pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,603 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class SyncVercelDestinationArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
access_token: pulumi.Input[_builtins.str],
|
|
23
|
+
deployment_environments: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
|
24
|
+
project_id: pulumi.Input[_builtins.str],
|
|
25
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None):
|
|
30
|
+
"""
|
|
31
|
+
The set of arguments for constructing a SyncVercelDestination resource.
|
|
32
|
+
:param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
|
|
33
|
+
variables.
|
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
|
|
35
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
36
|
+
:param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
|
|
37
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
|
38
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
39
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
|
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
41
|
+
The value should not contain leading or trailing forward slashes.
|
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
43
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
|
44
|
+
Supports a subset of the Go Template syntax.
|
|
45
|
+
:param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
|
|
46
|
+
"""
|
|
47
|
+
pulumi.set(__self__, "access_token", access_token)
|
|
48
|
+
pulumi.set(__self__, "deployment_environments", deployment_environments)
|
|
49
|
+
pulumi.set(__self__, "project_id", project_id)
|
|
50
|
+
if granularity is not None:
|
|
51
|
+
pulumi.set(__self__, "granularity", granularity)
|
|
52
|
+
if name is not None:
|
|
53
|
+
pulumi.set(__self__, "name", name)
|
|
54
|
+
if namespace is not None:
|
|
55
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
56
|
+
if secret_name_template is not None:
|
|
57
|
+
pulumi.set(__self__, "secret_name_template", secret_name_template)
|
|
58
|
+
if team_id is not None:
|
|
59
|
+
pulumi.set(__self__, "team_id", team_id)
|
|
60
|
+
|
|
61
|
+
@_builtins.property
|
|
62
|
+
@pulumi.getter(name="accessToken")
|
|
63
|
+
def access_token(self) -> pulumi.Input[_builtins.str]:
|
|
64
|
+
"""
|
|
65
|
+
Vercel API access token with the permissions to manage environment
|
|
66
|
+
variables.
|
|
67
|
+
"""
|
|
68
|
+
return pulumi.get(self, "access_token")
|
|
69
|
+
|
|
70
|
+
@access_token.setter
|
|
71
|
+
def access_token(self, value: pulumi.Input[_builtins.str]):
|
|
72
|
+
pulumi.set(self, "access_token", value)
|
|
73
|
+
|
|
74
|
+
@_builtins.property
|
|
75
|
+
@pulumi.getter(name="deploymentEnvironments")
|
|
76
|
+
def deployment_environments(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
|
77
|
+
"""
|
|
78
|
+
Deployment environments where the environment variables
|
|
79
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
80
|
+
"""
|
|
81
|
+
return pulumi.get(self, "deployment_environments")
|
|
82
|
+
|
|
83
|
+
@deployment_environments.setter
|
|
84
|
+
def deployment_environments(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
|
85
|
+
pulumi.set(self, "deployment_environments", value)
|
|
86
|
+
|
|
87
|
+
@_builtins.property
|
|
88
|
+
@pulumi.getter(name="projectId")
|
|
89
|
+
def project_id(self) -> pulumi.Input[_builtins.str]:
|
|
90
|
+
"""
|
|
91
|
+
Project ID where to manage environment variables.
|
|
92
|
+
"""
|
|
93
|
+
return pulumi.get(self, "project_id")
|
|
94
|
+
|
|
95
|
+
@project_id.setter
|
|
96
|
+
def project_id(self, value: pulumi.Input[_builtins.str]):
|
|
97
|
+
pulumi.set(self, "project_id", value)
|
|
98
|
+
|
|
99
|
+
@_builtins.property
|
|
100
|
+
@pulumi.getter
|
|
101
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
102
|
+
"""
|
|
103
|
+
Determines what level of information is synced as a distinct resource
|
|
104
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
105
|
+
"""
|
|
106
|
+
return pulumi.get(self, "granularity")
|
|
107
|
+
|
|
108
|
+
@granularity.setter
|
|
109
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
110
|
+
pulumi.set(self, "granularity", value)
|
|
111
|
+
|
|
112
|
+
@_builtins.property
|
|
113
|
+
@pulumi.getter
|
|
114
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
115
|
+
"""
|
|
116
|
+
Unique name of the GitHub destination.
|
|
117
|
+
"""
|
|
118
|
+
return pulumi.get(self, "name")
|
|
119
|
+
|
|
120
|
+
@name.setter
|
|
121
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
122
|
+
pulumi.set(self, "name", value)
|
|
123
|
+
|
|
124
|
+
@_builtins.property
|
|
125
|
+
@pulumi.getter
|
|
126
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
127
|
+
"""
|
|
128
|
+
The namespace to provision the resource in.
|
|
129
|
+
The value should not contain leading or trailing forward slashes.
|
|
130
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
131
|
+
"""
|
|
132
|
+
return pulumi.get(self, "namespace")
|
|
133
|
+
|
|
134
|
+
@namespace.setter
|
|
135
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
136
|
+
pulumi.set(self, "namespace", value)
|
|
137
|
+
|
|
138
|
+
@_builtins.property
|
|
139
|
+
@pulumi.getter(name="secretNameTemplate")
|
|
140
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
141
|
+
"""
|
|
142
|
+
Template describing how to generate external secret names.
|
|
143
|
+
Supports a subset of the Go Template syntax.
|
|
144
|
+
"""
|
|
145
|
+
return pulumi.get(self, "secret_name_template")
|
|
146
|
+
|
|
147
|
+
@secret_name_template.setter
|
|
148
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
149
|
+
pulumi.set(self, "secret_name_template", value)
|
|
150
|
+
|
|
151
|
+
@_builtins.property
|
|
152
|
+
@pulumi.getter(name="teamId")
|
|
153
|
+
def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
154
|
+
"""
|
|
155
|
+
Team ID where to manage environment variables.
|
|
156
|
+
"""
|
|
157
|
+
return pulumi.get(self, "team_id")
|
|
158
|
+
|
|
159
|
+
@team_id.setter
|
|
160
|
+
def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
161
|
+
pulumi.set(self, "team_id", value)
|
|
162
|
+
|
|
163
|
+
|
|
164
|
+
@pulumi.input_type
|
|
165
|
+
class _SyncVercelDestinationState:
|
|
166
|
+
def __init__(__self__, *,
|
|
167
|
+
access_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
168
|
+
deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
169
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
|
170
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
171
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
172
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
173
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
174
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
175
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
176
|
+
"""
|
|
177
|
+
Input properties used for looking up and filtering SyncVercelDestination resources.
|
|
178
|
+
:param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
|
|
179
|
+
variables.
|
|
180
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
|
|
181
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
182
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
|
183
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
184
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
|
|
185
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
186
|
+
The value should not contain leading or trailing forward slashes.
|
|
187
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
188
|
+
:param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
|
|
189
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
|
190
|
+
Supports a subset of the Go Template syntax.
|
|
191
|
+
:param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
|
|
192
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`vercel-project`).
|
|
193
|
+
"""
|
|
194
|
+
if access_token is not None:
|
|
195
|
+
pulumi.set(__self__, "access_token", access_token)
|
|
196
|
+
if deployment_environments is not None:
|
|
197
|
+
pulumi.set(__self__, "deployment_environments", deployment_environments)
|
|
198
|
+
if granularity is not None:
|
|
199
|
+
pulumi.set(__self__, "granularity", granularity)
|
|
200
|
+
if name is not None:
|
|
201
|
+
pulumi.set(__self__, "name", name)
|
|
202
|
+
if namespace is not None:
|
|
203
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
204
|
+
if project_id is not None:
|
|
205
|
+
pulumi.set(__self__, "project_id", project_id)
|
|
206
|
+
if secret_name_template is not None:
|
|
207
|
+
pulumi.set(__self__, "secret_name_template", secret_name_template)
|
|
208
|
+
if team_id is not None:
|
|
209
|
+
pulumi.set(__self__, "team_id", team_id)
|
|
210
|
+
if type is not None:
|
|
211
|
+
pulumi.set(__self__, "type", type)
|
|
212
|
+
|
|
213
|
+
@_builtins.property
|
|
214
|
+
@pulumi.getter(name="accessToken")
|
|
215
|
+
def access_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
216
|
+
"""
|
|
217
|
+
Vercel API access token with the permissions to manage environment
|
|
218
|
+
variables.
|
|
219
|
+
"""
|
|
220
|
+
return pulumi.get(self, "access_token")
|
|
221
|
+
|
|
222
|
+
@access_token.setter
|
|
223
|
+
def access_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
224
|
+
pulumi.set(self, "access_token", value)
|
|
225
|
+
|
|
226
|
+
@_builtins.property
|
|
227
|
+
@pulumi.getter(name="deploymentEnvironments")
|
|
228
|
+
def deployment_environments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
229
|
+
"""
|
|
230
|
+
Deployment environments where the environment variables
|
|
231
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
232
|
+
"""
|
|
233
|
+
return pulumi.get(self, "deployment_environments")
|
|
234
|
+
|
|
235
|
+
@deployment_environments.setter
|
|
236
|
+
def deployment_environments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
237
|
+
pulumi.set(self, "deployment_environments", value)
|
|
238
|
+
|
|
239
|
+
@_builtins.property
|
|
240
|
+
@pulumi.getter
|
|
241
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
242
|
+
"""
|
|
243
|
+
Determines what level of information is synced as a distinct resource
|
|
244
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
245
|
+
"""
|
|
246
|
+
return pulumi.get(self, "granularity")
|
|
247
|
+
|
|
248
|
+
@granularity.setter
|
|
249
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
250
|
+
pulumi.set(self, "granularity", value)
|
|
251
|
+
|
|
252
|
+
@_builtins.property
|
|
253
|
+
@pulumi.getter
|
|
254
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
255
|
+
"""
|
|
256
|
+
Unique name of the GitHub destination.
|
|
257
|
+
"""
|
|
258
|
+
return pulumi.get(self, "name")
|
|
259
|
+
|
|
260
|
+
@name.setter
|
|
261
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
262
|
+
pulumi.set(self, "name", value)
|
|
263
|
+
|
|
264
|
+
@_builtins.property
|
|
265
|
+
@pulumi.getter
|
|
266
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
267
|
+
"""
|
|
268
|
+
The namespace to provision the resource in.
|
|
269
|
+
The value should not contain leading or trailing forward slashes.
|
|
270
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
271
|
+
"""
|
|
272
|
+
return pulumi.get(self, "namespace")
|
|
273
|
+
|
|
274
|
+
@namespace.setter
|
|
275
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
276
|
+
pulumi.set(self, "namespace", value)
|
|
277
|
+
|
|
278
|
+
@_builtins.property
|
|
279
|
+
@pulumi.getter(name="projectId")
|
|
280
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
281
|
+
"""
|
|
282
|
+
Project ID where to manage environment variables.
|
|
283
|
+
"""
|
|
284
|
+
return pulumi.get(self, "project_id")
|
|
285
|
+
|
|
286
|
+
@project_id.setter
|
|
287
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
288
|
+
pulumi.set(self, "project_id", value)
|
|
289
|
+
|
|
290
|
+
@_builtins.property
|
|
291
|
+
@pulumi.getter(name="secretNameTemplate")
|
|
292
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
293
|
+
"""
|
|
294
|
+
Template describing how to generate external secret names.
|
|
295
|
+
Supports a subset of the Go Template syntax.
|
|
296
|
+
"""
|
|
297
|
+
return pulumi.get(self, "secret_name_template")
|
|
298
|
+
|
|
299
|
+
@secret_name_template.setter
|
|
300
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
301
|
+
pulumi.set(self, "secret_name_template", value)
|
|
302
|
+
|
|
303
|
+
@_builtins.property
|
|
304
|
+
@pulumi.getter(name="teamId")
|
|
305
|
+
def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
306
|
+
"""
|
|
307
|
+
Team ID where to manage environment variables.
|
|
308
|
+
"""
|
|
309
|
+
return pulumi.get(self, "team_id")
|
|
310
|
+
|
|
311
|
+
@team_id.setter
|
|
312
|
+
def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
313
|
+
pulumi.set(self, "team_id", value)
|
|
314
|
+
|
|
315
|
+
@_builtins.property
|
|
316
|
+
@pulumi.getter
|
|
317
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
318
|
+
"""
|
|
319
|
+
The type of the secrets destination (`vercel-project`).
|
|
320
|
+
"""
|
|
321
|
+
return pulumi.get(self, "type")
|
|
322
|
+
|
|
323
|
+
@type.setter
|
|
324
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
325
|
+
pulumi.set(self, "type", value)
|
|
326
|
+
|
|
327
|
+
|
|
328
|
+
@pulumi.type_token("vault:secrets/syncVercelDestination:SyncVercelDestination")
|
|
329
|
+
class SyncVercelDestination(pulumi.CustomResource):
|
|
330
|
+
@overload
|
|
331
|
+
def __init__(__self__,
|
|
332
|
+
resource_name: str,
|
|
333
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
334
|
+
access_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
335
|
+
deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
336
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
|
337
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
338
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
339
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
340
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
341
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
342
|
+
__props__=None):
|
|
343
|
+
"""
|
|
344
|
+
## Example Usage
|
|
345
|
+
|
|
346
|
+
```python
|
|
347
|
+
import pulumi
|
|
348
|
+
import pulumi_vault as vault
|
|
349
|
+
|
|
350
|
+
vercel = vault.secrets.SyncVercelDestination("vercel",
|
|
351
|
+
name="vercel-dest",
|
|
352
|
+
access_token=access_token,
|
|
353
|
+
project_id=project_id,
|
|
354
|
+
deployment_environments=[
|
|
355
|
+
"development",
|
|
356
|
+
"preview",
|
|
357
|
+
"production",
|
|
358
|
+
],
|
|
359
|
+
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
|
360
|
+
```
|
|
361
|
+
|
|
362
|
+
## Import
|
|
363
|
+
|
|
364
|
+
GitHub Secrets sync destinations can be imported using the `name`, e.g.
|
|
365
|
+
|
|
366
|
+
```sh
|
|
367
|
+
$ pulumi import vault:secrets/syncVercelDestination:SyncVercelDestination vercel vercel-dest
|
|
368
|
+
```
|
|
369
|
+
|
|
370
|
+
:param str resource_name: The name of the resource.
|
|
371
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
372
|
+
:param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
|
|
373
|
+
variables.
|
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
|
|
375
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
376
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
|
377
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
378
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
|
|
379
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
380
|
+
The value should not contain leading or trailing forward slashes.
|
|
381
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
382
|
+
:param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
|
|
383
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
|
384
|
+
Supports a subset of the Go Template syntax.
|
|
385
|
+
:param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
|
|
386
|
+
"""
|
|
387
|
+
...
|
|
388
|
+
@overload
|
|
389
|
+
def __init__(__self__,
|
|
390
|
+
resource_name: str,
|
|
391
|
+
args: SyncVercelDestinationArgs,
|
|
392
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
393
|
+
"""
|
|
394
|
+
## Example Usage
|
|
395
|
+
|
|
396
|
+
```python
|
|
397
|
+
import pulumi
|
|
398
|
+
import pulumi_vault as vault
|
|
399
|
+
|
|
400
|
+
vercel = vault.secrets.SyncVercelDestination("vercel",
|
|
401
|
+
name="vercel-dest",
|
|
402
|
+
access_token=access_token,
|
|
403
|
+
project_id=project_id,
|
|
404
|
+
deployment_environments=[
|
|
405
|
+
"development",
|
|
406
|
+
"preview",
|
|
407
|
+
"production",
|
|
408
|
+
],
|
|
409
|
+
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
|
410
|
+
```
|
|
411
|
+
|
|
412
|
+
## Import
|
|
413
|
+
|
|
414
|
+
GitHub Secrets sync destinations can be imported using the `name`, e.g.
|
|
415
|
+
|
|
416
|
+
```sh
|
|
417
|
+
$ pulumi import vault:secrets/syncVercelDestination:SyncVercelDestination vercel vercel-dest
|
|
418
|
+
```
|
|
419
|
+
|
|
420
|
+
:param str resource_name: The name of the resource.
|
|
421
|
+
:param SyncVercelDestinationArgs args: The arguments to use to populate this resource's properties.
|
|
422
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
423
|
+
"""
|
|
424
|
+
...
|
|
425
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
426
|
+
resource_args, opts = _utilities.get_resource_args_opts(SyncVercelDestinationArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
427
|
+
if resource_args is not None:
|
|
428
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
429
|
+
else:
|
|
430
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
431
|
+
|
|
432
|
+
def _internal_init(__self__,
|
|
433
|
+
resource_name: str,
|
|
434
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
435
|
+
access_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
436
|
+
deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
437
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
|
438
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
439
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
440
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
441
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
442
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
443
|
+
__props__=None):
|
|
444
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
445
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
446
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
447
|
+
if opts.id is None:
|
|
448
|
+
if __props__ is not None:
|
|
449
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
450
|
+
__props__ = SyncVercelDestinationArgs.__new__(SyncVercelDestinationArgs)
|
|
451
|
+
|
|
452
|
+
if access_token is None and not opts.urn:
|
|
453
|
+
raise TypeError("Missing required property 'access_token'")
|
|
454
|
+
__props__.__dict__["access_token"] = None if access_token is None else pulumi.Output.secret(access_token)
|
|
455
|
+
if deployment_environments is None and not opts.urn:
|
|
456
|
+
raise TypeError("Missing required property 'deployment_environments'")
|
|
457
|
+
__props__.__dict__["deployment_environments"] = deployment_environments
|
|
458
|
+
__props__.__dict__["granularity"] = granularity
|
|
459
|
+
__props__.__dict__["name"] = name
|
|
460
|
+
__props__.__dict__["namespace"] = namespace
|
|
461
|
+
if project_id is None and not opts.urn:
|
|
462
|
+
raise TypeError("Missing required property 'project_id'")
|
|
463
|
+
__props__.__dict__["project_id"] = project_id
|
|
464
|
+
__props__.__dict__["secret_name_template"] = secret_name_template
|
|
465
|
+
__props__.__dict__["team_id"] = team_id
|
|
466
|
+
__props__.__dict__["type"] = None
|
|
467
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessToken"])
|
|
468
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
469
|
+
super(SyncVercelDestination, __self__).__init__(
|
|
470
|
+
'vault:secrets/syncVercelDestination:SyncVercelDestination',
|
|
471
|
+
resource_name,
|
|
472
|
+
__props__,
|
|
473
|
+
opts)
|
|
474
|
+
|
|
475
|
+
@staticmethod
|
|
476
|
+
def get(resource_name: str,
|
|
477
|
+
id: pulumi.Input[str],
|
|
478
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
479
|
+
access_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
480
|
+
deployment_environments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
481
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
|
482
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
483
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
484
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
485
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
486
|
+
team_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
487
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncVercelDestination':
|
|
488
|
+
"""
|
|
489
|
+
Get an existing SyncVercelDestination resource's state with the given name, id, and optional extra
|
|
490
|
+
properties used to qualify the lookup.
|
|
491
|
+
|
|
492
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
493
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
494
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
495
|
+
:param pulumi.Input[_builtins.str] access_token: Vercel API access token with the permissions to manage environment
|
|
496
|
+
variables.
|
|
497
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] deployment_environments: Deployment environments where the environment variables
|
|
498
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
499
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
|
500
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
501
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the GitHub destination.
|
|
502
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
503
|
+
The value should not contain leading or trailing forward slashes.
|
|
504
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
505
|
+
:param pulumi.Input[_builtins.str] project_id: Project ID where to manage environment variables.
|
|
506
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
|
507
|
+
Supports a subset of the Go Template syntax.
|
|
508
|
+
:param pulumi.Input[_builtins.str] team_id: Team ID where to manage environment variables.
|
|
509
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`vercel-project`).
|
|
510
|
+
"""
|
|
511
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
512
|
+
|
|
513
|
+
__props__ = _SyncVercelDestinationState.__new__(_SyncVercelDestinationState)
|
|
514
|
+
|
|
515
|
+
__props__.__dict__["access_token"] = access_token
|
|
516
|
+
__props__.__dict__["deployment_environments"] = deployment_environments
|
|
517
|
+
__props__.__dict__["granularity"] = granularity
|
|
518
|
+
__props__.__dict__["name"] = name
|
|
519
|
+
__props__.__dict__["namespace"] = namespace
|
|
520
|
+
__props__.__dict__["project_id"] = project_id
|
|
521
|
+
__props__.__dict__["secret_name_template"] = secret_name_template
|
|
522
|
+
__props__.__dict__["team_id"] = team_id
|
|
523
|
+
__props__.__dict__["type"] = type
|
|
524
|
+
return SyncVercelDestination(resource_name, opts=opts, __props__=__props__)
|
|
525
|
+
|
|
526
|
+
@_builtins.property
|
|
527
|
+
@pulumi.getter(name="accessToken")
|
|
528
|
+
def access_token(self) -> pulumi.Output[_builtins.str]:
|
|
529
|
+
"""
|
|
530
|
+
Vercel API access token with the permissions to manage environment
|
|
531
|
+
variables.
|
|
532
|
+
"""
|
|
533
|
+
return pulumi.get(self, "access_token")
|
|
534
|
+
|
|
535
|
+
@_builtins.property
|
|
536
|
+
@pulumi.getter(name="deploymentEnvironments")
|
|
537
|
+
def deployment_environments(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
538
|
+
"""
|
|
539
|
+
Deployment environments where the environment variables
|
|
540
|
+
are available. Accepts `development`, `preview` and `production`.
|
|
541
|
+
"""
|
|
542
|
+
return pulumi.get(self, "deployment_environments")
|
|
543
|
+
|
|
544
|
+
@_builtins.property
|
|
545
|
+
@pulumi.getter
|
|
546
|
+
def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
547
|
+
"""
|
|
548
|
+
Determines what level of information is synced as a distinct resource
|
|
549
|
+
at the destination. Supports `secret-path` and `secret-key`.
|
|
550
|
+
"""
|
|
551
|
+
return pulumi.get(self, "granularity")
|
|
552
|
+
|
|
553
|
+
@_builtins.property
|
|
554
|
+
@pulumi.getter
|
|
555
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
556
|
+
"""
|
|
557
|
+
Unique name of the GitHub destination.
|
|
558
|
+
"""
|
|
559
|
+
return pulumi.get(self, "name")
|
|
560
|
+
|
|
561
|
+
@_builtins.property
|
|
562
|
+
@pulumi.getter
|
|
563
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
564
|
+
"""
|
|
565
|
+
The namespace to provision the resource in.
|
|
566
|
+
The value should not contain leading or trailing forward slashes.
|
|
567
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
568
|
+
"""
|
|
569
|
+
return pulumi.get(self, "namespace")
|
|
570
|
+
|
|
571
|
+
@_builtins.property
|
|
572
|
+
@pulumi.getter(name="projectId")
|
|
573
|
+
def project_id(self) -> pulumi.Output[_builtins.str]:
|
|
574
|
+
"""
|
|
575
|
+
Project ID where to manage environment variables.
|
|
576
|
+
"""
|
|
577
|
+
return pulumi.get(self, "project_id")
|
|
578
|
+
|
|
579
|
+
@_builtins.property
|
|
580
|
+
@pulumi.getter(name="secretNameTemplate")
|
|
581
|
+
def secret_name_template(self) -> pulumi.Output[_builtins.str]:
|
|
582
|
+
"""
|
|
583
|
+
Template describing how to generate external secret names.
|
|
584
|
+
Supports a subset of the Go Template syntax.
|
|
585
|
+
"""
|
|
586
|
+
return pulumi.get(self, "secret_name_template")
|
|
587
|
+
|
|
588
|
+
@_builtins.property
|
|
589
|
+
@pulumi.getter(name="teamId")
|
|
590
|
+
def team_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
591
|
+
"""
|
|
592
|
+
Team ID where to manage environment variables.
|
|
593
|
+
"""
|
|
594
|
+
return pulumi.get(self, "team_id")
|
|
595
|
+
|
|
596
|
+
@_builtins.property
|
|
597
|
+
@pulumi.getter
|
|
598
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
|
599
|
+
"""
|
|
600
|
+
The type of the secrets destination (`vercel-project`).
|
|
601
|
+
"""
|
|
602
|
+
return pulumi.get(self, "type")
|
|
603
|
+
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
from .. import _utilities
|
|
7
|
+
import typing
|
|
8
|
+
# Export this package's modules as members:
|
|
9
|
+
from .get_secret_backend_sign import *
|
|
10
|
+
from .secret_backend_ca import *
|
|
11
|
+
from .secret_backend_role import *
|
|
12
|
+
from ._inputs import *
|
|
13
|
+
from . import outputs
|