pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,563 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretRoleArgs', 'SecretRole']
18
+
19
+ @pulumi.input_type
20
+ class SecretRoleArgs:
21
+ def __init__(__self__, *,
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
24
+ description: Optional[pulumi.Input[_builtins.str]] = None,
25
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
29
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
30
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ user_id: Optional[pulumi.Input[_builtins.str]] = None):
32
+ """
33
+ The set of arguments for constructing a SecretRole resource.
34
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
35
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
36
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
+ The value should not contain leading or trailing forward slashes.
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
+ *Available only for Vault Enterprise*.
40
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
41
+ """
42
+ if backend is not None:
43
+ pulumi.set(__self__, "backend", backend)
44
+ if credential_type is not None:
45
+ pulumi.set(__self__, "credential_type", credential_type)
46
+ if description is not None:
47
+ pulumi.set(__self__, "description", description)
48
+ if max_ttl is not None:
49
+ pulumi.set(__self__, "max_ttl", max_ttl)
50
+ if name is not None:
51
+ pulumi.set(__self__, "name", name)
52
+ if namespace is not None:
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if organization is not None:
55
+ pulumi.set(__self__, "organization", organization)
56
+ if team_id is not None:
57
+ pulumi.set(__self__, "team_id", team_id)
58
+ if ttl is not None:
59
+ pulumi.set(__self__, "ttl", ttl)
60
+ if user_id is not None:
61
+ pulumi.set(__self__, "user_id", user_id)
62
+
63
+ @_builtins.property
64
+ @pulumi.getter
65
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
66
+ return pulumi.get(self, "backend")
67
+
68
+ @backend.setter
69
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
70
+ pulumi.set(self, "backend", value)
71
+
72
+ @_builtins.property
73
+ @pulumi.getter(name="credentialType")
74
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
75
+ """
76
+ The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
77
+ """
78
+ return pulumi.get(self, "credential_type")
79
+
80
+ @credential_type.setter
81
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
82
+ pulumi.set(self, "credential_type", value)
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
87
+ return pulumi.get(self, "description")
88
+
89
+ @description.setter
90
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
91
+ pulumi.set(self, "description", value)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter(name="maxTtl")
95
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
96
+ """
97
+ Maximum TTL for leases associated with this role, in seconds.
98
+ """
99
+ return pulumi.get(self, "max_ttl")
100
+
101
+ @max_ttl.setter
102
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
103
+ pulumi.set(self, "max_ttl", value)
104
+
105
+ @_builtins.property
106
+ @pulumi.getter
107
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
108
+ return pulumi.get(self, "name")
109
+
110
+ @name.setter
111
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
112
+ pulumi.set(self, "name", value)
113
+
114
+ @_builtins.property
115
+ @pulumi.getter
116
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
117
+ """
118
+ The namespace to provision the resource in.
119
+ The value should not contain leading or trailing forward slashes.
120
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
121
+ *Available only for Vault Enterprise*.
122
+ """
123
+ return pulumi.get(self, "namespace")
124
+
125
+ @namespace.setter
126
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
127
+ pulumi.set(self, "namespace", value)
128
+
129
+ @_builtins.property
130
+ @pulumi.getter
131
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
132
+ return pulumi.get(self, "organization")
133
+
134
+ @organization.setter
135
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
136
+ pulumi.set(self, "organization", value)
137
+
138
+ @_builtins.property
139
+ @pulumi.getter(name="teamId")
140
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
141
+ return pulumi.get(self, "team_id")
142
+
143
+ @team_id.setter
144
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
145
+ pulumi.set(self, "team_id", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter
149
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
150
+ """
151
+ Specifies the TTL for this role, in seconds.
152
+ """
153
+ return pulumi.get(self, "ttl")
154
+
155
+ @ttl.setter
156
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
157
+ pulumi.set(self, "ttl", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="userId")
161
+ def user_id(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ return pulumi.get(self, "user_id")
163
+
164
+ @user_id.setter
165
+ def user_id(self, value: Optional[pulumi.Input[_builtins.str]]):
166
+ pulumi.set(self, "user_id", value)
167
+
168
+
169
+ @pulumi.input_type
170
+ class _SecretRoleState:
171
+ def __init__(__self__, *,
172
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
173
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
174
+ description: Optional[pulumi.Input[_builtins.str]] = None,
175
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
176
+ name: Optional[pulumi.Input[_builtins.str]] = None,
177
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
178
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
179
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
180
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
181
+ user_id: Optional[pulumi.Input[_builtins.str]] = None):
182
+ """
183
+ Input properties used for looking up and filtering SecretRole resources.
184
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
185
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
186
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
187
+ The value should not contain leading or trailing forward slashes.
188
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
189
+ *Available only for Vault Enterprise*.
190
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
191
+ """
192
+ if backend is not None:
193
+ pulumi.set(__self__, "backend", backend)
194
+ if credential_type is not None:
195
+ pulumi.set(__self__, "credential_type", credential_type)
196
+ if description is not None:
197
+ pulumi.set(__self__, "description", description)
198
+ if max_ttl is not None:
199
+ pulumi.set(__self__, "max_ttl", max_ttl)
200
+ if name is not None:
201
+ pulumi.set(__self__, "name", name)
202
+ if namespace is not None:
203
+ pulumi.set(__self__, "namespace", namespace)
204
+ if organization is not None:
205
+ pulumi.set(__self__, "organization", organization)
206
+ if team_id is not None:
207
+ pulumi.set(__self__, "team_id", team_id)
208
+ if ttl is not None:
209
+ pulumi.set(__self__, "ttl", ttl)
210
+ if user_id is not None:
211
+ pulumi.set(__self__, "user_id", user_id)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter
215
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
216
+ return pulumi.get(self, "backend")
217
+
218
+ @backend.setter
219
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
220
+ pulumi.set(self, "backend", value)
221
+
222
+ @_builtins.property
223
+ @pulumi.getter(name="credentialType")
224
+ def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
225
+ """
226
+ The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
227
+ """
228
+ return pulumi.get(self, "credential_type")
229
+
230
+ @credential_type.setter
231
+ def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
232
+ pulumi.set(self, "credential_type", value)
233
+
234
+ @_builtins.property
235
+ @pulumi.getter
236
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
237
+ return pulumi.get(self, "description")
238
+
239
+ @description.setter
240
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
241
+ pulumi.set(self, "description", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter(name="maxTtl")
245
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
+ """
247
+ Maximum TTL for leases associated with this role, in seconds.
248
+ """
249
+ return pulumi.get(self, "max_ttl")
250
+
251
+ @max_ttl.setter
252
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
253
+ pulumi.set(self, "max_ttl", value)
254
+
255
+ @_builtins.property
256
+ @pulumi.getter
257
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
258
+ return pulumi.get(self, "name")
259
+
260
+ @name.setter
261
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
262
+ pulumi.set(self, "name", value)
263
+
264
+ @_builtins.property
265
+ @pulumi.getter
266
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
267
+ """
268
+ The namespace to provision the resource in.
269
+ The value should not contain leading or trailing forward slashes.
270
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
+ *Available only for Vault Enterprise*.
272
+ """
273
+ return pulumi.get(self, "namespace")
274
+
275
+ @namespace.setter
276
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
277
+ pulumi.set(self, "namespace", value)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter
281
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
282
+ return pulumi.get(self, "organization")
283
+
284
+ @organization.setter
285
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
286
+ pulumi.set(self, "organization", value)
287
+
288
+ @_builtins.property
289
+ @pulumi.getter(name="teamId")
290
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
291
+ return pulumi.get(self, "team_id")
292
+
293
+ @team_id.setter
294
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
295
+ pulumi.set(self, "team_id", value)
296
+
297
+ @_builtins.property
298
+ @pulumi.getter
299
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
300
+ """
301
+ Specifies the TTL for this role, in seconds.
302
+ """
303
+ return pulumi.get(self, "ttl")
304
+
305
+ @ttl.setter
306
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
307
+ pulumi.set(self, "ttl", value)
308
+
309
+ @_builtins.property
310
+ @pulumi.getter(name="userId")
311
+ def user_id(self) -> Optional[pulumi.Input[_builtins.str]]:
312
+ return pulumi.get(self, "user_id")
313
+
314
+ @user_id.setter
315
+ def user_id(self, value: Optional[pulumi.Input[_builtins.str]]):
316
+ pulumi.set(self, "user_id", value)
317
+
318
+
319
+ @pulumi.type_token("vault:terraformcloud/secretRole:SecretRole")
320
+ class SecretRole(pulumi.CustomResource):
321
+ @overload
322
+ def __init__(__self__,
323
+ resource_name: str,
324
+ opts: Optional[pulumi.ResourceOptions] = None,
325
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
326
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
327
+ description: Optional[pulumi.Input[_builtins.str]] = None,
328
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
329
+ name: Optional[pulumi.Input[_builtins.str]] = None,
330
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
331
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
332
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
333
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
334
+ user_id: Optional[pulumi.Input[_builtins.str]] = None,
335
+ __props__=None):
336
+ """
337
+ ## Example Usage
338
+
339
+ ```python
340
+ import pulumi
341
+ import pulumi_vault as vault
342
+
343
+ test = vault.terraformcloud.SecretBackend("test",
344
+ backend="terraform",
345
+ description="Manages the Terraform Cloud backend",
346
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
347
+ example = vault.terraformcloud.SecretRole("example",
348
+ backend=test.backend,
349
+ name="test-role",
350
+ organization="example-organization-name",
351
+ team_id="team-ieF4isC...")
352
+ ```
353
+
354
+ ## Import
355
+
356
+ Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
357
+
358
+ ```sh
359
+ $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
360
+ ```
361
+
362
+ :param str resource_name: The name of the resource.
363
+ :param pulumi.ResourceOptions opts: Options for the resource.
364
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
365
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
366
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
367
+ The value should not contain leading or trailing forward slashes.
368
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
369
+ *Available only for Vault Enterprise*.
370
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
371
+ """
372
+ ...
373
+ @overload
374
+ def __init__(__self__,
375
+ resource_name: str,
376
+ args: Optional[SecretRoleArgs] = None,
377
+ opts: Optional[pulumi.ResourceOptions] = None):
378
+ """
379
+ ## Example Usage
380
+
381
+ ```python
382
+ import pulumi
383
+ import pulumi_vault as vault
384
+
385
+ test = vault.terraformcloud.SecretBackend("test",
386
+ backend="terraform",
387
+ description="Manages the Terraform Cloud backend",
388
+ token="V0idfhi2iksSDU234ucdbi2nidsi...")
389
+ example = vault.terraformcloud.SecretRole("example",
390
+ backend=test.backend,
391
+ name="test-role",
392
+ organization="example-organization-name",
393
+ team_id="team-ieF4isC...")
394
+ ```
395
+
396
+ ## Import
397
+
398
+ Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
399
+
400
+ ```sh
401
+ $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
402
+ ```
403
+
404
+ :param str resource_name: The name of the resource.
405
+ :param SecretRoleArgs args: The arguments to use to populate this resource's properties.
406
+ :param pulumi.ResourceOptions opts: Options for the resource.
407
+ """
408
+ ...
409
+ def __init__(__self__, resource_name: str, *args, **kwargs):
410
+ resource_args, opts = _utilities.get_resource_args_opts(SecretRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
411
+ if resource_args is not None:
412
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
413
+ else:
414
+ __self__._internal_init(resource_name, *args, **kwargs)
415
+
416
+ def _internal_init(__self__,
417
+ resource_name: str,
418
+ opts: Optional[pulumi.ResourceOptions] = None,
419
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
420
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
421
+ description: Optional[pulumi.Input[_builtins.str]] = None,
422
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
423
+ name: Optional[pulumi.Input[_builtins.str]] = None,
424
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
425
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
426
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
427
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
428
+ user_id: Optional[pulumi.Input[_builtins.str]] = None,
429
+ __props__=None):
430
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
431
+ if not isinstance(opts, pulumi.ResourceOptions):
432
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
433
+ if opts.id is None:
434
+ if __props__ is not None:
435
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
436
+ __props__ = SecretRoleArgs.__new__(SecretRoleArgs)
437
+
438
+ __props__.__dict__["backend"] = backend
439
+ __props__.__dict__["credential_type"] = credential_type
440
+ __props__.__dict__["description"] = description
441
+ __props__.__dict__["max_ttl"] = max_ttl
442
+ __props__.__dict__["name"] = name
443
+ __props__.__dict__["namespace"] = namespace
444
+ __props__.__dict__["organization"] = organization
445
+ __props__.__dict__["team_id"] = team_id
446
+ __props__.__dict__["ttl"] = ttl
447
+ __props__.__dict__["user_id"] = user_id
448
+ super(SecretRole, __self__).__init__(
449
+ 'vault:terraformcloud/secretRole:SecretRole',
450
+ resource_name,
451
+ __props__,
452
+ opts)
453
+
454
+ @staticmethod
455
+ def get(resource_name: str,
456
+ id: pulumi.Input[str],
457
+ opts: Optional[pulumi.ResourceOptions] = None,
458
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
459
+ credential_type: Optional[pulumi.Input[_builtins.str]] = None,
460
+ description: Optional[pulumi.Input[_builtins.str]] = None,
461
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
462
+ name: Optional[pulumi.Input[_builtins.str]] = None,
463
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
464
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
465
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
466
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
467
+ user_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretRole':
468
+ """
469
+ Get an existing SecretRole resource's state with the given name, id, and optional extra
470
+ properties used to qualify the lookup.
471
+
472
+ :param str resource_name: The unique name of the resulting resource.
473
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
474
+ :param pulumi.ResourceOptions opts: Options for the resource.
475
+ :param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
476
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
477
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
478
+ The value should not contain leading or trailing forward slashes.
479
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
480
+ *Available only for Vault Enterprise*.
481
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role, in seconds.
482
+ """
483
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
484
+
485
+ __props__ = _SecretRoleState.__new__(_SecretRoleState)
486
+
487
+ __props__.__dict__["backend"] = backend
488
+ __props__.__dict__["credential_type"] = credential_type
489
+ __props__.__dict__["description"] = description
490
+ __props__.__dict__["max_ttl"] = max_ttl
491
+ __props__.__dict__["name"] = name
492
+ __props__.__dict__["namespace"] = namespace
493
+ __props__.__dict__["organization"] = organization
494
+ __props__.__dict__["team_id"] = team_id
495
+ __props__.__dict__["ttl"] = ttl
496
+ __props__.__dict__["user_id"] = user_id
497
+ return SecretRole(resource_name, opts=opts, __props__=__props__)
498
+
499
+ @_builtins.property
500
+ @pulumi.getter
501
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
502
+ return pulumi.get(self, "backend")
503
+
504
+ @_builtins.property
505
+ @pulumi.getter(name="credentialType")
506
+ def credential_type(self) -> pulumi.Output[Optional[_builtins.str]]:
507
+ """
508
+ The type of credential to generate. Valid values are 'team', 'team_legacy', 'user', or 'organization'. Can only create multiple-team tokens with `team`.
509
+ """
510
+ return pulumi.get(self, "credential_type")
511
+
512
+ @_builtins.property
513
+ @pulumi.getter
514
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
515
+ return pulumi.get(self, "description")
516
+
517
+ @_builtins.property
518
+ @pulumi.getter(name="maxTtl")
519
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
520
+ """
521
+ Maximum TTL for leases associated with this role, in seconds.
522
+ """
523
+ return pulumi.get(self, "max_ttl")
524
+
525
+ @_builtins.property
526
+ @pulumi.getter
527
+ def name(self) -> pulumi.Output[_builtins.str]:
528
+ return pulumi.get(self, "name")
529
+
530
+ @_builtins.property
531
+ @pulumi.getter
532
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
533
+ """
534
+ The namespace to provision the resource in.
535
+ The value should not contain leading or trailing forward slashes.
536
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
537
+ *Available only for Vault Enterprise*.
538
+ """
539
+ return pulumi.get(self, "namespace")
540
+
541
+ @_builtins.property
542
+ @pulumi.getter
543
+ def organization(self) -> pulumi.Output[Optional[_builtins.str]]:
544
+ return pulumi.get(self, "organization")
545
+
546
+ @_builtins.property
547
+ @pulumi.getter(name="teamId")
548
+ def team_id(self) -> pulumi.Output[Optional[_builtins.str]]:
549
+ return pulumi.get(self, "team_id")
550
+
551
+ @_builtins.property
552
+ @pulumi.getter
553
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
554
+ """
555
+ Specifies the TTL for this role, in seconds.
556
+ """
557
+ return pulumi.get(self, "ttl")
558
+
559
+ @_builtins.property
560
+ @pulumi.getter(name="userId")
561
+ def user_id(self) -> pulumi.Output[Optional[_builtins.str]]:
562
+ return pulumi.get(self, "user_id")
563
+