pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/azure/backend_role.py +111 -0
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +536 -0
- pulumi_vault/database/outputs.py +483 -3
- pulumi_vault/gcp/_inputs.py +162 -4
- pulumi_vault/gcp/auth_backend.py +64 -3
- pulumi_vault/gcp/outputs.py +161 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/auth_backend_config.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +54 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -37,6 +37,7 @@ class SecretBackendRoleArgs:
|
|
37
37
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
38
38
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
39
39
|
enforce_hostnames: Optional[pulumi.Input[bool]] = None,
|
40
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
41
|
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
41
42
|
generate_lease: Optional[pulumi.Input[bool]] = None,
|
42
43
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
@@ -84,6 +85,7 @@ class SecretBackendRoleArgs:
|
|
84
85
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
85
86
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
86
87
|
:param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
|
88
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
87
89
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
88
90
|
:param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
|
89
91
|
:param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
|
@@ -104,7 +106,7 @@ class SecretBackendRoleArgs:
|
|
104
106
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
105
107
|
*Available only for Vault Enterprise*.
|
106
108
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
107
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
109
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
108
110
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
109
111
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
110
112
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -159,6 +161,8 @@ class SecretBackendRoleArgs:
|
|
159
161
|
pulumi.set(__self__, "email_protection_flag", email_protection_flag)
|
160
162
|
if enforce_hostnames is not None:
|
161
163
|
pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
|
164
|
+
if ext_key_usage_oids is not None:
|
165
|
+
pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
|
162
166
|
if ext_key_usages is not None:
|
163
167
|
pulumi.set(__self__, "ext_key_usages", ext_key_usages)
|
164
168
|
if generate_lease is not None:
|
@@ -460,6 +464,18 @@ class SecretBackendRoleArgs:
|
|
460
464
|
def enforce_hostnames(self, value: Optional[pulumi.Input[bool]]):
|
461
465
|
pulumi.set(self, "enforce_hostnames", value)
|
462
466
|
|
467
|
+
@property
|
468
|
+
@pulumi.getter(name="extKeyUsageOids")
|
469
|
+
def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
470
|
+
"""
|
471
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
472
|
+
"""
|
473
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
474
|
+
|
475
|
+
@ext_key_usage_oids.setter
|
476
|
+
def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
477
|
+
pulumi.set(self, "ext_key_usage_oids", value)
|
478
|
+
|
463
479
|
@property
|
464
480
|
@pulumi.getter(name="extKeyUsages")
|
465
481
|
def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -605,7 +621,7 @@ class SecretBackendRoleArgs:
|
|
605
621
|
@pulumi.getter(name="notBeforeDuration")
|
606
622
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
607
623
|
"""
|
608
|
-
Specifies the
|
624
|
+
Specifies the duration by which to backdate the NotBefore property.
|
609
625
|
"""
|
610
626
|
return pulumi.get(self, "not_before_duration")
|
611
627
|
|
@@ -782,6 +798,7 @@ class _SecretBackendRoleState:
|
|
782
798
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
783
799
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
784
800
|
enforce_hostnames: Optional[pulumi.Input[bool]] = None,
|
801
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
785
802
|
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
786
803
|
generate_lease: Optional[pulumi.Input[bool]] = None,
|
787
804
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
@@ -829,6 +846,7 @@ class _SecretBackendRoleState:
|
|
829
846
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
830
847
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
831
848
|
:param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
|
849
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
832
850
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
833
851
|
:param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
|
834
852
|
:param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
|
@@ -849,7 +867,7 @@ class _SecretBackendRoleState:
|
|
849
867
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
850
868
|
*Available only for Vault Enterprise*.
|
851
869
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
852
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
870
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
853
871
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
854
872
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
855
873
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -905,6 +923,8 @@ class _SecretBackendRoleState:
|
|
905
923
|
pulumi.set(__self__, "email_protection_flag", email_protection_flag)
|
906
924
|
if enforce_hostnames is not None:
|
907
925
|
pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
|
926
|
+
if ext_key_usage_oids is not None:
|
927
|
+
pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
|
908
928
|
if ext_key_usages is not None:
|
909
929
|
pulumi.set(__self__, "ext_key_usages", ext_key_usages)
|
910
930
|
if generate_lease is not None:
|
@@ -1206,6 +1226,18 @@ class _SecretBackendRoleState:
|
|
1206
1226
|
def enforce_hostnames(self, value: Optional[pulumi.Input[bool]]):
|
1207
1227
|
pulumi.set(self, "enforce_hostnames", value)
|
1208
1228
|
|
1229
|
+
@property
|
1230
|
+
@pulumi.getter(name="extKeyUsageOids")
|
1231
|
+
def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1232
|
+
"""
|
1233
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
1234
|
+
"""
|
1235
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
1236
|
+
|
1237
|
+
@ext_key_usage_oids.setter
|
1238
|
+
def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1239
|
+
pulumi.set(self, "ext_key_usage_oids", value)
|
1240
|
+
|
1209
1241
|
@property
|
1210
1242
|
@pulumi.getter(name="extKeyUsages")
|
1211
1243
|
def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -1351,7 +1383,7 @@ class _SecretBackendRoleState:
|
|
1351
1383
|
@pulumi.getter(name="notBeforeDuration")
|
1352
1384
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
1353
1385
|
"""
|
1354
|
-
Specifies the
|
1386
|
+
Specifies the duration by which to backdate the NotBefore property.
|
1355
1387
|
"""
|
1356
1388
|
return pulumi.get(self, "not_before_duration")
|
1357
1389
|
|
@@ -1530,6 +1562,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1530
1562
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1531
1563
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
1532
1564
|
enforce_hostnames: Optional[pulumi.Input[bool]] = None,
|
1565
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1533
1566
|
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1534
1567
|
generate_lease: Optional[pulumi.Input[bool]] = None,
|
1535
1568
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
@@ -1613,6 +1646,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1613
1646
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1614
1647
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
1615
1648
|
:param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
|
1649
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
1616
1650
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
1617
1651
|
:param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
|
1618
1652
|
:param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
|
@@ -1633,7 +1667,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1633
1667
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1634
1668
|
*Available only for Vault Enterprise*.
|
1635
1669
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1636
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
1670
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1637
1671
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1638
1672
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1639
1673
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -1724,6 +1758,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1724
1758
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1725
1759
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
1726
1760
|
enforce_hostnames: Optional[pulumi.Input[bool]] = None,
|
1761
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1727
1762
|
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1728
1763
|
generate_lease: Optional[pulumi.Input[bool]] = None,
|
1729
1764
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
@@ -1780,6 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1780
1815
|
__props__.__dict__["countries"] = countries
|
1781
1816
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
1782
1817
|
__props__.__dict__["enforce_hostnames"] = enforce_hostnames
|
1818
|
+
__props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
|
1783
1819
|
__props__.__dict__["ext_key_usages"] = ext_key_usages
|
1784
1820
|
__props__.__dict__["generate_lease"] = generate_lease
|
1785
1821
|
__props__.__dict__["issuer_ref"] = issuer_ref
|
@@ -1835,6 +1871,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1835
1871
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1836
1872
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
1837
1873
|
enforce_hostnames: Optional[pulumi.Input[bool]] = None,
|
1874
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1838
1875
|
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1839
1876
|
generate_lease: Optional[pulumi.Input[bool]] = None,
|
1840
1877
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
@@ -1887,6 +1924,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1887
1924
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1888
1925
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
1889
1926
|
:param pulumi.Input[bool] enforce_hostnames: Flag to allow only valid host names
|
1927
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
1890
1928
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
1891
1929
|
:param pulumi.Input[bool] generate_lease: Flag to generate leases with certificates
|
1892
1930
|
:param pulumi.Input[str] issuer_ref: Specifies the default issuer of this request. May
|
@@ -1907,7 +1945,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1907
1945
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1908
1946
|
*Available only for Vault Enterprise*.
|
1909
1947
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1910
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
1948
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1911
1949
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1912
1950
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1913
1951
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -1946,6 +1984,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1946
1984
|
__props__.__dict__["countries"] = countries
|
1947
1985
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
1948
1986
|
__props__.__dict__["enforce_hostnames"] = enforce_hostnames
|
1987
|
+
__props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
|
1949
1988
|
__props__.__dict__["ext_key_usages"] = ext_key_usages
|
1950
1989
|
__props__.__dict__["generate_lease"] = generate_lease
|
1951
1990
|
__props__.__dict__["issuer_ref"] = issuer_ref
|
@@ -2140,6 +2179,14 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2140
2179
|
"""
|
2141
2180
|
return pulumi.get(self, "enforce_hostnames")
|
2142
2181
|
|
2182
|
+
@property
|
2183
|
+
@pulumi.getter(name="extKeyUsageOids")
|
2184
|
+
def ext_key_usage_oids(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
2185
|
+
"""
|
2186
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
2187
|
+
"""
|
2188
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
2189
|
+
|
2143
2190
|
@property
|
2144
2191
|
@pulumi.getter(name="extKeyUsages")
|
2145
2192
|
def ext_key_usages(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -2241,7 +2288,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2241
2288
|
@pulumi.getter(name="notBeforeDuration")
|
2242
2289
|
def not_before_duration(self) -> pulumi.Output[str]:
|
2243
2290
|
"""
|
2244
|
-
Specifies the
|
2291
|
+
Specifies the duration by which to backdate the NotBefore property.
|
2245
2292
|
"""
|
2246
2293
|
return pulumi.get(self, "not_before_duration")
|
2247
2294
|
|
pulumi_vault/rabbitmq/_inputs.py
CHANGED
@@ -22,6 +22,12 @@ class SecretBackendRoleVhostArgs:
|
|
22
22
|
host: pulumi.Input[str],
|
23
23
|
read: pulumi.Input[str],
|
24
24
|
write: pulumi.Input[str]):
|
25
|
+
"""
|
26
|
+
:param pulumi.Input[str] configure: The configure permissions for this vhost.
|
27
|
+
:param pulumi.Input[str] host: The vhost to set permissions for.
|
28
|
+
:param pulumi.Input[str] read: The read permissions for this vhost.
|
29
|
+
:param pulumi.Input[str] write: The write permissions for this vhost.
|
30
|
+
"""
|
25
31
|
pulumi.set(__self__, "configure", configure)
|
26
32
|
pulumi.set(__self__, "host", host)
|
27
33
|
pulumi.set(__self__, "read", read)
|
@@ -30,6 +36,9 @@ class SecretBackendRoleVhostArgs:
|
|
30
36
|
@property
|
31
37
|
@pulumi.getter
|
32
38
|
def configure(self) -> pulumi.Input[str]:
|
39
|
+
"""
|
40
|
+
The configure permissions for this vhost.
|
41
|
+
"""
|
33
42
|
return pulumi.get(self, "configure")
|
34
43
|
|
35
44
|
@configure.setter
|
@@ -39,6 +48,9 @@ class SecretBackendRoleVhostArgs:
|
|
39
48
|
@property
|
40
49
|
@pulumi.getter
|
41
50
|
def host(self) -> pulumi.Input[str]:
|
51
|
+
"""
|
52
|
+
The vhost to set permissions for.
|
53
|
+
"""
|
42
54
|
return pulumi.get(self, "host")
|
43
55
|
|
44
56
|
@host.setter
|
@@ -48,6 +60,9 @@ class SecretBackendRoleVhostArgs:
|
|
48
60
|
@property
|
49
61
|
@pulumi.getter
|
50
62
|
def read(self) -> pulumi.Input[str]:
|
63
|
+
"""
|
64
|
+
The read permissions for this vhost.
|
65
|
+
"""
|
51
66
|
return pulumi.get(self, "read")
|
52
67
|
|
53
68
|
@read.setter
|
@@ -57,6 +72,9 @@ class SecretBackendRoleVhostArgs:
|
|
57
72
|
@property
|
58
73
|
@pulumi.getter
|
59
74
|
def write(self) -> pulumi.Input[str]:
|
75
|
+
"""
|
76
|
+
The write permissions for this vhost.
|
77
|
+
"""
|
60
78
|
return pulumi.get(self, "write")
|
61
79
|
|
62
80
|
@write.setter
|
@@ -70,6 +88,7 @@ class SecretBackendRoleVhostTopicArgs:
|
|
70
88
|
host: pulumi.Input[str],
|
71
89
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]] = None):
|
72
90
|
"""
|
91
|
+
:param pulumi.Input[str] host: The vhost to set permissions for.
|
73
92
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
74
93
|
"""
|
75
94
|
pulumi.set(__self__, "host", host)
|
@@ -79,6 +98,9 @@ class SecretBackendRoleVhostTopicArgs:
|
|
79
98
|
@property
|
80
99
|
@pulumi.getter
|
81
100
|
def host(self) -> pulumi.Input[str]:
|
101
|
+
"""
|
102
|
+
The vhost to set permissions for.
|
103
|
+
"""
|
82
104
|
return pulumi.get(self, "host")
|
83
105
|
|
84
106
|
@host.setter
|
@@ -104,6 +126,11 @@ class SecretBackendRoleVhostTopicVhostArgs:
|
|
104
126
|
read: pulumi.Input[str],
|
105
127
|
topic: pulumi.Input[str],
|
106
128
|
write: pulumi.Input[str]):
|
129
|
+
"""
|
130
|
+
:param pulumi.Input[str] read: The read permissions for this vhost.
|
131
|
+
:param pulumi.Input[str] topic: The vhost to set permissions for.
|
132
|
+
:param pulumi.Input[str] write: The write permissions for this vhost.
|
133
|
+
"""
|
107
134
|
pulumi.set(__self__, "read", read)
|
108
135
|
pulumi.set(__self__, "topic", topic)
|
109
136
|
pulumi.set(__self__, "write", write)
|
@@ -111,6 +138,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
|
|
111
138
|
@property
|
112
139
|
@pulumi.getter
|
113
140
|
def read(self) -> pulumi.Input[str]:
|
141
|
+
"""
|
142
|
+
The read permissions for this vhost.
|
143
|
+
"""
|
114
144
|
return pulumi.get(self, "read")
|
115
145
|
|
116
146
|
@read.setter
|
@@ -120,6 +150,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
|
|
120
150
|
@property
|
121
151
|
@pulumi.getter
|
122
152
|
def topic(self) -> pulumi.Input[str]:
|
153
|
+
"""
|
154
|
+
The vhost to set permissions for.
|
155
|
+
"""
|
123
156
|
return pulumi.get(self, "topic")
|
124
157
|
|
125
158
|
@topic.setter
|
@@ -129,6 +162,9 @@ class SecretBackendRoleVhostTopicVhostArgs:
|
|
129
162
|
@property
|
130
163
|
@pulumi.getter
|
131
164
|
def write(self) -> pulumi.Input[str]:
|
165
|
+
"""
|
166
|
+
The write permissions for this vhost.
|
167
|
+
"""
|
132
168
|
return pulumi.get(self, "write")
|
133
169
|
|
134
170
|
@write.setter
|
pulumi_vault/rabbitmq/outputs.py
CHANGED
@@ -23,6 +23,12 @@ class SecretBackendRoleVhost(dict):
|
|
23
23
|
host: str,
|
24
24
|
read: str,
|
25
25
|
write: str):
|
26
|
+
"""
|
27
|
+
:param str configure: The configure permissions for this vhost.
|
28
|
+
:param str host: The vhost to set permissions for.
|
29
|
+
:param str read: The read permissions for this vhost.
|
30
|
+
:param str write: The write permissions for this vhost.
|
31
|
+
"""
|
26
32
|
pulumi.set(__self__, "configure", configure)
|
27
33
|
pulumi.set(__self__, "host", host)
|
28
34
|
pulumi.set(__self__, "read", read)
|
@@ -31,21 +37,33 @@ class SecretBackendRoleVhost(dict):
|
|
31
37
|
@property
|
32
38
|
@pulumi.getter
|
33
39
|
def configure(self) -> str:
|
40
|
+
"""
|
41
|
+
The configure permissions for this vhost.
|
42
|
+
"""
|
34
43
|
return pulumi.get(self, "configure")
|
35
44
|
|
36
45
|
@property
|
37
46
|
@pulumi.getter
|
38
47
|
def host(self) -> str:
|
48
|
+
"""
|
49
|
+
The vhost to set permissions for.
|
50
|
+
"""
|
39
51
|
return pulumi.get(self, "host")
|
40
52
|
|
41
53
|
@property
|
42
54
|
@pulumi.getter
|
43
55
|
def read(self) -> str:
|
56
|
+
"""
|
57
|
+
The read permissions for this vhost.
|
58
|
+
"""
|
44
59
|
return pulumi.get(self, "read")
|
45
60
|
|
46
61
|
@property
|
47
62
|
@pulumi.getter
|
48
63
|
def write(self) -> str:
|
64
|
+
"""
|
65
|
+
The write permissions for this vhost.
|
66
|
+
"""
|
49
67
|
return pulumi.get(self, "write")
|
50
68
|
|
51
69
|
|
@@ -55,6 +73,7 @@ class SecretBackendRoleVhostTopic(dict):
|
|
55
73
|
host: str,
|
56
74
|
vhosts: Optional[Sequence['outputs.SecretBackendRoleVhostTopicVhost']] = None):
|
57
75
|
"""
|
76
|
+
:param str host: The vhost to set permissions for.
|
58
77
|
:param Sequence['SecretBackendRoleVhostTopicVhostArgs'] vhosts: Specifies a map of virtual hosts to permissions.
|
59
78
|
"""
|
60
79
|
pulumi.set(__self__, "host", host)
|
@@ -64,6 +83,9 @@ class SecretBackendRoleVhostTopic(dict):
|
|
64
83
|
@property
|
65
84
|
@pulumi.getter
|
66
85
|
def host(self) -> str:
|
86
|
+
"""
|
87
|
+
The vhost to set permissions for.
|
88
|
+
"""
|
67
89
|
return pulumi.get(self, "host")
|
68
90
|
|
69
91
|
@property
|
@@ -81,6 +103,11 @@ class SecretBackendRoleVhostTopicVhost(dict):
|
|
81
103
|
read: str,
|
82
104
|
topic: str,
|
83
105
|
write: str):
|
106
|
+
"""
|
107
|
+
:param str read: The read permissions for this vhost.
|
108
|
+
:param str topic: The vhost to set permissions for.
|
109
|
+
:param str write: The write permissions for this vhost.
|
110
|
+
"""
|
84
111
|
pulumi.set(__self__, "read", read)
|
85
112
|
pulumi.set(__self__, "topic", topic)
|
86
113
|
pulumi.set(__self__, "write", write)
|
@@ -88,16 +115,25 @@ class SecretBackendRoleVhostTopicVhost(dict):
|
|
88
115
|
@property
|
89
116
|
@pulumi.getter
|
90
117
|
def read(self) -> str:
|
118
|
+
"""
|
119
|
+
The read permissions for this vhost.
|
120
|
+
"""
|
91
121
|
return pulumi.get(self, "read")
|
92
122
|
|
93
123
|
@property
|
94
124
|
@pulumi.getter
|
95
125
|
def topic(self) -> str:
|
126
|
+
"""
|
127
|
+
The vhost to set permissions for.
|
128
|
+
"""
|
96
129
|
return pulumi.get(self, "topic")
|
97
130
|
|
98
131
|
@property
|
99
132
|
@pulumi.getter
|
100
133
|
def write(self) -> str:
|
134
|
+
"""
|
135
|
+
The write permissions for this vhost.
|
136
|
+
"""
|
101
137
|
return pulumi.get(self, "write")
|
102
138
|
|
103
139
|
|
@@ -58,8 +58,7 @@ class AuthBackendRoleArgs:
|
|
58
58
|
Its current value will be referenced at renewal time.
|
59
59
|
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
60
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
61
|
-
:param pulumi.Input[int] token_num_uses: The
|
62
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
61
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
63
62
|
:param pulumi.Input[int] token_period: If set, indicates that the
|
64
63
|
token generated using this role should never expire. The token should be renewed within the
|
65
64
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
@@ -269,8 +268,7 @@ class AuthBackendRoleArgs:
|
|
269
268
|
@pulumi.getter(name="tokenNumUses")
|
270
269
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
271
270
|
"""
|
272
|
-
The
|
273
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
271
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
274
272
|
"""
|
275
273
|
return pulumi.get(self, "token_num_uses")
|
276
274
|
|
@@ -383,8 +381,7 @@ class _AuthBackendRoleState:
|
|
383
381
|
Its current value will be referenced at renewal time.
|
384
382
|
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
385
383
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
386
|
-
:param pulumi.Input[int] token_num_uses: The
|
387
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
384
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
388
385
|
:param pulumi.Input[int] token_period: If set, indicates that the
|
389
386
|
token generated using this role should never expire. The token should be renewed within the
|
390
387
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
@@ -595,8 +592,7 @@ class _AuthBackendRoleState:
|
|
595
592
|
@pulumi.getter(name="tokenNumUses")
|
596
593
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
597
594
|
"""
|
598
|
-
The
|
599
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
595
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
600
596
|
"""
|
601
597
|
return pulumi.get(self, "token_num_uses")
|
602
598
|
|
@@ -748,8 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
748
744
|
Its current value will be referenced at renewal time.
|
749
745
|
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
750
746
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
751
|
-
:param pulumi.Input[int] token_num_uses: The
|
752
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
747
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
753
748
|
:param pulumi.Input[int] token_period: If set, indicates that the
|
754
749
|
token generated using this role should never expire. The token should be renewed within the
|
755
750
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
@@ -925,8 +920,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
925
920
|
Its current value will be referenced at renewal time.
|
926
921
|
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
927
922
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
928
|
-
:param pulumi.Input[int] token_num_uses: The
|
929
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
923
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
930
924
|
:param pulumi.Input[int] token_period: If set, indicates that the
|
931
925
|
token generated using this role should never expire. The token should be renewed within the
|
932
926
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
@@ -1077,8 +1071,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1077
1071
|
@pulumi.getter(name="tokenNumUses")
|
1078
1072
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1079
1073
|
"""
|
1080
|
-
The
|
1081
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1074
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1082
1075
|
"""
|
1083
1076
|
return pulumi.get(self, "token_num_uses")
|
1084
1077
|
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
from .. import _utilities
|
6
|
+
import typing
|
7
|
+
# Export this package's modules as members:
|
8
|
+
from .sync_association import *
|
9
|
+
from .sync_aws_destination import *
|
10
|
+
from .sync_azure_destination import *
|
11
|
+
from .sync_config import *
|
12
|
+
from .sync_gcp_destination import *
|
13
|
+
from .sync_gh_destination import *
|
14
|
+
from .sync_vercel_destination import *
|