pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,552 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendLibrarySetArgs:
21
+ def __init__(__self__, *,
22
+ service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
25
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
29
+ """
30
+ The set of arguments for constructing a SecretBackendLibrarySet resource.
31
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
32
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
33
+ accounts must be checked in by the entity or client token that checked them
34
+ out. Defaults to false.
35
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
36
+ to the configuration max_ttl if not provided.
37
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
38
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
39
+ Must be unique within the backend.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
45
+ ttl if not provided.
46
+ """
47
+ pulumi.set(__self__, "service_account_names", service_account_names)
48
+ if disable_check_in_enforcement is not None:
49
+ pulumi.set(__self__, "disable_check_in_enforcement", disable_check_in_enforcement)
50
+ if max_ttl is not None:
51
+ pulumi.set(__self__, "max_ttl", max_ttl)
52
+ if mount is not None:
53
+ pulumi.set(__self__, "mount", mount)
54
+ if name is not None:
55
+ pulumi.set(__self__, "name", name)
56
+ if namespace is not None:
57
+ pulumi.set(__self__, "namespace", namespace)
58
+ if ttl is not None:
59
+ pulumi.set(__self__, "ttl", ttl)
60
+
61
+ @_builtins.property
62
+ @pulumi.getter(name="serviceAccountNames")
63
+ def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
64
+ """
65
+ Specifies the slice of service accounts mapped to this set.
66
+ """
67
+ return pulumi.get(self, "service_account_names")
68
+
69
+ @service_account_names.setter
70
+ def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
71
+ pulumi.set(self, "service_account_names", value)
72
+
73
+ @_builtins.property
74
+ @pulumi.getter(name="disableCheckInEnforcement")
75
+ def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
76
+ """
77
+ Disable enforcing that service
78
+ accounts must be checked in by the entity or client token that checked them
79
+ out. Defaults to false.
80
+ """
81
+ return pulumi.get(self, "disable_check_in_enforcement")
82
+
83
+ @disable_check_in_enforcement.setter
84
+ def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
85
+ pulumi.set(self, "disable_check_in_enforcement", value)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter(name="maxTtl")
89
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
90
+ """
91
+ The maximum password time-to-live in seconds. Defaults
92
+ to the configuration max_ttl if not provided.
93
+ """
94
+ return pulumi.get(self, "max_ttl")
95
+
96
+ @max_ttl.setter
97
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
98
+ pulumi.set(self, "max_ttl", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter
102
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
103
+ """
104
+ The path where the LDAP secrets backend is mounted.
105
+ """
106
+ return pulumi.get(self, "mount")
107
+
108
+ @mount.setter
109
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
110
+ pulumi.set(self, "mount", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter
114
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
115
+ """
116
+ The name to identify this set of service accounts.
117
+ Must be unique within the backend.
118
+ """
119
+ return pulumi.get(self, "name")
120
+
121
+ @name.setter
122
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
123
+ pulumi.set(self, "name", value)
124
+
125
+ @_builtins.property
126
+ @pulumi.getter
127
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
128
+ """
129
+ The namespace to provision the resource in.
130
+ The value should not contain leading or trailing forward slashes.
131
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
+ *Available only for Vault Enterprise*.
133
+ """
134
+ return pulumi.get(self, "namespace")
135
+
136
+ @namespace.setter
137
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
138
+ pulumi.set(self, "namespace", value)
139
+
140
+ @_builtins.property
141
+ @pulumi.getter
142
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
143
+ """
144
+ The password time-to-live in seconds. Defaults to the configuration
145
+ ttl if not provided.
146
+ """
147
+ return pulumi.get(self, "ttl")
148
+
149
+ @ttl.setter
150
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
151
+ pulumi.set(self, "ttl", value)
152
+
153
+
154
+ @pulumi.input_type
155
+ class _SecretBackendLibrarySetState:
156
+ def __init__(__self__, *,
157
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
158
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
159
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
160
+ name: Optional[pulumi.Input[_builtins.str]] = None,
161
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
162
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
163
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
164
+ """
165
+ Input properties used for looking up and filtering SecretBackendLibrarySet resources.
166
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
167
+ accounts must be checked in by the entity or client token that checked them
168
+ out. Defaults to false.
169
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
170
+ to the configuration max_ttl if not provided.
171
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
172
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
173
+ Must be unique within the backend.
174
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
175
+ The value should not contain leading or trailing forward slashes.
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
+ *Available only for Vault Enterprise*.
178
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
179
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
180
+ ttl if not provided.
181
+ """
182
+ if disable_check_in_enforcement is not None:
183
+ pulumi.set(__self__, "disable_check_in_enforcement", disable_check_in_enforcement)
184
+ if max_ttl is not None:
185
+ pulumi.set(__self__, "max_ttl", max_ttl)
186
+ if mount is not None:
187
+ pulumi.set(__self__, "mount", mount)
188
+ if name is not None:
189
+ pulumi.set(__self__, "name", name)
190
+ if namespace is not None:
191
+ pulumi.set(__self__, "namespace", namespace)
192
+ if service_account_names is not None:
193
+ pulumi.set(__self__, "service_account_names", service_account_names)
194
+ if ttl is not None:
195
+ pulumi.set(__self__, "ttl", ttl)
196
+
197
+ @_builtins.property
198
+ @pulumi.getter(name="disableCheckInEnforcement")
199
+ def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
200
+ """
201
+ Disable enforcing that service
202
+ accounts must be checked in by the entity or client token that checked them
203
+ out. Defaults to false.
204
+ """
205
+ return pulumi.get(self, "disable_check_in_enforcement")
206
+
207
+ @disable_check_in_enforcement.setter
208
+ def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
209
+ pulumi.set(self, "disable_check_in_enforcement", value)
210
+
211
+ @_builtins.property
212
+ @pulumi.getter(name="maxTtl")
213
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
214
+ """
215
+ The maximum password time-to-live in seconds. Defaults
216
+ to the configuration max_ttl if not provided.
217
+ """
218
+ return pulumi.get(self, "max_ttl")
219
+
220
+ @max_ttl.setter
221
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
222
+ pulumi.set(self, "max_ttl", value)
223
+
224
+ @_builtins.property
225
+ @pulumi.getter
226
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
227
+ """
228
+ The path where the LDAP secrets backend is mounted.
229
+ """
230
+ return pulumi.get(self, "mount")
231
+
232
+ @mount.setter
233
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
234
+ pulumi.set(self, "mount", value)
235
+
236
+ @_builtins.property
237
+ @pulumi.getter
238
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
239
+ """
240
+ The name to identify this set of service accounts.
241
+ Must be unique within the backend.
242
+ """
243
+ return pulumi.get(self, "name")
244
+
245
+ @name.setter
246
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
247
+ pulumi.set(self, "name", value)
248
+
249
+ @_builtins.property
250
+ @pulumi.getter
251
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
252
+ """
253
+ The namespace to provision the resource in.
254
+ The value should not contain leading or trailing forward slashes.
255
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
+ *Available only for Vault Enterprise*.
257
+ """
258
+ return pulumi.get(self, "namespace")
259
+
260
+ @namespace.setter
261
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
262
+ pulumi.set(self, "namespace", value)
263
+
264
+ @_builtins.property
265
+ @pulumi.getter(name="serviceAccountNames")
266
+ def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
267
+ """
268
+ Specifies the slice of service accounts mapped to this set.
269
+ """
270
+ return pulumi.get(self, "service_account_names")
271
+
272
+ @service_account_names.setter
273
+ def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
274
+ pulumi.set(self, "service_account_names", value)
275
+
276
+ @_builtins.property
277
+ @pulumi.getter
278
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
279
+ """
280
+ The password time-to-live in seconds. Defaults to the configuration
281
+ ttl if not provided.
282
+ """
283
+ return pulumi.get(self, "ttl")
284
+
285
+ @ttl.setter
286
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
287
+ pulumi.set(self, "ttl", value)
288
+
289
+
290
+ @pulumi.type_token("vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet")
291
+ class SecretBackendLibrarySet(pulumi.CustomResource):
292
+ @overload
293
+ def __init__(__self__,
294
+ resource_name: str,
295
+ opts: Optional[pulumi.ResourceOptions] = None,
296
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
297
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
298
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
299
+ name: Optional[pulumi.Input[_builtins.str]] = None,
300
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
301
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
302
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
303
+ __props__=None):
304
+ """
305
+ ## Example Usage
306
+
307
+ ```python
308
+ import pulumi
309
+ import pulumi_vault as vault
310
+
311
+ config = vault.ldap.SecretBackend("config",
312
+ path="ldap",
313
+ binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
314
+ bindpass="SuperSecretPassw0rd",
315
+ url="ldaps://localhost",
316
+ insecure_tls=True,
317
+ userdn="CN=Users,DC=corp,DC=example,DC=net")
318
+ qa = vault.ldap.SecretBackendLibrarySet("qa",
319
+ mount=config.path,
320
+ name="qa",
321
+ service_account_names=[
322
+ "Bob",
323
+ "Mary",
324
+ ],
325
+ ttl=60,
326
+ disable_check_in_enforcement=True,
327
+ max_ttl=120)
328
+ ```
329
+
330
+ ## Import
331
+
332
+ LDAP secret backend libraries can be imported using the `path`, e.g.
333
+
334
+ ```sh
335
+ $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
336
+ ```
337
+
338
+ :param str resource_name: The name of the resource.
339
+ :param pulumi.ResourceOptions opts: Options for the resource.
340
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
341
+ accounts must be checked in by the entity or client token that checked them
342
+ out. Defaults to false.
343
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
344
+ to the configuration max_ttl if not provided.
345
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
346
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
347
+ Must be unique within the backend.
348
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
349
+ The value should not contain leading or trailing forward slashes.
350
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
351
+ *Available only for Vault Enterprise*.
352
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
353
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
354
+ ttl if not provided.
355
+ """
356
+ ...
357
+ @overload
358
+ def __init__(__self__,
359
+ resource_name: str,
360
+ args: SecretBackendLibrarySetArgs,
361
+ opts: Optional[pulumi.ResourceOptions] = None):
362
+ """
363
+ ## Example Usage
364
+
365
+ ```python
366
+ import pulumi
367
+ import pulumi_vault as vault
368
+
369
+ config = vault.ldap.SecretBackend("config",
370
+ path="ldap",
371
+ binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
372
+ bindpass="SuperSecretPassw0rd",
373
+ url="ldaps://localhost",
374
+ insecure_tls=True,
375
+ userdn="CN=Users,DC=corp,DC=example,DC=net")
376
+ qa = vault.ldap.SecretBackendLibrarySet("qa",
377
+ mount=config.path,
378
+ name="qa",
379
+ service_account_names=[
380
+ "Bob",
381
+ "Mary",
382
+ ],
383
+ ttl=60,
384
+ disable_check_in_enforcement=True,
385
+ max_ttl=120)
386
+ ```
387
+
388
+ ## Import
389
+
390
+ LDAP secret backend libraries can be imported using the `path`, e.g.
391
+
392
+ ```sh
393
+ $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
394
+ ```
395
+
396
+ :param str resource_name: The name of the resource.
397
+ :param SecretBackendLibrarySetArgs args: The arguments to use to populate this resource's properties.
398
+ :param pulumi.ResourceOptions opts: Options for the resource.
399
+ """
400
+ ...
401
+ def __init__(__self__, resource_name: str, *args, **kwargs):
402
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendLibrarySetArgs, pulumi.ResourceOptions, *args, **kwargs)
403
+ if resource_args is not None:
404
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
405
+ else:
406
+ __self__._internal_init(resource_name, *args, **kwargs)
407
+
408
+ def _internal_init(__self__,
409
+ resource_name: str,
410
+ opts: Optional[pulumi.ResourceOptions] = None,
411
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
412
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
413
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
414
+ name: Optional[pulumi.Input[_builtins.str]] = None,
415
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
416
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
417
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
418
+ __props__=None):
419
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
420
+ if not isinstance(opts, pulumi.ResourceOptions):
421
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
422
+ if opts.id is None:
423
+ if __props__ is not None:
424
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
425
+ __props__ = SecretBackendLibrarySetArgs.__new__(SecretBackendLibrarySetArgs)
426
+
427
+ __props__.__dict__["disable_check_in_enforcement"] = disable_check_in_enforcement
428
+ __props__.__dict__["max_ttl"] = max_ttl
429
+ __props__.__dict__["mount"] = mount
430
+ __props__.__dict__["name"] = name
431
+ __props__.__dict__["namespace"] = namespace
432
+ if service_account_names is None and not opts.urn:
433
+ raise TypeError("Missing required property 'service_account_names'")
434
+ __props__.__dict__["service_account_names"] = service_account_names
435
+ __props__.__dict__["ttl"] = ttl
436
+ super(SecretBackendLibrarySet, __self__).__init__(
437
+ 'vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet',
438
+ resource_name,
439
+ __props__,
440
+ opts)
441
+
442
+ @staticmethod
443
+ def get(resource_name: str,
444
+ id: pulumi.Input[str],
445
+ opts: Optional[pulumi.ResourceOptions] = None,
446
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
447
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
448
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
449
+ name: Optional[pulumi.Input[_builtins.str]] = None,
450
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
451
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
452
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendLibrarySet':
453
+ """
454
+ Get an existing SecretBackendLibrarySet resource's state with the given name, id, and optional extra
455
+ properties used to qualify the lookup.
456
+
457
+ :param str resource_name: The unique name of the resulting resource.
458
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
459
+ :param pulumi.ResourceOptions opts: Options for the resource.
460
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
461
+ accounts must be checked in by the entity or client token that checked them
462
+ out. Defaults to false.
463
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
464
+ to the configuration max_ttl if not provided.
465
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
466
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
467
+ Must be unique within the backend.
468
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
469
+ The value should not contain leading or trailing forward slashes.
470
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
471
+ *Available only for Vault Enterprise*.
472
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
473
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
474
+ ttl if not provided.
475
+ """
476
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
477
+
478
+ __props__ = _SecretBackendLibrarySetState.__new__(_SecretBackendLibrarySetState)
479
+
480
+ __props__.__dict__["disable_check_in_enforcement"] = disable_check_in_enforcement
481
+ __props__.__dict__["max_ttl"] = max_ttl
482
+ __props__.__dict__["mount"] = mount
483
+ __props__.__dict__["name"] = name
484
+ __props__.__dict__["namespace"] = namespace
485
+ __props__.__dict__["service_account_names"] = service_account_names
486
+ __props__.__dict__["ttl"] = ttl
487
+ return SecretBackendLibrarySet(resource_name, opts=opts, __props__=__props__)
488
+
489
+ @_builtins.property
490
+ @pulumi.getter(name="disableCheckInEnforcement")
491
+ def disable_check_in_enforcement(self) -> pulumi.Output[Optional[_builtins.bool]]:
492
+ """
493
+ Disable enforcing that service
494
+ accounts must be checked in by the entity or client token that checked them
495
+ out. Defaults to false.
496
+ """
497
+ return pulumi.get(self, "disable_check_in_enforcement")
498
+
499
+ @_builtins.property
500
+ @pulumi.getter(name="maxTtl")
501
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
502
+ """
503
+ The maximum password time-to-live in seconds. Defaults
504
+ to the configuration max_ttl if not provided.
505
+ """
506
+ return pulumi.get(self, "max_ttl")
507
+
508
+ @_builtins.property
509
+ @pulumi.getter
510
+ def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
511
+ """
512
+ The path where the LDAP secrets backend is mounted.
513
+ """
514
+ return pulumi.get(self, "mount")
515
+
516
+ @_builtins.property
517
+ @pulumi.getter
518
+ def name(self) -> pulumi.Output[_builtins.str]:
519
+ """
520
+ The name to identify this set of service accounts.
521
+ Must be unique within the backend.
522
+ """
523
+ return pulumi.get(self, "name")
524
+
525
+ @_builtins.property
526
+ @pulumi.getter
527
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
528
+ """
529
+ The namespace to provision the resource in.
530
+ The value should not contain leading or trailing forward slashes.
531
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
532
+ *Available only for Vault Enterprise*.
533
+ """
534
+ return pulumi.get(self, "namespace")
535
+
536
+ @_builtins.property
537
+ @pulumi.getter(name="serviceAccountNames")
538
+ def service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
539
+ """
540
+ Specifies the slice of service accounts mapped to this set.
541
+ """
542
+ return pulumi.get(self, "service_account_names")
543
+
544
+ @_builtins.property
545
+ @pulumi.getter
546
+ def ttl(self) -> pulumi.Output[_builtins.int]:
547
+ """
548
+ The password time-to-live in seconds. Defaults to the configuration
549
+ ttl if not provided.
550
+ """
551
+ return pulumi.get(self, "ttl")
552
+