pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,24 +19,24 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
address: Optional[pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
base_path: Optional[pulumi.Input[
|
26
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
27
|
-
description: Optional[pulumi.Input[
|
28
|
-
disable_remount: Optional[pulumi.Input[
|
29
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
30
|
-
namespace: Optional[pulumi.Input[
|
31
|
-
token: Optional[pulumi.Input[
|
22
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
26
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
32
31
|
"""
|
33
32
|
The set of arguments for constructing a SecretBackend resource.
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
34
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
35
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
37
36
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
38
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
39
38
|
for credentials issued by this backend.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
41
40
|
The value should not contain leading or trailing forward slashes.
|
42
41
|
The `namespace` is always relative to the provider's configured namespace.
|
43
42
|
*Available only for Vault Enterprise*.
|
@@ -61,60 +60,60 @@ class SecretBackendArgs:
|
|
61
60
|
if token is not None:
|
62
61
|
pulumi.set(__self__, "token", token)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def address(self) -> Optional[pulumi.Input[
|
65
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
67
66
|
return pulumi.get(self, "address")
|
68
67
|
|
69
68
|
@address.setter
|
70
|
-
def address(self, value: Optional[pulumi.Input[
|
69
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
71
70
|
pulumi.set(self, "address", value)
|
72
71
|
|
73
|
-
@property
|
72
|
+
@_builtins.property
|
74
73
|
@pulumi.getter
|
75
|
-
def backend(self) -> Optional[pulumi.Input[
|
74
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
76
75
|
return pulumi.get(self, "backend")
|
77
76
|
|
78
77
|
@backend.setter
|
79
|
-
def backend(self, value: Optional[pulumi.Input[
|
78
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
80
79
|
pulumi.set(self, "backend", value)
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter(name="basePath")
|
84
|
-
def base_path(self) -> Optional[pulumi.Input[
|
83
|
+
def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
85
84
|
return pulumi.get(self, "base_path")
|
86
85
|
|
87
86
|
@base_path.setter
|
88
|
-
def base_path(self, value: Optional[pulumi.Input[
|
87
|
+
def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
89
88
|
pulumi.set(self, "base_path", value)
|
90
89
|
|
91
|
-
@property
|
90
|
+
@_builtins.property
|
92
91
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
93
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
92
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
94
93
|
"""
|
95
94
|
The default TTL for credentials issued by this backend.
|
96
95
|
"""
|
97
96
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
98
97
|
|
99
98
|
@default_lease_ttl_seconds.setter
|
100
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
99
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
101
100
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter
|
105
|
-
def description(self) -> Optional[pulumi.Input[
|
104
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
106
105
|
"""
|
107
106
|
A human-friendly description for this backend.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "description")
|
110
109
|
|
111
110
|
@description.setter
|
112
|
-
def description(self, value: Optional[pulumi.Input[
|
111
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
113
112
|
pulumi.set(self, "description", value)
|
114
113
|
|
115
|
-
@property
|
114
|
+
@_builtins.property
|
116
115
|
@pulumi.getter(name="disableRemount")
|
117
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
116
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
118
117
|
"""
|
119
118
|
If set, opts out of mount migration on path updates.
|
120
119
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -122,12 +121,12 @@ class SecretBackendArgs:
|
|
122
121
|
return pulumi.get(self, "disable_remount")
|
123
122
|
|
124
123
|
@disable_remount.setter
|
125
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
124
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
126
125
|
pulumi.set(self, "disable_remount", value)
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
130
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
129
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
131
130
|
"""
|
132
131
|
The maximum TTL that can be requested
|
133
132
|
for credentials issued by this backend.
|
@@ -135,12 +134,12 @@ class SecretBackendArgs:
|
|
135
134
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
136
135
|
|
137
136
|
@max_lease_ttl_seconds.setter
|
138
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
137
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
139
138
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter
|
143
|
-
def namespace(self) -> Optional[pulumi.Input[
|
142
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
144
143
|
"""
|
145
144
|
The namespace to provision the resource in.
|
146
145
|
The value should not contain leading or trailing forward slashes.
|
@@ -150,40 +149,40 @@ class SecretBackendArgs:
|
|
150
149
|
return pulumi.get(self, "namespace")
|
151
150
|
|
152
151
|
@namespace.setter
|
153
|
-
def namespace(self, value: Optional[pulumi.Input[
|
152
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
154
153
|
pulumi.set(self, "namespace", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter
|
158
|
-
def token(self) -> Optional[pulumi.Input[
|
157
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
159
158
|
return pulumi.get(self, "token")
|
160
159
|
|
161
160
|
@token.setter
|
162
|
-
def token(self, value: Optional[pulumi.Input[
|
161
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
162
|
pulumi.set(self, "token", value)
|
164
163
|
|
165
164
|
|
166
165
|
@pulumi.input_type
|
167
166
|
class _SecretBackendState:
|
168
167
|
def __init__(__self__, *,
|
169
|
-
address: Optional[pulumi.Input[
|
170
|
-
backend: Optional[pulumi.Input[
|
171
|
-
base_path: Optional[pulumi.Input[
|
172
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
173
|
-
description: Optional[pulumi.Input[
|
174
|
-
disable_remount: Optional[pulumi.Input[
|
175
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
176
|
-
namespace: Optional[pulumi.Input[
|
177
|
-
token: Optional[pulumi.Input[
|
168
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
169
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
170
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
171
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
172
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
173
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
174
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
175
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
176
|
+
token: Optional[pulumi.Input[_builtins.str]] = None):
|
178
177
|
"""
|
179
178
|
Input properties used for looking up and filtering SecretBackend resources.
|
180
|
-
:param pulumi.Input[
|
181
|
-
:param pulumi.Input[
|
182
|
-
:param pulumi.Input[
|
179
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
180
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
181
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
183
182
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
184
|
-
:param pulumi.Input[
|
183
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
185
184
|
for credentials issued by this backend.
|
186
|
-
:param pulumi.Input[
|
185
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
187
186
|
The value should not contain leading or trailing forward slashes.
|
188
187
|
The `namespace` is always relative to the provider's configured namespace.
|
189
188
|
*Available only for Vault Enterprise*.
|
@@ -207,60 +206,60 @@ class _SecretBackendState:
|
|
207
206
|
if token is not None:
|
208
207
|
pulumi.set(__self__, "token", token)
|
209
208
|
|
210
|
-
@property
|
209
|
+
@_builtins.property
|
211
210
|
@pulumi.getter
|
212
|
-
def address(self) -> Optional[pulumi.Input[
|
211
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
213
212
|
return pulumi.get(self, "address")
|
214
213
|
|
215
214
|
@address.setter
|
216
|
-
def address(self, value: Optional[pulumi.Input[
|
215
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
217
216
|
pulumi.set(self, "address", value)
|
218
217
|
|
219
|
-
@property
|
218
|
+
@_builtins.property
|
220
219
|
@pulumi.getter
|
221
|
-
def backend(self) -> Optional[pulumi.Input[
|
220
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
222
221
|
return pulumi.get(self, "backend")
|
223
222
|
|
224
223
|
@backend.setter
|
225
|
-
def backend(self, value: Optional[pulumi.Input[
|
224
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
226
225
|
pulumi.set(self, "backend", value)
|
227
226
|
|
228
|
-
@property
|
227
|
+
@_builtins.property
|
229
228
|
@pulumi.getter(name="basePath")
|
230
|
-
def base_path(self) -> Optional[pulumi.Input[
|
229
|
+
def base_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
231
230
|
return pulumi.get(self, "base_path")
|
232
231
|
|
233
232
|
@base_path.setter
|
234
|
-
def base_path(self, value: Optional[pulumi.Input[
|
233
|
+
def base_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
235
234
|
pulumi.set(self, "base_path", value)
|
236
235
|
|
237
|
-
@property
|
236
|
+
@_builtins.property
|
238
237
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
239
|
-
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
238
|
+
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
240
239
|
"""
|
241
240
|
The default TTL for credentials issued by this backend.
|
242
241
|
"""
|
243
242
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
244
243
|
|
245
244
|
@default_lease_ttl_seconds.setter
|
246
|
-
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
245
|
+
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
247
246
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
248
247
|
|
249
|
-
@property
|
248
|
+
@_builtins.property
|
250
249
|
@pulumi.getter
|
251
|
-
def description(self) -> Optional[pulumi.Input[
|
250
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
252
251
|
"""
|
253
252
|
A human-friendly description for this backend.
|
254
253
|
"""
|
255
254
|
return pulumi.get(self, "description")
|
256
255
|
|
257
256
|
@description.setter
|
258
|
-
def description(self, value: Optional[pulumi.Input[
|
257
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
259
258
|
pulumi.set(self, "description", value)
|
260
259
|
|
261
|
-
@property
|
260
|
+
@_builtins.property
|
262
261
|
@pulumi.getter(name="disableRemount")
|
263
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
262
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
264
263
|
"""
|
265
264
|
If set, opts out of mount migration on path updates.
|
266
265
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -268,12 +267,12 @@ class _SecretBackendState:
|
|
268
267
|
return pulumi.get(self, "disable_remount")
|
269
268
|
|
270
269
|
@disable_remount.setter
|
271
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
270
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
272
271
|
pulumi.set(self, "disable_remount", value)
|
273
272
|
|
274
|
-
@property
|
273
|
+
@_builtins.property
|
275
274
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
276
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
275
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
277
276
|
"""
|
278
277
|
The maximum TTL that can be requested
|
279
278
|
for credentials issued by this backend.
|
@@ -281,12 +280,12 @@ class _SecretBackendState:
|
|
281
280
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
282
281
|
|
283
282
|
@max_lease_ttl_seconds.setter
|
284
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
283
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
285
284
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
286
285
|
|
287
|
-
@property
|
286
|
+
@_builtins.property
|
288
287
|
@pulumi.getter
|
289
|
-
def namespace(self) -> Optional[pulumi.Input[
|
288
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
289
|
"""
|
291
290
|
The namespace to provision the resource in.
|
292
291
|
The value should not contain leading or trailing forward slashes.
|
@@ -296,16 +295,16 @@ class _SecretBackendState:
|
|
296
295
|
return pulumi.get(self, "namespace")
|
297
296
|
|
298
297
|
@namespace.setter
|
299
|
-
def namespace(self, value: Optional[pulumi.Input[
|
298
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
299
|
pulumi.set(self, "namespace", value)
|
301
300
|
|
302
|
-
@property
|
301
|
+
@_builtins.property
|
303
302
|
@pulumi.getter
|
304
|
-
def token(self) -> Optional[pulumi.Input[
|
303
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
305
304
|
return pulumi.get(self, "token")
|
306
305
|
|
307
306
|
@token.setter
|
308
|
-
def token(self, value: Optional[pulumi.Input[
|
307
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
309
308
|
pulumi.set(self, "token", value)
|
310
309
|
|
311
310
|
|
@@ -315,15 +314,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
315
314
|
def __init__(__self__,
|
316
315
|
resource_name: str,
|
317
316
|
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
-
address: Optional[pulumi.Input[
|
319
|
-
backend: Optional[pulumi.Input[
|
320
|
-
base_path: Optional[pulumi.Input[
|
321
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
322
|
-
description: Optional[pulumi.Input[
|
323
|
-
disable_remount: Optional[pulumi.Input[
|
324
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
325
|
-
namespace: Optional[pulumi.Input[
|
326
|
-
token: Optional[pulumi.Input[
|
317
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
318
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
319
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
320
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
321
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
323
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
324
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
325
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
327
326
|
__props__=None):
|
328
327
|
"""
|
329
328
|
## Example Usage
|
@@ -348,13 +347,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
348
347
|
|
349
348
|
:param str resource_name: The name of the resource.
|
350
349
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
351
|
-
:param pulumi.Input[
|
352
|
-
:param pulumi.Input[
|
353
|
-
:param pulumi.Input[
|
350
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
351
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
352
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
354
353
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
355
|
-
:param pulumi.Input[
|
354
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
356
355
|
for credentials issued by this backend.
|
357
|
-
:param pulumi.Input[
|
356
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
358
357
|
The value should not contain leading or trailing forward slashes.
|
359
358
|
The `namespace` is always relative to the provider's configured namespace.
|
360
359
|
*Available only for Vault Enterprise*.
|
@@ -401,15 +400,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
401
400
|
def _internal_init(__self__,
|
402
401
|
resource_name: str,
|
403
402
|
opts: Optional[pulumi.ResourceOptions] = None,
|
404
|
-
address: Optional[pulumi.Input[
|
405
|
-
backend: Optional[pulumi.Input[
|
406
|
-
base_path: Optional[pulumi.Input[
|
407
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
408
|
-
description: Optional[pulumi.Input[
|
409
|
-
disable_remount: Optional[pulumi.Input[
|
410
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
411
|
-
namespace: Optional[pulumi.Input[
|
412
|
-
token: Optional[pulumi.Input[
|
403
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
404
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
405
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
406
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
407
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
408
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
409
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
410
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
413
412
|
__props__=None):
|
414
413
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
415
414
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -440,15 +439,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
440
439
|
def get(resource_name: str,
|
441
440
|
id: pulumi.Input[str],
|
442
441
|
opts: Optional[pulumi.ResourceOptions] = None,
|
443
|
-
address: Optional[pulumi.Input[
|
444
|
-
backend: Optional[pulumi.Input[
|
445
|
-
base_path: Optional[pulumi.Input[
|
446
|
-
default_lease_ttl_seconds: Optional[pulumi.Input[
|
447
|
-
description: Optional[pulumi.Input[
|
448
|
-
disable_remount: Optional[pulumi.Input[
|
449
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
450
|
-
namespace: Optional[pulumi.Input[
|
451
|
-
token: Optional[pulumi.Input[
|
442
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
443
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
444
|
+
base_path: Optional[pulumi.Input[_builtins.str]] = None,
|
445
|
+
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
446
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
447
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
448
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
449
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
|
452
451
|
"""
|
453
452
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
454
453
|
properties used to qualify the lookup.
|
@@ -456,13 +455,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
456
455
|
:param str resource_name: The unique name of the resulting resource.
|
457
456
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
458
457
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
459
|
-
:param pulumi.Input[
|
460
|
-
:param pulumi.Input[
|
461
|
-
:param pulumi.Input[
|
458
|
+
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
459
|
+
:param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
|
460
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
462
461
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
463
|
-
:param pulumi.Input[
|
462
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
464
463
|
for credentials issued by this backend.
|
465
|
-
:param pulumi.Input[
|
464
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
466
465
|
The value should not contain leading or trailing forward slashes.
|
467
466
|
The `namespace` is always relative to the provider's configured namespace.
|
468
467
|
*Available only for Vault Enterprise*.
|
@@ -482,58 +481,58 @@ class SecretBackend(pulumi.CustomResource):
|
|
482
481
|
__props__.__dict__["token"] = token
|
483
482
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
484
483
|
|
485
|
-
@property
|
484
|
+
@_builtins.property
|
486
485
|
@pulumi.getter
|
487
|
-
def address(self) -> pulumi.Output[Optional[
|
486
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
488
487
|
return pulumi.get(self, "address")
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter
|
492
|
-
def backend(self) -> pulumi.Output[Optional[
|
491
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
493
492
|
return pulumi.get(self, "backend")
|
494
493
|
|
495
|
-
@property
|
494
|
+
@_builtins.property
|
496
495
|
@pulumi.getter(name="basePath")
|
497
|
-
def base_path(self) -> pulumi.Output[Optional[
|
496
|
+
def base_path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
498
497
|
return pulumi.get(self, "base_path")
|
499
498
|
|
500
|
-
@property
|
499
|
+
@_builtins.property
|
501
500
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
502
|
-
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
501
|
+
def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
503
502
|
"""
|
504
503
|
The default TTL for credentials issued by this backend.
|
505
504
|
"""
|
506
505
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
507
506
|
|
508
|
-
@property
|
507
|
+
@_builtins.property
|
509
508
|
@pulumi.getter
|
510
|
-
def description(self) -> pulumi.Output[Optional[
|
509
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
511
510
|
"""
|
512
511
|
A human-friendly description for this backend.
|
513
512
|
"""
|
514
513
|
return pulumi.get(self, "description")
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter(name="disableRemount")
|
518
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
517
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
519
518
|
"""
|
520
519
|
If set, opts out of mount migration on path updates.
|
521
520
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
522
521
|
"""
|
523
522
|
return pulumi.get(self, "disable_remount")
|
524
523
|
|
525
|
-
@property
|
524
|
+
@_builtins.property
|
526
525
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
527
|
-
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[
|
526
|
+
def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
|
528
527
|
"""
|
529
528
|
The maximum TTL that can be requested
|
530
529
|
for credentials issued by this backend.
|
531
530
|
"""
|
532
531
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
533
532
|
|
534
|
-
@property
|
533
|
+
@_builtins.property
|
535
534
|
@pulumi.getter
|
536
|
-
def namespace(self) -> pulumi.Output[Optional[
|
535
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
537
536
|
"""
|
538
537
|
The namespace to provision the resource in.
|
539
538
|
The value should not contain leading or trailing forward slashes.
|
@@ -542,8 +541,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
542
541
|
"""
|
543
542
|
return pulumi.get(self, "namespace")
|
544
543
|
|
545
|
-
@property
|
544
|
+
@_builtins.property
|
546
545
|
@pulumi.getter
|
547
|
-
def token(self) -> pulumi.Output[Optional[
|
546
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
548
547
|
return pulumi.get(self, "token")
|
549
548
|
|