pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1194 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretRoleArgs', 'SecretRole']
18
+
19
+ @pulumi.input_type
20
+ class SecretRoleArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ scope: pulumi.Input[_builtins.str],
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
39
+ operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
41
+ tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
42
+ tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None):
43
+ """
44
+ The set of arguments for constructing a SecretRole resource.
45
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
46
+ not begin or end with a `/`. Defaults to `kmip`.
47
+ :param pulumi.Input[_builtins.str] role: Name of the role.
48
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
49
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
50
+ The value should not contain leading or trailing forward slashes.
51
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
52
+ *Available only for Vault Enterprise*.
53
+ :param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
54
+ :param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
55
+ :param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
56
+ :param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
57
+ :param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
58
+ :param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
59
+ :param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
60
+ :param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
61
+ :param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
62
+ :param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
63
+ :param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
64
+ :param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
65
+ :param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
66
+ :param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
67
+ :param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
68
+ :param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
69
+ :param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
70
+ """
71
+ pulumi.set(__self__, "path", path)
72
+ pulumi.set(__self__, "role", role)
73
+ pulumi.set(__self__, "scope", scope)
74
+ if namespace is not None:
75
+ pulumi.set(__self__, "namespace", namespace)
76
+ if operation_activate is not None:
77
+ pulumi.set(__self__, "operation_activate", operation_activate)
78
+ if operation_add_attribute is not None:
79
+ pulumi.set(__self__, "operation_add_attribute", operation_add_attribute)
80
+ if operation_all is not None:
81
+ pulumi.set(__self__, "operation_all", operation_all)
82
+ if operation_create is not None:
83
+ pulumi.set(__self__, "operation_create", operation_create)
84
+ if operation_destroy is not None:
85
+ pulumi.set(__self__, "operation_destroy", operation_destroy)
86
+ if operation_discover_versions is not None:
87
+ pulumi.set(__self__, "operation_discover_versions", operation_discover_versions)
88
+ if operation_get is not None:
89
+ pulumi.set(__self__, "operation_get", operation_get)
90
+ if operation_get_attribute_list is not None:
91
+ pulumi.set(__self__, "operation_get_attribute_list", operation_get_attribute_list)
92
+ if operation_get_attributes is not None:
93
+ pulumi.set(__self__, "operation_get_attributes", operation_get_attributes)
94
+ if operation_locate is not None:
95
+ pulumi.set(__self__, "operation_locate", operation_locate)
96
+ if operation_none is not None:
97
+ pulumi.set(__self__, "operation_none", operation_none)
98
+ if operation_register is not None:
99
+ pulumi.set(__self__, "operation_register", operation_register)
100
+ if operation_rekey is not None:
101
+ pulumi.set(__self__, "operation_rekey", operation_rekey)
102
+ if operation_revoke is not None:
103
+ pulumi.set(__self__, "operation_revoke", operation_revoke)
104
+ if tls_client_key_bits is not None:
105
+ pulumi.set(__self__, "tls_client_key_bits", tls_client_key_bits)
106
+ if tls_client_key_type is not None:
107
+ pulumi.set(__self__, "tls_client_key_type", tls_client_key_type)
108
+ if tls_client_ttl is not None:
109
+ pulumi.set(__self__, "tls_client_ttl", tls_client_ttl)
110
+
111
+ @_builtins.property
112
+ @pulumi.getter
113
+ def path(self) -> pulumi.Input[_builtins.str]:
114
+ """
115
+ The unique path this backend should be mounted at. Must
116
+ not begin or end with a `/`. Defaults to `kmip`.
117
+ """
118
+ return pulumi.get(self, "path")
119
+
120
+ @path.setter
121
+ def path(self, value: pulumi.Input[_builtins.str]):
122
+ pulumi.set(self, "path", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter
126
+ def role(self) -> pulumi.Input[_builtins.str]:
127
+ """
128
+ Name of the role.
129
+ """
130
+ return pulumi.get(self, "role")
131
+
132
+ @role.setter
133
+ def role(self, value: pulumi.Input[_builtins.str]):
134
+ pulumi.set(self, "role", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter
138
+ def scope(self) -> pulumi.Input[_builtins.str]:
139
+ """
140
+ Name of the scope.
141
+ """
142
+ return pulumi.get(self, "scope")
143
+
144
+ @scope.setter
145
+ def scope(self, value: pulumi.Input[_builtins.str]):
146
+ pulumi.set(self, "scope", value)
147
+
148
+ @_builtins.property
149
+ @pulumi.getter
150
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
151
+ """
152
+ The namespace to provision the resource in.
153
+ The value should not contain leading or trailing forward slashes.
154
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
+ *Available only for Vault Enterprise*.
156
+ """
157
+ return pulumi.get(self, "namespace")
158
+
159
+ @namespace.setter
160
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
161
+ pulumi.set(self, "namespace", value)
162
+
163
+ @_builtins.property
164
+ @pulumi.getter(name="operationActivate")
165
+ def operation_activate(self) -> Optional[pulumi.Input[_builtins.bool]]:
166
+ """
167
+ Grant permission to use the KMIP Activate operation.
168
+ """
169
+ return pulumi.get(self, "operation_activate")
170
+
171
+ @operation_activate.setter
172
+ def operation_activate(self, value: Optional[pulumi.Input[_builtins.bool]]):
173
+ pulumi.set(self, "operation_activate", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="operationAddAttribute")
177
+ def operation_add_attribute(self) -> Optional[pulumi.Input[_builtins.bool]]:
178
+ """
179
+ Grant permission to use the KMIP Add Attribute operation.
180
+ """
181
+ return pulumi.get(self, "operation_add_attribute")
182
+
183
+ @operation_add_attribute.setter
184
+ def operation_add_attribute(self, value: Optional[pulumi.Input[_builtins.bool]]):
185
+ pulumi.set(self, "operation_add_attribute", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter(name="operationAll")
189
+ def operation_all(self) -> Optional[pulumi.Input[_builtins.bool]]:
190
+ """
191
+ Grant all permissions to this role. May not be specified with any other `operation_*` params.
192
+ """
193
+ return pulumi.get(self, "operation_all")
194
+
195
+ @operation_all.setter
196
+ def operation_all(self, value: Optional[pulumi.Input[_builtins.bool]]):
197
+ pulumi.set(self, "operation_all", value)
198
+
199
+ @_builtins.property
200
+ @pulumi.getter(name="operationCreate")
201
+ def operation_create(self) -> Optional[pulumi.Input[_builtins.bool]]:
202
+ """
203
+ Grant permission to use the KMIP Create operation.
204
+ """
205
+ return pulumi.get(self, "operation_create")
206
+
207
+ @operation_create.setter
208
+ def operation_create(self, value: Optional[pulumi.Input[_builtins.bool]]):
209
+ pulumi.set(self, "operation_create", value)
210
+
211
+ @_builtins.property
212
+ @pulumi.getter(name="operationDestroy")
213
+ def operation_destroy(self) -> Optional[pulumi.Input[_builtins.bool]]:
214
+ """
215
+ Grant permission to use the KMIP Destroy operation.
216
+ """
217
+ return pulumi.get(self, "operation_destroy")
218
+
219
+ @operation_destroy.setter
220
+ def operation_destroy(self, value: Optional[pulumi.Input[_builtins.bool]]):
221
+ pulumi.set(self, "operation_destroy", value)
222
+
223
+ @_builtins.property
224
+ @pulumi.getter(name="operationDiscoverVersions")
225
+ def operation_discover_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
226
+ """
227
+ Grant permission to use the KMIP Discover Version operation.
228
+ """
229
+ return pulumi.get(self, "operation_discover_versions")
230
+
231
+ @operation_discover_versions.setter
232
+ def operation_discover_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
233
+ pulumi.set(self, "operation_discover_versions", value)
234
+
235
+ @_builtins.property
236
+ @pulumi.getter(name="operationGet")
237
+ def operation_get(self) -> Optional[pulumi.Input[_builtins.bool]]:
238
+ """
239
+ Grant permission to use the KMIP Get operation.
240
+ """
241
+ return pulumi.get(self, "operation_get")
242
+
243
+ @operation_get.setter
244
+ def operation_get(self, value: Optional[pulumi.Input[_builtins.bool]]):
245
+ pulumi.set(self, "operation_get", value)
246
+
247
+ @_builtins.property
248
+ @pulumi.getter(name="operationGetAttributeList")
249
+ def operation_get_attribute_list(self) -> Optional[pulumi.Input[_builtins.bool]]:
250
+ """
251
+ Grant permission to use the KMIP Get Atrribute List operation.
252
+ """
253
+ return pulumi.get(self, "operation_get_attribute_list")
254
+
255
+ @operation_get_attribute_list.setter
256
+ def operation_get_attribute_list(self, value: Optional[pulumi.Input[_builtins.bool]]):
257
+ pulumi.set(self, "operation_get_attribute_list", value)
258
+
259
+ @_builtins.property
260
+ @pulumi.getter(name="operationGetAttributes")
261
+ def operation_get_attributes(self) -> Optional[pulumi.Input[_builtins.bool]]:
262
+ """
263
+ Grant permission to use the KMIP Get Atrributes operation.
264
+ """
265
+ return pulumi.get(self, "operation_get_attributes")
266
+
267
+ @operation_get_attributes.setter
268
+ def operation_get_attributes(self, value: Optional[pulumi.Input[_builtins.bool]]):
269
+ pulumi.set(self, "operation_get_attributes", value)
270
+
271
+ @_builtins.property
272
+ @pulumi.getter(name="operationLocate")
273
+ def operation_locate(self) -> Optional[pulumi.Input[_builtins.bool]]:
274
+ """
275
+ Grant permission to use the KMIP Get Locate operation.
276
+ """
277
+ return pulumi.get(self, "operation_locate")
278
+
279
+ @operation_locate.setter
280
+ def operation_locate(self, value: Optional[pulumi.Input[_builtins.bool]]):
281
+ pulumi.set(self, "operation_locate", value)
282
+
283
+ @_builtins.property
284
+ @pulumi.getter(name="operationNone")
285
+ def operation_none(self) -> Optional[pulumi.Input[_builtins.bool]]:
286
+ """
287
+ Remove all permissions from this role. May not be specified with any other `operation_*` params.
288
+ """
289
+ return pulumi.get(self, "operation_none")
290
+
291
+ @operation_none.setter
292
+ def operation_none(self, value: Optional[pulumi.Input[_builtins.bool]]):
293
+ pulumi.set(self, "operation_none", value)
294
+
295
+ @_builtins.property
296
+ @pulumi.getter(name="operationRegister")
297
+ def operation_register(self) -> Optional[pulumi.Input[_builtins.bool]]:
298
+ """
299
+ Grant permission to use the KMIP Register operation.
300
+ """
301
+ return pulumi.get(self, "operation_register")
302
+
303
+ @operation_register.setter
304
+ def operation_register(self, value: Optional[pulumi.Input[_builtins.bool]]):
305
+ pulumi.set(self, "operation_register", value)
306
+
307
+ @_builtins.property
308
+ @pulumi.getter(name="operationRekey")
309
+ def operation_rekey(self) -> Optional[pulumi.Input[_builtins.bool]]:
310
+ """
311
+ Grant permission to use the KMIP Rekey operation.
312
+ """
313
+ return pulumi.get(self, "operation_rekey")
314
+
315
+ @operation_rekey.setter
316
+ def operation_rekey(self, value: Optional[pulumi.Input[_builtins.bool]]):
317
+ pulumi.set(self, "operation_rekey", value)
318
+
319
+ @_builtins.property
320
+ @pulumi.getter(name="operationRevoke")
321
+ def operation_revoke(self) -> Optional[pulumi.Input[_builtins.bool]]:
322
+ """
323
+ Grant permission to use the KMIP Revoke operation.
324
+ """
325
+ return pulumi.get(self, "operation_revoke")
326
+
327
+ @operation_revoke.setter
328
+ def operation_revoke(self, value: Optional[pulumi.Input[_builtins.bool]]):
329
+ pulumi.set(self, "operation_revoke", value)
330
+
331
+ @_builtins.property
332
+ @pulumi.getter(name="tlsClientKeyBits")
333
+ def tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
334
+ """
335
+ Client certificate key bits, valid values depend on key type.
336
+ """
337
+ return pulumi.get(self, "tls_client_key_bits")
338
+
339
+ @tls_client_key_bits.setter
340
+ def tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
341
+ pulumi.set(self, "tls_client_key_bits", value)
342
+
343
+ @_builtins.property
344
+ @pulumi.getter(name="tlsClientKeyType")
345
+ def tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
346
+ """
347
+ Client certificate key type, `rsa` or `ec`.
348
+ """
349
+ return pulumi.get(self, "tls_client_key_type")
350
+
351
+ @tls_client_key_type.setter
352
+ def tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
353
+ pulumi.set(self, "tls_client_key_type", value)
354
+
355
+ @_builtins.property
356
+ @pulumi.getter(name="tlsClientTtl")
357
+ def tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
358
+ """
359
+ Client certificate TTL in seconds.
360
+ """
361
+ return pulumi.get(self, "tls_client_ttl")
362
+
363
+ @tls_client_ttl.setter
364
+ def tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
365
+ pulumi.set(self, "tls_client_ttl", value)
366
+
367
+
368
+ @pulumi.input_type
369
+ class _SecretRoleState:
370
+ def __init__(__self__, *,
371
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
372
+ operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
373
+ operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
374
+ operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
375
+ operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
376
+ operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
378
+ operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
379
+ operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
380
+ operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
381
+ operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
382
+ operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
383
+ operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
384
+ operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
385
+ operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
386
+ path: Optional[pulumi.Input[_builtins.str]] = None,
387
+ role: Optional[pulumi.Input[_builtins.str]] = None,
388
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
389
+ tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
390
+ tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
391
+ tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None):
392
+ """
393
+ Input properties used for looking up and filtering SecretRole resources.
394
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
395
+ The value should not contain leading or trailing forward slashes.
396
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
397
+ *Available only for Vault Enterprise*.
398
+ :param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
399
+ :param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
400
+ :param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
401
+ :param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
402
+ :param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
403
+ :param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
404
+ :param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
405
+ :param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
406
+ :param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
407
+ :param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
408
+ :param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
409
+ :param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
410
+ :param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
411
+ :param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
412
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
413
+ not begin or end with a `/`. Defaults to `kmip`.
414
+ :param pulumi.Input[_builtins.str] role: Name of the role.
415
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
416
+ :param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
417
+ :param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
418
+ :param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
419
+ """
420
+ if namespace is not None:
421
+ pulumi.set(__self__, "namespace", namespace)
422
+ if operation_activate is not None:
423
+ pulumi.set(__self__, "operation_activate", operation_activate)
424
+ if operation_add_attribute is not None:
425
+ pulumi.set(__self__, "operation_add_attribute", operation_add_attribute)
426
+ if operation_all is not None:
427
+ pulumi.set(__self__, "operation_all", operation_all)
428
+ if operation_create is not None:
429
+ pulumi.set(__self__, "operation_create", operation_create)
430
+ if operation_destroy is not None:
431
+ pulumi.set(__self__, "operation_destroy", operation_destroy)
432
+ if operation_discover_versions is not None:
433
+ pulumi.set(__self__, "operation_discover_versions", operation_discover_versions)
434
+ if operation_get is not None:
435
+ pulumi.set(__self__, "operation_get", operation_get)
436
+ if operation_get_attribute_list is not None:
437
+ pulumi.set(__self__, "operation_get_attribute_list", operation_get_attribute_list)
438
+ if operation_get_attributes is not None:
439
+ pulumi.set(__self__, "operation_get_attributes", operation_get_attributes)
440
+ if operation_locate is not None:
441
+ pulumi.set(__self__, "operation_locate", operation_locate)
442
+ if operation_none is not None:
443
+ pulumi.set(__self__, "operation_none", operation_none)
444
+ if operation_register is not None:
445
+ pulumi.set(__self__, "operation_register", operation_register)
446
+ if operation_rekey is not None:
447
+ pulumi.set(__self__, "operation_rekey", operation_rekey)
448
+ if operation_revoke is not None:
449
+ pulumi.set(__self__, "operation_revoke", operation_revoke)
450
+ if path is not None:
451
+ pulumi.set(__self__, "path", path)
452
+ if role is not None:
453
+ pulumi.set(__self__, "role", role)
454
+ if scope is not None:
455
+ pulumi.set(__self__, "scope", scope)
456
+ if tls_client_key_bits is not None:
457
+ pulumi.set(__self__, "tls_client_key_bits", tls_client_key_bits)
458
+ if tls_client_key_type is not None:
459
+ pulumi.set(__self__, "tls_client_key_type", tls_client_key_type)
460
+ if tls_client_ttl is not None:
461
+ pulumi.set(__self__, "tls_client_ttl", tls_client_ttl)
462
+
463
+ @_builtins.property
464
+ @pulumi.getter
465
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
466
+ """
467
+ The namespace to provision the resource in.
468
+ The value should not contain leading or trailing forward slashes.
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
470
+ *Available only for Vault Enterprise*.
471
+ """
472
+ return pulumi.get(self, "namespace")
473
+
474
+ @namespace.setter
475
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
476
+ pulumi.set(self, "namespace", value)
477
+
478
+ @_builtins.property
479
+ @pulumi.getter(name="operationActivate")
480
+ def operation_activate(self) -> Optional[pulumi.Input[_builtins.bool]]:
481
+ """
482
+ Grant permission to use the KMIP Activate operation.
483
+ """
484
+ return pulumi.get(self, "operation_activate")
485
+
486
+ @operation_activate.setter
487
+ def operation_activate(self, value: Optional[pulumi.Input[_builtins.bool]]):
488
+ pulumi.set(self, "operation_activate", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter(name="operationAddAttribute")
492
+ def operation_add_attribute(self) -> Optional[pulumi.Input[_builtins.bool]]:
493
+ """
494
+ Grant permission to use the KMIP Add Attribute operation.
495
+ """
496
+ return pulumi.get(self, "operation_add_attribute")
497
+
498
+ @operation_add_attribute.setter
499
+ def operation_add_attribute(self, value: Optional[pulumi.Input[_builtins.bool]]):
500
+ pulumi.set(self, "operation_add_attribute", value)
501
+
502
+ @_builtins.property
503
+ @pulumi.getter(name="operationAll")
504
+ def operation_all(self) -> Optional[pulumi.Input[_builtins.bool]]:
505
+ """
506
+ Grant all permissions to this role. May not be specified with any other `operation_*` params.
507
+ """
508
+ return pulumi.get(self, "operation_all")
509
+
510
+ @operation_all.setter
511
+ def operation_all(self, value: Optional[pulumi.Input[_builtins.bool]]):
512
+ pulumi.set(self, "operation_all", value)
513
+
514
+ @_builtins.property
515
+ @pulumi.getter(name="operationCreate")
516
+ def operation_create(self) -> Optional[pulumi.Input[_builtins.bool]]:
517
+ """
518
+ Grant permission to use the KMIP Create operation.
519
+ """
520
+ return pulumi.get(self, "operation_create")
521
+
522
+ @operation_create.setter
523
+ def operation_create(self, value: Optional[pulumi.Input[_builtins.bool]]):
524
+ pulumi.set(self, "operation_create", value)
525
+
526
+ @_builtins.property
527
+ @pulumi.getter(name="operationDestroy")
528
+ def operation_destroy(self) -> Optional[pulumi.Input[_builtins.bool]]:
529
+ """
530
+ Grant permission to use the KMIP Destroy operation.
531
+ """
532
+ return pulumi.get(self, "operation_destroy")
533
+
534
+ @operation_destroy.setter
535
+ def operation_destroy(self, value: Optional[pulumi.Input[_builtins.bool]]):
536
+ pulumi.set(self, "operation_destroy", value)
537
+
538
+ @_builtins.property
539
+ @pulumi.getter(name="operationDiscoverVersions")
540
+ def operation_discover_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
541
+ """
542
+ Grant permission to use the KMIP Discover Version operation.
543
+ """
544
+ return pulumi.get(self, "operation_discover_versions")
545
+
546
+ @operation_discover_versions.setter
547
+ def operation_discover_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
548
+ pulumi.set(self, "operation_discover_versions", value)
549
+
550
+ @_builtins.property
551
+ @pulumi.getter(name="operationGet")
552
+ def operation_get(self) -> Optional[pulumi.Input[_builtins.bool]]:
553
+ """
554
+ Grant permission to use the KMIP Get operation.
555
+ """
556
+ return pulumi.get(self, "operation_get")
557
+
558
+ @operation_get.setter
559
+ def operation_get(self, value: Optional[pulumi.Input[_builtins.bool]]):
560
+ pulumi.set(self, "operation_get", value)
561
+
562
+ @_builtins.property
563
+ @pulumi.getter(name="operationGetAttributeList")
564
+ def operation_get_attribute_list(self) -> Optional[pulumi.Input[_builtins.bool]]:
565
+ """
566
+ Grant permission to use the KMIP Get Atrribute List operation.
567
+ """
568
+ return pulumi.get(self, "operation_get_attribute_list")
569
+
570
+ @operation_get_attribute_list.setter
571
+ def operation_get_attribute_list(self, value: Optional[pulumi.Input[_builtins.bool]]):
572
+ pulumi.set(self, "operation_get_attribute_list", value)
573
+
574
+ @_builtins.property
575
+ @pulumi.getter(name="operationGetAttributes")
576
+ def operation_get_attributes(self) -> Optional[pulumi.Input[_builtins.bool]]:
577
+ """
578
+ Grant permission to use the KMIP Get Atrributes operation.
579
+ """
580
+ return pulumi.get(self, "operation_get_attributes")
581
+
582
+ @operation_get_attributes.setter
583
+ def operation_get_attributes(self, value: Optional[pulumi.Input[_builtins.bool]]):
584
+ pulumi.set(self, "operation_get_attributes", value)
585
+
586
+ @_builtins.property
587
+ @pulumi.getter(name="operationLocate")
588
+ def operation_locate(self) -> Optional[pulumi.Input[_builtins.bool]]:
589
+ """
590
+ Grant permission to use the KMIP Get Locate operation.
591
+ """
592
+ return pulumi.get(self, "operation_locate")
593
+
594
+ @operation_locate.setter
595
+ def operation_locate(self, value: Optional[pulumi.Input[_builtins.bool]]):
596
+ pulumi.set(self, "operation_locate", value)
597
+
598
+ @_builtins.property
599
+ @pulumi.getter(name="operationNone")
600
+ def operation_none(self) -> Optional[pulumi.Input[_builtins.bool]]:
601
+ """
602
+ Remove all permissions from this role. May not be specified with any other `operation_*` params.
603
+ """
604
+ return pulumi.get(self, "operation_none")
605
+
606
+ @operation_none.setter
607
+ def operation_none(self, value: Optional[pulumi.Input[_builtins.bool]]):
608
+ pulumi.set(self, "operation_none", value)
609
+
610
+ @_builtins.property
611
+ @pulumi.getter(name="operationRegister")
612
+ def operation_register(self) -> Optional[pulumi.Input[_builtins.bool]]:
613
+ """
614
+ Grant permission to use the KMIP Register operation.
615
+ """
616
+ return pulumi.get(self, "operation_register")
617
+
618
+ @operation_register.setter
619
+ def operation_register(self, value: Optional[pulumi.Input[_builtins.bool]]):
620
+ pulumi.set(self, "operation_register", value)
621
+
622
+ @_builtins.property
623
+ @pulumi.getter(name="operationRekey")
624
+ def operation_rekey(self) -> Optional[pulumi.Input[_builtins.bool]]:
625
+ """
626
+ Grant permission to use the KMIP Rekey operation.
627
+ """
628
+ return pulumi.get(self, "operation_rekey")
629
+
630
+ @operation_rekey.setter
631
+ def operation_rekey(self, value: Optional[pulumi.Input[_builtins.bool]]):
632
+ pulumi.set(self, "operation_rekey", value)
633
+
634
+ @_builtins.property
635
+ @pulumi.getter(name="operationRevoke")
636
+ def operation_revoke(self) -> Optional[pulumi.Input[_builtins.bool]]:
637
+ """
638
+ Grant permission to use the KMIP Revoke operation.
639
+ """
640
+ return pulumi.get(self, "operation_revoke")
641
+
642
+ @operation_revoke.setter
643
+ def operation_revoke(self, value: Optional[pulumi.Input[_builtins.bool]]):
644
+ pulumi.set(self, "operation_revoke", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter
648
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
649
+ """
650
+ The unique path this backend should be mounted at. Must
651
+ not begin or end with a `/`. Defaults to `kmip`.
652
+ """
653
+ return pulumi.get(self, "path")
654
+
655
+ @path.setter
656
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
657
+ pulumi.set(self, "path", value)
658
+
659
+ @_builtins.property
660
+ @pulumi.getter
661
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
662
+ """
663
+ Name of the role.
664
+ """
665
+ return pulumi.get(self, "role")
666
+
667
+ @role.setter
668
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
669
+ pulumi.set(self, "role", value)
670
+
671
+ @_builtins.property
672
+ @pulumi.getter
673
+ def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
674
+ """
675
+ Name of the scope.
676
+ """
677
+ return pulumi.get(self, "scope")
678
+
679
+ @scope.setter
680
+ def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
681
+ pulumi.set(self, "scope", value)
682
+
683
+ @_builtins.property
684
+ @pulumi.getter(name="tlsClientKeyBits")
685
+ def tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
686
+ """
687
+ Client certificate key bits, valid values depend on key type.
688
+ """
689
+ return pulumi.get(self, "tls_client_key_bits")
690
+
691
+ @tls_client_key_bits.setter
692
+ def tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
693
+ pulumi.set(self, "tls_client_key_bits", value)
694
+
695
+ @_builtins.property
696
+ @pulumi.getter(name="tlsClientKeyType")
697
+ def tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
698
+ """
699
+ Client certificate key type, `rsa` or `ec`.
700
+ """
701
+ return pulumi.get(self, "tls_client_key_type")
702
+
703
+ @tls_client_key_type.setter
704
+ def tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
705
+ pulumi.set(self, "tls_client_key_type", value)
706
+
707
+ @_builtins.property
708
+ @pulumi.getter(name="tlsClientTtl")
709
+ def tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
710
+ """
711
+ Client certificate TTL in seconds.
712
+ """
713
+ return pulumi.get(self, "tls_client_ttl")
714
+
715
+ @tls_client_ttl.setter
716
+ def tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
717
+ pulumi.set(self, "tls_client_ttl", value)
718
+
719
+
720
+ @pulumi.type_token("vault:kmip/secretRole:SecretRole")
721
+ class SecretRole(pulumi.CustomResource):
722
+ @overload
723
+ def __init__(__self__,
724
+ resource_name: str,
725
+ opts: Optional[pulumi.ResourceOptions] = None,
726
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
727
+ operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
728
+ operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
729
+ operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
730
+ operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
731
+ operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
732
+ operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
733
+ operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
734
+ operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
735
+ operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
736
+ operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
737
+ operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
738
+ operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
739
+ operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
740
+ operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
741
+ path: Optional[pulumi.Input[_builtins.str]] = None,
742
+ role: Optional[pulumi.Input[_builtins.str]] = None,
743
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
744
+ tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
745
+ tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
746
+ tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
747
+ __props__=None):
748
+ """
749
+ Manages KMIP Secret roles in a Vault server. This feature requires
750
+ Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
751
+ for more information.
752
+
753
+ ## Example Usage
754
+
755
+ ```python
756
+ import pulumi
757
+ import pulumi_vault as vault
758
+
759
+ default = vault.kmip.SecretBackend("default",
760
+ path="kmip",
761
+ description="Vault KMIP backend")
762
+ dev = vault.kmip.SecretScope("dev",
763
+ path=default.path,
764
+ scope="dev",
765
+ force=True)
766
+ admin = vault.kmip.SecretRole("admin",
767
+ path=dev.path,
768
+ scope=dev.scope,
769
+ role="admin",
770
+ tls_client_key_type="ec",
771
+ tls_client_key_bits=256,
772
+ operation_activate=True,
773
+ operation_get=True,
774
+ operation_get_attributes=True,
775
+ operation_create=True,
776
+ operation_destroy=True)
777
+ ```
778
+
779
+ ## Import
780
+
781
+ KMIP Secret role can be imported using the `path`, e.g.
782
+
783
+ ```sh
784
+ $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
785
+ ```
786
+
787
+ :param str resource_name: The name of the resource.
788
+ :param pulumi.ResourceOptions opts: Options for the resource.
789
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
790
+ The value should not contain leading or trailing forward slashes.
791
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
792
+ *Available only for Vault Enterprise*.
793
+ :param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
794
+ :param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
795
+ :param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
796
+ :param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
797
+ :param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
798
+ :param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
799
+ :param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
800
+ :param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
801
+ :param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
802
+ :param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
803
+ :param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
804
+ :param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
805
+ :param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
806
+ :param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
807
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
808
+ not begin or end with a `/`. Defaults to `kmip`.
809
+ :param pulumi.Input[_builtins.str] role: Name of the role.
810
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
811
+ :param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
812
+ :param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
813
+ :param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
814
+ """
815
+ ...
816
+ @overload
817
+ def __init__(__self__,
818
+ resource_name: str,
819
+ args: SecretRoleArgs,
820
+ opts: Optional[pulumi.ResourceOptions] = None):
821
+ """
822
+ Manages KMIP Secret roles in a Vault server. This feature requires
823
+ Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
824
+ for more information.
825
+
826
+ ## Example Usage
827
+
828
+ ```python
829
+ import pulumi
830
+ import pulumi_vault as vault
831
+
832
+ default = vault.kmip.SecretBackend("default",
833
+ path="kmip",
834
+ description="Vault KMIP backend")
835
+ dev = vault.kmip.SecretScope("dev",
836
+ path=default.path,
837
+ scope="dev",
838
+ force=True)
839
+ admin = vault.kmip.SecretRole("admin",
840
+ path=dev.path,
841
+ scope=dev.scope,
842
+ role="admin",
843
+ tls_client_key_type="ec",
844
+ tls_client_key_bits=256,
845
+ operation_activate=True,
846
+ operation_get=True,
847
+ operation_get_attributes=True,
848
+ operation_create=True,
849
+ operation_destroy=True)
850
+ ```
851
+
852
+ ## Import
853
+
854
+ KMIP Secret role can be imported using the `path`, e.g.
855
+
856
+ ```sh
857
+ $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
858
+ ```
859
+
860
+ :param str resource_name: The name of the resource.
861
+ :param SecretRoleArgs args: The arguments to use to populate this resource's properties.
862
+ :param pulumi.ResourceOptions opts: Options for the resource.
863
+ """
864
+ ...
865
+ def __init__(__self__, resource_name: str, *args, **kwargs):
866
+ resource_args, opts = _utilities.get_resource_args_opts(SecretRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
867
+ if resource_args is not None:
868
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
869
+ else:
870
+ __self__._internal_init(resource_name, *args, **kwargs)
871
+
872
+ def _internal_init(__self__,
873
+ resource_name: str,
874
+ opts: Optional[pulumi.ResourceOptions] = None,
875
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
876
+ operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
877
+ operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
878
+ operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
879
+ operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
880
+ operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
881
+ operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
882
+ operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
883
+ operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
884
+ operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
885
+ operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
886
+ operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
887
+ operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
888
+ operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
889
+ operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
890
+ path: Optional[pulumi.Input[_builtins.str]] = None,
891
+ role: Optional[pulumi.Input[_builtins.str]] = None,
892
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
893
+ tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
894
+ tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
895
+ tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
896
+ __props__=None):
897
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
898
+ if not isinstance(opts, pulumi.ResourceOptions):
899
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
900
+ if opts.id is None:
901
+ if __props__ is not None:
902
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
903
+ __props__ = SecretRoleArgs.__new__(SecretRoleArgs)
904
+
905
+ __props__.__dict__["namespace"] = namespace
906
+ __props__.__dict__["operation_activate"] = operation_activate
907
+ __props__.__dict__["operation_add_attribute"] = operation_add_attribute
908
+ __props__.__dict__["operation_all"] = operation_all
909
+ __props__.__dict__["operation_create"] = operation_create
910
+ __props__.__dict__["operation_destroy"] = operation_destroy
911
+ __props__.__dict__["operation_discover_versions"] = operation_discover_versions
912
+ __props__.__dict__["operation_get"] = operation_get
913
+ __props__.__dict__["operation_get_attribute_list"] = operation_get_attribute_list
914
+ __props__.__dict__["operation_get_attributes"] = operation_get_attributes
915
+ __props__.__dict__["operation_locate"] = operation_locate
916
+ __props__.__dict__["operation_none"] = operation_none
917
+ __props__.__dict__["operation_register"] = operation_register
918
+ __props__.__dict__["operation_rekey"] = operation_rekey
919
+ __props__.__dict__["operation_revoke"] = operation_revoke
920
+ if path is None and not opts.urn:
921
+ raise TypeError("Missing required property 'path'")
922
+ __props__.__dict__["path"] = path
923
+ if role is None and not opts.urn:
924
+ raise TypeError("Missing required property 'role'")
925
+ __props__.__dict__["role"] = role
926
+ if scope is None and not opts.urn:
927
+ raise TypeError("Missing required property 'scope'")
928
+ __props__.__dict__["scope"] = scope
929
+ __props__.__dict__["tls_client_key_bits"] = tls_client_key_bits
930
+ __props__.__dict__["tls_client_key_type"] = tls_client_key_type
931
+ __props__.__dict__["tls_client_ttl"] = tls_client_ttl
932
+ super(SecretRole, __self__).__init__(
933
+ 'vault:kmip/secretRole:SecretRole',
934
+ resource_name,
935
+ __props__,
936
+ opts)
937
+
938
+ @staticmethod
939
+ def get(resource_name: str,
940
+ id: pulumi.Input[str],
941
+ opts: Optional[pulumi.ResourceOptions] = None,
942
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
943
+ operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
944
+ operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
945
+ operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
946
+ operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
947
+ operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
948
+ operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
949
+ operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
950
+ operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
951
+ operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
952
+ operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
953
+ operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
954
+ operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
955
+ operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
956
+ operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
957
+ path: Optional[pulumi.Input[_builtins.str]] = None,
958
+ role: Optional[pulumi.Input[_builtins.str]] = None,
959
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
960
+ tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
961
+ tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
962
+ tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretRole':
963
+ """
964
+ Get an existing SecretRole resource's state with the given name, id, and optional extra
965
+ properties used to qualify the lookup.
966
+
967
+ :param str resource_name: The unique name of the resulting resource.
968
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
969
+ :param pulumi.ResourceOptions opts: Options for the resource.
970
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
971
+ The value should not contain leading or trailing forward slashes.
972
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
973
+ *Available only for Vault Enterprise*.
974
+ :param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
975
+ :param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
976
+ :param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
977
+ :param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
978
+ :param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
979
+ :param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
980
+ :param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
981
+ :param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
982
+ :param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
983
+ :param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
984
+ :param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
985
+ :param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
986
+ :param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
987
+ :param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
988
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
989
+ not begin or end with a `/`. Defaults to `kmip`.
990
+ :param pulumi.Input[_builtins.str] role: Name of the role.
991
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
992
+ :param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
993
+ :param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
994
+ :param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
995
+ """
996
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
997
+
998
+ __props__ = _SecretRoleState.__new__(_SecretRoleState)
999
+
1000
+ __props__.__dict__["namespace"] = namespace
1001
+ __props__.__dict__["operation_activate"] = operation_activate
1002
+ __props__.__dict__["operation_add_attribute"] = operation_add_attribute
1003
+ __props__.__dict__["operation_all"] = operation_all
1004
+ __props__.__dict__["operation_create"] = operation_create
1005
+ __props__.__dict__["operation_destroy"] = operation_destroy
1006
+ __props__.__dict__["operation_discover_versions"] = operation_discover_versions
1007
+ __props__.__dict__["operation_get"] = operation_get
1008
+ __props__.__dict__["operation_get_attribute_list"] = operation_get_attribute_list
1009
+ __props__.__dict__["operation_get_attributes"] = operation_get_attributes
1010
+ __props__.__dict__["operation_locate"] = operation_locate
1011
+ __props__.__dict__["operation_none"] = operation_none
1012
+ __props__.__dict__["operation_register"] = operation_register
1013
+ __props__.__dict__["operation_rekey"] = operation_rekey
1014
+ __props__.__dict__["operation_revoke"] = operation_revoke
1015
+ __props__.__dict__["path"] = path
1016
+ __props__.__dict__["role"] = role
1017
+ __props__.__dict__["scope"] = scope
1018
+ __props__.__dict__["tls_client_key_bits"] = tls_client_key_bits
1019
+ __props__.__dict__["tls_client_key_type"] = tls_client_key_type
1020
+ __props__.__dict__["tls_client_ttl"] = tls_client_ttl
1021
+ return SecretRole(resource_name, opts=opts, __props__=__props__)
1022
+
1023
+ @_builtins.property
1024
+ @pulumi.getter
1025
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1026
+ """
1027
+ The namespace to provision the resource in.
1028
+ The value should not contain leading or trailing forward slashes.
1029
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1030
+ *Available only for Vault Enterprise*.
1031
+ """
1032
+ return pulumi.get(self, "namespace")
1033
+
1034
+ @_builtins.property
1035
+ @pulumi.getter(name="operationActivate")
1036
+ def operation_activate(self) -> pulumi.Output[_builtins.bool]:
1037
+ """
1038
+ Grant permission to use the KMIP Activate operation.
1039
+ """
1040
+ return pulumi.get(self, "operation_activate")
1041
+
1042
+ @_builtins.property
1043
+ @pulumi.getter(name="operationAddAttribute")
1044
+ def operation_add_attribute(self) -> pulumi.Output[_builtins.bool]:
1045
+ """
1046
+ Grant permission to use the KMIP Add Attribute operation.
1047
+ """
1048
+ return pulumi.get(self, "operation_add_attribute")
1049
+
1050
+ @_builtins.property
1051
+ @pulumi.getter(name="operationAll")
1052
+ def operation_all(self) -> pulumi.Output[_builtins.bool]:
1053
+ """
1054
+ Grant all permissions to this role. May not be specified with any other `operation_*` params.
1055
+ """
1056
+ return pulumi.get(self, "operation_all")
1057
+
1058
+ @_builtins.property
1059
+ @pulumi.getter(name="operationCreate")
1060
+ def operation_create(self) -> pulumi.Output[_builtins.bool]:
1061
+ """
1062
+ Grant permission to use the KMIP Create operation.
1063
+ """
1064
+ return pulumi.get(self, "operation_create")
1065
+
1066
+ @_builtins.property
1067
+ @pulumi.getter(name="operationDestroy")
1068
+ def operation_destroy(self) -> pulumi.Output[_builtins.bool]:
1069
+ """
1070
+ Grant permission to use the KMIP Destroy operation.
1071
+ """
1072
+ return pulumi.get(self, "operation_destroy")
1073
+
1074
+ @_builtins.property
1075
+ @pulumi.getter(name="operationDiscoverVersions")
1076
+ def operation_discover_versions(self) -> pulumi.Output[_builtins.bool]:
1077
+ """
1078
+ Grant permission to use the KMIP Discover Version operation.
1079
+ """
1080
+ return pulumi.get(self, "operation_discover_versions")
1081
+
1082
+ @_builtins.property
1083
+ @pulumi.getter(name="operationGet")
1084
+ def operation_get(self) -> pulumi.Output[_builtins.bool]:
1085
+ """
1086
+ Grant permission to use the KMIP Get operation.
1087
+ """
1088
+ return pulumi.get(self, "operation_get")
1089
+
1090
+ @_builtins.property
1091
+ @pulumi.getter(name="operationGetAttributeList")
1092
+ def operation_get_attribute_list(self) -> pulumi.Output[_builtins.bool]:
1093
+ """
1094
+ Grant permission to use the KMIP Get Atrribute List operation.
1095
+ """
1096
+ return pulumi.get(self, "operation_get_attribute_list")
1097
+
1098
+ @_builtins.property
1099
+ @pulumi.getter(name="operationGetAttributes")
1100
+ def operation_get_attributes(self) -> pulumi.Output[_builtins.bool]:
1101
+ """
1102
+ Grant permission to use the KMIP Get Atrributes operation.
1103
+ """
1104
+ return pulumi.get(self, "operation_get_attributes")
1105
+
1106
+ @_builtins.property
1107
+ @pulumi.getter(name="operationLocate")
1108
+ def operation_locate(self) -> pulumi.Output[_builtins.bool]:
1109
+ """
1110
+ Grant permission to use the KMIP Get Locate operation.
1111
+ """
1112
+ return pulumi.get(self, "operation_locate")
1113
+
1114
+ @_builtins.property
1115
+ @pulumi.getter(name="operationNone")
1116
+ def operation_none(self) -> pulumi.Output[_builtins.bool]:
1117
+ """
1118
+ Remove all permissions from this role. May not be specified with any other `operation_*` params.
1119
+ """
1120
+ return pulumi.get(self, "operation_none")
1121
+
1122
+ @_builtins.property
1123
+ @pulumi.getter(name="operationRegister")
1124
+ def operation_register(self) -> pulumi.Output[_builtins.bool]:
1125
+ """
1126
+ Grant permission to use the KMIP Register operation.
1127
+ """
1128
+ return pulumi.get(self, "operation_register")
1129
+
1130
+ @_builtins.property
1131
+ @pulumi.getter(name="operationRekey")
1132
+ def operation_rekey(self) -> pulumi.Output[_builtins.bool]:
1133
+ """
1134
+ Grant permission to use the KMIP Rekey operation.
1135
+ """
1136
+ return pulumi.get(self, "operation_rekey")
1137
+
1138
+ @_builtins.property
1139
+ @pulumi.getter(name="operationRevoke")
1140
+ def operation_revoke(self) -> pulumi.Output[_builtins.bool]:
1141
+ """
1142
+ Grant permission to use the KMIP Revoke operation.
1143
+ """
1144
+ return pulumi.get(self, "operation_revoke")
1145
+
1146
+ @_builtins.property
1147
+ @pulumi.getter
1148
+ def path(self) -> pulumi.Output[_builtins.str]:
1149
+ """
1150
+ The unique path this backend should be mounted at. Must
1151
+ not begin or end with a `/`. Defaults to `kmip`.
1152
+ """
1153
+ return pulumi.get(self, "path")
1154
+
1155
+ @_builtins.property
1156
+ @pulumi.getter
1157
+ def role(self) -> pulumi.Output[_builtins.str]:
1158
+ """
1159
+ Name of the role.
1160
+ """
1161
+ return pulumi.get(self, "role")
1162
+
1163
+ @_builtins.property
1164
+ @pulumi.getter
1165
+ def scope(self) -> pulumi.Output[_builtins.str]:
1166
+ """
1167
+ Name of the scope.
1168
+ """
1169
+ return pulumi.get(self, "scope")
1170
+
1171
+ @_builtins.property
1172
+ @pulumi.getter(name="tlsClientKeyBits")
1173
+ def tls_client_key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
1174
+ """
1175
+ Client certificate key bits, valid values depend on key type.
1176
+ """
1177
+ return pulumi.get(self, "tls_client_key_bits")
1178
+
1179
+ @_builtins.property
1180
+ @pulumi.getter(name="tlsClientKeyType")
1181
+ def tls_client_key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1182
+ """
1183
+ Client certificate key type, `rsa` or `ec`.
1184
+ """
1185
+ return pulumi.get(self, "tls_client_key_type")
1186
+
1187
+ @_builtins.property
1188
+ @pulumi.getter(name="tlsClientTtl")
1189
+ def tls_client_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1190
+ """
1191
+ Client certificate TTL in seconds.
1192
+ """
1193
+ return pulumi.get(self, "tls_client_ttl")
1194
+