pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/__init__.py +59 -0
  2. pulumi_vault/_inputs.py +380 -0
  3. pulumi_vault/_utilities.py +2 -2
  4. pulumi_vault/aws/secret_backend.py +188 -0
  5. pulumi_vault/aws/secret_backend_static_role.py +2 -2
  6. pulumi_vault/azure/backend.py +7 -21
  7. pulumi_vault/azure/backend_role.py +111 -0
  8. pulumi_vault/config/__init__.pyi +0 -3
  9. pulumi_vault/config/outputs.py +380 -0
  10. pulumi_vault/config/vars.py +0 -3
  11. pulumi_vault/consul/secret_backend.py +7 -35
  12. pulumi_vault/database/_inputs.py +536 -0
  13. pulumi_vault/database/outputs.py +483 -3
  14. pulumi_vault/gcp/_inputs.py +162 -4
  15. pulumi_vault/gcp/auth_backend.py +64 -3
  16. pulumi_vault/gcp/outputs.py +161 -4
  17. pulumi_vault/get_raft_autopilot_state.py +0 -12
  18. pulumi_vault/identity/group_alias.py +6 -6
  19. pulumi_vault/kubernetes/auth_backend_config.py +7 -7
  20. pulumi_vault/kubernetes/secret_backend_role.py +8 -4
  21. pulumi_vault/kv/_inputs.py +12 -0
  22. pulumi_vault/kv/outputs.py +12 -0
  23. pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
  24. pulumi_vault/ldap/secret_backend_static_role.py +2 -2
  25. pulumi_vault/managed/_inputs.py +12 -0
  26. pulumi_vault/managed/keys.py +20 -0
  27. pulumi_vault/managed/outputs.py +12 -0
  28. pulumi_vault/mongodbatlas/secret_role.py +2 -2
  29. pulumi_vault/namespace.py +46 -14
  30. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
  31. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
  32. pulumi_vault/pkisecret/secret_backend_role.py +54 -7
  33. pulumi_vault/rabbitmq/_inputs.py +36 -0
  34. pulumi_vault/rabbitmq/outputs.py +36 -0
  35. pulumi_vault/saml/auth_backend_role.py +7 -14
  36. pulumi_vault/secrets/__init__.py +14 -0
  37. pulumi_vault/secrets/sync_association.py +464 -0
  38. pulumi_vault/secrets/sync_aws_destination.py +564 -0
  39. pulumi_vault/secrets/sync_azure_destination.py +674 -0
  40. pulumi_vault/secrets/sync_config.py +297 -0
  41. pulumi_vault/secrets/sync_gcp_destination.py +438 -0
  42. pulumi_vault/secrets/sync_gh_destination.py +511 -0
  43. pulumi_vault/secrets/sync_vercel_destination.py +541 -0
  44. pulumi_vault/ssh/secret_backend_role.py +7 -14
  45. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
  46. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
  47. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
  48. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -11,6 +11,7 @@ from .. import _utilities
11
11
 
12
12
  __all__ = [
13
13
  'AuthBackendCustomEndpointArgs',
14
+ 'AuthBackendTuneArgs',
14
15
  'SecretRolesetBindingArgs',
15
16
  'SecretStaticAccountBindingArgs',
16
17
  ]
@@ -28,8 +29,6 @@ class AuthBackendCustomEndpointArgs:
28
29
 
29
30
  The endpoint value provided for a given key has the form of `scheme://host:port`.
30
31
  The `scheme://` and `:port` portions of the endpoint value are optional.
31
-
32
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
33
32
  :param pulumi.Input[str] crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
34
33
  :param pulumi.Input[str] iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
35
34
  """
@@ -62,8 +61,6 @@ class AuthBackendCustomEndpointArgs:
62
61
 
63
62
  The endpoint value provided for a given key has the form of `scheme://host:port`.
64
63
  The `scheme://` and `:port` portions of the endpoint value are optional.
65
-
66
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
67
64
  """
68
65
  return pulumi.get(self, "compute")
69
66
 
@@ -96,6 +93,167 @@ class AuthBackendCustomEndpointArgs:
96
93
  pulumi.set(self, "iam", value)
97
94
 
98
95
 
96
+ @pulumi.input_type
97
+ class AuthBackendTuneArgs:
98
+ def __init__(__self__, *,
99
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
100
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
101
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
102
+ default_lease_ttl: Optional[pulumi.Input[str]] = None,
103
+ listing_visibility: Optional[pulumi.Input[str]] = None,
104
+ max_lease_ttl: Optional[pulumi.Input[str]] = None,
105
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
106
+ token_type: Optional[pulumi.Input[str]] = None):
107
+ """
108
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to whitelist and allowing
109
+ a plugin to include them in the response.
110
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
111
+ not be HMAC'd by audit devices in the request data object.
112
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
113
+ not be HMAC'd by audit devices in the response data object.
114
+ :param pulumi.Input[str] default_lease_ttl: Specifies the default time-to-live.
115
+ If set, this overrides the global default.
116
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
117
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in
118
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
119
+ :param pulumi.Input[str] max_lease_ttl: Specifies the maximum time-to-live.
120
+ If set, this overrides the global default.
121
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
122
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to whitelist and
123
+ pass from the request to the backend.
124
+ :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
125
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
126
+
127
+
128
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
129
+ """
130
+ if allowed_response_headers is not None:
131
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
132
+ if audit_non_hmac_request_keys is not None:
133
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
134
+ if audit_non_hmac_response_keys is not None:
135
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
136
+ if default_lease_ttl is not None:
137
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
138
+ if listing_visibility is not None:
139
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
140
+ if max_lease_ttl is not None:
141
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
142
+ if passthrough_request_headers is not None:
143
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
144
+ if token_type is not None:
145
+ pulumi.set(__self__, "token_type", token_type)
146
+
147
+ @property
148
+ @pulumi.getter(name="allowedResponseHeaders")
149
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
150
+ """
151
+ List of headers to whitelist and allowing
152
+ a plugin to include them in the response.
153
+ """
154
+ return pulumi.get(self, "allowed_response_headers")
155
+
156
+ @allowed_response_headers.setter
157
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
158
+ pulumi.set(self, "allowed_response_headers", value)
159
+
160
+ @property
161
+ @pulumi.getter(name="auditNonHmacRequestKeys")
162
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
163
+ """
164
+ Specifies the list of keys that will
165
+ not be HMAC'd by audit devices in the request data object.
166
+ """
167
+ return pulumi.get(self, "audit_non_hmac_request_keys")
168
+
169
+ @audit_non_hmac_request_keys.setter
170
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
171
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
172
+
173
+ @property
174
+ @pulumi.getter(name="auditNonHmacResponseKeys")
175
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
176
+ """
177
+ Specifies the list of keys that will
178
+ not be HMAC'd by audit devices in the response data object.
179
+ """
180
+ return pulumi.get(self, "audit_non_hmac_response_keys")
181
+
182
+ @audit_non_hmac_response_keys.setter
183
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
184
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
185
+
186
+ @property
187
+ @pulumi.getter(name="defaultLeaseTtl")
188
+ def default_lease_ttl(self) -> Optional[pulumi.Input[str]]:
189
+ """
190
+ Specifies the default time-to-live.
191
+ If set, this overrides the global default.
192
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
193
+ """
194
+ return pulumi.get(self, "default_lease_ttl")
195
+
196
+ @default_lease_ttl.setter
197
+ def default_lease_ttl(self, value: Optional[pulumi.Input[str]]):
198
+ pulumi.set(self, "default_lease_ttl", value)
199
+
200
+ @property
201
+ @pulumi.getter(name="listingVisibility")
202
+ def listing_visibility(self) -> Optional[pulumi.Input[str]]:
203
+ """
204
+ Specifies whether to show this mount in
205
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
206
+ """
207
+ return pulumi.get(self, "listing_visibility")
208
+
209
+ @listing_visibility.setter
210
+ def listing_visibility(self, value: Optional[pulumi.Input[str]]):
211
+ pulumi.set(self, "listing_visibility", value)
212
+
213
+ @property
214
+ @pulumi.getter(name="maxLeaseTtl")
215
+ def max_lease_ttl(self) -> Optional[pulumi.Input[str]]:
216
+ """
217
+ Specifies the maximum time-to-live.
218
+ If set, this overrides the global default.
219
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
220
+ """
221
+ return pulumi.get(self, "max_lease_ttl")
222
+
223
+ @max_lease_ttl.setter
224
+ def max_lease_ttl(self, value: Optional[pulumi.Input[str]]):
225
+ pulumi.set(self, "max_lease_ttl", value)
226
+
227
+ @property
228
+ @pulumi.getter(name="passthroughRequestHeaders")
229
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
230
+ """
231
+ List of headers to whitelist and
232
+ pass from the request to the backend.
233
+ """
234
+ return pulumi.get(self, "passthrough_request_headers")
235
+
236
+ @passthrough_request_headers.setter
237
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
238
+ pulumi.set(self, "passthrough_request_headers", value)
239
+
240
+ @property
241
+ @pulumi.getter(name="tokenType")
242
+ def token_type(self) -> Optional[pulumi.Input[str]]:
243
+ """
244
+ Specifies the type of tokens that should be returned by
245
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
246
+
247
+
248
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
249
+ """
250
+ return pulumi.get(self, "token_type")
251
+
252
+ @token_type.setter
253
+ def token_type(self, value: Optional[pulumi.Input[str]]):
254
+ pulumi.set(self, "token_type", value)
255
+
256
+
99
257
  @pulumi.input_type
100
258
  class SecretRolesetBindingArgs:
101
259
  def __init__(__self__, *,
@@ -26,7 +26,8 @@ class AuthBackendArgs:
26
26
  namespace: Optional[pulumi.Input[str]] = None,
27
27
  path: Optional[pulumi.Input[str]] = None,
28
28
  private_key_id: Optional[pulumi.Input[str]] = None,
29
- project_id: Optional[pulumi.Input[str]] = None):
29
+ project_id: Optional[pulumi.Input[str]] = None,
30
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
30
31
  """
31
32
  The set of arguments for constructing a AuthBackend resource.
32
33
  :param pulumi.Input[str] client_email: The clients email associated with the credentials
@@ -50,6 +51,9 @@ class AuthBackendArgs:
50
51
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
51
52
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
52
53
  :param pulumi.Input[str] project_id: The GCP Project ID
54
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
55
+
56
+ The `tune` block is used to tune the auth backend:
53
57
  """
54
58
  if client_email is not None:
55
59
  pulumi.set(__self__, "client_email", client_email)
@@ -73,6 +77,8 @@ class AuthBackendArgs:
73
77
  pulumi.set(__self__, "private_key_id", private_key_id)
74
78
  if project_id is not None:
75
79
  pulumi.set(__self__, "project_id", project_id)
80
+ if tune is not None:
81
+ pulumi.set(__self__, "tune", tune)
76
82
 
77
83
  @property
78
84
  @pulumi.getter(name="clientEmail")
@@ -216,6 +222,20 @@ class AuthBackendArgs:
216
222
  def project_id(self, value: Optional[pulumi.Input[str]]):
217
223
  pulumi.set(self, "project_id", value)
218
224
 
225
+ @property
226
+ @pulumi.getter
227
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
228
+ """
229
+ Extra configuration block. Structure is documented below.
230
+
231
+ The `tune` block is used to tune the auth backend:
232
+ """
233
+ return pulumi.get(self, "tune")
234
+
235
+ @tune.setter
236
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
237
+ pulumi.set(self, "tune", value)
238
+
219
239
 
220
240
  @pulumi.input_type
221
241
  class _AuthBackendState:
@@ -231,7 +251,8 @@ class _AuthBackendState:
231
251
  namespace: Optional[pulumi.Input[str]] = None,
232
252
  path: Optional[pulumi.Input[str]] = None,
233
253
  private_key_id: Optional[pulumi.Input[str]] = None,
234
- project_id: Optional[pulumi.Input[str]] = None):
254
+ project_id: Optional[pulumi.Input[str]] = None,
255
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
235
256
  """
236
257
  Input properties used for looking up and filtering AuthBackend resources.
237
258
  :param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
@@ -256,6 +277,9 @@ class _AuthBackendState:
256
277
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
257
278
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
258
279
  :param pulumi.Input[str] project_id: The GCP Project ID
280
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
281
+
282
+ The `tune` block is used to tune the auth backend:
259
283
  """
260
284
  if accessor is not None:
261
285
  pulumi.set(__self__, "accessor", accessor)
@@ -281,6 +305,8 @@ class _AuthBackendState:
281
305
  pulumi.set(__self__, "private_key_id", private_key_id)
282
306
  if project_id is not None:
283
307
  pulumi.set(__self__, "project_id", project_id)
308
+ if tune is not None:
309
+ pulumi.set(__self__, "tune", tune)
284
310
 
285
311
  @property
286
312
  @pulumi.getter
@@ -436,6 +462,20 @@ class _AuthBackendState:
436
462
  def project_id(self, value: Optional[pulumi.Input[str]]):
437
463
  pulumi.set(self, "project_id", value)
438
464
 
465
+ @property
466
+ @pulumi.getter
467
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
468
+ """
469
+ Extra configuration block. Structure is documented below.
470
+
471
+ The `tune` block is used to tune the auth backend:
472
+ """
473
+ return pulumi.get(self, "tune")
474
+
475
+ @tune.setter
476
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
477
+ pulumi.set(self, "tune", value)
478
+
439
479
 
440
480
  class AuthBackend(pulumi.CustomResource):
441
481
  @overload
@@ -453,6 +493,7 @@ class AuthBackend(pulumi.CustomResource):
453
493
  path: Optional[pulumi.Input[str]] = None,
454
494
  private_key_id: Optional[pulumi.Input[str]] = None,
455
495
  project_id: Optional[pulumi.Input[str]] = None,
496
+ tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
456
497
  __props__=None):
457
498
  """
458
499
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
@@ -504,6 +545,9 @@ class AuthBackend(pulumi.CustomResource):
504
545
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
505
546
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
506
547
  :param pulumi.Input[str] project_id: The GCP Project ID
548
+ :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
549
+
550
+ The `tune` block is used to tune the auth backend:
507
551
  """
508
552
  ...
509
553
  @overload
@@ -564,6 +608,7 @@ class AuthBackend(pulumi.CustomResource):
564
608
  path: Optional[pulumi.Input[str]] = None,
565
609
  private_key_id: Optional[pulumi.Input[str]] = None,
566
610
  project_id: Optional[pulumi.Input[str]] = None,
611
+ tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
567
612
  __props__=None):
568
613
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
569
614
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -584,6 +629,7 @@ class AuthBackend(pulumi.CustomResource):
584
629
  __props__.__dict__["path"] = path
585
630
  __props__.__dict__["private_key_id"] = private_key_id
586
631
  __props__.__dict__["project_id"] = project_id
632
+ __props__.__dict__["tune"] = tune
587
633
  __props__.__dict__["accessor"] = None
588
634
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
589
635
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
@@ -608,7 +654,8 @@ class AuthBackend(pulumi.CustomResource):
608
654
  namespace: Optional[pulumi.Input[str]] = None,
609
655
  path: Optional[pulumi.Input[str]] = None,
610
656
  private_key_id: Optional[pulumi.Input[str]] = None,
611
- project_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackend':
657
+ project_id: Optional[pulumi.Input[str]] = None,
658
+ tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
612
659
  """
613
660
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
614
661
  properties used to qualify the lookup.
@@ -638,6 +685,9 @@ class AuthBackend(pulumi.CustomResource):
638
685
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
639
686
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
640
687
  :param pulumi.Input[str] project_id: The GCP Project ID
688
+ :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
689
+
690
+ The `tune` block is used to tune the auth backend:
641
691
  """
642
692
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
643
693
 
@@ -655,6 +705,7 @@ class AuthBackend(pulumi.CustomResource):
655
705
  __props__.__dict__["path"] = path
656
706
  __props__.__dict__["private_key_id"] = private_key_id
657
707
  __props__.__dict__["project_id"] = project_id
708
+ __props__.__dict__["tune"] = tune
658
709
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
659
710
 
660
711
  @property
@@ -763,3 +814,13 @@ class AuthBackend(pulumi.CustomResource):
763
814
  """
764
815
  return pulumi.get(self, "project_id")
765
816
 
817
+ @property
818
+ @pulumi.getter
819
+ def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
820
+ """
821
+ Extra configuration block. Structure is documented below.
822
+
823
+ The `tune` block is used to tune the auth backend:
824
+ """
825
+ return pulumi.get(self, "tune")
826
+
@@ -11,6 +11,7 @@ from .. import _utilities
11
11
 
12
12
  __all__ = [
13
13
  'AuthBackendCustomEndpoint',
14
+ 'AuthBackendTune',
14
15
  'SecretRolesetBinding',
15
16
  'SecretStaticAccountBinding',
16
17
  ]
@@ -28,8 +29,6 @@ class AuthBackendCustomEndpoint(dict):
28
29
 
29
30
  The endpoint value provided for a given key has the form of `scheme://host:port`.
30
31
  The `scheme://` and `:port` portions of the endpoint value are optional.
31
-
32
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
33
32
  :param str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
34
33
  :param str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
35
34
  """
@@ -58,8 +57,6 @@ class AuthBackendCustomEndpoint(dict):
58
57
 
59
58
  The endpoint value provided for a given key has the form of `scheme://host:port`.
60
59
  The `scheme://` and `:port` portions of the endpoint value are optional.
61
-
62
- For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
63
60
  """
64
61
  return pulumi.get(self, "compute")
65
62
 
@@ -80,6 +77,166 @@ class AuthBackendCustomEndpoint(dict):
80
77
  return pulumi.get(self, "iam")
81
78
 
82
79
 
80
+ @pulumi.output_type
81
+ class AuthBackendTune(dict):
82
+ @staticmethod
83
+ def __key_warning(key: str):
84
+ suggest = None
85
+ if key == "allowedResponseHeaders":
86
+ suggest = "allowed_response_headers"
87
+ elif key == "auditNonHmacRequestKeys":
88
+ suggest = "audit_non_hmac_request_keys"
89
+ elif key == "auditNonHmacResponseKeys":
90
+ suggest = "audit_non_hmac_response_keys"
91
+ elif key == "defaultLeaseTtl":
92
+ suggest = "default_lease_ttl"
93
+ elif key == "listingVisibility":
94
+ suggest = "listing_visibility"
95
+ elif key == "maxLeaseTtl":
96
+ suggest = "max_lease_ttl"
97
+ elif key == "passthroughRequestHeaders":
98
+ suggest = "passthrough_request_headers"
99
+ elif key == "tokenType":
100
+ suggest = "token_type"
101
+
102
+ if suggest:
103
+ pulumi.log.warn(f"Key '{key}' not found in AuthBackendTune. Access the value via the '{suggest}' property getter instead.")
104
+
105
+ def __getitem__(self, key: str) -> Any:
106
+ AuthBackendTune.__key_warning(key)
107
+ return super().__getitem__(key)
108
+
109
+ def get(self, key: str, default = None) -> Any:
110
+ AuthBackendTune.__key_warning(key)
111
+ return super().get(key, default)
112
+
113
+ def __init__(__self__, *,
114
+ allowed_response_headers: Optional[Sequence[str]] = None,
115
+ audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
116
+ audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
117
+ default_lease_ttl: Optional[str] = None,
118
+ listing_visibility: Optional[str] = None,
119
+ max_lease_ttl: Optional[str] = None,
120
+ passthrough_request_headers: Optional[Sequence[str]] = None,
121
+ token_type: Optional[str] = None):
122
+ """
123
+ :param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
124
+ a plugin to include them in the response.
125
+ :param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
126
+ not be HMAC'd by audit devices in the request data object.
127
+ :param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
128
+ not be HMAC'd by audit devices in the response data object.
129
+ :param str default_lease_ttl: Specifies the default time-to-live.
130
+ If set, this overrides the global default.
131
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
132
+ :param str listing_visibility: Specifies whether to show this mount in
133
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
134
+ :param str max_lease_ttl: Specifies the maximum time-to-live.
135
+ If set, this overrides the global default.
136
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
137
+ :param Sequence[str] passthrough_request_headers: List of headers to whitelist and
138
+ pass from the request to the backend.
139
+ :param str token_type: Specifies the type of tokens that should be returned by
140
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
141
+
142
+
143
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
144
+ """
145
+ if allowed_response_headers is not None:
146
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
147
+ if audit_non_hmac_request_keys is not None:
148
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
149
+ if audit_non_hmac_response_keys is not None:
150
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
151
+ if default_lease_ttl is not None:
152
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
153
+ if listing_visibility is not None:
154
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
155
+ if max_lease_ttl is not None:
156
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
157
+ if passthrough_request_headers is not None:
158
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
159
+ if token_type is not None:
160
+ pulumi.set(__self__, "token_type", token_type)
161
+
162
+ @property
163
+ @pulumi.getter(name="allowedResponseHeaders")
164
+ def allowed_response_headers(self) -> Optional[Sequence[str]]:
165
+ """
166
+ List of headers to whitelist and allowing
167
+ a plugin to include them in the response.
168
+ """
169
+ return pulumi.get(self, "allowed_response_headers")
170
+
171
+ @property
172
+ @pulumi.getter(name="auditNonHmacRequestKeys")
173
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
174
+ """
175
+ Specifies the list of keys that will
176
+ not be HMAC'd by audit devices in the request data object.
177
+ """
178
+ return pulumi.get(self, "audit_non_hmac_request_keys")
179
+
180
+ @property
181
+ @pulumi.getter(name="auditNonHmacResponseKeys")
182
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
183
+ """
184
+ Specifies the list of keys that will
185
+ not be HMAC'd by audit devices in the response data object.
186
+ """
187
+ return pulumi.get(self, "audit_non_hmac_response_keys")
188
+
189
+ @property
190
+ @pulumi.getter(name="defaultLeaseTtl")
191
+ def default_lease_ttl(self) -> Optional[str]:
192
+ """
193
+ Specifies the default time-to-live.
194
+ If set, this overrides the global default.
195
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
196
+ """
197
+ return pulumi.get(self, "default_lease_ttl")
198
+
199
+ @property
200
+ @pulumi.getter(name="listingVisibility")
201
+ def listing_visibility(self) -> Optional[str]:
202
+ """
203
+ Specifies whether to show this mount in
204
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
205
+ """
206
+ return pulumi.get(self, "listing_visibility")
207
+
208
+ @property
209
+ @pulumi.getter(name="maxLeaseTtl")
210
+ def max_lease_ttl(self) -> Optional[str]:
211
+ """
212
+ Specifies the maximum time-to-live.
213
+ If set, this overrides the global default.
214
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
215
+ """
216
+ return pulumi.get(self, "max_lease_ttl")
217
+
218
+ @property
219
+ @pulumi.getter(name="passthroughRequestHeaders")
220
+ def passthrough_request_headers(self) -> Optional[Sequence[str]]:
221
+ """
222
+ List of headers to whitelist and
223
+ pass from the request to the backend.
224
+ """
225
+ return pulumi.get(self, "passthrough_request_headers")
226
+
227
+ @property
228
+ @pulumi.getter(name="tokenType")
229
+ def token_type(self) -> Optional[str]:
230
+ """
231
+ Specifies the type of tokens that should be returned by
232
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
233
+
234
+
235
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
236
+ """
237
+ return pulumi.get(self, "token_type")
238
+
239
+
83
240
  @pulumi.output_type
84
241
  class SecretRolesetBinding(dict):
85
242
  def __init__(__self__, *,
@@ -188,12 +188,6 @@ class AwaitableGetRaftAutopilotStateResult(GetRaftAutopilotStateResult):
188
188
  def get_raft_autopilot_state(namespace: Optional[str] = None,
189
189
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRaftAutopilotStateResult:
190
190
  """
191
- Displays the state of the raft cluster under integrated storage as seen by
192
- autopilot. It shows whether autopilot thinks the cluster is healthy or not, and
193
- how many nodes could fail before the cluster becomes unhealthy ("Failure
194
- Tolerance"). For more information, please refer to the
195
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/system/storage/raftautopilot#get-cluster-state).
196
-
197
191
  ## Example Usage
198
192
 
199
193
  ```python
@@ -235,12 +229,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
235
229
  def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
236
230
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
237
231
  """
238
- Displays the state of the raft cluster under integrated storage as seen by
239
- autopilot. It shows whether autopilot thinks the cluster is healthy or not, and
240
- how many nodes could fail before the cluster becomes unhealthy ("Failure
241
- Tolerance"). For more information, please refer to the
242
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/system/storage/raftautopilot#get-cluster-state).
243
-
244
232
  ## Example Usage
245
233
 
246
234
  ```python
@@ -199,16 +199,16 @@ class GroupAlias(pulumi.CustomResource):
199
199
 
200
200
  ## Import
201
201
 
202
- The group alias can be imported with the group alias `id`, for example
202
+ The group alias can be imported with the group alias `id`, for example:
203
203
 
204
204
  ```sh
205
- $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
205
+ $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
206
206
  ```
207
207
 
208
208
  Group aliases can also be imported using the UUID of the alias record, e.g.
209
209
 
210
210
  ```sh
211
- $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
211
+ $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
212
212
  ```
213
213
 
214
214
  :param str resource_name: The name of the resource.
@@ -252,16 +252,16 @@ class GroupAlias(pulumi.CustomResource):
252
252
 
253
253
  ## Import
254
254
 
255
- The group alias can be imported with the group alias `id`, for example
255
+ The group alias can be imported with the group alias `id`, for example:
256
256
 
257
257
  ```sh
258
- $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
258
+ $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
259
259
  ```
260
260
 
261
261
  Group aliases can also be imported using the UUID of the alias record, e.g.
262
262
 
263
263
  ```sh
264
- $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
264
+ $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
265
265
  ```
266
266
 
267
267
  :param str resource_name: The name of the resource.