pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/__init__.py +59 -0
  2. pulumi_vault/_inputs.py +380 -0
  3. pulumi_vault/_utilities.py +2 -2
  4. pulumi_vault/aws/secret_backend.py +188 -0
  5. pulumi_vault/aws/secret_backend_static_role.py +2 -2
  6. pulumi_vault/azure/backend.py +7 -21
  7. pulumi_vault/azure/backend_role.py +111 -0
  8. pulumi_vault/config/__init__.pyi +0 -3
  9. pulumi_vault/config/outputs.py +380 -0
  10. pulumi_vault/config/vars.py +0 -3
  11. pulumi_vault/consul/secret_backend.py +7 -35
  12. pulumi_vault/database/_inputs.py +536 -0
  13. pulumi_vault/database/outputs.py +483 -3
  14. pulumi_vault/gcp/_inputs.py +162 -4
  15. pulumi_vault/gcp/auth_backend.py +64 -3
  16. pulumi_vault/gcp/outputs.py +161 -4
  17. pulumi_vault/get_raft_autopilot_state.py +0 -12
  18. pulumi_vault/identity/group_alias.py +6 -6
  19. pulumi_vault/kubernetes/auth_backend_config.py +7 -7
  20. pulumi_vault/kubernetes/secret_backend_role.py +8 -4
  21. pulumi_vault/kv/_inputs.py +12 -0
  22. pulumi_vault/kv/outputs.py +12 -0
  23. pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
  24. pulumi_vault/ldap/secret_backend_static_role.py +2 -2
  25. pulumi_vault/managed/_inputs.py +12 -0
  26. pulumi_vault/managed/keys.py +20 -0
  27. pulumi_vault/managed/outputs.py +12 -0
  28. pulumi_vault/mongodbatlas/secret_role.py +2 -2
  29. pulumi_vault/namespace.py +46 -14
  30. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
  31. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
  32. pulumi_vault/pkisecret/secret_backend_role.py +54 -7
  33. pulumi_vault/rabbitmq/_inputs.py +36 -0
  34. pulumi_vault/rabbitmq/outputs.py +36 -0
  35. pulumi_vault/saml/auth_backend_role.py +7 -14
  36. pulumi_vault/secrets/__init__.py +14 -0
  37. pulumi_vault/secrets/sync_association.py +464 -0
  38. pulumi_vault/secrets/sync_aws_destination.py +564 -0
  39. pulumi_vault/secrets/sync_azure_destination.py +674 -0
  40. pulumi_vault/secrets/sync_config.py +297 -0
  41. pulumi_vault/secrets/sync_gcp_destination.py +438 -0
  42. pulumi_vault/secrets/sync_gh_destination.py +511 -0
  43. pulumi_vault/secrets/sync_vercel_destination.py +541 -0
  44. pulumi_vault/ssh/secret_backend_role.py +7 -14
  45. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
  46. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
  47. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
  48. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -37,6 +37,7 @@ class SecretBackendRoleArgs:
37
37
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
38
38
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
39
39
  enforce_hostnames: Optional[pulumi.Input[bool]] = None,
40
+ ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
40
41
  ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
41
42
  generate_lease: Optional[pulumi.Input[bool]] = None,
42
43
  issuer_ref: Optional[pulumi.Input[str]] = None,
@@ -84,6 +85,7 @@ class SecretBackendRoleArgs:
84
85
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
85
86
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
86
87
  :param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
88
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
87
89
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
88
90
  :param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
89
91
  :param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
@@ -104,7 +106,7 @@ class SecretBackendRoleArgs:
104
106
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
105
107
  *Available only for Vault Enterprise*.
106
108
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
107
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
109
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
108
110
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
109
111
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
110
112
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -159,6 +161,8 @@ class SecretBackendRoleArgs:
159
161
  pulumi.set(__self__, "email_protection_flag", email_protection_flag)
160
162
  if enforce_hostnames is not None:
161
163
  pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
164
+ if ext_key_usage_oids is not None:
165
+ pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
162
166
  if ext_key_usages is not None:
163
167
  pulumi.set(__self__, "ext_key_usages", ext_key_usages)
164
168
  if generate_lease is not None:
@@ -460,6 +464,18 @@ class SecretBackendRoleArgs:
460
464
  def enforce_hostnames(self, value: Optional[pulumi.Input[bool]]):
461
465
  pulumi.set(self, "enforce_hostnames", value)
462
466
 
467
+ @property
468
+ @pulumi.getter(name="extKeyUsageOids")
469
+ def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
470
+ """
471
+ Specify the allowed extended key usage OIDs constraint on issued certificates
472
+ """
473
+ return pulumi.get(self, "ext_key_usage_oids")
474
+
475
+ @ext_key_usage_oids.setter
476
+ def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
477
+ pulumi.set(self, "ext_key_usage_oids", value)
478
+
463
479
  @property
464
480
  @pulumi.getter(name="extKeyUsages")
465
481
  def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -605,7 +621,7 @@ class SecretBackendRoleArgs:
605
621
  @pulumi.getter(name="notBeforeDuration")
606
622
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
607
623
  """
608
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
624
+ Specifies the duration by which to backdate the NotBefore property.
609
625
  """
610
626
  return pulumi.get(self, "not_before_duration")
611
627
 
@@ -782,6 +798,7 @@ class _SecretBackendRoleState:
782
798
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
783
799
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
784
800
  enforce_hostnames: Optional[pulumi.Input[bool]] = None,
801
+ ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
785
802
  ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
786
803
  generate_lease: Optional[pulumi.Input[bool]] = None,
787
804
  issuer_ref: Optional[pulumi.Input[str]] = None,
@@ -829,6 +846,7 @@ class _SecretBackendRoleState:
829
846
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
830
847
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
831
848
  :param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
849
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
832
850
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
833
851
  :param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
834
852
  :param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
@@ -849,7 +867,7 @@ class _SecretBackendRoleState:
849
867
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
850
868
  *Available only for Vault Enterprise*.
851
869
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
852
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
870
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
853
871
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
854
872
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
855
873
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -905,6 +923,8 @@ class _SecretBackendRoleState:
905
923
  pulumi.set(__self__, "email_protection_flag", email_protection_flag)
906
924
  if enforce_hostnames is not None:
907
925
  pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
926
+ if ext_key_usage_oids is not None:
927
+ pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
908
928
  if ext_key_usages is not None:
909
929
  pulumi.set(__self__, "ext_key_usages", ext_key_usages)
910
930
  if generate_lease is not None:
@@ -1206,6 +1226,18 @@ class _SecretBackendRoleState:
1206
1226
  def enforce_hostnames(self, value: Optional[pulumi.Input[bool]]):
1207
1227
  pulumi.set(self, "enforce_hostnames", value)
1208
1228
 
1229
+ @property
1230
+ @pulumi.getter(name="extKeyUsageOids")
1231
+ def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1232
+ """
1233
+ Specify the allowed extended key usage OIDs constraint on issued certificates
1234
+ """
1235
+ return pulumi.get(self, "ext_key_usage_oids")
1236
+
1237
+ @ext_key_usage_oids.setter
1238
+ def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1239
+ pulumi.set(self, "ext_key_usage_oids", value)
1240
+
1209
1241
  @property
1210
1242
  @pulumi.getter(name="extKeyUsages")
1211
1243
  def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -1351,7 +1383,7 @@ class _SecretBackendRoleState:
1351
1383
  @pulumi.getter(name="notBeforeDuration")
1352
1384
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
1353
1385
  """
1354
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1386
+ Specifies the duration by which to backdate the NotBefore property.
1355
1387
  """
1356
1388
  return pulumi.get(self, "not_before_duration")
1357
1389
 
@@ -1530,6 +1562,7 @@ class SecretBackendRole(pulumi.CustomResource):
1530
1562
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1531
1563
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
1532
1564
  enforce_hostnames: Optional[pulumi.Input[bool]] = None,
1565
+ ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1533
1566
  ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1534
1567
  generate_lease: Optional[pulumi.Input[bool]] = None,
1535
1568
  issuer_ref: Optional[pulumi.Input[str]] = None,
@@ -1613,6 +1646,7 @@ class SecretBackendRole(pulumi.CustomResource):
1613
1646
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1614
1647
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
1615
1648
  :param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
1649
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
1616
1650
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
1617
1651
  :param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
1618
1652
  :param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
@@ -1633,7 +1667,7 @@ class SecretBackendRole(pulumi.CustomResource):
1633
1667
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1634
1668
  *Available only for Vault Enterprise*.
1635
1669
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1636
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1670
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1637
1671
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1638
1672
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1639
1673
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -1724,6 +1758,7 @@ class SecretBackendRole(pulumi.CustomResource):
1724
1758
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1725
1759
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
1726
1760
  enforce_hostnames: Optional[pulumi.Input[bool]] = None,
1761
+ ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1727
1762
  ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1728
1763
  generate_lease: Optional[pulumi.Input[bool]] = None,
1729
1764
  issuer_ref: Optional[pulumi.Input[str]] = None,
@@ -1780,6 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
1780
1815
  __props__.__dict__["countries"] = countries
1781
1816
  __props__.__dict__["email_protection_flag"] = email_protection_flag
1782
1817
  __props__.__dict__["enforce_hostnames"] = enforce_hostnames
1818
+ __props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
1783
1819
  __props__.__dict__["ext_key_usages"] = ext_key_usages
1784
1820
  __props__.__dict__["generate_lease"] = generate_lease
1785
1821
  __props__.__dict__["issuer_ref"] = issuer_ref
@@ -1835,6 +1871,7 @@ class SecretBackendRole(pulumi.CustomResource):
1835
1871
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1836
1872
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
1837
1873
  enforce_hostnames: Optional[pulumi.Input[bool]] = None,
1874
+ ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1838
1875
  ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1839
1876
  generate_lease: Optional[pulumi.Input[bool]] = None,
1840
1877
  issuer_ref: Optional[pulumi.Input[str]] = None,
@@ -1887,6 +1924,7 @@ class SecretBackendRole(pulumi.CustomResource):
1887
1924
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1888
1925
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
1889
1926
  :param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
1927
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
1890
1928
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
1891
1929
  :param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
1892
1930
  :param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
@@ -1907,7 +1945,7 @@ class SecretBackendRole(pulumi.CustomResource):
1907
1945
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1908
1946
  *Available only for Vault Enterprise*.
1909
1947
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1910
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1948
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1911
1949
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1912
1950
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1913
1951
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -1946,6 +1984,7 @@ class SecretBackendRole(pulumi.CustomResource):
1946
1984
  __props__.__dict__["countries"] = countries
1947
1985
  __props__.__dict__["email_protection_flag"] = email_protection_flag
1948
1986
  __props__.__dict__["enforce_hostnames"] = enforce_hostnames
1987
+ __props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
1949
1988
  __props__.__dict__["ext_key_usages"] = ext_key_usages
1950
1989
  __props__.__dict__["generate_lease"] = generate_lease
1951
1990
  __props__.__dict__["issuer_ref"] = issuer_ref
@@ -2140,6 +2179,14 @@ class SecretBackendRole(pulumi.CustomResource):
2140
2179
  """
2141
2180
  return pulumi.get(self, "enforce_hostnames")
2142
2181
 
2182
+ @property
2183
+ @pulumi.getter(name="extKeyUsageOids")
2184
+ def ext_key_usage_oids(self) -> pulumi.Output[Optional[Sequence[str]]]:
2185
+ """
2186
+ Specify the allowed extended key usage OIDs constraint on issued certificates
2187
+ """
2188
+ return pulumi.get(self, "ext_key_usage_oids")
2189
+
2143
2190
  @property
2144
2191
  @pulumi.getter(name="extKeyUsages")
2145
2192
  def ext_key_usages(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -2241,7 +2288,7 @@ class SecretBackendRole(pulumi.CustomResource):
2241
2288
  @pulumi.getter(name="notBeforeDuration")
2242
2289
  def not_before_duration(self) -> pulumi.Output[str]:
2243
2290
  """
2244
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
2291
+ Specifies the duration by which to backdate the NotBefore property.
2245
2292
  """
2246
2293
  return pulumi.get(self, "not_before_duration")
2247
2294
 
@@ -22,6 +22,12 @@ class SecretBackendRoleVhostArgs:
22
22
  host: pulumi.Input[str],
23
23
  read: pulumi.Input[str],
24
24
  write: pulumi.Input[str]):
25
+ """
26
+ :param pulumi.Input[str] configure: The configure permissions for this vhost.
27
+ :param pulumi.Input[str] host: The vhost to set permissions for.
28
+ :param pulumi.Input[str] read: The read permissions for this vhost.
29
+ :param pulumi.Input[str] write: The write permissions for this vhost.
30
+ """
25
31
  pulumi.set(__self__, "configure", configure)
26
32
  pulumi.set(__self__, "host", host)
27
33
  pulumi.set(__self__, "read", read)
@@ -30,6 +36,9 @@ class SecretBackendRoleVhostArgs:
30
36
  @property
31
37
  @pulumi.getter
32
38
  def configure(self) -> pulumi.Input[str]:
39
+ """
40
+ The configure permissions for this vhost.
41
+ """
33
42
  return pulumi.get(self, "configure")
34
43
 
35
44
  @configure.setter
@@ -39,6 +48,9 @@ class SecretBackendRoleVhostArgs:
39
48
  @property
40
49
  @pulumi.getter
41
50
  def host(self) -> pulumi.Input[str]:
51
+ """
52
+ The vhost to set permissions for.
53
+ """
42
54
  return pulumi.get(self, "host")
43
55
 
44
56
  @host.setter
@@ -48,6 +60,9 @@ class SecretBackendRoleVhostArgs:
48
60
  @property
49
61
  @pulumi.getter
50
62
  def read(self) -> pulumi.Input[str]:
63
+ """
64
+ The read permissions for this vhost.
65
+ """
51
66
  return pulumi.get(self, "read")
52
67
 
53
68
  @read.setter
@@ -57,6 +72,9 @@ class SecretBackendRoleVhostArgs:
57
72
  @property
58
73
  @pulumi.getter
59
74
  def write(self) -> pulumi.Input[str]:
75
+ """
76
+ The write permissions for this vhost.
77
+ """
60
78
  return pulumi.get(self, "write")
61
79
 
62
80
  @write.setter
@@ -70,6 +88,7 @@ class SecretBackendRoleVhostTopicArgs:
70
88
  host: pulumi.Input[str],
71
89
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]] = None):
72
90
  """
91
+ :param pulumi.Input[str] host: The vhost to set permissions for.
73
92
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
74
93
  """
75
94
  pulumi.set(__self__, "host", host)
@@ -79,6 +98,9 @@ class SecretBackendRoleVhostTopicArgs:
79
98
  @property
80
99
  @pulumi.getter
81
100
  def host(self) -> pulumi.Input[str]:
101
+ """
102
+ The vhost to set permissions for.
103
+ """
82
104
  return pulumi.get(self, "host")
83
105
 
84
106
  @host.setter
@@ -104,6 +126,11 @@ class SecretBackendRoleVhostTopicVhostArgs:
104
126
  read: pulumi.Input[str],
105
127
  topic: pulumi.Input[str],
106
128
  write: pulumi.Input[str]):
129
+ """
130
+ :param pulumi.Input[str] read: The read permissions for this vhost.
131
+ :param pulumi.Input[str] topic: The vhost to set permissions for.
132
+ :param pulumi.Input[str] write: The write permissions for this vhost.
133
+ """
107
134
  pulumi.set(__self__, "read", read)
108
135
  pulumi.set(__self__, "topic", topic)
109
136
  pulumi.set(__self__, "write", write)
@@ -111,6 +138,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
111
138
  @property
112
139
  @pulumi.getter
113
140
  def read(self) -> pulumi.Input[str]:
141
+ """
142
+ The read permissions for this vhost.
143
+ """
114
144
  return pulumi.get(self, "read")
115
145
 
116
146
  @read.setter
@@ -120,6 +150,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
120
150
  @property
121
151
  @pulumi.getter
122
152
  def topic(self) -> pulumi.Input[str]:
153
+ """
154
+ The vhost to set permissions for.
155
+ """
123
156
  return pulumi.get(self, "topic")
124
157
 
125
158
  @topic.setter
@@ -129,6 +162,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
129
162
  @property
130
163
  @pulumi.getter
131
164
  def write(self) -> pulumi.Input[str]:
165
+ """
166
+ The write permissions for this vhost.
167
+ """
132
168
  return pulumi.get(self, "write")
133
169
 
134
170
  @write.setter
@@ -23,6 +23,12 @@ class SecretBackendRoleVhost(dict):
23
23
  host: str,
24
24
  read: str,
25
25
  write: str):
26
+ """
27
+ :param str configure: The configure permissions for this vhost.
28
+ :param str host: The vhost to set permissions for.
29
+ :param str read: The read permissions for this vhost.
30
+ :param str write: The write permissions for this vhost.
31
+ """
26
32
  pulumi.set(__self__, "configure", configure)
27
33
  pulumi.set(__self__, "host", host)
28
34
  pulumi.set(__self__, "read", read)
@@ -31,21 +37,33 @@ class SecretBackendRoleVhost(dict):
31
37
  @property
32
38
  @pulumi.getter
33
39
  def configure(self) -> str:
40
+ """
41
+ The configure permissions for this vhost.
42
+ """
34
43
  return pulumi.get(self, "configure")
35
44
 
36
45
  @property
37
46
  @pulumi.getter
38
47
  def host(self) -> str:
48
+ """
49
+ The vhost to set permissions for.
50
+ """
39
51
  return pulumi.get(self, "host")
40
52
 
41
53
  @property
42
54
  @pulumi.getter
43
55
  def read(self) -> str:
56
+ """
57
+ The read permissions for this vhost.
58
+ """
44
59
  return pulumi.get(self, "read")
45
60
 
46
61
  @property
47
62
  @pulumi.getter
48
63
  def write(self) -> str:
64
+ """
65
+ The write permissions for this vhost.
66
+ """
49
67
  return pulumi.get(self, "write")
50
68
 
51
69
 
@@ -55,6 +73,7 @@ class SecretBackendRoleVhostTopic(dict):
55
73
  host: str,
56
74
  vhosts: Optional[Sequence['outputs.SecretBackendRoleVhostTopicVhost']] = None):
57
75
  """
76
+ :param str host: The vhost to set permissions for.
58
77
  :param Sequence['SecretBackendRoleVhostTopicVhostArgs'] vhosts: Specifies a map of virtual hosts to permissions.
59
78
  """
60
79
  pulumi.set(__self__, "host", host)
@@ -64,6 +83,9 @@ class SecretBackendRoleVhostTopic(dict):
64
83
  @property
65
84
  @pulumi.getter
66
85
  def host(self) -> str:
86
+ """
87
+ The vhost to set permissions for.
88
+ """
67
89
  return pulumi.get(self, "host")
68
90
 
69
91
  @property
@@ -81,6 +103,11 @@ class SecretBackendRoleVhostTopicVhost(dict):
81
103
  read: str,
82
104
  topic: str,
83
105
  write: str):
106
+ """
107
+ :param str read: The read permissions for this vhost.
108
+ :param str topic: The vhost to set permissions for.
109
+ :param str write: The write permissions for this vhost.
110
+ """
84
111
  pulumi.set(__self__, "read", read)
85
112
  pulumi.set(__self__, "topic", topic)
86
113
  pulumi.set(__self__, "write", write)
@@ -88,16 +115,25 @@ class SecretBackendRoleVhostTopicVhost(dict):
88
115
  @property
89
116
  @pulumi.getter
90
117
  def read(self) -> str:
118
+ """
119
+ The read permissions for this vhost.
120
+ """
91
121
  return pulumi.get(self, "read")
92
122
 
93
123
  @property
94
124
  @pulumi.getter
95
125
  def topic(self) -> str:
126
+ """
127
+ The vhost to set permissions for.
128
+ """
96
129
  return pulumi.get(self, "topic")
97
130
 
98
131
  @property
99
132
  @pulumi.getter
100
133
  def write(self) -> str:
134
+ """
135
+ The write permissions for this vhost.
136
+ """
101
137
  return pulumi.get(self, "write")
102
138
 
103
139
 
@@ -58,8 +58,7 @@ class AuthBackendRoleArgs:
58
58
  Its current value will be referenced at renewal time.
59
59
  :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
60
  generated tokens; otherwise it will be added to the policies set in token_policies.
61
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
62
- of times a generated token may be used (within its lifetime); 0 means unlimited.
61
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
63
62
  :param pulumi.Input[int] token_period: If set, indicates that the
64
63
  token generated using this role should never expire. The token should be renewed within the
65
64
  duration specified by this value. At each renewal, the token's TTL will be set to the
@@ -269,8 +268,7 @@ class AuthBackendRoleArgs:
269
268
  @pulumi.getter(name="tokenNumUses")
270
269
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
271
270
  """
272
- The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
273
- of times a generated token may be used (within its lifetime); 0 means unlimited.
271
+ The maximum number of times a token may be used, a value of zero means unlimited
274
272
  """
275
273
  return pulumi.get(self, "token_num_uses")
276
274
 
@@ -383,8 +381,7 @@ class _AuthBackendRoleState:
383
381
  Its current value will be referenced at renewal time.
384
382
  :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
385
383
  generated tokens; otherwise it will be added to the policies set in token_policies.
386
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
387
- of times a generated token may be used (within its lifetime); 0 means unlimited.
384
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
388
385
  :param pulumi.Input[int] token_period: If set, indicates that the
389
386
  token generated using this role should never expire. The token should be renewed within the
390
387
  duration specified by this value. At each renewal, the token's TTL will be set to the
@@ -595,8 +592,7 @@ class _AuthBackendRoleState:
595
592
  @pulumi.getter(name="tokenNumUses")
596
593
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
597
594
  """
598
- The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
599
- of times a generated token may be used (within its lifetime); 0 means unlimited.
595
+ The maximum number of times a token may be used, a value of zero means unlimited
600
596
  """
601
597
  return pulumi.get(self, "token_num_uses")
602
598
 
@@ -748,8 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
748
744
  Its current value will be referenced at renewal time.
749
745
  :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
750
746
  generated tokens; otherwise it will be added to the policies set in token_policies.
751
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
752
- of times a generated token may be used (within its lifetime); 0 means unlimited.
747
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
753
748
  :param pulumi.Input[int] token_period: If set, indicates that the
754
749
  token generated using this role should never expire. The token should be renewed within the
755
750
  duration specified by this value. At each renewal, the token's TTL will be set to the
@@ -925,8 +920,7 @@ class AuthBackendRole(pulumi.CustomResource):
925
920
  Its current value will be referenced at renewal time.
926
921
  :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
927
922
  generated tokens; otherwise it will be added to the policies set in token_policies.
928
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
929
- of times a generated token may be used (within its lifetime); 0 means unlimited.
923
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
930
924
  :param pulumi.Input[int] token_period: If set, indicates that the
931
925
  token generated using this role should never expire. The token should be renewed within the
932
926
  duration specified by this value. At each renewal, the token's TTL will be set to the
@@ -1077,8 +1071,7 @@ class AuthBackendRole(pulumi.CustomResource):
1077
1071
  @pulumi.getter(name="tokenNumUses")
1078
1072
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1079
1073
  """
1080
- The [maximum number](https://developer.hashicorp.com/vault/api-docs/auth/saml#token_num_uses)
1081
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1074
+ The maximum number of times a token may be used, a value of zero means unlimited
1082
1075
  """
1083
1076
  return pulumi.get(self, "token_num_uses")
1084
1077
 
@@ -0,0 +1,14 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ from .. import _utilities
6
+ import typing
7
+ # Export this package's modules as members:
8
+ from .sync_association import *
9
+ from .sync_aws_destination import *
10
+ from .sync_azure_destination import *
11
+ from .sync_config import *
12
+ from .sync_gcp_destination import *
13
+ from .sync_gh_destination import *
14
+ from .sync_vercel_destination import *