
|
745
744
|
|
746
|
-
@property
|
745
|
+
@_builtins.property
|
747
746
|
@pulumi.getter(name="rollbackLdif")
|
748
|
-
def rollback_ldif(self) -> pulumi.Output[Optional[
|
747
|
+
def rollback_ldif(self) -> pulumi.Output[Optional[_builtins.str]]:
|
749
748
|
"""
|
750
749
|
A templatized LDIF string used to attempt to
|
751
750
|
rollback any changes in the event that execution of the `creation_ldif` results
|
@@ -756,9 +755,9 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
756
755
|
"""
|
757
756
|
return pulumi.get(self, "rollback_ldif")
|
758
757
|
|
759
|
-
@property
|
758
|
+
@_builtins.property
|
760
759
|
@pulumi.getter(name="usernameTemplate")
|
761
|
-
def username_template(self) -> pulumi.Output[Optional[
|
760
|
+
def username_template(self) -> pulumi.Output[Optional[_builtins.str]]:
|
762
761
|
"""
|
763
762
|
A template used to generate a dynamic
|
764
763
|
username. This will be used to fill in the `.Username` field within the
|