pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,796 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleSecretIdArgs:
21
+ def __init__(__self__, *,
22
+ role_name: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
28
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
29
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
30
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
32
+ """
33
+ The set of arguments for constructing a AuthBackendRoleSecretId resource.
34
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
35
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
37
+ perform the login operation using this SecretID.
38
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
39
+ key-value pairs to be set on tokens issued with this SecretID.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
45
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
46
+ mode. Defaults to Vault auto-generating SecretIDs.
47
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
48
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
49
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
50
+ invalidated through unwrapping.
51
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
52
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
53
+ and available for the duration specified. Only a single unwrapping of the
54
+ token is allowed.
55
+ """
56
+ pulumi.set(__self__, "role_name", role_name)
57
+ if backend is not None:
58
+ pulumi.set(__self__, "backend", backend)
59
+ if cidr_lists is not None:
60
+ pulumi.set(__self__, "cidr_lists", cidr_lists)
61
+ if metadata is not None:
62
+ pulumi.set(__self__, "metadata", metadata)
63
+ if namespace is not None:
64
+ pulumi.set(__self__, "namespace", namespace)
65
+ if num_uses is not None:
66
+ pulumi.set(__self__, "num_uses", num_uses)
67
+ if secret_id is not None:
68
+ pulumi.set(__self__, "secret_id", secret_id)
69
+ if ttl is not None:
70
+ pulumi.set(__self__, "ttl", ttl)
71
+ if with_wrapped_accessor is not None:
72
+ pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
73
+ if wrapping_ttl is not None:
74
+ pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
75
+
76
+ @_builtins.property
77
+ @pulumi.getter(name="roleName")
78
+ def role_name(self) -> pulumi.Input[_builtins.str]:
79
+ """
80
+ The name of the role to create the SecretID for.
81
+ """
82
+ return pulumi.get(self, "role_name")
83
+
84
+ @role_name.setter
85
+ def role_name(self, value: pulumi.Input[_builtins.str]):
86
+ pulumi.set(self, "role_name", value)
87
+
88
+ @_builtins.property
89
+ @pulumi.getter
90
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
91
+ """
92
+ Unique name of the auth backend to configure.
93
+ """
94
+ return pulumi.get(self, "backend")
95
+
96
+ @backend.setter
97
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
98
+ pulumi.set(self, "backend", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="cidrLists")
102
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
103
+ """
104
+ If set, specifies blocks of IP addresses which can
105
+ perform the login operation using this SecretID.
106
+ """
107
+ return pulumi.get(self, "cidr_lists")
108
+
109
+ @cidr_lists.setter
110
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
111
+ pulumi.set(self, "cidr_lists", value)
112
+
113
+ @_builtins.property
114
+ @pulumi.getter
115
+ def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
116
+ """
117
+ A JSON-encoded string containing metadata in
118
+ key-value pairs to be set on tokens issued with this SecretID.
119
+ """
120
+ return pulumi.get(self, "metadata")
121
+
122
+ @metadata.setter
123
+ def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
124
+ pulumi.set(self, "metadata", value)
125
+
126
+ @_builtins.property
127
+ @pulumi.getter
128
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
129
+ """
130
+ The namespace to provision the resource in.
131
+ The value should not contain leading or trailing forward slashes.
132
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
133
+ *Available only for Vault Enterprise*.
134
+ """
135
+ return pulumi.get(self, "namespace")
136
+
137
+ @namespace.setter
138
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
139
+ pulumi.set(self, "namespace", value)
140
+
141
+ @_builtins.property
142
+ @pulumi.getter(name="numUses")
143
+ def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
144
+ """
145
+ The number of uses for the secret-id.
146
+ """
147
+ return pulumi.get(self, "num_uses")
148
+
149
+ @num_uses.setter
150
+ def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
151
+ pulumi.set(self, "num_uses", value)
152
+
153
+ @_builtins.property
154
+ @pulumi.getter(name="secretId")
155
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
156
+ """
157
+ The SecretID to be created. If set, uses "Push"
158
+ mode. Defaults to Vault auto-generating SecretIDs.
159
+ """
160
+ return pulumi.get(self, "secret_id")
161
+
162
+ @secret_id.setter
163
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
164
+ pulumi.set(self, "secret_id", value)
165
+
166
+ @_builtins.property
167
+ @pulumi.getter
168
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
169
+ """
170
+ The TTL duration of the SecretID.
171
+ """
172
+ return pulumi.get(self, "ttl")
173
+
174
+ @ttl.setter
175
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
176
+ pulumi.set(self, "ttl", value)
177
+
178
+ @_builtins.property
179
+ @pulumi.getter(name="withWrappedAccessor")
180
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
181
+ """
182
+ Set to `true` to use the wrapped secret-id accessor as the resource ID.
183
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
184
+ invalidated through unwrapping.
185
+ """
186
+ return pulumi.get(self, "with_wrapped_accessor")
187
+
188
+ @with_wrapped_accessor.setter
189
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
190
+ pulumi.set(self, "with_wrapped_accessor", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter(name="wrappingTtl")
194
+ def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
195
+ """
196
+ If set, the SecretID response will be
197
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
198
+ and available for the duration specified. Only a single unwrapping of the
199
+ token is allowed.
200
+ """
201
+ return pulumi.get(self, "wrapping_ttl")
202
+
203
+ @wrapping_ttl.setter
204
+ def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
205
+ pulumi.set(self, "wrapping_ttl", value)
206
+
207
+
208
+ @pulumi.input_type
209
+ class _AuthBackendRoleSecretIdState:
210
+ def __init__(__self__, *,
211
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
212
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
213
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
215
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
216
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
217
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
218
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
219
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
220
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
221
+ wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
222
+ wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
223
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
224
+ """
225
+ Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
226
+ :param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
227
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
228
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
229
+ perform the login operation using this SecretID.
230
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
231
+ key-value pairs to be set on tokens issued with this SecretID.
232
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
233
+ The value should not contain leading or trailing forward slashes.
234
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
+ *Available only for Vault Enterprise*.
236
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
237
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
238
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
239
+ mode. Defaults to Vault auto-generating SecretIDs.
240
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
241
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
242
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
243
+ invalidated through unwrapping.
244
+ :param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
245
+ be safely logged.
246
+ :param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
247
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
248
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
249
+ and available for the duration specified. Only a single unwrapping of the
250
+ token is allowed.
251
+ """
252
+ if accessor is not None:
253
+ pulumi.set(__self__, "accessor", accessor)
254
+ if backend is not None:
255
+ pulumi.set(__self__, "backend", backend)
256
+ if cidr_lists is not None:
257
+ pulumi.set(__self__, "cidr_lists", cidr_lists)
258
+ if metadata is not None:
259
+ pulumi.set(__self__, "metadata", metadata)
260
+ if namespace is not None:
261
+ pulumi.set(__self__, "namespace", namespace)
262
+ if num_uses is not None:
263
+ pulumi.set(__self__, "num_uses", num_uses)
264
+ if role_name is not None:
265
+ pulumi.set(__self__, "role_name", role_name)
266
+ if secret_id is not None:
267
+ pulumi.set(__self__, "secret_id", secret_id)
268
+ if ttl is not None:
269
+ pulumi.set(__self__, "ttl", ttl)
270
+ if with_wrapped_accessor is not None:
271
+ pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
272
+ if wrapping_accessor is not None:
273
+ pulumi.set(__self__, "wrapping_accessor", wrapping_accessor)
274
+ if wrapping_token is not None:
275
+ pulumi.set(__self__, "wrapping_token", wrapping_token)
276
+ if wrapping_ttl is not None:
277
+ pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter
281
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
282
+ """
283
+ The unique ID for this SecretID that can be safely logged.
284
+ """
285
+ return pulumi.get(self, "accessor")
286
+
287
+ @accessor.setter
288
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
289
+ pulumi.set(self, "accessor", value)
290
+
291
+ @_builtins.property
292
+ @pulumi.getter
293
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
294
+ """
295
+ Unique name of the auth backend to configure.
296
+ """
297
+ return pulumi.get(self, "backend")
298
+
299
+ @backend.setter
300
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
301
+ pulumi.set(self, "backend", value)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter(name="cidrLists")
305
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
306
+ """
307
+ If set, specifies blocks of IP addresses which can
308
+ perform the login operation using this SecretID.
309
+ """
310
+ return pulumi.get(self, "cidr_lists")
311
+
312
+ @cidr_lists.setter
313
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
314
+ pulumi.set(self, "cidr_lists", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter
318
+ def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
319
+ """
320
+ A JSON-encoded string containing metadata in
321
+ key-value pairs to be set on tokens issued with this SecretID.
322
+ """
323
+ return pulumi.get(self, "metadata")
324
+
325
+ @metadata.setter
326
+ def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
327
+ pulumi.set(self, "metadata", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter
331
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
332
+ """
333
+ The namespace to provision the resource in.
334
+ The value should not contain leading or trailing forward slashes.
335
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
336
+ *Available only for Vault Enterprise*.
337
+ """
338
+ return pulumi.get(self, "namespace")
339
+
340
+ @namespace.setter
341
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
342
+ pulumi.set(self, "namespace", value)
343
+
344
+ @_builtins.property
345
+ @pulumi.getter(name="numUses")
346
+ def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
347
+ """
348
+ The number of uses for the secret-id.
349
+ """
350
+ return pulumi.get(self, "num_uses")
351
+
352
+ @num_uses.setter
353
+ def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
354
+ pulumi.set(self, "num_uses", value)
355
+
356
+ @_builtins.property
357
+ @pulumi.getter(name="roleName")
358
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
359
+ """
360
+ The name of the role to create the SecretID for.
361
+ """
362
+ return pulumi.get(self, "role_name")
363
+
364
+ @role_name.setter
365
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
366
+ pulumi.set(self, "role_name", value)
367
+
368
+ @_builtins.property
369
+ @pulumi.getter(name="secretId")
370
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
371
+ """
372
+ The SecretID to be created. If set, uses "Push"
373
+ mode. Defaults to Vault auto-generating SecretIDs.
374
+ """
375
+ return pulumi.get(self, "secret_id")
376
+
377
+ @secret_id.setter
378
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
379
+ pulumi.set(self, "secret_id", value)
380
+
381
+ @_builtins.property
382
+ @pulumi.getter
383
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
384
+ """
385
+ The TTL duration of the SecretID.
386
+ """
387
+ return pulumi.get(self, "ttl")
388
+
389
+ @ttl.setter
390
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
391
+ pulumi.set(self, "ttl", value)
392
+
393
+ @_builtins.property
394
+ @pulumi.getter(name="withWrappedAccessor")
395
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
396
+ """
397
+ Set to `true` to use the wrapped secret-id accessor as the resource ID.
398
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
399
+ invalidated through unwrapping.
400
+ """
401
+ return pulumi.get(self, "with_wrapped_accessor")
402
+
403
+ @with_wrapped_accessor.setter
404
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
405
+ pulumi.set(self, "with_wrapped_accessor", value)
406
+
407
+ @_builtins.property
408
+ @pulumi.getter(name="wrappingAccessor")
409
+ def wrapping_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
410
+ """
411
+ The unique ID for the response-wrapped SecretID that can
412
+ be safely logged.
413
+ """
414
+ return pulumi.get(self, "wrapping_accessor")
415
+
416
+ @wrapping_accessor.setter
417
+ def wrapping_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
418
+ pulumi.set(self, "wrapping_accessor", value)
419
+
420
+ @_builtins.property
421
+ @pulumi.getter(name="wrappingToken")
422
+ def wrapping_token(self) -> Optional[pulumi.Input[_builtins.str]]:
423
+ """
424
+ The token used to retrieve a response-wrapped SecretID.
425
+ """
426
+ return pulumi.get(self, "wrapping_token")
427
+
428
+ @wrapping_token.setter
429
+ def wrapping_token(self, value: Optional[pulumi.Input[_builtins.str]]):
430
+ pulumi.set(self, "wrapping_token", value)
431
+
432
+ @_builtins.property
433
+ @pulumi.getter(name="wrappingTtl")
434
+ def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
435
+ """
436
+ If set, the SecretID response will be
437
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
438
+ and available for the duration specified. Only a single unwrapping of the
439
+ token is allowed.
440
+ """
441
+ return pulumi.get(self, "wrapping_ttl")
442
+
443
+ @wrapping_ttl.setter
444
+ def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
445
+ pulumi.set(self, "wrapping_ttl", value)
446
+
447
+
448
+ @pulumi.type_token("vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId")
449
+ class AuthBackendRoleSecretId(pulumi.CustomResource):
450
+ @overload
451
+ def __init__(__self__,
452
+ resource_name: str,
453
+ opts: Optional[pulumi.ResourceOptions] = None,
454
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
455
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
456
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
458
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
459
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
460
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
461
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
462
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
463
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
464
+ __props__=None):
465
+ """
466
+ Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
467
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
468
+ information.
469
+
470
+ ## Example Usage
471
+
472
+ ```python
473
+ import pulumi
474
+ import json
475
+ import pulumi_vault as vault
476
+
477
+ approle = vault.AuthBackend("approle", type="approle")
478
+ example = vault.approle.AuthBackendRole("example",
479
+ backend=approle.path,
480
+ role_name="test-role",
481
+ token_policies=[
482
+ "default",
483
+ "dev",
484
+ "prod",
485
+ ])
486
+ id = vault.approle.AuthBackendRoleSecretId("id",
487
+ backend=approle.path,
488
+ role_name=example.role_name,
489
+ metadata=json.dumps({
490
+ "hello": "world",
491
+ }))
492
+ ```
493
+
494
+ :param str resource_name: The name of the resource.
495
+ :param pulumi.ResourceOptions opts: Options for the resource.
496
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
497
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
498
+ perform the login operation using this SecretID.
499
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
500
+ key-value pairs to be set on tokens issued with this SecretID.
501
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
502
+ The value should not contain leading or trailing forward slashes.
503
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
504
+ *Available only for Vault Enterprise*.
505
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
506
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
507
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
508
+ mode. Defaults to Vault auto-generating SecretIDs.
509
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
510
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
511
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
512
+ invalidated through unwrapping.
513
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
514
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
515
+ and available for the duration specified. Only a single unwrapping of the
516
+ token is allowed.
517
+ """
518
+ ...
519
+ @overload
520
+ def __init__(__self__,
521
+ resource_name: str,
522
+ args: AuthBackendRoleSecretIdArgs,
523
+ opts: Optional[pulumi.ResourceOptions] = None):
524
+ """
525
+ Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
526
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
527
+ information.
528
+
529
+ ## Example Usage
530
+
531
+ ```python
532
+ import pulumi
533
+ import json
534
+ import pulumi_vault as vault
535
+
536
+ approle = vault.AuthBackend("approle", type="approle")
537
+ example = vault.approle.AuthBackendRole("example",
538
+ backend=approle.path,
539
+ role_name="test-role",
540
+ token_policies=[
541
+ "default",
542
+ "dev",
543
+ "prod",
544
+ ])
545
+ id = vault.approle.AuthBackendRoleSecretId("id",
546
+ backend=approle.path,
547
+ role_name=example.role_name,
548
+ metadata=json.dumps({
549
+ "hello": "world",
550
+ }))
551
+ ```
552
+
553
+ :param str resource_name: The name of the resource.
554
+ :param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
555
+ :param pulumi.ResourceOptions opts: Options for the resource.
556
+ """
557
+ ...
558
+ def __init__(__self__, resource_name: str, *args, **kwargs):
559
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleSecretIdArgs, pulumi.ResourceOptions, *args, **kwargs)
560
+ if resource_args is not None:
561
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
562
+ else:
563
+ __self__._internal_init(resource_name, *args, **kwargs)
564
+
565
+ def _internal_init(__self__,
566
+ resource_name: str,
567
+ opts: Optional[pulumi.ResourceOptions] = None,
568
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
569
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
571
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
572
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
573
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
574
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
575
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
576
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
578
+ __props__=None):
579
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
580
+ if not isinstance(opts, pulumi.ResourceOptions):
581
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
582
+ if opts.id is None:
583
+ if __props__ is not None:
584
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
585
+ __props__ = AuthBackendRoleSecretIdArgs.__new__(AuthBackendRoleSecretIdArgs)
586
+
587
+ __props__.__dict__["backend"] = backend
588
+ __props__.__dict__["cidr_lists"] = cidr_lists
589
+ __props__.__dict__["metadata"] = metadata
590
+ __props__.__dict__["namespace"] = namespace
591
+ __props__.__dict__["num_uses"] = num_uses
592
+ if role_name is None and not opts.urn:
593
+ raise TypeError("Missing required property 'role_name'")
594
+ __props__.__dict__["role_name"] = role_name
595
+ __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
596
+ __props__.__dict__["ttl"] = ttl
597
+ __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
598
+ __props__.__dict__["wrapping_ttl"] = wrapping_ttl
599
+ __props__.__dict__["accessor"] = None
600
+ __props__.__dict__["wrapping_accessor"] = None
601
+ __props__.__dict__["wrapping_token"] = None
602
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="vault:appRole/authBackendRoleSecretID:AuthBackendRoleSecretID")])
603
+ opts = pulumi.ResourceOptions.merge(opts, alias_opts)
604
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["secretId", "wrappingToken"])
605
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
606
+ super(AuthBackendRoleSecretId, __self__).__init__(
607
+ 'vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId',
608
+ resource_name,
609
+ __props__,
610
+ opts)
611
+
612
+ @staticmethod
613
+ def get(resource_name: str,
614
+ id: pulumi.Input[str],
615
+ opts: Optional[pulumi.ResourceOptions] = None,
616
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
617
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
618
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
619
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
620
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
621
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
622
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
623
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
624
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
625
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
626
+ wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
627
+ wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
628
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleSecretId':
629
+ """
630
+ Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
631
+ properties used to qualify the lookup.
632
+
633
+ :param str resource_name: The unique name of the resulting resource.
634
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
635
+ :param pulumi.ResourceOptions opts: Options for the resource.
636
+ :param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
637
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
638
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
639
+ perform the login operation using this SecretID.
640
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
641
+ key-value pairs to be set on tokens issued with this SecretID.
642
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
643
+ The value should not contain leading or trailing forward slashes.
644
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
645
+ *Available only for Vault Enterprise*.
646
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
647
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
648
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
649
+ mode. Defaults to Vault auto-generating SecretIDs.
650
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
651
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
652
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
653
+ invalidated through unwrapping.
654
+ :param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
655
+ be safely logged.
656
+ :param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
657
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
658
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
659
+ and available for the duration specified. Only a single unwrapping of the
660
+ token is allowed.
661
+ """
662
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
663
+
664
+ __props__ = _AuthBackendRoleSecretIdState.__new__(_AuthBackendRoleSecretIdState)
665
+
666
+ __props__.__dict__["accessor"] = accessor
667
+ __props__.__dict__["backend"] = backend
668
+ __props__.__dict__["cidr_lists"] = cidr_lists
669
+ __props__.__dict__["metadata"] = metadata
670
+ __props__.__dict__["namespace"] = namespace
671
+ __props__.__dict__["num_uses"] = num_uses
672
+ __props__.__dict__["role_name"] = role_name
673
+ __props__.__dict__["secret_id"] = secret_id
674
+ __props__.__dict__["ttl"] = ttl
675
+ __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
676
+ __props__.__dict__["wrapping_accessor"] = wrapping_accessor
677
+ __props__.__dict__["wrapping_token"] = wrapping_token
678
+ __props__.__dict__["wrapping_ttl"] = wrapping_ttl
679
+ return AuthBackendRoleSecretId(resource_name, opts=opts, __props__=__props__)
680
+
681
+ @_builtins.property
682
+ @pulumi.getter
683
+ def accessor(self) -> pulumi.Output[_builtins.str]:
684
+ """
685
+ The unique ID for this SecretID that can be safely logged.
686
+ """
687
+ return pulumi.get(self, "accessor")
688
+
689
+ @_builtins.property
690
+ @pulumi.getter
691
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
692
+ """
693
+ Unique name of the auth backend to configure.
694
+ """
695
+ return pulumi.get(self, "backend")
696
+
697
+ @_builtins.property
698
+ @pulumi.getter(name="cidrLists")
699
+ def cidr_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
700
+ """
701
+ If set, specifies blocks of IP addresses which can
702
+ perform the login operation using this SecretID.
703
+ """
704
+ return pulumi.get(self, "cidr_lists")
705
+
706
+ @_builtins.property
707
+ @pulumi.getter
708
+ def metadata(self) -> pulumi.Output[Optional[_builtins.str]]:
709
+ """
710
+ A JSON-encoded string containing metadata in
711
+ key-value pairs to be set on tokens issued with this SecretID.
712
+ """
713
+ return pulumi.get(self, "metadata")
714
+
715
+ @_builtins.property
716
+ @pulumi.getter
717
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
718
+ """
719
+ The namespace to provision the resource in.
720
+ The value should not contain leading or trailing forward slashes.
721
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
722
+ *Available only for Vault Enterprise*.
723
+ """
724
+ return pulumi.get(self, "namespace")
725
+
726
+ @_builtins.property
727
+ @pulumi.getter(name="numUses")
728
+ def num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
729
+ """
730
+ The number of uses for the secret-id.
731
+ """
732
+ return pulumi.get(self, "num_uses")
733
+
734
+ @_builtins.property
735
+ @pulumi.getter(name="roleName")
736
+ def role_name(self) -> pulumi.Output[_builtins.str]:
737
+ """
738
+ The name of the role to create the SecretID for.
739
+ """
740
+ return pulumi.get(self, "role_name")
741
+
742
+ @_builtins.property
743
+ @pulumi.getter(name="secretId")
744
+ def secret_id(self) -> pulumi.Output[_builtins.str]:
745
+ """
746
+ The SecretID to be created. If set, uses "Push"
747
+ mode. Defaults to Vault auto-generating SecretIDs.
748
+ """
749
+ return pulumi.get(self, "secret_id")
750
+
751
+ @_builtins.property
752
+ @pulumi.getter
753
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
754
+ """
755
+ The TTL duration of the SecretID.
756
+ """
757
+ return pulumi.get(self, "ttl")
758
+
759
+ @_builtins.property
760
+ @pulumi.getter(name="withWrappedAccessor")
761
+ def with_wrapped_accessor(self) -> pulumi.Output[Optional[_builtins.bool]]:
762
+ """
763
+ Set to `true` to use the wrapped secret-id accessor as the resource ID.
764
+ If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
765
+ invalidated through unwrapping.
766
+ """
767
+ return pulumi.get(self, "with_wrapped_accessor")
768
+
769
+ @_builtins.property
770
+ @pulumi.getter(name="wrappingAccessor")
771
+ def wrapping_accessor(self) -> pulumi.Output[_builtins.str]:
772
+ """
773
+ The unique ID for the response-wrapped SecretID that can
774
+ be safely logged.
775
+ """
776
+ return pulumi.get(self, "wrapping_accessor")
777
+
778
+ @_builtins.property
779
+ @pulumi.getter(name="wrappingToken")
780
+ def wrapping_token(self) -> pulumi.Output[_builtins.str]:
781
+ """
782
+ The token used to retrieve a response-wrapped SecretID.
783
+ """
784
+ return pulumi.get(self, "wrapping_token")
785
+
786
+ @_builtins.property
787
+ @pulumi.getter(name="wrappingTtl")
788
+ def wrapping_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
789
+ """
790
+ If set, the SecretID response will be
791
+ [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
792
+ and available for the duration specified. Only a single unwrapping of the
793
+ token is allowed.
794
+ """
795
+ return pulumi.get(self, "wrapping_ttl")
796
+