pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,489 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
18
+
19
+ @pulumi.input_type
20
+ class NomadSecretRoleArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ type: Optional[pulumi.Input[_builtins.str]] = None):
28
+ """
29
+ The set of arguments for constructing a NomadSecretRole resource.
30
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
31
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
32
+ Must be unique within the backend.
33
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
34
+ false.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
+ The value should not contain leading or trailing forward slashes.
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
+ *Available only for Vault Enterprise*.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
40
+ when `type` is 'client'.
41
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
42
+ settings are 'client' and 'management'. Defaults to 'client'.
43
+ """
44
+ pulumi.set(__self__, "backend", backend)
45
+ pulumi.set(__self__, "role", role)
46
+ if global_ is not None:
47
+ pulumi.set(__self__, "global_", global_)
48
+ if namespace is not None:
49
+ pulumi.set(__self__, "namespace", namespace)
50
+ if policies is not None:
51
+ pulumi.set(__self__, "policies", policies)
52
+ if type is not None:
53
+ pulumi.set(__self__, "type", type)
54
+
55
+ @_builtins.property
56
+ @pulumi.getter
57
+ def backend(self) -> pulumi.Input[_builtins.str]:
58
+ """
59
+ The unique path this backend should be mounted at.
60
+ """
61
+ return pulumi.get(self, "backend")
62
+
63
+ @backend.setter
64
+ def backend(self, value: pulumi.Input[_builtins.str]):
65
+ pulumi.set(self, "backend", value)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter
69
+ def role(self) -> pulumi.Input[_builtins.str]:
70
+ """
71
+ The name to identify this role within the backend.
72
+ Must be unique within the backend.
73
+ """
74
+ return pulumi.get(self, "role")
75
+
76
+ @role.setter
77
+ def role(self, value: pulumi.Input[_builtins.str]):
78
+ pulumi.set(self, "role", value)
79
+
80
+ @_builtins.property
81
+ @pulumi.getter(name="global")
82
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
83
+ """
84
+ Specifies if the generated token should be global. Defaults to
85
+ false.
86
+ """
87
+ return pulumi.get(self, "global_")
88
+
89
+ @global_.setter
90
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
91
+ pulumi.set(self, "global_", value)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
96
+ """
97
+ The namespace to provision the resource in.
98
+ The value should not contain leading or trailing forward slashes.
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
100
+ *Available only for Vault Enterprise*.
101
+ """
102
+ return pulumi.get(self, "namespace")
103
+
104
+ @namespace.setter
105
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
106
+ pulumi.set(self, "namespace", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter
110
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
111
+ """
112
+ List of policies attached to the generated token. This setting is only used
113
+ when `type` is 'client'.
114
+ """
115
+ return pulumi.get(self, "policies")
116
+
117
+ @policies.setter
118
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
119
+ pulumi.set(self, "policies", value)
120
+
121
+ @_builtins.property
122
+ @pulumi.getter
123
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
124
+ """
125
+ Specifies the type of token to create when using this role. Valid
126
+ settings are 'client' and 'management'. Defaults to 'client'.
127
+ """
128
+ return pulumi.get(self, "type")
129
+
130
+ @type.setter
131
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
132
+ pulumi.set(self, "type", value)
133
+
134
+
135
+ @pulumi.input_type
136
+ class _NomadSecretRoleState:
137
+ def __init__(__self__, *,
138
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
139
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
140
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
141
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
142
+ role: Optional[pulumi.Input[_builtins.str]] = None,
143
+ type: Optional[pulumi.Input[_builtins.str]] = None):
144
+ """
145
+ Input properties used for looking up and filtering NomadSecretRole resources.
146
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
147
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
148
+ false.
149
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
150
+ The value should not contain leading or trailing forward slashes.
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
+ *Available only for Vault Enterprise*.
153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
154
+ when `type` is 'client'.
155
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
156
+ Must be unique within the backend.
157
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
158
+ settings are 'client' and 'management'. Defaults to 'client'.
159
+ """
160
+ if backend is not None:
161
+ pulumi.set(__self__, "backend", backend)
162
+ if global_ is not None:
163
+ pulumi.set(__self__, "global_", global_)
164
+ if namespace is not None:
165
+ pulumi.set(__self__, "namespace", namespace)
166
+ if policies is not None:
167
+ pulumi.set(__self__, "policies", policies)
168
+ if role is not None:
169
+ pulumi.set(__self__, "role", role)
170
+ if type is not None:
171
+ pulumi.set(__self__, "type", type)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter
175
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
176
+ """
177
+ The unique path this backend should be mounted at.
178
+ """
179
+ return pulumi.get(self, "backend")
180
+
181
+ @backend.setter
182
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
183
+ pulumi.set(self, "backend", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="global")
187
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
188
+ """
189
+ Specifies if the generated token should be global. Defaults to
190
+ false.
191
+ """
192
+ return pulumi.get(self, "global_")
193
+
194
+ @global_.setter
195
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
196
+ pulumi.set(self, "global_", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter
200
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
201
+ """
202
+ The namespace to provision the resource in.
203
+ The value should not contain leading or trailing forward slashes.
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
205
+ *Available only for Vault Enterprise*.
206
+ """
207
+ return pulumi.get(self, "namespace")
208
+
209
+ @namespace.setter
210
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
211
+ pulumi.set(self, "namespace", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter
215
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ List of policies attached to the generated token. This setting is only used
218
+ when `type` is 'client'.
219
+ """
220
+ return pulumi.get(self, "policies")
221
+
222
+ @policies.setter
223
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
224
+ pulumi.set(self, "policies", value)
225
+
226
+ @_builtins.property
227
+ @pulumi.getter
228
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
229
+ """
230
+ The name to identify this role within the backend.
231
+ Must be unique within the backend.
232
+ """
233
+ return pulumi.get(self, "role")
234
+
235
+ @role.setter
236
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
237
+ pulumi.set(self, "role", value)
238
+
239
+ @_builtins.property
240
+ @pulumi.getter
241
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
242
+ """
243
+ Specifies the type of token to create when using this role. Valid
244
+ settings are 'client' and 'management'. Defaults to 'client'.
245
+ """
246
+ return pulumi.get(self, "type")
247
+
248
+ @type.setter
249
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
250
+ pulumi.set(self, "type", value)
251
+
252
+
253
+ @pulumi.type_token("vault:index/nomadSecretRole:NomadSecretRole")
254
+ class NomadSecretRole(pulumi.CustomResource):
255
+ @overload
256
+ def __init__(__self__,
257
+ resource_name: str,
258
+ opts: Optional[pulumi.ResourceOptions] = None,
259
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
260
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
261
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
262
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
263
+ role: Optional[pulumi.Input[_builtins.str]] = None,
264
+ type: Optional[pulumi.Input[_builtins.str]] = None,
265
+ __props__=None):
266
+ """
267
+ ## Example Usage
268
+
269
+ ```python
270
+ import pulumi
271
+ import pulumi_vault as vault
272
+
273
+ config = vault.NomadSecretBackend("config",
274
+ backend="nomad",
275
+ description="test description",
276
+ default_lease_ttl_seconds=3600,
277
+ max_lease_ttl_seconds=7200,
278
+ address="https://127.0.0.1:4646",
279
+ token="ae20ceaa-...")
280
+ test = vault.NomadSecretRole("test",
281
+ backend=config.backend,
282
+ role="test",
283
+ type="client",
284
+ policies=["readonly"])
285
+ ```
286
+
287
+ ## Import
288
+
289
+ Nomad secret role can be imported using the `backend`, e.g.
290
+
291
+ ```sh
292
+ $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
293
+ ```
294
+
295
+ :param str resource_name: The name of the resource.
296
+ :param pulumi.ResourceOptions opts: Options for the resource.
297
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
298
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
299
+ false.
300
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
301
+ The value should not contain leading or trailing forward slashes.
302
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
303
+ *Available only for Vault Enterprise*.
304
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
305
+ when `type` is 'client'.
306
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
307
+ Must be unique within the backend.
308
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
309
+ settings are 'client' and 'management'. Defaults to 'client'.
310
+ """
311
+ ...
312
+ @overload
313
+ def __init__(__self__,
314
+ resource_name: str,
315
+ args: NomadSecretRoleArgs,
316
+ opts: Optional[pulumi.ResourceOptions] = None):
317
+ """
318
+ ## Example Usage
319
+
320
+ ```python
321
+ import pulumi
322
+ import pulumi_vault as vault
323
+
324
+ config = vault.NomadSecretBackend("config",
325
+ backend="nomad",
326
+ description="test description",
327
+ default_lease_ttl_seconds=3600,
328
+ max_lease_ttl_seconds=7200,
329
+ address="https://127.0.0.1:4646",
330
+ token="ae20ceaa-...")
331
+ test = vault.NomadSecretRole("test",
332
+ backend=config.backend,
333
+ role="test",
334
+ type="client",
335
+ policies=["readonly"])
336
+ ```
337
+
338
+ ## Import
339
+
340
+ Nomad secret role can be imported using the `backend`, e.g.
341
+
342
+ ```sh
343
+ $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
344
+ ```
345
+
346
+ :param str resource_name: The name of the resource.
347
+ :param NomadSecretRoleArgs args: The arguments to use to populate this resource's properties.
348
+ :param pulumi.ResourceOptions opts: Options for the resource.
349
+ """
350
+ ...
351
+ def __init__(__self__, resource_name: str, *args, **kwargs):
352
+ resource_args, opts = _utilities.get_resource_args_opts(NomadSecretRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
353
+ if resource_args is not None:
354
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
355
+ else:
356
+ __self__._internal_init(resource_name, *args, **kwargs)
357
+
358
+ def _internal_init(__self__,
359
+ resource_name: str,
360
+ opts: Optional[pulumi.ResourceOptions] = None,
361
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
362
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
365
+ role: Optional[pulumi.Input[_builtins.str]] = None,
366
+ type: Optional[pulumi.Input[_builtins.str]] = None,
367
+ __props__=None):
368
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
369
+ if not isinstance(opts, pulumi.ResourceOptions):
370
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
371
+ if opts.id is None:
372
+ if __props__ is not None:
373
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
374
+ __props__ = NomadSecretRoleArgs.__new__(NomadSecretRoleArgs)
375
+
376
+ if backend is None and not opts.urn:
377
+ raise TypeError("Missing required property 'backend'")
378
+ __props__.__dict__["backend"] = backend
379
+ __props__.__dict__["global_"] = global_
380
+ __props__.__dict__["namespace"] = namespace
381
+ __props__.__dict__["policies"] = policies
382
+ if role is None and not opts.urn:
383
+ raise TypeError("Missing required property 'role'")
384
+ __props__.__dict__["role"] = role
385
+ __props__.__dict__["type"] = type
386
+ super(NomadSecretRole, __self__).__init__(
387
+ 'vault:index/nomadSecretRole:NomadSecretRole',
388
+ resource_name,
389
+ __props__,
390
+ opts)
391
+
392
+ @staticmethod
393
+ def get(resource_name: str,
394
+ id: pulumi.Input[str],
395
+ opts: Optional[pulumi.ResourceOptions] = None,
396
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
397
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
398
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
399
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
400
+ role: Optional[pulumi.Input[_builtins.str]] = None,
401
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'NomadSecretRole':
402
+ """
403
+ Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
404
+ properties used to qualify the lookup.
405
+
406
+ :param str resource_name: The unique name of the resulting resource.
407
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
408
+ :param pulumi.ResourceOptions opts: Options for the resource.
409
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
410
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
411
+ false.
412
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
413
+ The value should not contain leading or trailing forward slashes.
414
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
415
+ *Available only for Vault Enterprise*.
416
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
417
+ when `type` is 'client'.
418
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
419
+ Must be unique within the backend.
420
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
421
+ settings are 'client' and 'management'. Defaults to 'client'.
422
+ """
423
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
424
+
425
+ __props__ = _NomadSecretRoleState.__new__(_NomadSecretRoleState)
426
+
427
+ __props__.__dict__["backend"] = backend
428
+ __props__.__dict__["global_"] = global_
429
+ __props__.__dict__["namespace"] = namespace
430
+ __props__.__dict__["policies"] = policies
431
+ __props__.__dict__["role"] = role
432
+ __props__.__dict__["type"] = type
433
+ return NomadSecretRole(resource_name, opts=opts, __props__=__props__)
434
+
435
+ @_builtins.property
436
+ @pulumi.getter
437
+ def backend(self) -> pulumi.Output[_builtins.str]:
438
+ """
439
+ The unique path this backend should be mounted at.
440
+ """
441
+ return pulumi.get(self, "backend")
442
+
443
+ @_builtins.property
444
+ @pulumi.getter(name="global")
445
+ def global_(self) -> pulumi.Output[_builtins.bool]:
446
+ """
447
+ Specifies if the generated token should be global. Defaults to
448
+ false.
449
+ """
450
+ return pulumi.get(self, "global_")
451
+
452
+ @_builtins.property
453
+ @pulumi.getter
454
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
455
+ """
456
+ The namespace to provision the resource in.
457
+ The value should not contain leading or trailing forward slashes.
458
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
459
+ *Available only for Vault Enterprise*.
460
+ """
461
+ return pulumi.get(self, "namespace")
462
+
463
+ @_builtins.property
464
+ @pulumi.getter
465
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
466
+ """
467
+ List of policies attached to the generated token. This setting is only used
468
+ when `type` is 'client'.
469
+ """
470
+ return pulumi.get(self, "policies")
471
+
472
+ @_builtins.property
473
+ @pulumi.getter
474
+ def role(self) -> pulumi.Output[_builtins.str]:
475
+ """
476
+ The name to identify this role within the backend.
477
+ Must be unique within the backend.
478
+ """
479
+ return pulumi.get(self, "role")
480
+
481
+ @_builtins.property
482
+ @pulumi.getter
483
+ def type(self) -> pulumi.Output[_builtins.str]:
484
+ """
485
+ Specifies the type of token to create when using this role. Valid
486
+ settings are 'client' and 'management'. Defaults to 'client'.
487
+ """
488
+ return pulumi.get(self, "type")
489
+