pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,445 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretCredsArgs', 'SecretCreds']
18
+
19
+ @pulumi.input_type
20
+ class SecretCredsArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
25
+ """
26
+ The set of arguments for constructing a SecretCreds resource.
27
+ :param pulumi.Input[_builtins.str] role: Name of the role.
28
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
29
+ The value should not contain leading or trailing forward slashes.
30
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
+ *Available only for Vault Enterprise*.
32
+ """
33
+ pulumi.set(__self__, "backend", backend)
34
+ pulumi.set(__self__, "role", role)
35
+ if namespace is not None:
36
+ pulumi.set(__self__, "namespace", namespace)
37
+
38
+ @_builtins.property
39
+ @pulumi.getter
40
+ def backend(self) -> pulumi.Input[_builtins.str]:
41
+ return pulumi.get(self, "backend")
42
+
43
+ @backend.setter
44
+ def backend(self, value: pulumi.Input[_builtins.str]):
45
+ pulumi.set(self, "backend", value)
46
+
47
+ @_builtins.property
48
+ @pulumi.getter
49
+ def role(self) -> pulumi.Input[_builtins.str]:
50
+ """
51
+ Name of the role.
52
+ """
53
+ return pulumi.get(self, "role")
54
+
55
+ @role.setter
56
+ def role(self, value: pulumi.Input[_builtins.str]):
57
+ pulumi.set(self, "role", value)
58
+
59
+ @_builtins.property
60
+ @pulumi.getter
61
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
62
+ """
63
+ The namespace to provision the resource in.
64
+ The value should not contain leading or trailing forward slashes.
65
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
+ *Available only for Vault Enterprise*.
67
+ """
68
+ return pulumi.get(self, "namespace")
69
+
70
+ @namespace.setter
71
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
72
+ pulumi.set(self, "namespace", value)
73
+
74
+
75
+ @pulumi.input_type
76
+ class _SecretCredsState:
77
+ def __init__(__self__, *,
78
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
79
+ lease_id: Optional[pulumi.Input[_builtins.str]] = None,
80
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
81
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
82
+ role: Optional[pulumi.Input[_builtins.str]] = None,
83
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
84
+ token: Optional[pulumi.Input[_builtins.str]] = None,
85
+ token_id: Optional[pulumi.Input[_builtins.str]] = None):
86
+ """
87
+ Input properties used for looking up and filtering SecretCreds resources.
88
+ :param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
89
+ Vault lease associated with them.
90
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
91
+ The value should not contain leading or trailing forward slashes.
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
+ *Available only for Vault Enterprise*.
94
+ :param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
95
+ :param pulumi.Input[_builtins.str] role: Name of the role.
96
+ :param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
97
+ :param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
98
+ to identify the user of the call.
99
+ :param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
100
+ to look up information about a token or to revoke a token.
101
+ """
102
+ if backend is not None:
103
+ pulumi.set(__self__, "backend", backend)
104
+ if lease_id is not None:
105
+ pulumi.set(__self__, "lease_id", lease_id)
106
+ if namespace is not None:
107
+ pulumi.set(__self__, "namespace", namespace)
108
+ if organization is not None:
109
+ pulumi.set(__self__, "organization", organization)
110
+ if role is not None:
111
+ pulumi.set(__self__, "role", role)
112
+ if team_id is not None:
113
+ pulumi.set(__self__, "team_id", team_id)
114
+ if token is not None:
115
+ pulumi.set(__self__, "token", token)
116
+ if token_id is not None:
117
+ pulumi.set(__self__, "token_id", token_id)
118
+
119
+ @_builtins.property
120
+ @pulumi.getter
121
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
122
+ return pulumi.get(self, "backend")
123
+
124
+ @backend.setter
125
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
126
+ pulumi.set(self, "backend", value)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter(name="leaseId")
130
+ def lease_id(self) -> Optional[pulumi.Input[_builtins.str]]:
131
+ """
132
+ The lease associated with the token. Only user tokens will have a
133
+ Vault lease associated with them.
134
+ """
135
+ return pulumi.get(self, "lease_id")
136
+
137
+ @lease_id.setter
138
+ def lease_id(self, value: Optional[pulumi.Input[_builtins.str]]):
139
+ pulumi.set(self, "lease_id", value)
140
+
141
+ @_builtins.property
142
+ @pulumi.getter
143
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
144
+ """
145
+ The namespace to provision the resource in.
146
+ The value should not contain leading or trailing forward slashes.
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
+ *Available only for Vault Enterprise*.
149
+ """
150
+ return pulumi.get(self, "namespace")
151
+
152
+ @namespace.setter
153
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
154
+ pulumi.set(self, "namespace", value)
155
+
156
+ @_builtins.property
157
+ @pulumi.getter
158
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
159
+ """
160
+ The organization associated with the token provided.
161
+ """
162
+ return pulumi.get(self, "organization")
163
+
164
+ @organization.setter
165
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
166
+ pulumi.set(self, "organization", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter
170
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
171
+ """
172
+ Name of the role.
173
+ """
174
+ return pulumi.get(self, "role")
175
+
176
+ @role.setter
177
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
178
+ pulumi.set(self, "role", value)
179
+
180
+ @_builtins.property
181
+ @pulumi.getter(name="teamId")
182
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
183
+ """
184
+ The team id associated with the token provided.
185
+ """
186
+ return pulumi.get(self, "team_id")
187
+
188
+ @team_id.setter
189
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
190
+ pulumi.set(self, "team_id", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter
194
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
195
+ """
196
+ The actual token that was generated and can be used with API calls
197
+ to identify the user of the call.
198
+ """
199
+ return pulumi.get(self, "token")
200
+
201
+ @token.setter
202
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
203
+ pulumi.set(self, "token", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="tokenId")
207
+ def token_id(self) -> Optional[pulumi.Input[_builtins.str]]:
208
+ """
209
+ The public identifier for a specific token. It can be used
210
+ to look up information about a token or to revoke a token.
211
+ """
212
+ return pulumi.get(self, "token_id")
213
+
214
+ @token_id.setter
215
+ def token_id(self, value: Optional[pulumi.Input[_builtins.str]]):
216
+ pulumi.set(self, "token_id", value)
217
+
218
+
219
+ @pulumi.type_token("vault:terraformcloud/secretCreds:SecretCreds")
220
+ class SecretCreds(pulumi.CustomResource):
221
+ @overload
222
+ def __init__(__self__,
223
+ resource_name: str,
224
+ opts: Optional[pulumi.ResourceOptions] = None,
225
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
226
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
227
+ role: Optional[pulumi.Input[_builtins.str]] = None,
228
+ __props__=None):
229
+ """
230
+ ## Example Usage
231
+
232
+ ```python
233
+ import pulumi
234
+ import pulumi_vault as vault
235
+
236
+ test = vault.terraformcloud.SecretBackend("test",
237
+ backend="terraform",
238
+ description="Manages the Terraform Cloud backend",
239
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
240
+ example = vault.terraformcloud.SecretRole("example",
241
+ backend=test.backend,
242
+ name="test-role",
243
+ organization="example-organization-name",
244
+ team_id="team-ieF4isC...")
245
+ token = vault.terraformcloud.SecretCreds("token",
246
+ backend=test.backend,
247
+ role=example.name)
248
+ ```
249
+
250
+ :param str resource_name: The name of the resource.
251
+ :param pulumi.ResourceOptions opts: Options for the resource.
252
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
253
+ The value should not contain leading or trailing forward slashes.
254
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
+ *Available only for Vault Enterprise*.
256
+ :param pulumi.Input[_builtins.str] role: Name of the role.
257
+ """
258
+ ...
259
+ @overload
260
+ def __init__(__self__,
261
+ resource_name: str,
262
+ args: SecretCredsArgs,
263
+ opts: Optional[pulumi.ResourceOptions] = None):
264
+ """
265
+ ## Example Usage
266
+
267
+ ```python
268
+ import pulumi
269
+ import pulumi_vault as vault
270
+
271
+ test = vault.terraformcloud.SecretBackend("test",
272
+ backend="terraform",
273
+ description="Manages the Terraform Cloud backend",
274
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
275
+ example = vault.terraformcloud.SecretRole("example",
276
+ backend=test.backend,
277
+ name="test-role",
278
+ organization="example-organization-name",
279
+ team_id="team-ieF4isC...")
280
+ token = vault.terraformcloud.SecretCreds("token",
281
+ backend=test.backend,
282
+ role=example.name)
283
+ ```
284
+
285
+ :param str resource_name: The name of the resource.
286
+ :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
287
+ :param pulumi.ResourceOptions opts: Options for the resource.
288
+ """
289
+ ...
290
+ def __init__(__self__, resource_name: str, *args, **kwargs):
291
+ resource_args, opts = _utilities.get_resource_args_opts(SecretCredsArgs, pulumi.ResourceOptions, *args, **kwargs)
292
+ if resource_args is not None:
293
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
294
+ else:
295
+ __self__._internal_init(resource_name, *args, **kwargs)
296
+
297
+ def _internal_init(__self__,
298
+ resource_name: str,
299
+ opts: Optional[pulumi.ResourceOptions] = None,
300
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
301
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
302
+ role: Optional[pulumi.Input[_builtins.str]] = None,
303
+ __props__=None):
304
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
305
+ if not isinstance(opts, pulumi.ResourceOptions):
306
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
307
+ if opts.id is None:
308
+ if __props__ is not None:
309
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
310
+ __props__ = SecretCredsArgs.__new__(SecretCredsArgs)
311
+
312
+ if backend is None and not opts.urn:
313
+ raise TypeError("Missing required property 'backend'")
314
+ __props__.__dict__["backend"] = backend
315
+ __props__.__dict__["namespace"] = namespace
316
+ if role is None and not opts.urn:
317
+ raise TypeError("Missing required property 'role'")
318
+ __props__.__dict__["role"] = role
319
+ __props__.__dict__["lease_id"] = None
320
+ __props__.__dict__["organization"] = None
321
+ __props__.__dict__["team_id"] = None
322
+ __props__.__dict__["token"] = None
323
+ __props__.__dict__["token_id"] = None
324
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["leaseId", "token"])
325
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
326
+ super(SecretCreds, __self__).__init__(
327
+ 'vault:terraformcloud/secretCreds:SecretCreds',
328
+ resource_name,
329
+ __props__,
330
+ opts)
331
+
332
+ @staticmethod
333
+ def get(resource_name: str,
334
+ id: pulumi.Input[str],
335
+ opts: Optional[pulumi.ResourceOptions] = None,
336
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
337
+ lease_id: Optional[pulumi.Input[_builtins.str]] = None,
338
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
339
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
340
+ role: Optional[pulumi.Input[_builtins.str]] = None,
341
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
342
+ token: Optional[pulumi.Input[_builtins.str]] = None,
343
+ token_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretCreds':
344
+ """
345
+ Get an existing SecretCreds resource's state with the given name, id, and optional extra
346
+ properties used to qualify the lookup.
347
+
348
+ :param str resource_name: The unique name of the resulting resource.
349
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
350
+ :param pulumi.ResourceOptions opts: Options for the resource.
351
+ :param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
352
+ Vault lease associated with them.
353
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
354
+ The value should not contain leading or trailing forward slashes.
355
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
+ *Available only for Vault Enterprise*.
357
+ :param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
358
+ :param pulumi.Input[_builtins.str] role: Name of the role.
359
+ :param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
360
+ :param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
361
+ to identify the user of the call.
362
+ :param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
363
+ to look up information about a token or to revoke a token.
364
+ """
365
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
366
+
367
+ __props__ = _SecretCredsState.__new__(_SecretCredsState)
368
+
369
+ __props__.__dict__["backend"] = backend
370
+ __props__.__dict__["lease_id"] = lease_id
371
+ __props__.__dict__["namespace"] = namespace
372
+ __props__.__dict__["organization"] = organization
373
+ __props__.__dict__["role"] = role
374
+ __props__.__dict__["team_id"] = team_id
375
+ __props__.__dict__["token"] = token
376
+ __props__.__dict__["token_id"] = token_id
377
+ return SecretCreds(resource_name, opts=opts, __props__=__props__)
378
+
379
+ @_builtins.property
380
+ @pulumi.getter
381
+ def backend(self) -> pulumi.Output[_builtins.str]:
382
+ return pulumi.get(self, "backend")
383
+
384
+ @_builtins.property
385
+ @pulumi.getter(name="leaseId")
386
+ def lease_id(self) -> pulumi.Output[_builtins.str]:
387
+ """
388
+ The lease associated with the token. Only user tokens will have a
389
+ Vault lease associated with them.
390
+ """
391
+ return pulumi.get(self, "lease_id")
392
+
393
+ @_builtins.property
394
+ @pulumi.getter
395
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
396
+ """
397
+ The namespace to provision the resource in.
398
+ The value should not contain leading or trailing forward slashes.
399
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
400
+ *Available only for Vault Enterprise*.
401
+ """
402
+ return pulumi.get(self, "namespace")
403
+
404
+ @_builtins.property
405
+ @pulumi.getter
406
+ def organization(self) -> pulumi.Output[_builtins.str]:
407
+ """
408
+ The organization associated with the token provided.
409
+ """
410
+ return pulumi.get(self, "organization")
411
+
412
+ @_builtins.property
413
+ @pulumi.getter
414
+ def role(self) -> pulumi.Output[_builtins.str]:
415
+ """
416
+ Name of the role.
417
+ """
418
+ return pulumi.get(self, "role")
419
+
420
+ @_builtins.property
421
+ @pulumi.getter(name="teamId")
422
+ def team_id(self) -> pulumi.Output[_builtins.str]:
423
+ """
424
+ The team id associated with the token provided.
425
+ """
426
+ return pulumi.get(self, "team_id")
427
+
428
+ @_builtins.property
429
+ @pulumi.getter
430
+ def token(self) -> pulumi.Output[_builtins.str]:
431
+ """
432
+ The actual token that was generated and can be used with API calls
433
+ to identify the user of the call.
434
+ """
435
+ return pulumi.get(self, "token")
436
+
437
+ @_builtins.property
438
+ @pulumi.getter(name="tokenId")
439
+ def token_id(self) -> pulumi.Output[_builtins.str]:
440
+ """
441
+ The public identifier for a specific token. It can be used
442
+ to look up information about a token or to revoke a token.
443
+ """
444
+ return pulumi.get(self, "token_id")
445
+