pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,639 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendStaticRoleArgs:
21
+ def __init__(__self__, *,
22
+ rotation_period: pulumi.Input[_builtins.int],
23
+ username: pulumi.Input[_builtins.str],
24
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
25
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
27
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
28
+ name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
30
+ """
31
+ The set of arguments for constructing a SecretBackendStaticRole resource.
32
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
33
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
34
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
35
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
36
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
37
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
38
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
39
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
40
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
41
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
42
+ not begin or end with a `/`. Defaults to `aws`
43
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
44
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
45
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
46
+ Must be unique within the backend.
47
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
+ The value should not contain leading or trailing forward slashes.
49
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
+ *Available only for Vault Enterprise*.
51
+ """
52
+ pulumi.set(__self__, "rotation_period", rotation_period)
53
+ pulumi.set(__self__, "username", username)
54
+ if assume_role_arn is not None:
55
+ pulumi.set(__self__, "assume_role_arn", assume_role_arn)
56
+ if assume_role_session_name is not None:
57
+ pulumi.set(__self__, "assume_role_session_name", assume_role_session_name)
58
+ if backend is not None:
59
+ pulumi.set(__self__, "backend", backend)
60
+ if external_id is not None:
61
+ pulumi.set(__self__, "external_id", external_id)
62
+ if name is not None:
63
+ pulumi.set(__self__, "name", name)
64
+ if namespace is not None:
65
+ pulumi.set(__self__, "namespace", namespace)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter(name="rotationPeriod")
69
+ def rotation_period(self) -> pulumi.Input[_builtins.int]:
70
+ """
71
+ How often Vault should rotate the password of the user entry.
72
+ """
73
+ return pulumi.get(self, "rotation_period")
74
+
75
+ @rotation_period.setter
76
+ def rotation_period(self, value: pulumi.Input[_builtins.int]):
77
+ pulumi.set(self, "rotation_period", value)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter
81
+ def username(self) -> pulumi.Input[_builtins.str]:
82
+ """
83
+ The username of the existing AWS IAM to manage password rotation for.
84
+ """
85
+ return pulumi.get(self, "username")
86
+
87
+ @username.setter
88
+ def username(self, value: pulumi.Input[_builtins.str]):
89
+ pulumi.set(self, "username", value)
90
+
91
+ @_builtins.property
92
+ @pulumi.getter(name="assumeRoleArn")
93
+ def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
94
+ """
95
+ Specifies the ARN of the role that Vault should assume.
96
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
97
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
98
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
99
+ """
100
+ return pulumi.get(self, "assume_role_arn")
101
+
102
+ @assume_role_arn.setter
103
+ def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
104
+ pulumi.set(self, "assume_role_arn", value)
105
+
106
+ @_builtins.property
107
+ @pulumi.getter(name="assumeRoleSessionName")
108
+ def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
109
+ """
110
+ Specifies the session name to use when assuming the role.
111
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
112
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
113
+ """
114
+ return pulumi.get(self, "assume_role_session_name")
115
+
116
+ @assume_role_session_name.setter
117
+ def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
118
+ pulumi.set(self, "assume_role_session_name", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter
122
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
123
+ """
124
+ The unique path this backend should be mounted at. Must
125
+ not begin or end with a `/`. Defaults to `aws`
126
+ """
127
+ return pulumi.get(self, "backend")
128
+
129
+ @backend.setter
130
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
131
+ pulumi.set(self, "backend", value)
132
+
133
+ @_builtins.property
134
+ @pulumi.getter(name="externalId")
135
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
136
+ """
137
+ Specifies the external ID to use when assuming the role.
138
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
139
+ """
140
+ return pulumi.get(self, "external_id")
141
+
142
+ @external_id.setter
143
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
144
+ pulumi.set(self, "external_id", value)
145
+
146
+ @_builtins.property
147
+ @pulumi.getter
148
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
149
+ """
150
+ The name to identify this role within the backend.
151
+ Must be unique within the backend.
152
+ """
153
+ return pulumi.get(self, "name")
154
+
155
+ @name.setter
156
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
157
+ pulumi.set(self, "name", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter
161
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The namespace to provision the resource in.
164
+ The value should not contain leading or trailing forward slashes.
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
+ *Available only for Vault Enterprise*.
167
+ """
168
+ return pulumi.get(self, "namespace")
169
+
170
+ @namespace.setter
171
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "namespace", value)
173
+
174
+
175
+ @pulumi.input_type
176
+ class _SecretBackendStaticRoleState:
177
+ def __init__(__self__, *,
178
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
179
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
180
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
181
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
182
+ name: Optional[pulumi.Input[_builtins.str]] = None,
183
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
184
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
185
+ username: Optional[pulumi.Input[_builtins.str]] = None):
186
+ """
187
+ Input properties used for looking up and filtering SecretBackendStaticRole resources.
188
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
189
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
190
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
191
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
192
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
193
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
194
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
195
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
196
+ not begin or end with a `/`. Defaults to `aws`
197
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
198
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
199
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
200
+ Must be unique within the backend.
201
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
202
+ The value should not contain leading or trailing forward slashes.
203
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
204
+ *Available only for Vault Enterprise*.
205
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
206
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
207
+ """
208
+ if assume_role_arn is not None:
209
+ pulumi.set(__self__, "assume_role_arn", assume_role_arn)
210
+ if assume_role_session_name is not None:
211
+ pulumi.set(__self__, "assume_role_session_name", assume_role_session_name)
212
+ if backend is not None:
213
+ pulumi.set(__self__, "backend", backend)
214
+ if external_id is not None:
215
+ pulumi.set(__self__, "external_id", external_id)
216
+ if name is not None:
217
+ pulumi.set(__self__, "name", name)
218
+ if namespace is not None:
219
+ pulumi.set(__self__, "namespace", namespace)
220
+ if rotation_period is not None:
221
+ pulumi.set(__self__, "rotation_period", rotation_period)
222
+ if username is not None:
223
+ pulumi.set(__self__, "username", username)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="assumeRoleArn")
227
+ def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ Specifies the ARN of the role that Vault should assume.
230
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
231
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
232
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
233
+ """
234
+ return pulumi.get(self, "assume_role_arn")
235
+
236
+ @assume_role_arn.setter
237
+ def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
238
+ pulumi.set(self, "assume_role_arn", value)
239
+
240
+ @_builtins.property
241
+ @pulumi.getter(name="assumeRoleSessionName")
242
+ def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
243
+ """
244
+ Specifies the session name to use when assuming the role.
245
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
246
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
247
+ """
248
+ return pulumi.get(self, "assume_role_session_name")
249
+
250
+ @assume_role_session_name.setter
251
+ def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
252
+ pulumi.set(self, "assume_role_session_name", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter
256
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
257
+ """
258
+ The unique path this backend should be mounted at. Must
259
+ not begin or end with a `/`. Defaults to `aws`
260
+ """
261
+ return pulumi.get(self, "backend")
262
+
263
+ @backend.setter
264
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
265
+ pulumi.set(self, "backend", value)
266
+
267
+ @_builtins.property
268
+ @pulumi.getter(name="externalId")
269
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
270
+ """
271
+ Specifies the external ID to use when assuming the role.
272
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
273
+ """
274
+ return pulumi.get(self, "external_id")
275
+
276
+ @external_id.setter
277
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
278
+ pulumi.set(self, "external_id", value)
279
+
280
+ @_builtins.property
281
+ @pulumi.getter
282
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
283
+ """
284
+ The name to identify this role within the backend.
285
+ Must be unique within the backend.
286
+ """
287
+ return pulumi.get(self, "name")
288
+
289
+ @name.setter
290
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
291
+ pulumi.set(self, "name", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter
295
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
296
+ """
297
+ The namespace to provision the resource in.
298
+ The value should not contain leading or trailing forward slashes.
299
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
300
+ *Available only for Vault Enterprise*.
301
+ """
302
+ return pulumi.get(self, "namespace")
303
+
304
+ @namespace.setter
305
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
306
+ pulumi.set(self, "namespace", value)
307
+
308
+ @_builtins.property
309
+ @pulumi.getter(name="rotationPeriod")
310
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
311
+ """
312
+ How often Vault should rotate the password of the user entry.
313
+ """
314
+ return pulumi.get(self, "rotation_period")
315
+
316
+ @rotation_period.setter
317
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
318
+ pulumi.set(self, "rotation_period", value)
319
+
320
+ @_builtins.property
321
+ @pulumi.getter
322
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
323
+ """
324
+ The username of the existing AWS IAM to manage password rotation for.
325
+ """
326
+ return pulumi.get(self, "username")
327
+
328
+ @username.setter
329
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
330
+ pulumi.set(self, "username", value)
331
+
332
+
333
+ @pulumi.type_token("vault:aws/secretBackendStaticRole:SecretBackendStaticRole")
334
+ class SecretBackendStaticRole(pulumi.CustomResource):
335
+ @overload
336
+ def __init__(__self__,
337
+ resource_name: str,
338
+ opts: Optional[pulumi.ResourceOptions] = None,
339
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
340
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
341
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
342
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
343
+ name: Optional[pulumi.Input[_builtins.str]] = None,
344
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
345
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
346
+ username: Optional[pulumi.Input[_builtins.str]] = None,
347
+ __props__=None):
348
+ """
349
+ ## Example Usage
350
+
351
+ ```python
352
+ import pulumi
353
+ import pulumi_vault as vault
354
+
355
+ aws = vault.aws.SecretBackend("aws",
356
+ path="my-aws",
357
+ description="Obtain AWS credentials.")
358
+ role = vault.aws.SecretBackendStaticRole("role",
359
+ backend=aws.path,
360
+ name="test",
361
+ username="my-test-user",
362
+ rotation_period=3600)
363
+ ```
364
+
365
+ ```python
366
+ import pulumi
367
+ import pulumi_vault as vault
368
+
369
+ aws = vault.aws.SecretBackend("aws",
370
+ path="my-aws",
371
+ description="Obtain AWS credentials.")
372
+ assume_role = vault.aws.SecretBackendStaticRole("assume-role",
373
+ backend=aws.path,
374
+ name="assume-role-test",
375
+ username="my-assume-role-user",
376
+ assume_role_arn="arn:aws:iam::123456789012:role/assume-role",
377
+ assume_role_session_name="assume-role-session",
378
+ external_id="test-id",
379
+ rotation_period=3600)
380
+ ```
381
+
382
+ ## Import
383
+
384
+ AWS secret backend static role can be imported using the full path to the role
385
+ of the form: `<mount_path>/static-roles/<role_name>` e.g.
386
+
387
+ ```sh
388
+ $ pulumi import vault:aws/secretBackendStaticRole:SecretBackendStaticRole role aws/static-roles/example-role
389
+ ```
390
+
391
+ :param str resource_name: The name of the resource.
392
+ :param pulumi.ResourceOptions opts: Options for the resource.
393
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
394
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
395
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
396
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
397
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
398
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
399
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
400
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
401
+ not begin or end with a `/`. Defaults to `aws`
402
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
403
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
404
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
405
+ Must be unique within the backend.
406
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
407
+ The value should not contain leading or trailing forward slashes.
408
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
409
+ *Available only for Vault Enterprise*.
410
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
411
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
412
+ """
413
+ ...
414
+ @overload
415
+ def __init__(__self__,
416
+ resource_name: str,
417
+ args: SecretBackendStaticRoleArgs,
418
+ opts: Optional[pulumi.ResourceOptions] = None):
419
+ """
420
+ ## Example Usage
421
+
422
+ ```python
423
+ import pulumi
424
+ import pulumi_vault as vault
425
+
426
+ aws = vault.aws.SecretBackend("aws",
427
+ path="my-aws",
428
+ description="Obtain AWS credentials.")
429
+ role = vault.aws.SecretBackendStaticRole("role",
430
+ backend=aws.path,
431
+ name="test",
432
+ username="my-test-user",
433
+ rotation_period=3600)
434
+ ```
435
+
436
+ ```python
437
+ import pulumi
438
+ import pulumi_vault as vault
439
+
440
+ aws = vault.aws.SecretBackend("aws",
441
+ path="my-aws",
442
+ description="Obtain AWS credentials.")
443
+ assume_role = vault.aws.SecretBackendStaticRole("assume-role",
444
+ backend=aws.path,
445
+ name="assume-role-test",
446
+ username="my-assume-role-user",
447
+ assume_role_arn="arn:aws:iam::123456789012:role/assume-role",
448
+ assume_role_session_name="assume-role-session",
449
+ external_id="test-id",
450
+ rotation_period=3600)
451
+ ```
452
+
453
+ ## Import
454
+
455
+ AWS secret backend static role can be imported using the full path to the role
456
+ of the form: `<mount_path>/static-roles/<role_name>` e.g.
457
+
458
+ ```sh
459
+ $ pulumi import vault:aws/secretBackendStaticRole:SecretBackendStaticRole role aws/static-roles/example-role
460
+ ```
461
+
462
+ :param str resource_name: The name of the resource.
463
+ :param SecretBackendStaticRoleArgs args: The arguments to use to populate this resource's properties.
464
+ :param pulumi.ResourceOptions opts: Options for the resource.
465
+ """
466
+ ...
467
+ def __init__(__self__, resource_name: str, *args, **kwargs):
468
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendStaticRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
469
+ if resource_args is not None:
470
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
471
+ else:
472
+ __self__._internal_init(resource_name, *args, **kwargs)
473
+
474
+ def _internal_init(__self__,
475
+ resource_name: str,
476
+ opts: Optional[pulumi.ResourceOptions] = None,
477
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
478
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
479
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
480
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
481
+ name: Optional[pulumi.Input[_builtins.str]] = None,
482
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
483
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
484
+ username: Optional[pulumi.Input[_builtins.str]] = None,
485
+ __props__=None):
486
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
487
+ if not isinstance(opts, pulumi.ResourceOptions):
488
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
489
+ if opts.id is None:
490
+ if __props__ is not None:
491
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
492
+ __props__ = SecretBackendStaticRoleArgs.__new__(SecretBackendStaticRoleArgs)
493
+
494
+ __props__.__dict__["assume_role_arn"] = assume_role_arn
495
+ __props__.__dict__["assume_role_session_name"] = assume_role_session_name
496
+ __props__.__dict__["backend"] = backend
497
+ __props__.__dict__["external_id"] = external_id
498
+ __props__.__dict__["name"] = name
499
+ __props__.__dict__["namespace"] = namespace
500
+ if rotation_period is None and not opts.urn:
501
+ raise TypeError("Missing required property 'rotation_period'")
502
+ __props__.__dict__["rotation_period"] = rotation_period
503
+ if username is None and not opts.urn:
504
+ raise TypeError("Missing required property 'username'")
505
+ __props__.__dict__["username"] = username
506
+ super(SecretBackendStaticRole, __self__).__init__(
507
+ 'vault:aws/secretBackendStaticRole:SecretBackendStaticRole',
508
+ resource_name,
509
+ __props__,
510
+ opts)
511
+
512
+ @staticmethod
513
+ def get(resource_name: str,
514
+ id: pulumi.Input[str],
515
+ opts: Optional[pulumi.ResourceOptions] = None,
516
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
517
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
518
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
519
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
520
+ name: Optional[pulumi.Input[_builtins.str]] = None,
521
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
522
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
523
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
524
+ """
525
+ Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
526
+ properties used to qualify the lookup.
527
+
528
+ :param str resource_name: The unique name of the resulting resource.
529
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
530
+ :param pulumi.ResourceOptions opts: Options for the resource.
531
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
532
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
533
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
534
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
535
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
536
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
537
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
538
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
539
+ not begin or end with a `/`. Defaults to `aws`
540
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
541
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
542
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
543
+ Must be unique within the backend.
544
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
545
+ The value should not contain leading or trailing forward slashes.
546
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
547
+ *Available only for Vault Enterprise*.
548
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
549
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
550
+ """
551
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
552
+
553
+ __props__ = _SecretBackendStaticRoleState.__new__(_SecretBackendStaticRoleState)
554
+
555
+ __props__.__dict__["assume_role_arn"] = assume_role_arn
556
+ __props__.__dict__["assume_role_session_name"] = assume_role_session_name
557
+ __props__.__dict__["backend"] = backend
558
+ __props__.__dict__["external_id"] = external_id
559
+ __props__.__dict__["name"] = name
560
+ __props__.__dict__["namespace"] = namespace
561
+ __props__.__dict__["rotation_period"] = rotation_period
562
+ __props__.__dict__["username"] = username
563
+ return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
564
+
565
+ @_builtins.property
566
+ @pulumi.getter(name="assumeRoleArn")
567
+ def assume_role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
568
+ """
569
+ Specifies the ARN of the role that Vault should assume.
570
+ When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
571
+ If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
572
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
573
+ """
574
+ return pulumi.get(self, "assume_role_arn")
575
+
576
+ @_builtins.property
577
+ @pulumi.getter(name="assumeRoleSessionName")
578
+ def assume_role_session_name(self) -> pulumi.Output[Optional[_builtins.str]]:
579
+ """
580
+ Specifies the session name to use when assuming the role.
581
+ If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
582
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
583
+ """
584
+ return pulumi.get(self, "assume_role_session_name")
585
+
586
+ @_builtins.property
587
+ @pulumi.getter
588
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
589
+ """
590
+ The unique path this backend should be mounted at. Must
591
+ not begin or end with a `/`. Defaults to `aws`
592
+ """
593
+ return pulumi.get(self, "backend")
594
+
595
+ @_builtins.property
596
+ @pulumi.getter(name="externalId")
597
+ def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
598
+ """
599
+ Specifies the external ID to use when assuming the role.
600
+ Requires Vault 1.19+. *Available only for Vault Enterprise*.
601
+ """
602
+ return pulumi.get(self, "external_id")
603
+
604
+ @_builtins.property
605
+ @pulumi.getter
606
+ def name(self) -> pulumi.Output[_builtins.str]:
607
+ """
608
+ The name to identify this role within the backend.
609
+ Must be unique within the backend.
610
+ """
611
+ return pulumi.get(self, "name")
612
+
613
+ @_builtins.property
614
+ @pulumi.getter
615
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
616
+ """
617
+ The namespace to provision the resource in.
618
+ The value should not contain leading or trailing forward slashes.
619
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
620
+ *Available only for Vault Enterprise*.
621
+ """
622
+ return pulumi.get(self, "namespace")
623
+
624
+ @_builtins.property
625
+ @pulumi.getter(name="rotationPeriod")
626
+ def rotation_period(self) -> pulumi.Output[_builtins.int]:
627
+ """
628
+ How often Vault should rotate the password of the user entry.
629
+ """
630
+ return pulumi.get(self, "rotation_period")
631
+
632
+ @_builtins.property
633
+ @pulumi.getter
634
+ def username(self) -> pulumi.Output[_builtins.str]:
635
+ """
636
+ The username of the existing AWS IAM to manage password rotation for.
637
+ """
638
+ return pulumi.get(self, "username")
639
+
@@ -0,0 +1,15 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .auth_backend_config import *
10
+ from .auth_backend_role import *
11
+ from .backend import *
12
+ from .backend_role import *
13
+ from .get_access_credentials import *
14
+ from ._inputs import *
15
+ from . import outputs