pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,603 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
18
+
19
+ @pulumi.input_type
20
+ class SyncVercelDestinationArgs:
21
+ def __init__(__self__, *,
22
+ access_token: pulumi.Input[_builtins.str],
23
+ deployment_environments: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ project_id: pulumi.Input[_builtins.str],
25
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
29
+ team_id: Optional[pulumi.Input[_builtins.str]] = None):
30
+ """
31
+ The set of arguments for constructing a SyncVercelDestination resource.
32
+ :param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
33
+ variables.
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
35
+ are available. Accepts `development`, `preview` and `production`.
36
+ :param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
37
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
38
+ at the destination. Supports `secret-path` and `secret-key`.
39
+ :param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
44
+ Supports a subset of the Go Template syntax.
45
+ :param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
46
+ """
47
+ pulumi.set(__self__, "access_token", access_token)
48
+ pulumi.set(__self__, "deployment_environments", deployment_environments)
49
+ pulumi.set(__self__, "project_id", project_id)
50
+ if granularity is not None:
51
+ pulumi.set(__self__, "granularity", granularity)
52
+ if name is not None:
53
+ pulumi.set(__self__, "name", name)
54
+ if namespace is not None:
55
+ pulumi.set(__self__, "namespace", namespace)
56
+ if secret_name_template is not None:
57
+ pulumi.set(__self__, "secret_name_template", secret_name_template)
58
+ if team_id is not None:
59
+ pulumi.set(__self__, "team_id", team_id)
60
+
61
+ @_builtins.property
62
+ @pulumi.getter(name="accessToken")
63
+ def access_token(self) -> pulumi.Input[_builtins.str]:
64
+ """
65
+ Vercel API access token with the permissions to manage environment
66
+ variables.
67
+ """
68
+ return pulumi.get(self, "access_token")
69
+
70
+ @access_token.setter
71
+ def access_token(self, value: pulumi.Input[_builtins.str]):
72
+ pulumi.set(self, "access_token", value)
73
+
74
+ @_builtins.property
75
+ @pulumi.getter(name="deploymentEnvironments")
76
+ def deployment_environments(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
77
+ """
78
+ Deployment environments where the environment variables
79
+ are available. Accepts `development`, `preview` and `production`.
80
+ """
81
+ return pulumi.get(self, "deployment_environments")
82
+
83
+ @deployment_environments.setter
84
+ def deployment_environments(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
85
+ pulumi.set(self, "deployment_environments", value)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter(name="projectId")
89
+ def project_id(self) -> pulumi.Input[_builtins.str]:
90
+ """
91
+ Project ID where to manage environment variables.
92
+ """
93
+ return pulumi.get(self, "project_id")
94
+
95
+ @project_id.setter
96
+ def project_id(self, value: pulumi.Input[_builtins.str]):
97
+ pulumi.set(self, "project_id", value)
98
+
99
+ @_builtins.property
100
+ @pulumi.getter
101
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
102
+ """
103
+ Determines what level of information is synced as a distinct resource
104
+ at the destination. Supports `secret-path` and `secret-key`.
105
+ """
106
+ return pulumi.get(self, "granularity")
107
+
108
+ @granularity.setter
109
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
110
+ pulumi.set(self, "granularity", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter
114
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
115
+ """
116
+ Unique name of the GitHub destination.
117
+ """
118
+ return pulumi.get(self, "name")
119
+
120
+ @name.setter
121
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
122
+ pulumi.set(self, "name", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter
126
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
127
+ """
128
+ The namespace to provision the resource in.
129
+ The value should not contain leading or trailing forward slashes.
130
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
131
+ """
132
+ return pulumi.get(self, "namespace")
133
+
134
+ @namespace.setter
135
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
136
+ pulumi.set(self, "namespace", value)
137
+
138
+ @_builtins.property
139
+ @pulumi.getter(name="secretNameTemplate")
140
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
141
+ """
142
+ Template describing how to generate external secret names.
143
+ Supports a subset of the Go Template syntax.
144
+ """
145
+ return pulumi.get(self, "secret_name_template")
146
+
147
+ @secret_name_template.setter
148
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
149
+ pulumi.set(self, "secret_name_template", value)
150
+
151
+ @_builtins.property
152
+ @pulumi.getter(name="teamId")
153
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
154
+ """
155
+ Team ID where to manage environment variables.
156
+ """
157
+ return pulumi.get(self, "team_id")
158
+
159
+ @team_id.setter
160
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
161
+ pulumi.set(self, "team_id", value)
162
+
163
+
164
+ @pulumi.input_type
165
+ class _SyncVercelDestinationState:
166
+ def __init__(__self__, *,
167
+ access_token: Optional[pulumi.Input[_builtins.str]] = None,
168
+ deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
169
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
170
+ name: Optional[pulumi.Input[_builtins.str]] = None,
171
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
172
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
173
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
174
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
175
+ type: Optional[pulumi.Input[_builtins.str]] = None):
176
+ """
177
+ Input properties used for looking up and filtering SyncVercelDestination resources.
178
+ :param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
179
+ variables.
180
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
181
+ are available. Accepts `development`, `preview` and `production`.
182
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
183
+ at the destination. Supports `secret-path` and `secret-key`.
184
+ :param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
185
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
186
+ The value should not contain leading or trailing forward slashes.
187
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
188
+ :param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
189
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
190
+ Supports a subset of the Go Template syntax.
191
+ :param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
192
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`vercel-project`).
193
+ """
194
+ if access_token is not None:
195
+ pulumi.set(__self__, "access_token", access_token)
196
+ if deployment_environments is not None:
197
+ pulumi.set(__self__, "deployment_environments", deployment_environments)
198
+ if granularity is not None:
199
+ pulumi.set(__self__, "granularity", granularity)
200
+ if name is not None:
201
+ pulumi.set(__self__, "name", name)
202
+ if namespace is not None:
203
+ pulumi.set(__self__, "namespace", namespace)
204
+ if project_id is not None:
205
+ pulumi.set(__self__, "project_id", project_id)
206
+ if secret_name_template is not None:
207
+ pulumi.set(__self__, "secret_name_template", secret_name_template)
208
+ if team_id is not None:
209
+ pulumi.set(__self__, "team_id", team_id)
210
+ if type is not None:
211
+ pulumi.set(__self__, "type", type)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="accessToken")
215
+ def access_token(self) -> Optional[pulumi.Input[_builtins.str]]:
216
+ """
217
+ Vercel API access token with the permissions to manage environment
218
+ variables.
219
+ """
220
+ return pulumi.get(self, "access_token")
221
+
222
+ @access_token.setter
223
+ def access_token(self, value: Optional[pulumi.Input[_builtins.str]]):
224
+ pulumi.set(self, "access_token", value)
225
+
226
+ @_builtins.property
227
+ @pulumi.getter(name="deploymentEnvironments")
228
+ def deployment_environments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
229
+ """
230
+ Deployment environments where the environment variables
231
+ are available. Accepts `development`, `preview` and `production`.
232
+ """
233
+ return pulumi.get(self, "deployment_environments")
234
+
235
+ @deployment_environments.setter
236
+ def deployment_environments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
237
+ pulumi.set(self, "deployment_environments", value)
238
+
239
+ @_builtins.property
240
+ @pulumi.getter
241
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
242
+ """
243
+ Determines what level of information is synced as a distinct resource
244
+ at the destination. Supports `secret-path` and `secret-key`.
245
+ """
246
+ return pulumi.get(self, "granularity")
247
+
248
+ @granularity.setter
249
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
250
+ pulumi.set(self, "granularity", value)
251
+
252
+ @_builtins.property
253
+ @pulumi.getter
254
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
255
+ """
256
+ Unique name of the GitHub destination.
257
+ """
258
+ return pulumi.get(self, "name")
259
+
260
+ @name.setter
261
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
262
+ pulumi.set(self, "name", value)
263
+
264
+ @_builtins.property
265
+ @pulumi.getter
266
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
267
+ """
268
+ The namespace to provision the resource in.
269
+ The value should not contain leading or trailing forward slashes.
270
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
+ """
272
+ return pulumi.get(self, "namespace")
273
+
274
+ @namespace.setter
275
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
276
+ pulumi.set(self, "namespace", value)
277
+
278
+ @_builtins.property
279
+ @pulumi.getter(name="projectId")
280
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
281
+ """
282
+ Project ID where to manage environment variables.
283
+ """
284
+ return pulumi.get(self, "project_id")
285
+
286
+ @project_id.setter
287
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
288
+ pulumi.set(self, "project_id", value)
289
+
290
+ @_builtins.property
291
+ @pulumi.getter(name="secretNameTemplate")
292
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
293
+ """
294
+ Template describing how to generate external secret names.
295
+ Supports a subset of the Go Template syntax.
296
+ """
297
+ return pulumi.get(self, "secret_name_template")
298
+
299
+ @secret_name_template.setter
300
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
301
+ pulumi.set(self, "secret_name_template", value)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter(name="teamId")
305
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
306
+ """
307
+ Team ID where to manage environment variables.
308
+ """
309
+ return pulumi.get(self, "team_id")
310
+
311
+ @team_id.setter
312
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
313
+ pulumi.set(self, "team_id", value)
314
+
315
+ @_builtins.property
316
+ @pulumi.getter
317
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
318
+ """
319
+ The type of the secrets destination (`vercel-project`).
320
+ """
321
+ return pulumi.get(self, "type")
322
+
323
+ @type.setter
324
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
325
+ pulumi.set(self, "type", value)
326
+
327
+
328
+ @pulumi.type_token("vault:secrets/syncVercelDestination:SyncVercelDestination")
329
+ class SyncVercelDestination(pulumi.CustomResource):
330
+ @overload
331
+ def __init__(__self__,
332
+ resource_name: str,
333
+ opts: Optional[pulumi.ResourceOptions] = None,
334
+ access_token: Optional[pulumi.Input[_builtins.str]] = None,
335
+ deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
336
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
337
+ name: Optional[pulumi.Input[_builtins.str]] = None,
338
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
339
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
340
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
341
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
342
+ __props__=None):
343
+ """
344
+ ## Example Usage
345
+
346
+ ```python
347
+ import pulumi
348
+ import pulumi_vault as vault
349
+
350
+ vercel = vault.secrets.SyncVercelDestination("vercel",
351
+ name="vercel-dest",
352
+ access_token=access_token,
353
+ project_id=project_id,
354
+ deployment_environments=[
355
+ "development",
356
+ "preview",
357
+ "production",
358
+ ],
359
+ secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
360
+ ```
361
+
362
+ ## Import
363
+
364
+ GitHub Secrets sync destinations can be imported using the `name`, e.g.
365
+
366
+ ```sh
367
+ $ pulumi import vault:secrets/syncVercelDestination:SyncVercelDestination vercel vercel-dest
368
+ ```
369
+
370
+ :param str resource_name: The name of the resource.
371
+ :param pulumi.ResourceOptions opts: Options for the resource.
372
+ :param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
373
+ variables.
374
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
375
+ are available. Accepts `development`, `preview` and `production`.
376
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
377
+ at the destination. Supports `secret-path` and `secret-key`.
378
+ :param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
379
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
380
+ The value should not contain leading or trailing forward slashes.
381
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
382
+ :param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
383
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
384
+ Supports a subset of the Go Template syntax.
385
+ :param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
386
+ """
387
+ ...
388
+ @overload
389
+ def __init__(__self__,
390
+ resource_name: str,
391
+ args: SyncVercelDestinationArgs,
392
+ opts: Optional[pulumi.ResourceOptions] = None):
393
+ """
394
+ ## Example Usage
395
+
396
+ ```python
397
+ import pulumi
398
+ import pulumi_vault as vault
399
+
400
+ vercel = vault.secrets.SyncVercelDestination("vercel",
401
+ name="vercel-dest",
402
+ access_token=access_token,
403
+ project_id=project_id,
404
+ deployment_environments=[
405
+ "development",
406
+ "preview",
407
+ "production",
408
+ ],
409
+ secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
410
+ ```
411
+
412
+ ## Import
413
+
414
+ GitHub Secrets sync destinations can be imported using the `name`, e.g.
415
+
416
+ ```sh
417
+ $ pulumi import vault:secrets/syncVercelDestination:SyncVercelDestination vercel vercel-dest
418
+ ```
419
+
420
+ :param str resource_name: The name of the resource.
421
+ :param SyncVercelDestinationArgs args: The arguments to use to populate this resource's properties.
422
+ :param pulumi.ResourceOptions opts: Options for the resource.
423
+ """
424
+ ...
425
+ def __init__(__self__, resource_name: str, *args, **kwargs):
426
+ resource_args, opts = _utilities.get_resource_args_opts(SyncVercelDestinationArgs, pulumi.ResourceOptions, *args, **kwargs)
427
+ if resource_args is not None:
428
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
429
+ else:
430
+ __self__._internal_init(resource_name, *args, **kwargs)
431
+
432
+ def _internal_init(__self__,
433
+ resource_name: str,
434
+ opts: Optional[pulumi.ResourceOptions] = None,
435
+ access_token: Optional[pulumi.Input[_builtins.str]] = None,
436
+ deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
437
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
438
+ name: Optional[pulumi.Input[_builtins.str]] = None,
439
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
440
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
441
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
442
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
443
+ __props__=None):
444
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
445
+ if not isinstance(opts, pulumi.ResourceOptions):
446
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
447
+ if opts.id is None:
448
+ if __props__ is not None:
449
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
450
+ __props__ = SyncVercelDestinationArgs.__new__(SyncVercelDestinationArgs)
451
+
452
+ if access_token is None and not opts.urn:
453
+ raise TypeError("Missing required property 'access_token'")
454
+ __props__.__dict__["access_token"] = None if access_token is None else pulumi.Output.secret(access_token)
455
+ if deployment_environments is None and not opts.urn:
456
+ raise TypeError("Missing required property 'deployment_environments'")
457
+ __props__.__dict__["deployment_environments"] = deployment_environments
458
+ __props__.__dict__["granularity"] = granularity
459
+ __props__.__dict__["name"] = name
460
+ __props__.__dict__["namespace"] = namespace
461
+ if project_id is None and not opts.urn:
462
+ raise TypeError("Missing required property 'project_id'")
463
+ __props__.__dict__["project_id"] = project_id
464
+ __props__.__dict__["secret_name_template"] = secret_name_template
465
+ __props__.__dict__["team_id"] = team_id
466
+ __props__.__dict__["type"] = None
467
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessToken"])
468
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
469
+ super(SyncVercelDestination, __self__).__init__(
470
+ 'vault:secrets/syncVercelDestination:SyncVercelDestination',
471
+ resource_name,
472
+ __props__,
473
+ opts)
474
+
475
+ @staticmethod
476
+ def get(resource_name: str,
477
+ id: pulumi.Input[str],
478
+ opts: Optional[pulumi.ResourceOptions] = None,
479
+ access_token: Optional[pulumi.Input[_builtins.str]] = None,
480
+ deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
481
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
482
+ name: Optional[pulumi.Input[_builtins.str]] = None,
483
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
484
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
485
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
486
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
487
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncVercelDestination':
488
+ """
489
+ Get an existing SyncVercelDestination resource's state with the given name, id, and optional extra
490
+ properties used to qualify the lookup.
491
+
492
+ :param str resource_name: The unique name of the resulting resource.
493
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
494
+ :param pulumi.ResourceOptions opts: Options for the resource.
495
+ :param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
496
+ variables.
497
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
498
+ are available. Accepts `development`, `preview` and `production`.
499
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
500
+ at the destination. Supports `secret-path` and `secret-key`.
501
+ :param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
502
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
503
+ The value should not contain leading or trailing forward slashes.
504
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
505
+ :param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
506
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
507
+ Supports a subset of the Go Template syntax.
508
+ :param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
509
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`vercel-project`).
510
+ """
511
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
512
+
513
+ __props__ = _SyncVercelDestinationState.__new__(_SyncVercelDestinationState)
514
+
515
+ __props__.__dict__["access_token"] = access_token
516
+ __props__.__dict__["deployment_environments"] = deployment_environments
517
+ __props__.__dict__["granularity"] = granularity
518
+ __props__.__dict__["name"] = name
519
+ __props__.__dict__["namespace"] = namespace
520
+ __props__.__dict__["project_id"] = project_id
521
+ __props__.__dict__["secret_name_template"] = secret_name_template
522
+ __props__.__dict__["team_id"] = team_id
523
+ __props__.__dict__["type"] = type
524
+ return SyncVercelDestination(resource_name, opts=opts, __props__=__props__)
525
+
526
+ @_builtins.property
527
+ @pulumi.getter(name="accessToken")
528
+ def access_token(self) -> pulumi.Output[_builtins.str]:
529
+ """
530
+ Vercel API access token with the permissions to manage environment
531
+ variables.
532
+ """
533
+ return pulumi.get(self, "access_token")
534
+
535
+ @_builtins.property
536
+ @pulumi.getter(name="deploymentEnvironments")
537
+ def deployment_environments(self) -> pulumi.Output[Sequence[_builtins.str]]:
538
+ """
539
+ Deployment environments where the environment variables
540
+ are available. Accepts `development`, `preview` and `production`.
541
+ """
542
+ return pulumi.get(self, "deployment_environments")
543
+
544
+ @_builtins.property
545
+ @pulumi.getter
546
+ def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
547
+ """
548
+ Determines what level of information is synced as a distinct resource
549
+ at the destination. Supports `secret-path` and `secret-key`.
550
+ """
551
+ return pulumi.get(self, "granularity")
552
+
553
+ @_builtins.property
554
+ @pulumi.getter
555
+ def name(self) -> pulumi.Output[_builtins.str]:
556
+ """
557
+ Unique name of the GitHub destination.
558
+ """
559
+ return pulumi.get(self, "name")
560
+
561
+ @_builtins.property
562
+ @pulumi.getter
563
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
564
+ """
565
+ The namespace to provision the resource in.
566
+ The value should not contain leading or trailing forward slashes.
567
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
568
+ """
569
+ return pulumi.get(self, "namespace")
570
+
571
+ @_builtins.property
572
+ @pulumi.getter(name="projectId")
573
+ def project_id(self) -> pulumi.Output[_builtins.str]:
574
+ """
575
+ Project ID where to manage environment variables.
576
+ """
577
+ return pulumi.get(self, "project_id")
578
+
579
+ @_builtins.property
580
+ @pulumi.getter(name="secretNameTemplate")
581
+ def secret_name_template(self) -> pulumi.Output[_builtins.str]:
582
+ """
583
+ Template describing how to generate external secret names.
584
+ Supports a subset of the Go Template syntax.
585
+ """
586
+ return pulumi.get(self, "secret_name_template")
587
+
588
+ @_builtins.property
589
+ @pulumi.getter(name="teamId")
590
+ def team_id(self) -> pulumi.Output[Optional[_builtins.str]]:
591
+ """
592
+ Team ID where to manage environment variables.
593
+ """
594
+ return pulumi.get(self, "team_id")
595
+
596
+ @_builtins.property
597
+ @pulumi.getter
598
+ def type(self) -> pulumi.Output[_builtins.str]:
599
+ """
600
+ The type of the secrets destination (`vercel-project`).
601
+ """
602
+ return pulumi.get(self, "type")
603
+
@@ -0,0 +1,13 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .get_secret_backend_sign import *
10
+ from .secret_backend_ca import *
11
+ from .secret_backend_role import *
12
+ from ._inputs import *
13
+ from . import outputs