pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,499 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretRoleArgs', 'SecretRole']
18
+
19
+ @pulumi.input_type
20
+ class SecretRoleArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ service_account_name: pulumi.Input[_builtins.str],
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
27
+ """
28
+ The set of arguments for constructing a SecretRole resource.
29
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
30
+ with no leading or trailing `/`s.
31
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
32
+ Must be unique within the backend.
33
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
34
+ account mapped to this role.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
+ The value should not contain leading or trailing forward slashes.
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
+ *Available only for Vault Enterprise*.
39
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
40
+ ttl if not provided.
41
+ """
42
+ pulumi.set(__self__, "backend", backend)
43
+ pulumi.set(__self__, "role", role)
44
+ pulumi.set(__self__, "service_account_name", service_account_name)
45
+ if namespace is not None:
46
+ pulumi.set(__self__, "namespace", namespace)
47
+ if ttl is not None:
48
+ pulumi.set(__self__, "ttl", ttl)
49
+
50
+ @_builtins.property
51
+ @pulumi.getter
52
+ def backend(self) -> pulumi.Input[_builtins.str]:
53
+ """
54
+ The path the AD secret backend is mounted at,
55
+ with no leading or trailing `/`s.
56
+ """
57
+ return pulumi.get(self, "backend")
58
+
59
+ @backend.setter
60
+ def backend(self, value: pulumi.Input[_builtins.str]):
61
+ pulumi.set(self, "backend", value)
62
+
63
+ @_builtins.property
64
+ @pulumi.getter
65
+ def role(self) -> pulumi.Input[_builtins.str]:
66
+ """
67
+ The name to identify this role within the backend.
68
+ Must be unique within the backend.
69
+ """
70
+ return pulumi.get(self, "role")
71
+
72
+ @role.setter
73
+ def role(self, value: pulumi.Input[_builtins.str]):
74
+ pulumi.set(self, "role", value)
75
+
76
+ @_builtins.property
77
+ @pulumi.getter(name="serviceAccountName")
78
+ def service_account_name(self) -> pulumi.Input[_builtins.str]:
79
+ """
80
+ Specifies the name of the Active Directory service
81
+ account mapped to this role.
82
+ """
83
+ return pulumi.get(self, "service_account_name")
84
+
85
+ @service_account_name.setter
86
+ def service_account_name(self, value: pulumi.Input[_builtins.str]):
87
+ pulumi.set(self, "service_account_name", value)
88
+
89
+ @_builtins.property
90
+ @pulumi.getter
91
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
92
+ """
93
+ The namespace to provision the resource in.
94
+ The value should not contain leading or trailing forward slashes.
95
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
96
+ *Available only for Vault Enterprise*.
97
+ """
98
+ return pulumi.get(self, "namespace")
99
+
100
+ @namespace.setter
101
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
102
+ pulumi.set(self, "namespace", value)
103
+
104
+ @_builtins.property
105
+ @pulumi.getter
106
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
107
+ """
108
+ The password time-to-live in seconds. Defaults to the configuration
109
+ ttl if not provided.
110
+ """
111
+ return pulumi.get(self, "ttl")
112
+
113
+ @ttl.setter
114
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
115
+ pulumi.set(self, "ttl", value)
116
+
117
+
118
+ @pulumi.input_type
119
+ class _SecretRoleState:
120
+ def __init__(__self__, *,
121
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
122
+ last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
123
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
124
+ password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
125
+ role: Optional[pulumi.Input[_builtins.str]] = None,
126
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
127
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
128
+ """
129
+ Input properties used for looking up and filtering SecretRole resources.
130
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
131
+ with no leading or trailing `/`s.
132
+ :param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
133
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
134
+ The value should not contain leading or trailing forward slashes.
135
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
+ *Available only for Vault Enterprise*.
137
+ :param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
138
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
139
+ Must be unique within the backend.
140
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
141
+ account mapped to this role.
142
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
143
+ ttl if not provided.
144
+ """
145
+ if backend is not None:
146
+ pulumi.set(__self__, "backend", backend)
147
+ if last_vault_rotation is not None:
148
+ pulumi.set(__self__, "last_vault_rotation", last_vault_rotation)
149
+ if namespace is not None:
150
+ pulumi.set(__self__, "namespace", namespace)
151
+ if password_last_set is not None:
152
+ pulumi.set(__self__, "password_last_set", password_last_set)
153
+ if role is not None:
154
+ pulumi.set(__self__, "role", role)
155
+ if service_account_name is not None:
156
+ pulumi.set(__self__, "service_account_name", service_account_name)
157
+ if ttl is not None:
158
+ pulumi.set(__self__, "ttl", ttl)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter
162
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
163
+ """
164
+ The path the AD secret backend is mounted at,
165
+ with no leading or trailing `/`s.
166
+ """
167
+ return pulumi.get(self, "backend")
168
+
169
+ @backend.setter
170
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
171
+ pulumi.set(self, "backend", value)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter(name="lastVaultRotation")
175
+ def last_vault_rotation(self) -> Optional[pulumi.Input[_builtins.str]]:
176
+ """
177
+ Timestamp of the last password rotation by Vault.
178
+ """
179
+ return pulumi.get(self, "last_vault_rotation")
180
+
181
+ @last_vault_rotation.setter
182
+ def last_vault_rotation(self, value: Optional[pulumi.Input[_builtins.str]]):
183
+ pulumi.set(self, "last_vault_rotation", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter
187
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
188
+ """
189
+ The namespace to provision the resource in.
190
+ The value should not contain leading or trailing forward slashes.
191
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
192
+ *Available only for Vault Enterprise*.
193
+ """
194
+ return pulumi.get(self, "namespace")
195
+
196
+ @namespace.setter
197
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
198
+ pulumi.set(self, "namespace", value)
199
+
200
+ @_builtins.property
201
+ @pulumi.getter(name="passwordLastSet")
202
+ def password_last_set(self) -> Optional[pulumi.Input[_builtins.str]]:
203
+ """
204
+ Timestamp of the last password set by Vault.
205
+ """
206
+ return pulumi.get(self, "password_last_set")
207
+
208
+ @password_last_set.setter
209
+ def password_last_set(self, value: Optional[pulumi.Input[_builtins.str]]):
210
+ pulumi.set(self, "password_last_set", value)
211
+
212
+ @_builtins.property
213
+ @pulumi.getter
214
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
215
+ """
216
+ The name to identify this role within the backend.
217
+ Must be unique within the backend.
218
+ """
219
+ return pulumi.get(self, "role")
220
+
221
+ @role.setter
222
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
223
+ pulumi.set(self, "role", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="serviceAccountName")
227
+ def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ Specifies the name of the Active Directory service
230
+ account mapped to this role.
231
+ """
232
+ return pulumi.get(self, "service_account_name")
233
+
234
+ @service_account_name.setter
235
+ def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
236
+ pulumi.set(self, "service_account_name", value)
237
+
238
+ @_builtins.property
239
+ @pulumi.getter
240
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
241
+ """
242
+ The password time-to-live in seconds. Defaults to the configuration
243
+ ttl if not provided.
244
+ """
245
+ return pulumi.get(self, "ttl")
246
+
247
+ @ttl.setter
248
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
249
+ pulumi.set(self, "ttl", value)
250
+
251
+
252
+ @pulumi.type_token("vault:ad/secretRole:SecretRole")
253
+ class SecretRole(pulumi.CustomResource):
254
+ @overload
255
+ def __init__(__self__,
256
+ resource_name: str,
257
+ opts: Optional[pulumi.ResourceOptions] = None,
258
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
259
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
260
+ role: Optional[pulumi.Input[_builtins.str]] = None,
261
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
262
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
263
+ __props__=None):
264
+ """
265
+ ## Example Usage
266
+
267
+ ```python
268
+ import pulumi
269
+ import pulumi_vault as vault
270
+
271
+ config = vault.ad.SecretBackend("config",
272
+ backend="ad",
273
+ binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
274
+ bindpass="SuperSecretPassw0rd",
275
+ url="ldaps://ad",
276
+ insecure_tls=True,
277
+ userdn="CN=Users,DC=corp,DC=example,DC=net")
278
+ role = vault.ad.SecretRole("role",
279
+ backend=config.backend,
280
+ role="bob",
281
+ service_account_name="Bob",
282
+ ttl=60)
283
+ ```
284
+
285
+ ## Import
286
+
287
+ AD secret backend roles can be imported using the `path`, e.g.
288
+
289
+ ```sh
290
+ $ pulumi import vault:ad/secretRole:SecretRole role ad/roles/bob
291
+ ```
292
+
293
+ :param str resource_name: The name of the resource.
294
+ :param pulumi.ResourceOptions opts: Options for the resource.
295
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
296
+ with no leading or trailing `/`s.
297
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
298
+ The value should not contain leading or trailing forward slashes.
299
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
300
+ *Available only for Vault Enterprise*.
301
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
302
+ Must be unique within the backend.
303
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
304
+ account mapped to this role.
305
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
306
+ ttl if not provided.
307
+ """
308
+ ...
309
+ @overload
310
+ def __init__(__self__,
311
+ resource_name: str,
312
+ args: SecretRoleArgs,
313
+ opts: Optional[pulumi.ResourceOptions] = None):
314
+ """
315
+ ## Example Usage
316
+
317
+ ```python
318
+ import pulumi
319
+ import pulumi_vault as vault
320
+
321
+ config = vault.ad.SecretBackend("config",
322
+ backend="ad",
323
+ binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
324
+ bindpass="SuperSecretPassw0rd",
325
+ url="ldaps://ad",
326
+ insecure_tls=True,
327
+ userdn="CN=Users,DC=corp,DC=example,DC=net")
328
+ role = vault.ad.SecretRole("role",
329
+ backend=config.backend,
330
+ role="bob",
331
+ service_account_name="Bob",
332
+ ttl=60)
333
+ ```
334
+
335
+ ## Import
336
+
337
+ AD secret backend roles can be imported using the `path`, e.g.
338
+
339
+ ```sh
340
+ $ pulumi import vault:ad/secretRole:SecretRole role ad/roles/bob
341
+ ```
342
+
343
+ :param str resource_name: The name of the resource.
344
+ :param SecretRoleArgs args: The arguments to use to populate this resource's properties.
345
+ :param pulumi.ResourceOptions opts: Options for the resource.
346
+ """
347
+ ...
348
+ def __init__(__self__, resource_name: str, *args, **kwargs):
349
+ resource_args, opts = _utilities.get_resource_args_opts(SecretRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
350
+ if resource_args is not None:
351
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
352
+ else:
353
+ __self__._internal_init(resource_name, *args, **kwargs)
354
+
355
+ def _internal_init(__self__,
356
+ resource_name: str,
357
+ opts: Optional[pulumi.ResourceOptions] = None,
358
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
359
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
360
+ role: Optional[pulumi.Input[_builtins.str]] = None,
361
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
362
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
363
+ __props__=None):
364
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
365
+ if not isinstance(opts, pulumi.ResourceOptions):
366
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
367
+ if opts.id is None:
368
+ if __props__ is not None:
369
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
370
+ __props__ = SecretRoleArgs.__new__(SecretRoleArgs)
371
+
372
+ if backend is None and not opts.urn:
373
+ raise TypeError("Missing required property 'backend'")
374
+ __props__.__dict__["backend"] = backend
375
+ __props__.__dict__["namespace"] = namespace
376
+ if role is None and not opts.urn:
377
+ raise TypeError("Missing required property 'role'")
378
+ __props__.__dict__["role"] = role
379
+ if service_account_name is None and not opts.urn:
380
+ raise TypeError("Missing required property 'service_account_name'")
381
+ __props__.__dict__["service_account_name"] = service_account_name
382
+ __props__.__dict__["ttl"] = ttl
383
+ __props__.__dict__["last_vault_rotation"] = None
384
+ __props__.__dict__["password_last_set"] = None
385
+ super(SecretRole, __self__).__init__(
386
+ 'vault:ad/secretRole:SecretRole',
387
+ resource_name,
388
+ __props__,
389
+ opts)
390
+
391
+ @staticmethod
392
+ def get(resource_name: str,
393
+ id: pulumi.Input[str],
394
+ opts: Optional[pulumi.ResourceOptions] = None,
395
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
396
+ last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
397
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
398
+ password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
399
+ role: Optional[pulumi.Input[_builtins.str]] = None,
400
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
401
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretRole':
402
+ """
403
+ Get an existing SecretRole resource's state with the given name, id, and optional extra
404
+ properties used to qualify the lookup.
405
+
406
+ :param str resource_name: The unique name of the resulting resource.
407
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
408
+ :param pulumi.ResourceOptions opts: Options for the resource.
409
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
410
+ with no leading or trailing `/`s.
411
+ :param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
412
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
413
+ The value should not contain leading or trailing forward slashes.
414
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
415
+ *Available only for Vault Enterprise*.
416
+ :param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
417
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
418
+ Must be unique within the backend.
419
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
420
+ account mapped to this role.
421
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
422
+ ttl if not provided.
423
+ """
424
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
425
+
426
+ __props__ = _SecretRoleState.__new__(_SecretRoleState)
427
+
428
+ __props__.__dict__["backend"] = backend
429
+ __props__.__dict__["last_vault_rotation"] = last_vault_rotation
430
+ __props__.__dict__["namespace"] = namespace
431
+ __props__.__dict__["password_last_set"] = password_last_set
432
+ __props__.__dict__["role"] = role
433
+ __props__.__dict__["service_account_name"] = service_account_name
434
+ __props__.__dict__["ttl"] = ttl
435
+ return SecretRole(resource_name, opts=opts, __props__=__props__)
436
+
437
+ @_builtins.property
438
+ @pulumi.getter
439
+ def backend(self) -> pulumi.Output[_builtins.str]:
440
+ """
441
+ The path the AD secret backend is mounted at,
442
+ with no leading or trailing `/`s.
443
+ """
444
+ return pulumi.get(self, "backend")
445
+
446
+ @_builtins.property
447
+ @pulumi.getter(name="lastVaultRotation")
448
+ def last_vault_rotation(self) -> pulumi.Output[_builtins.str]:
449
+ """
450
+ Timestamp of the last password rotation by Vault.
451
+ """
452
+ return pulumi.get(self, "last_vault_rotation")
453
+
454
+ @_builtins.property
455
+ @pulumi.getter
456
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
457
+ """
458
+ The namespace to provision the resource in.
459
+ The value should not contain leading or trailing forward slashes.
460
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
461
+ *Available only for Vault Enterprise*.
462
+ """
463
+ return pulumi.get(self, "namespace")
464
+
465
+ @_builtins.property
466
+ @pulumi.getter(name="passwordLastSet")
467
+ def password_last_set(self) -> pulumi.Output[_builtins.str]:
468
+ """
469
+ Timestamp of the last password set by Vault.
470
+ """
471
+ return pulumi.get(self, "password_last_set")
472
+
473
+ @_builtins.property
474
+ @pulumi.getter
475
+ def role(self) -> pulumi.Output[_builtins.str]:
476
+ """
477
+ The name to identify this role within the backend.
478
+ Must be unique within the backend.
479
+ """
480
+ return pulumi.get(self, "role")
481
+
482
+ @_builtins.property
483
+ @pulumi.getter(name="serviceAccountName")
484
+ def service_account_name(self) -> pulumi.Output[_builtins.str]:
485
+ """
486
+ Specifies the name of the Active Directory service
487
+ account mapped to this role.
488
+ """
489
+ return pulumi.get(self, "service_account_name")
490
+
491
+ @_builtins.property
492
+ @pulumi.getter
493
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
494
+ """
495
+ The password time-to-live in seconds. Defaults to the configuration
496
+ ttl if not provided.
497
+ """
498
+ return pulumi.get(self, "ttl")
499
+
@@ -0,0 +1,9 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .auth_backend_role import *