pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
@@ -19,7 +24,9 @@ class AuthBackendRoleSecretIdArgs:
|
|
19
24
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
25
|
metadata: Optional[pulumi.Input[str]] = None,
|
21
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
22
28
|
secret_id: Optional[pulumi.Input[str]] = None,
|
29
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
23
30
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
24
31
|
wrapping_ttl: Optional[pulumi.Input[str]] = None):
|
25
32
|
"""
|
@@ -32,10 +39,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
32
39
|
key-value pairs to be set on tokens issued with this SecretID.
|
33
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
41
|
The value should not contain leading or trailing forward slashes.
|
35
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
43
|
*Available only for Vault Enterprise*.
|
44
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
37
45
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
38
46
|
mode. Defaults to Vault auto-generating SecretIDs.
|
47
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
39
48
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
40
49
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
41
50
|
invalidated through unwrapping.
|
@@ -53,8 +62,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
53
62
|
pulumi.set(__self__, "metadata", metadata)
|
54
63
|
if namespace is not None:
|
55
64
|
pulumi.set(__self__, "namespace", namespace)
|
65
|
+
if num_uses is not None:
|
66
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
56
67
|
if secret_id is not None:
|
57
68
|
pulumi.set(__self__, "secret_id", secret_id)
|
69
|
+
if ttl is not None:
|
70
|
+
pulumi.set(__self__, "ttl", ttl)
|
58
71
|
if with_wrapped_accessor is not None:
|
59
72
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
60
73
|
if wrapping_ttl is not None:
|
@@ -116,7 +129,7 @@ class AuthBackendRoleSecretIdArgs:
|
|
116
129
|
"""
|
117
130
|
The namespace to provision the resource in.
|
118
131
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
132
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
133
|
*Available only for Vault Enterprise*.
|
121
134
|
"""
|
122
135
|
return pulumi.get(self, "namespace")
|
@@ -125,6 +138,18 @@ class AuthBackendRoleSecretIdArgs:
|
|
125
138
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
126
139
|
pulumi.set(self, "namespace", value)
|
127
140
|
|
141
|
+
@property
|
142
|
+
@pulumi.getter(name="numUses")
|
143
|
+
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
144
|
+
"""
|
145
|
+
The number of uses for the secret-id.
|
146
|
+
"""
|
147
|
+
return pulumi.get(self, "num_uses")
|
148
|
+
|
149
|
+
@num_uses.setter
|
150
|
+
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
151
|
+
pulumi.set(self, "num_uses", value)
|
152
|
+
|
128
153
|
@property
|
129
154
|
@pulumi.getter(name="secretId")
|
130
155
|
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
@@ -138,6 +163,18 @@ class AuthBackendRoleSecretIdArgs:
|
|
138
163
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
139
164
|
pulumi.set(self, "secret_id", value)
|
140
165
|
|
166
|
+
@property
|
167
|
+
@pulumi.getter
|
168
|
+
def ttl(self) -> Optional[pulumi.Input[int]]:
|
169
|
+
"""
|
170
|
+
The TTL duration of the SecretID.
|
171
|
+
"""
|
172
|
+
return pulumi.get(self, "ttl")
|
173
|
+
|
174
|
+
@ttl.setter
|
175
|
+
def ttl(self, value: Optional[pulumi.Input[int]]):
|
176
|
+
pulumi.set(self, "ttl", value)
|
177
|
+
|
141
178
|
@property
|
142
179
|
@pulumi.getter(name="withWrappedAccessor")
|
143
180
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -176,8 +213,10 @@ class _AuthBackendRoleSecretIdState:
|
|
176
213
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
177
214
|
metadata: Optional[pulumi.Input[str]] = None,
|
178
215
|
namespace: Optional[pulumi.Input[str]] = None,
|
216
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
179
217
|
role_name: Optional[pulumi.Input[str]] = None,
|
180
218
|
secret_id: Optional[pulumi.Input[str]] = None,
|
219
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
181
220
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
182
221
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
183
222
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -192,11 +231,13 @@ class _AuthBackendRoleSecretIdState:
|
|
192
231
|
key-value pairs to be set on tokens issued with this SecretID.
|
193
232
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
194
233
|
The value should not contain leading or trailing forward slashes.
|
195
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
234
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
235
|
*Available only for Vault Enterprise*.
|
236
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
197
237
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
198
238
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
199
239
|
mode. Defaults to Vault auto-generating SecretIDs.
|
240
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
200
241
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
201
242
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
202
243
|
invalidated through unwrapping.
|
@@ -218,10 +259,14 @@ class _AuthBackendRoleSecretIdState:
|
|
218
259
|
pulumi.set(__self__, "metadata", metadata)
|
219
260
|
if namespace is not None:
|
220
261
|
pulumi.set(__self__, "namespace", namespace)
|
262
|
+
if num_uses is not None:
|
263
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
221
264
|
if role_name is not None:
|
222
265
|
pulumi.set(__self__, "role_name", role_name)
|
223
266
|
if secret_id is not None:
|
224
267
|
pulumi.set(__self__, "secret_id", secret_id)
|
268
|
+
if ttl is not None:
|
269
|
+
pulumi.set(__self__, "ttl", ttl)
|
225
270
|
if with_wrapped_accessor is not None:
|
226
271
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
227
272
|
if wrapping_accessor is not None:
|
@@ -287,7 +332,7 @@ class _AuthBackendRoleSecretIdState:
|
|
287
332
|
"""
|
288
333
|
The namespace to provision the resource in.
|
289
334
|
The value should not contain leading or trailing forward slashes.
|
290
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
291
336
|
*Available only for Vault Enterprise*.
|
292
337
|
"""
|
293
338
|
return pulumi.get(self, "namespace")
|
@@ -296,6 +341,18 @@ class _AuthBackendRoleSecretIdState:
|
|
296
341
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
297
342
|
pulumi.set(self, "namespace", value)
|
298
343
|
|
344
|
+
@property
|
345
|
+
@pulumi.getter(name="numUses")
|
346
|
+
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
347
|
+
"""
|
348
|
+
The number of uses for the secret-id.
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "num_uses")
|
351
|
+
|
352
|
+
@num_uses.setter
|
353
|
+
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
354
|
+
pulumi.set(self, "num_uses", value)
|
355
|
+
|
299
356
|
@property
|
300
357
|
@pulumi.getter(name="roleName")
|
301
358
|
def role_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -321,6 +378,18 @@ class _AuthBackendRoleSecretIdState:
|
|
321
378
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
322
379
|
pulumi.set(self, "secret_id", value)
|
323
380
|
|
381
|
+
@property
|
382
|
+
@pulumi.getter
|
383
|
+
def ttl(self) -> Optional[pulumi.Input[int]]:
|
384
|
+
"""
|
385
|
+
The TTL duration of the SecretID.
|
386
|
+
"""
|
387
|
+
return pulumi.get(self, "ttl")
|
388
|
+
|
389
|
+
@ttl.setter
|
390
|
+
def ttl(self, value: Optional[pulumi.Input[int]]):
|
391
|
+
pulumi.set(self, "ttl", value)
|
392
|
+
|
324
393
|
@property
|
325
394
|
@pulumi.getter(name="withWrappedAccessor")
|
326
395
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -385,8 +454,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
385
454
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
386
455
|
metadata: Optional[pulumi.Input[str]] = None,
|
387
456
|
namespace: Optional[pulumi.Input[str]] = None,
|
457
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
388
458
|
role_name: Optional[pulumi.Input[str]] = None,
|
389
459
|
secret_id: Optional[pulumi.Input[str]] = None,
|
460
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
390
461
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
391
462
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
392
463
|
__props__=None):
|
@@ -428,11 +499,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
428
499
|
key-value pairs to be set on tokens issued with this SecretID.
|
429
500
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
430
501
|
The value should not contain leading or trailing forward slashes.
|
431
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
502
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
432
503
|
*Available only for Vault Enterprise*.
|
504
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
433
505
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
434
506
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
435
507
|
mode. Defaults to Vault auto-generating SecretIDs.
|
508
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
436
509
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
437
510
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
438
511
|
invalidated through unwrapping.
|
@@ -495,8 +568,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
495
568
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
496
569
|
metadata: Optional[pulumi.Input[str]] = None,
|
497
570
|
namespace: Optional[pulumi.Input[str]] = None,
|
571
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
498
572
|
role_name: Optional[pulumi.Input[str]] = None,
|
499
573
|
secret_id: Optional[pulumi.Input[str]] = None,
|
574
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
500
575
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
501
576
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
502
577
|
__props__=None):
|
@@ -512,10 +587,12 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
512
587
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
513
588
|
__props__.__dict__["metadata"] = metadata
|
514
589
|
__props__.__dict__["namespace"] = namespace
|
590
|
+
__props__.__dict__["num_uses"] = num_uses
|
515
591
|
if role_name is None and not opts.urn:
|
516
592
|
raise TypeError("Missing required property 'role_name'")
|
517
593
|
__props__.__dict__["role_name"] = role_name
|
518
594
|
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
595
|
+
__props__.__dict__["ttl"] = ttl
|
519
596
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
520
597
|
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
521
598
|
__props__.__dict__["accessor"] = None
|
@@ -540,8 +617,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
540
617
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
541
618
|
metadata: Optional[pulumi.Input[str]] = None,
|
542
619
|
namespace: Optional[pulumi.Input[str]] = None,
|
620
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
543
621
|
role_name: Optional[pulumi.Input[str]] = None,
|
544
622
|
secret_id: Optional[pulumi.Input[str]] = None,
|
623
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
545
624
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
546
625
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
547
626
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -561,11 +640,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
561
640
|
key-value pairs to be set on tokens issued with this SecretID.
|
562
641
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
563
642
|
The value should not contain leading or trailing forward slashes.
|
564
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
643
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
565
644
|
*Available only for Vault Enterprise*.
|
645
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
566
646
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
567
647
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
568
648
|
mode. Defaults to Vault auto-generating SecretIDs.
|
649
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
569
650
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
570
651
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
571
652
|
invalidated through unwrapping.
|
@@ -586,8 +667,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
586
667
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
587
668
|
__props__.__dict__["metadata"] = metadata
|
588
669
|
__props__.__dict__["namespace"] = namespace
|
670
|
+
__props__.__dict__["num_uses"] = num_uses
|
589
671
|
__props__.__dict__["role_name"] = role_name
|
590
672
|
__props__.__dict__["secret_id"] = secret_id
|
673
|
+
__props__.__dict__["ttl"] = ttl
|
591
674
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
592
675
|
__props__.__dict__["wrapping_accessor"] = wrapping_accessor
|
593
676
|
__props__.__dict__["wrapping_token"] = wrapping_token
|
@@ -634,11 +717,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
634
717
|
"""
|
635
718
|
The namespace to provision the resource in.
|
636
719
|
The value should not contain leading or trailing forward slashes.
|
637
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
720
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
638
721
|
*Available only for Vault Enterprise*.
|
639
722
|
"""
|
640
723
|
return pulumi.get(self, "namespace")
|
641
724
|
|
725
|
+
@property
|
726
|
+
@pulumi.getter(name="numUses")
|
727
|
+
def num_uses(self) -> pulumi.Output[Optional[int]]:
|
728
|
+
"""
|
729
|
+
The number of uses for the secret-id.
|
730
|
+
"""
|
731
|
+
return pulumi.get(self, "num_uses")
|
732
|
+
|
642
733
|
@property
|
643
734
|
@pulumi.getter(name="roleName")
|
644
735
|
def role_name(self) -> pulumi.Output[str]:
|
@@ -656,6 +747,14 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
656
747
|
"""
|
657
748
|
return pulumi.get(self, "secret_id")
|
658
749
|
|
750
|
+
@property
|
751
|
+
@pulumi.getter
|
752
|
+
def ttl(self) -> pulumi.Output[Optional[int]]:
|
753
|
+
"""
|
754
|
+
The TTL duration of the SecretID.
|
755
|
+
"""
|
756
|
+
return pulumi.get(self, "ttl")
|
757
|
+
|
659
758
|
@property
|
660
759
|
@pulumi.getter(name="withWrappedAccessor")
|
661
760
|
def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -123,13 +128,10 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
123
128
|
namespace=pulumi.get(__ret__, 'namespace'),
|
124
129
|
role_id=pulumi.get(__ret__, 'role_id'),
|
125
130
|
role_name=pulumi.get(__ret__, 'role_name'))
|
126
|
-
|
127
|
-
|
128
|
-
@_utilities.lift_output_func(get_auth_backend_role_id)
|
129
131
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
130
132
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
131
133
|
role_name: Optional[pulumi.Input[str]] = None,
|
132
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
134
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
133
135
|
"""
|
134
136
|
Reads the Role ID of an AppRole from a Vault server.
|
135
137
|
|
@@ -153,4 +155,15 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
153
155
|
*Available only for Vault Enterprise*.
|
154
156
|
:param str role_name: The name of the role to retrieve the Role ID for.
|
155
157
|
"""
|
156
|
-
|
158
|
+
__args__ = dict()
|
159
|
+
__args__['backend'] = backend
|
160
|
+
__args__['namespace'] = namespace
|
161
|
+
__args__['roleName'] = role_name
|
162
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
|
+
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
|
+
backend=pulumi.get(__response__, 'backend'),
|
166
|
+
id=pulumi.get(__response__, 'id'),
|
167
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
168
|
+
role_id=pulumi.get(__response__, 'role_id'),
|
169
|
+
role_name=pulumi.get(__response__, 'role_name')))
|
pulumi_vault/audit.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuditArgs', 'Audit']
|
@@ -30,7 +35,7 @@ class AuditArgs:
|
|
30
35
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
31
36
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
37
|
The value should not contain leading or trailing forward slashes.
|
33
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
39
|
*Available only for Vault Enterprise*.
|
35
40
|
:param pulumi.Input[str] path: The path to mount the audit device. This defaults to the type.
|
36
41
|
"""
|
@@ -101,7 +106,7 @@ class AuditArgs:
|
|
101
106
|
"""
|
102
107
|
The namespace to provision the resource in.
|
103
108
|
The value should not contain leading or trailing forward slashes.
|
104
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
109
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
105
110
|
*Available only for Vault Enterprise*.
|
106
111
|
"""
|
107
112
|
return pulumi.get(self, "namespace")
|
@@ -138,7 +143,7 @@ class _AuditState:
|
|
138
143
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
139
144
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
140
145
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
147
|
*Available only for Vault Enterprise*.
|
143
148
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
144
149
|
|
@@ -189,7 +194,7 @@ class _AuditState:
|
|
189
194
|
"""
|
190
195
|
The namespace to provision the resource in.
|
191
196
|
The value should not contain leading or trailing forward slashes.
|
192
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
197
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
193
198
|
*Available only for Vault Enterprise*.
|
194
199
|
"""
|
195
200
|
return pulumi.get(self, "namespace")
|
@@ -251,6 +256,7 @@ class Audit(pulumi.CustomResource):
|
|
251
256
|
__props__=None):
|
252
257
|
"""
|
253
258
|
## Example Usage
|
259
|
+
|
254
260
|
### File Audit Device)
|
255
261
|
|
256
262
|
```python
|
@@ -258,11 +264,12 @@ class Audit(pulumi.CustomResource):
|
|
258
264
|
import pulumi_vault as vault
|
259
265
|
|
260
266
|
test = vault.Audit("test",
|
267
|
+
type="file",
|
261
268
|
options={
|
262
269
|
"file_path": "C:/temp/audit.txt",
|
263
|
-
}
|
264
|
-
type="file")
|
270
|
+
})
|
265
271
|
```
|
272
|
+
|
266
273
|
### Socket Audit Device)
|
267
274
|
|
268
275
|
```python
|
@@ -270,14 +277,14 @@ class Audit(pulumi.CustomResource):
|
|
270
277
|
import pulumi_vault as vault
|
271
278
|
|
272
279
|
test = vault.Audit("test",
|
280
|
+
type="socket",
|
281
|
+
path="app_socket",
|
273
282
|
local=False,
|
274
283
|
options={
|
275
284
|
"address": "127.0.0.1:8000",
|
276
|
-
"description": "application x socket",
|
277
285
|
"socket_type": "tcp",
|
278
|
-
|
279
|
-
|
280
|
-
type="socket")
|
286
|
+
"description": "application x socket",
|
287
|
+
})
|
281
288
|
```
|
282
289
|
|
283
290
|
## Import
|
@@ -285,7 +292,7 @@ class Audit(pulumi.CustomResource):
|
|
285
292
|
Audit devices can be imported using the `path`, e.g.
|
286
293
|
|
287
294
|
```sh
|
288
|
-
|
295
|
+
$ pulumi import vault:index/audit:Audit test syslog
|
289
296
|
```
|
290
297
|
|
291
298
|
:param str resource_name: The name of the resource.
|
@@ -294,7 +301,7 @@ class Audit(pulumi.CustomResource):
|
|
294
301
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
295
302
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
296
303
|
The value should not contain leading or trailing forward slashes.
|
297
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
304
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
298
305
|
*Available only for Vault Enterprise*.
|
299
306
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
300
307
|
|
@@ -310,6 +317,7 @@ class Audit(pulumi.CustomResource):
|
|
310
317
|
opts: Optional[pulumi.ResourceOptions] = None):
|
311
318
|
"""
|
312
319
|
## Example Usage
|
320
|
+
|
313
321
|
### File Audit Device)
|
314
322
|
|
315
323
|
```python
|
@@ -317,11 +325,12 @@ class Audit(pulumi.CustomResource):
|
|
317
325
|
import pulumi_vault as vault
|
318
326
|
|
319
327
|
test = vault.Audit("test",
|
328
|
+
type="file",
|
320
329
|
options={
|
321
330
|
"file_path": "C:/temp/audit.txt",
|
322
|
-
}
|
323
|
-
type="file")
|
331
|
+
})
|
324
332
|
```
|
333
|
+
|
325
334
|
### Socket Audit Device)
|
326
335
|
|
327
336
|
```python
|
@@ -329,14 +338,14 @@ class Audit(pulumi.CustomResource):
|
|
329
338
|
import pulumi_vault as vault
|
330
339
|
|
331
340
|
test = vault.Audit("test",
|
341
|
+
type="socket",
|
342
|
+
path="app_socket",
|
332
343
|
local=False,
|
333
344
|
options={
|
334
345
|
"address": "127.0.0.1:8000",
|
335
|
-
"description": "application x socket",
|
336
346
|
"socket_type": "tcp",
|
337
|
-
|
338
|
-
|
339
|
-
type="socket")
|
347
|
+
"description": "application x socket",
|
348
|
+
})
|
340
349
|
```
|
341
350
|
|
342
351
|
## Import
|
@@ -344,7 +353,7 @@ class Audit(pulumi.CustomResource):
|
|
344
353
|
Audit devices can be imported using the `path`, e.g.
|
345
354
|
|
346
355
|
```sh
|
347
|
-
|
356
|
+
$ pulumi import vault:index/audit:Audit test syslog
|
348
357
|
```
|
349
358
|
|
350
359
|
:param str resource_name: The name of the resource.
|
@@ -414,7 +423,7 @@ class Audit(pulumi.CustomResource):
|
|
414
423
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
415
424
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
416
425
|
The value should not contain leading or trailing forward slashes.
|
417
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
426
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
427
|
*Available only for Vault Enterprise*.
|
419
428
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
420
429
|
|
@@ -456,7 +465,7 @@ class Audit(pulumi.CustomResource):
|
|
456
465
|
"""
|
457
466
|
The namespace to provision the resource in.
|
458
467
|
The value should not contain leading or trailing forward slashes.
|
459
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
468
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
460
469
|
*Available only for Vault Enterprise*.
|
461
470
|
"""
|
462
471
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
@@ -146,7 +151,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
146
151
|
import pulumi
|
147
152
|
import pulumi_vault as vault
|
148
153
|
|
149
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
154
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
155
|
+
name="X-Forwarded-For",
|
156
|
+
hmac=False)
|
150
157
|
```
|
151
158
|
|
152
159
|
:param str resource_name: The name of the resource.
|
@@ -175,7 +182,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
175
182
|
import pulumi
|
176
183
|
import pulumi_vault as vault
|
177
184
|
|
178
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
185
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
186
|
+
name="X-Forwarded-For",
|
187
|
+
hmac=False)
|
179
188
|
```
|
180
189
|
|
181
190
|
:param str resource_name: The name of the resource.
|