pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendStsRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
account_id: pulumi.Input[
|
24
|
-
sts_role: pulumi.Input[
|
25
|
-
backend: Optional[pulumi.Input[
|
26
|
-
external_id: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
account_id: pulumi.Input[_builtins.str],
|
23
|
+
sts_role: pulumi.Input[_builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a AuthBackendStsRole resource.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
|
30
|
+
:param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
|
32
31
|
by EC2 instances in the account specified by `account_id`.
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
34
33
|
mounted at. Defaults to `aws`.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
@@ -47,21 +46,21 @@ class AuthBackendStsRoleArgs:
|
|
47
46
|
if namespace is not None:
|
48
47
|
pulumi.set(__self__, "namespace", namespace)
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
@pulumi.getter(name="accountId")
|
52
|
-
def account_id(self) -> pulumi.Input[
|
51
|
+
def account_id(self) -> pulumi.Input[_builtins.str]:
|
53
52
|
"""
|
54
53
|
The AWS account ID to configure the STS role for.
|
55
54
|
"""
|
56
55
|
return pulumi.get(self, "account_id")
|
57
56
|
|
58
57
|
@account_id.setter
|
59
|
-
def account_id(self, value: pulumi.Input[
|
58
|
+
def account_id(self, value: pulumi.Input[_builtins.str]):
|
60
59
|
pulumi.set(self, "account_id", value)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter(name="stsRole")
|
64
|
-
def sts_role(self) -> pulumi.Input[
|
63
|
+
def sts_role(self) -> pulumi.Input[_builtins.str]:
|
65
64
|
"""
|
66
65
|
The STS role to assume when verifying requests made
|
67
66
|
by EC2 instances in the account specified by `account_id`.
|
@@ -69,12 +68,12 @@ class AuthBackendStsRoleArgs:
|
|
69
68
|
return pulumi.get(self, "sts_role")
|
70
69
|
|
71
70
|
@sts_role.setter
|
72
|
-
def sts_role(self, value: pulumi.Input[
|
71
|
+
def sts_role(self, value: pulumi.Input[_builtins.str]):
|
73
72
|
pulumi.set(self, "sts_role", value)
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter
|
77
|
-
def backend(self) -> Optional[pulumi.Input[
|
76
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
78
77
|
"""
|
79
78
|
The path the AWS auth backend being configured was
|
80
79
|
mounted at. Defaults to `aws`.
|
@@ -82,24 +81,24 @@ class AuthBackendStsRoleArgs:
|
|
82
81
|
return pulumi.get(self, "backend")
|
83
82
|
|
84
83
|
@backend.setter
|
85
|
-
def backend(self, value: Optional[pulumi.Input[
|
84
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
86
85
|
pulumi.set(self, "backend", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="externalId")
|
90
|
-
def external_id(self) -> Optional[pulumi.Input[
|
89
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
91
90
|
"""
|
92
91
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "external_id")
|
95
94
|
|
96
95
|
@external_id.setter
|
97
|
-
def external_id(self, value: Optional[pulumi.Input[
|
96
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
98
97
|
pulumi.set(self, "external_id", value)
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter
|
102
|
-
def namespace(self) -> Optional[pulumi.Input[
|
101
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
103
102
|
"""
|
104
103
|
The namespace to provision the resource in.
|
105
104
|
The value should not contain leading or trailing forward slashes.
|
@@ -109,29 +108,29 @@ class AuthBackendStsRoleArgs:
|
|
109
108
|
return pulumi.get(self, "namespace")
|
110
109
|
|
111
110
|
@namespace.setter
|
112
|
-
def namespace(self, value: Optional[pulumi.Input[
|
111
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
113
112
|
pulumi.set(self, "namespace", value)
|
114
113
|
|
115
114
|
|
116
115
|
@pulumi.input_type
|
117
116
|
class _AuthBackendStsRoleState:
|
118
117
|
def __init__(__self__, *,
|
119
|
-
account_id: Optional[pulumi.Input[
|
120
|
-
backend: Optional[pulumi.Input[
|
121
|
-
external_id: Optional[pulumi.Input[
|
122
|
-
namespace: Optional[pulumi.Input[
|
123
|
-
sts_role: Optional[pulumi.Input[
|
118
|
+
account_id: Optional[pulumi.Input[_builtins.str]] = None,
|
119
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
120
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
121
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
122
|
+
sts_role: Optional[pulumi.Input[_builtins.str]] = None):
|
124
123
|
"""
|
125
124
|
Input properties used for looking up and filtering AuthBackendStsRole resources.
|
126
|
-
:param pulumi.Input[
|
127
|
-
:param pulumi.Input[
|
125
|
+
:param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
|
126
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
128
127
|
mounted at. Defaults to `aws`.
|
129
|
-
:param pulumi.Input[
|
130
|
-
:param pulumi.Input[
|
128
|
+
:param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
129
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
131
130
|
The value should not contain leading or trailing forward slashes.
|
132
131
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
133
132
|
*Available only for Vault Enterprise*.
|
134
|
-
:param pulumi.Input[
|
133
|
+
:param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
|
135
134
|
by EC2 instances in the account specified by `account_id`.
|
136
135
|
"""
|
137
136
|
if account_id is not None:
|
@@ -145,21 +144,21 @@ class _AuthBackendStsRoleState:
|
|
145
144
|
if sts_role is not None:
|
146
145
|
pulumi.set(__self__, "sts_role", sts_role)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="accountId")
|
150
|
-
def account_id(self) -> Optional[pulumi.Input[
|
149
|
+
def account_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
151
150
|
"""
|
152
151
|
The AWS account ID to configure the STS role for.
|
153
152
|
"""
|
154
153
|
return pulumi.get(self, "account_id")
|
155
154
|
|
156
155
|
@account_id.setter
|
157
|
-
def account_id(self, value: Optional[pulumi.Input[
|
156
|
+
def account_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
158
157
|
pulumi.set(self, "account_id", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter
|
162
|
-
def backend(self) -> Optional[pulumi.Input[
|
161
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
163
162
|
"""
|
164
163
|
The path the AWS auth backend being configured was
|
165
164
|
mounted at. Defaults to `aws`.
|
@@ -167,24 +166,24 @@ class _AuthBackendStsRoleState:
|
|
167
166
|
return pulumi.get(self, "backend")
|
168
167
|
|
169
168
|
@backend.setter
|
170
|
-
def backend(self, value: Optional[pulumi.Input[
|
169
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "backend", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="externalId")
|
175
|
-
def external_id(self) -> Optional[pulumi.Input[
|
174
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
176
175
|
"""
|
177
176
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
178
177
|
"""
|
179
178
|
return pulumi.get(self, "external_id")
|
180
179
|
|
181
180
|
@external_id.setter
|
182
|
-
def external_id(self, value: Optional[pulumi.Input[
|
181
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
183
182
|
pulumi.set(self, "external_id", value)
|
184
183
|
|
185
|
-
@property
|
184
|
+
@_builtins.property
|
186
185
|
@pulumi.getter
|
187
|
-
def namespace(self) -> Optional[pulumi.Input[
|
186
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
188
187
|
"""
|
189
188
|
The namespace to provision the resource in.
|
190
189
|
The value should not contain leading or trailing forward slashes.
|
@@ -194,12 +193,12 @@ class _AuthBackendStsRoleState:
|
|
194
193
|
return pulumi.get(self, "namespace")
|
195
194
|
|
196
195
|
@namespace.setter
|
197
|
-
def namespace(self, value: Optional[pulumi.Input[
|
196
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
197
|
pulumi.set(self, "namespace", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter(name="stsRole")
|
202
|
-
def sts_role(self) -> Optional[pulumi.Input[
|
201
|
+
def sts_role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
203
202
|
"""
|
204
203
|
The STS role to assume when verifying requests made
|
205
204
|
by EC2 instances in the account specified by `account_id`.
|
@@ -207,7 +206,7 @@ class _AuthBackendStsRoleState:
|
|
207
206
|
return pulumi.get(self, "sts_role")
|
208
207
|
|
209
208
|
@sts_role.setter
|
210
|
-
def sts_role(self, value: Optional[pulumi.Input[
|
209
|
+
def sts_role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
211
210
|
pulumi.set(self, "sts_role", value)
|
212
211
|
|
213
212
|
|
@@ -217,11 +216,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
217
216
|
def __init__(__self__,
|
218
217
|
resource_name: str,
|
219
218
|
opts: Optional[pulumi.ResourceOptions] = None,
|
220
|
-
account_id: Optional[pulumi.Input[
|
221
|
-
backend: Optional[pulumi.Input[
|
222
|
-
external_id: Optional[pulumi.Input[
|
223
|
-
namespace: Optional[pulumi.Input[
|
224
|
-
sts_role: Optional[pulumi.Input[
|
219
|
+
account_id: Optional[pulumi.Input[_builtins.str]] = None,
|
220
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
221
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
223
|
+
sts_role: Optional[pulumi.Input[_builtins.str]] = None,
|
225
224
|
__props__=None):
|
226
225
|
"""
|
227
226
|
## Example Usage
|
@@ -247,15 +246,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
247
246
|
|
248
247
|
:param str resource_name: The name of the resource.
|
249
248
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
250
|
-
:param pulumi.Input[
|
251
|
-
:param pulumi.Input[
|
249
|
+
:param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
|
250
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
252
251
|
mounted at. Defaults to `aws`.
|
253
|
-
:param pulumi.Input[
|
254
|
-
:param pulumi.Input[
|
252
|
+
:param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
253
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
255
254
|
The value should not contain leading or trailing forward slashes.
|
256
255
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
257
256
|
*Available only for Vault Enterprise*.
|
258
|
-
:param pulumi.Input[
|
257
|
+
:param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
|
259
258
|
by EC2 instances in the account specified by `account_id`.
|
260
259
|
"""
|
261
260
|
...
|
@@ -301,11 +300,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
301
300
|
def _internal_init(__self__,
|
302
301
|
resource_name: str,
|
303
302
|
opts: Optional[pulumi.ResourceOptions] = None,
|
304
|
-
account_id: Optional[pulumi.Input[
|
305
|
-
backend: Optional[pulumi.Input[
|
306
|
-
external_id: Optional[pulumi.Input[
|
307
|
-
namespace: Optional[pulumi.Input[
|
308
|
-
sts_role: Optional[pulumi.Input[
|
303
|
+
account_id: Optional[pulumi.Input[_builtins.str]] = None,
|
304
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
305
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
306
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
307
|
+
sts_role: Optional[pulumi.Input[_builtins.str]] = None,
|
309
308
|
__props__=None):
|
310
309
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
311
310
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -334,11 +333,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
334
333
|
def get(resource_name: str,
|
335
334
|
id: pulumi.Input[str],
|
336
335
|
opts: Optional[pulumi.ResourceOptions] = None,
|
337
|
-
account_id: Optional[pulumi.Input[
|
338
|
-
backend: Optional[pulumi.Input[
|
339
|
-
external_id: Optional[pulumi.Input[
|
340
|
-
namespace: Optional[pulumi.Input[
|
341
|
-
sts_role: Optional[pulumi.Input[
|
336
|
+
account_id: Optional[pulumi.Input[_builtins.str]] = None,
|
337
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
338
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
339
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
sts_role: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendStsRole':
|
342
341
|
"""
|
343
342
|
Get an existing AuthBackendStsRole resource's state with the given name, id, and optional extra
|
344
343
|
properties used to qualify the lookup.
|
@@ -346,15 +345,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
346
345
|
:param str resource_name: The unique name of the resulting resource.
|
347
346
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
348
347
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
349
|
-
:param pulumi.Input[
|
350
|
-
:param pulumi.Input[
|
348
|
+
:param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
|
349
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
351
350
|
mounted at. Defaults to `aws`.
|
352
|
-
:param pulumi.Input[
|
353
|
-
:param pulumi.Input[
|
351
|
+
:param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
352
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
354
353
|
The value should not contain leading or trailing forward slashes.
|
355
354
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
356
355
|
*Available only for Vault Enterprise*.
|
357
|
-
:param pulumi.Input[
|
356
|
+
:param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
|
358
357
|
by EC2 instances in the account specified by `account_id`.
|
359
358
|
"""
|
360
359
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -368,34 +367,34 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
368
367
|
__props__.__dict__["sts_role"] = sts_role
|
369
368
|
return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
|
370
369
|
|
371
|
-
@property
|
370
|
+
@_builtins.property
|
372
371
|
@pulumi.getter(name="accountId")
|
373
|
-
def account_id(self) -> pulumi.Output[
|
372
|
+
def account_id(self) -> pulumi.Output[_builtins.str]:
|
374
373
|
"""
|
375
374
|
The AWS account ID to configure the STS role for.
|
376
375
|
"""
|
377
376
|
return pulumi.get(self, "account_id")
|
378
377
|
|
379
|
-
@property
|
378
|
+
@_builtins.property
|
380
379
|
@pulumi.getter
|
381
|
-
def backend(self) -> pulumi.Output[Optional[
|
380
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
382
381
|
"""
|
383
382
|
The path the AWS auth backend being configured was
|
384
383
|
mounted at. Defaults to `aws`.
|
385
384
|
"""
|
386
385
|
return pulumi.get(self, "backend")
|
387
386
|
|
388
|
-
@property
|
387
|
+
@_builtins.property
|
389
388
|
@pulumi.getter(name="externalId")
|
390
|
-
def external_id(self) -> pulumi.Output[Optional[
|
389
|
+
def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
391
390
|
"""
|
392
391
|
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
393
392
|
"""
|
394
393
|
return pulumi.get(self, "external_id")
|
395
394
|
|
396
|
-
@property
|
395
|
+
@_builtins.property
|
397
396
|
@pulumi.getter
|
398
|
-
def namespace(self) -> pulumi.Output[Optional[
|
397
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
399
398
|
"""
|
400
399
|
The namespace to provision the resource in.
|
401
400
|
The value should not contain leading or trailing forward slashes.
|
@@ -404,9 +403,9 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
404
403
|
"""
|
405
404
|
return pulumi.get(self, "namespace")
|
406
405
|
|
407
|
-
@property
|
406
|
+
@_builtins.property
|
408
407
|
@pulumi.getter(name="stsRole")
|
409
|
-
def sts_role(self) -> pulumi.Output[
|
408
|
+
def sts_role(self) -> pulumi.Output[_builtins.str]:
|
410
409
|
"""
|
411
410
|
The STS role to assume when verifying requests made
|
412
411
|
by EC2 instances in the account specified by `account_id`.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -74,30 +73,30 @@ class GetAccessCredentialsResult:
|
|
74
73
|
raise TypeError("Expected argument 'type' to be a str")
|
75
74
|
pulumi.set(__self__, "type", type)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter(name="accessKey")
|
79
|
-
def access_key(self) ->
|
78
|
+
def access_key(self) -> _builtins.str:
|
80
79
|
"""
|
81
80
|
The AWS Access Key ID returned by Vault.
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "access_key")
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter
|
87
|
-
def backend(self) ->
|
86
|
+
def backend(self) -> _builtins.str:
|
88
87
|
return pulumi.get(self, "backend")
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def id(self) ->
|
91
|
+
def id(self) -> _builtins.str:
|
93
92
|
"""
|
94
93
|
The provider-assigned unique ID for this managed resource.
|
95
94
|
"""
|
96
95
|
return pulumi.get(self, "id")
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter(name="leaseDuration")
|
100
|
-
def lease_duration(self) ->
|
99
|
+
def lease_duration(self) -> _builtins.int:
|
101
100
|
"""
|
102
101
|
The duration of the secret lease, in seconds relative
|
103
102
|
to the time the data was requested. Once this time has passed any plan
|
@@ -105,68 +104,68 @@ class GetAccessCredentialsResult:
|
|
105
104
|
"""
|
106
105
|
return pulumi.get(self, "lease_duration")
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter(name="leaseId")
|
110
|
-
def lease_id(self) ->
|
109
|
+
def lease_id(self) -> _builtins.str:
|
111
110
|
"""
|
112
111
|
The lease identifier assigned by Vault.
|
113
112
|
"""
|
114
113
|
return pulumi.get(self, "lease_id")
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="leaseRenewable")
|
118
|
-
def lease_renewable(self) ->
|
117
|
+
def lease_renewable(self) -> _builtins.bool:
|
119
118
|
return pulumi.get(self, "lease_renewable")
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter(name="leaseStartTime")
|
123
|
-
def lease_start_time(self) ->
|
122
|
+
def lease_start_time(self) -> _builtins.str:
|
124
123
|
return pulumi.get(self, "lease_start_time")
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter
|
128
|
-
def namespace(self) -> Optional[
|
127
|
+
def namespace(self) -> Optional[_builtins.str]:
|
129
128
|
return pulumi.get(self, "namespace")
|
130
129
|
|
131
|
-
@property
|
130
|
+
@_builtins.property
|
132
131
|
@pulumi.getter
|
133
|
-
def region(self) -> Optional[
|
132
|
+
def region(self) -> Optional[_builtins.str]:
|
134
133
|
return pulumi.get(self, "region")
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter
|
138
|
-
def role(self) ->
|
137
|
+
def role(self) -> _builtins.str:
|
139
138
|
return pulumi.get(self, "role")
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter(name="roleArn")
|
143
|
-
def role_arn(self) -> Optional[
|
142
|
+
def role_arn(self) -> Optional[_builtins.str]:
|
144
143
|
return pulumi.get(self, "role_arn")
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter(name="secretKey")
|
148
|
-
def secret_key(self) ->
|
147
|
+
def secret_key(self) -> _builtins.str:
|
149
148
|
"""
|
150
149
|
The AWS Secret Key returned by Vault.
|
151
150
|
"""
|
152
151
|
return pulumi.get(self, "secret_key")
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="securityToken")
|
156
|
-
def security_token(self) ->
|
155
|
+
def security_token(self) -> _builtins.str:
|
157
156
|
"""
|
158
157
|
The STS token returned by Vault, if any.
|
159
158
|
"""
|
160
159
|
return pulumi.get(self, "security_token")
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
@pulumi.getter
|
164
|
-
def ttl(self) -> Optional[
|
163
|
+
def ttl(self) -> Optional[_builtins.str]:
|
165
164
|
return pulumi.get(self, "ttl")
|
166
165
|
|
167
|
-
@property
|
166
|
+
@_builtins.property
|
168
167
|
@pulumi.getter
|
169
|
-
def type(self) -> Optional[
|
168
|
+
def type(self) -> Optional[_builtins.str]:
|
170
169
|
return pulumi.get(self, "type")
|
171
170
|
|
172
171
|
|
@@ -193,34 +192,34 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
|
|
193
192
|
type=self.type)
|
194
193
|
|
195
194
|
|
196
|
-
def get_access_credentials(backend: Optional[
|
197
|
-
namespace: Optional[
|
198
|
-
region: Optional[
|
199
|
-
role: Optional[
|
200
|
-
role_arn: Optional[
|
201
|
-
ttl: Optional[
|
202
|
-
type: Optional[
|
195
|
+
def get_access_credentials(backend: Optional[_builtins.str] = None,
|
196
|
+
namespace: Optional[_builtins.str] = None,
|
197
|
+
region: Optional[_builtins.str] = None,
|
198
|
+
role: Optional[_builtins.str] = None,
|
199
|
+
role_arn: Optional[_builtins.str] = None,
|
200
|
+
ttl: Optional[_builtins.str] = None,
|
201
|
+
type: Optional[_builtins.str] = None,
|
203
202
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
|
204
203
|
"""
|
205
204
|
## Example Usage
|
206
205
|
|
207
206
|
|
208
|
-
:param
|
207
|
+
:param _builtins.str backend: The path to the AWS secret backend to
|
209
208
|
read credentials from, with no leading or trailing `/`s.
|
210
|
-
:param
|
209
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
211
210
|
The value should not contain leading or trailing forward slashes.
|
212
211
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
213
212
|
*Available only for Vault Enterprise*.
|
214
|
-
:param
|
215
|
-
:param
|
213
|
+
:param _builtins.str region: The region the read credentials belong to.
|
214
|
+
:param _builtins.str role: The name of the AWS secret backend role to read
|
216
215
|
credentials from, with no leading or trailing `/`s.
|
217
|
-
:param
|
216
|
+
:param _builtins.str role_arn: The specific AWS ARN to use
|
218
217
|
from the configured role. If the role does not have multiple ARNs, this does
|
219
218
|
not need to be specified.
|
220
|
-
:param
|
219
|
+
:param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
221
220
|
is specified as a string with a duration suffix. Valid only when
|
222
221
|
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
223
|
-
:param
|
222
|
+
:param _builtins.str type: The type of credentials to read. Defaults
|
224
223
|
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
225
224
|
Key. Can also be set to `"sts"`, which will return a security token
|
226
225
|
in addition to the keys.
|
@@ -252,34 +251,34 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
|
|
252
251
|
security_token=pulumi.get(__ret__, 'security_token'),
|
253
252
|
ttl=pulumi.get(__ret__, 'ttl'),
|
254
253
|
type=pulumi.get(__ret__, 'type'))
|
255
|
-
def get_access_credentials_output(backend: Optional[pulumi.Input[
|
256
|
-
namespace: Optional[pulumi.Input[Optional[
|
257
|
-
region: Optional[pulumi.Input[Optional[
|
258
|
-
role: Optional[pulumi.Input[
|
259
|
-
role_arn: Optional[pulumi.Input[Optional[
|
260
|
-
ttl: Optional[pulumi.Input[Optional[
|
261
|
-
type: Optional[pulumi.Input[Optional[
|
254
|
+
def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
255
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
256
|
+
region: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
257
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
258
|
+
role_arn: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
259
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
260
|
+
type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
262
261
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
263
262
|
"""
|
264
263
|
## Example Usage
|
265
264
|
|
266
265
|
|
267
|
-
:param
|
266
|
+
:param _builtins.str backend: The path to the AWS secret backend to
|
268
267
|
read credentials from, with no leading or trailing `/`s.
|
269
|
-
:param
|
268
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
270
269
|
The value should not contain leading or trailing forward slashes.
|
271
270
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
272
271
|
*Available only for Vault Enterprise*.
|
273
|
-
:param
|
274
|
-
:param
|
272
|
+
:param _builtins.str region: The region the read credentials belong to.
|
273
|
+
:param _builtins.str role: The name of the AWS secret backend role to read
|
275
274
|
credentials from, with no leading or trailing `/`s.
|
276
|
-
:param
|
275
|
+
:param _builtins.str role_arn: The specific AWS ARN to use
|
277
276
|
from the configured role. If the role does not have multiple ARNs, this does
|
278
277
|
not need to be specified.
|
279
|
-
:param
|
278
|
+
:param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
280
279
|
is specified as a string with a duration suffix. Valid only when
|
281
280
|
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
282
|
-
:param
|
281
|
+
:param _builtins.str type: The type of credentials to read. Defaults
|
283
282
|
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
284
283
|
Key. Can also be set to `"sts"`, which will return a security token
|
285
284
|
in addition to the keys.
|