pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
@@ -15,6 +20,7 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
|
15
20
|
class QuotaLeaseCountArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
max_leases: pulumi.Input[int],
|
23
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
18
24
|
name: Optional[pulumi.Input[str]] = None,
|
19
25
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
26
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -23,6 +29,7 @@ class QuotaLeaseCountArgs:
|
|
23
29
|
The set of arguments for constructing a QuotaLeaseCount resource.
|
24
30
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
25
31
|
rule. The `max_leases` must be positive.
|
32
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
26
33
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
27
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
35
|
The value should not contain leading or trailing forward slashes.
|
@@ -37,6 +44,8 @@ class QuotaLeaseCountArgs:
|
|
37
44
|
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
38
45
|
"""
|
39
46
|
pulumi.set(__self__, "max_leases", max_leases)
|
47
|
+
if inheritable is not None:
|
48
|
+
pulumi.set(__self__, "inheritable", inheritable)
|
40
49
|
if name is not None:
|
41
50
|
pulumi.set(__self__, "name", name)
|
42
51
|
if namespace is not None:
|
@@ -59,6 +68,18 @@ class QuotaLeaseCountArgs:
|
|
59
68
|
def max_leases(self, value: pulumi.Input[int]):
|
60
69
|
pulumi.set(self, "max_leases", value)
|
61
70
|
|
71
|
+
@property
|
72
|
+
@pulumi.getter
|
73
|
+
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
74
|
+
"""
|
75
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
76
|
+
"""
|
77
|
+
return pulumi.get(self, "inheritable")
|
78
|
+
|
79
|
+
@inheritable.setter
|
80
|
+
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
81
|
+
pulumi.set(self, "inheritable", value)
|
82
|
+
|
62
83
|
@property
|
63
84
|
@pulumi.getter
|
64
85
|
def name(self) -> Optional[pulumi.Input[str]]:
|
@@ -119,6 +140,7 @@ class QuotaLeaseCountArgs:
|
|
119
140
|
@pulumi.input_type
|
120
141
|
class _QuotaLeaseCountState:
|
121
142
|
def __init__(__self__, *,
|
143
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
122
144
|
max_leases: Optional[pulumi.Input[int]] = None,
|
123
145
|
name: Optional[pulumi.Input[str]] = None,
|
124
146
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -126,6 +148,7 @@ class _QuotaLeaseCountState:
|
|
126
148
|
role: Optional[pulumi.Input[str]] = None):
|
127
149
|
"""
|
128
150
|
Input properties used for looking up and filtering QuotaLeaseCount resources.
|
151
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
129
152
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
130
153
|
rule. The `max_leases` must be positive.
|
131
154
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -141,6 +164,8 @@ class _QuotaLeaseCountState:
|
|
141
164
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
142
165
|
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
143
166
|
"""
|
167
|
+
if inheritable is not None:
|
168
|
+
pulumi.set(__self__, "inheritable", inheritable)
|
144
169
|
if max_leases is not None:
|
145
170
|
pulumi.set(__self__, "max_leases", max_leases)
|
146
171
|
if name is not None:
|
@@ -152,6 +177,18 @@ class _QuotaLeaseCountState:
|
|
152
177
|
if role is not None:
|
153
178
|
pulumi.set(__self__, "role", role)
|
154
179
|
|
180
|
+
@property
|
181
|
+
@pulumi.getter
|
182
|
+
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
183
|
+
"""
|
184
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
185
|
+
"""
|
186
|
+
return pulumi.get(self, "inheritable")
|
187
|
+
|
188
|
+
@inheritable.setter
|
189
|
+
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
190
|
+
pulumi.set(self, "inheritable", value)
|
191
|
+
|
155
192
|
@property
|
156
193
|
@pulumi.getter(name="maxLeases")
|
157
194
|
def max_leases(self) -> Optional[pulumi.Input[int]]:
|
@@ -227,6 +264,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
227
264
|
def __init__(__self__,
|
228
265
|
resource_name: str,
|
229
266
|
opts: Optional[pulumi.ResourceOptions] = None,
|
267
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
230
268
|
max_leases: Optional[pulumi.Input[int]] = None,
|
231
269
|
name: Optional[pulumi.Input[str]] = None,
|
232
270
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -250,8 +288,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
250
288
|
import pulumi_vault as vault
|
251
289
|
|
252
290
|
global_ = vault.QuotaLeaseCount("global",
|
253
|
-
|
254
|
-
path=""
|
291
|
+
name="global",
|
292
|
+
path="",
|
293
|
+
max_leases=100)
|
255
294
|
```
|
256
295
|
|
257
296
|
## Import
|
@@ -259,11 +298,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
259
298
|
Lease count quotas can be imported using their names
|
260
299
|
|
261
300
|
```sh
|
262
|
-
|
301
|
+
$ pulumi import vault:index/quotaLeaseCount:QuotaLeaseCount global global
|
263
302
|
```
|
264
303
|
|
265
304
|
:param str resource_name: The name of the resource.
|
266
305
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
306
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
267
307
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
268
308
|
rule. The `max_leases` must be positive.
|
269
309
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -302,8 +342,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
302
342
|
import pulumi_vault as vault
|
303
343
|
|
304
344
|
global_ = vault.QuotaLeaseCount("global",
|
305
|
-
|
306
|
-
path=""
|
345
|
+
name="global",
|
346
|
+
path="",
|
347
|
+
max_leases=100)
|
307
348
|
```
|
308
349
|
|
309
350
|
## Import
|
@@ -311,7 +352,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
311
352
|
Lease count quotas can be imported using their names
|
312
353
|
|
313
354
|
```sh
|
314
|
-
|
355
|
+
$ pulumi import vault:index/quotaLeaseCount:QuotaLeaseCount global global
|
315
356
|
```
|
316
357
|
|
317
358
|
:param str resource_name: The name of the resource.
|
@@ -329,6 +370,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
329
370
|
def _internal_init(__self__,
|
330
371
|
resource_name: str,
|
331
372
|
opts: Optional[pulumi.ResourceOptions] = None,
|
373
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
332
374
|
max_leases: Optional[pulumi.Input[int]] = None,
|
333
375
|
name: Optional[pulumi.Input[str]] = None,
|
334
376
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -343,6 +385,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
343
385
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
344
386
|
__props__ = QuotaLeaseCountArgs.__new__(QuotaLeaseCountArgs)
|
345
387
|
|
388
|
+
__props__.__dict__["inheritable"] = inheritable
|
346
389
|
if max_leases is None and not opts.urn:
|
347
390
|
raise TypeError("Missing required property 'max_leases'")
|
348
391
|
__props__.__dict__["max_leases"] = max_leases
|
@@ -360,6 +403,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
360
403
|
def get(resource_name: str,
|
361
404
|
id: pulumi.Input[str],
|
362
405
|
opts: Optional[pulumi.ResourceOptions] = None,
|
406
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
363
407
|
max_leases: Optional[pulumi.Input[int]] = None,
|
364
408
|
name: Optional[pulumi.Input[str]] = None,
|
365
409
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -372,6 +416,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
372
416
|
:param str resource_name: The unique name of the resulting resource.
|
373
417
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
374
418
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
419
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
375
420
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
376
421
|
rule. The `max_leases` must be positive.
|
377
422
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -391,6 +436,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
391
436
|
|
392
437
|
__props__ = _QuotaLeaseCountState.__new__(_QuotaLeaseCountState)
|
393
438
|
|
439
|
+
__props__.__dict__["inheritable"] = inheritable
|
394
440
|
__props__.__dict__["max_leases"] = max_leases
|
395
441
|
__props__.__dict__["name"] = name
|
396
442
|
__props__.__dict__["namespace"] = namespace
|
@@ -398,6 +444,14 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
398
444
|
__props__.__dict__["role"] = role
|
399
445
|
return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
|
400
446
|
|
447
|
+
@property
|
448
|
+
@pulumi.getter
|
449
|
+
def inheritable(self) -> pulumi.Output[Optional[bool]]:
|
450
|
+
"""
|
451
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
452
|
+
"""
|
453
|
+
return pulumi.get(self, "inheritable")
|
454
|
+
|
401
455
|
@property
|
402
456
|
@pulumi.getter(name="maxLeases")
|
403
457
|
def max_leases(self) -> pulumi.Output[int]:
|
pulumi_vault/quota_rate_limit.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['QuotaRateLimitArgs', 'QuotaRateLimit']
|
@@ -16,6 +21,7 @@ class QuotaRateLimitArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
rate: pulumi.Input[float],
|
18
23
|
block_interval: Optional[pulumi.Input[int]] = None,
|
24
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
19
25
|
interval: Optional[pulumi.Input[int]] = None,
|
20
26
|
name: Optional[pulumi.Input[str]] = None,
|
21
27
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -27,6 +33,7 @@ class QuotaRateLimitArgs:
|
|
27
33
|
rule. The `rate` must be positive.
|
28
34
|
:param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
|
29
35
|
be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
|
36
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
30
37
|
:param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
|
31
38
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
32
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -44,6 +51,8 @@ class QuotaRateLimitArgs:
|
|
44
51
|
pulumi.set(__self__, "rate", rate)
|
45
52
|
if block_interval is not None:
|
46
53
|
pulumi.set(__self__, "block_interval", block_interval)
|
54
|
+
if inheritable is not None:
|
55
|
+
pulumi.set(__self__, "inheritable", inheritable)
|
47
56
|
if interval is not None:
|
48
57
|
pulumi.set(__self__, "interval", interval)
|
49
58
|
if name is not None:
|
@@ -81,6 +90,18 @@ class QuotaRateLimitArgs:
|
|
81
90
|
def block_interval(self, value: Optional[pulumi.Input[int]]):
|
82
91
|
pulumi.set(self, "block_interval", value)
|
83
92
|
|
93
|
+
@property
|
94
|
+
@pulumi.getter
|
95
|
+
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
96
|
+
"""
|
97
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
98
|
+
"""
|
99
|
+
return pulumi.get(self, "inheritable")
|
100
|
+
|
101
|
+
@inheritable.setter
|
102
|
+
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
103
|
+
pulumi.set(self, "inheritable", value)
|
104
|
+
|
84
105
|
@property
|
85
106
|
@pulumi.getter
|
86
107
|
def interval(self) -> Optional[pulumi.Input[int]]:
|
@@ -154,6 +175,7 @@ class QuotaRateLimitArgs:
|
|
154
175
|
class _QuotaRateLimitState:
|
155
176
|
def __init__(__self__, *,
|
156
177
|
block_interval: Optional[pulumi.Input[int]] = None,
|
178
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
157
179
|
interval: Optional[pulumi.Input[int]] = None,
|
158
180
|
name: Optional[pulumi.Input[str]] = None,
|
159
181
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -164,6 +186,7 @@ class _QuotaRateLimitState:
|
|
164
186
|
Input properties used for looking up and filtering QuotaRateLimit resources.
|
165
187
|
:param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
|
166
188
|
be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
|
189
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
167
190
|
:param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
|
168
191
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
169
192
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -182,6 +205,8 @@ class _QuotaRateLimitState:
|
|
182
205
|
"""
|
183
206
|
if block_interval is not None:
|
184
207
|
pulumi.set(__self__, "block_interval", block_interval)
|
208
|
+
if inheritable is not None:
|
209
|
+
pulumi.set(__self__, "inheritable", inheritable)
|
185
210
|
if interval is not None:
|
186
211
|
pulumi.set(__self__, "interval", interval)
|
187
212
|
if name is not None:
|
@@ -208,6 +233,18 @@ class _QuotaRateLimitState:
|
|
208
233
|
def block_interval(self, value: Optional[pulumi.Input[int]]):
|
209
234
|
pulumi.set(self, "block_interval", value)
|
210
235
|
|
236
|
+
@property
|
237
|
+
@pulumi.getter
|
238
|
+
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
239
|
+
"""
|
240
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
241
|
+
"""
|
242
|
+
return pulumi.get(self, "inheritable")
|
243
|
+
|
244
|
+
@inheritable.setter
|
245
|
+
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
246
|
+
pulumi.set(self, "inheritable", value)
|
247
|
+
|
211
248
|
@property
|
212
249
|
@pulumi.getter
|
213
250
|
def interval(self) -> Optional[pulumi.Input[int]]:
|
@@ -296,6 +333,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
296
333
|
resource_name: str,
|
297
334
|
opts: Optional[pulumi.ResourceOptions] = None,
|
298
335
|
block_interval: Optional[pulumi.Input[int]] = None,
|
336
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
299
337
|
interval: Optional[pulumi.Input[int]] = None,
|
300
338
|
name: Optional[pulumi.Input[str]] = None,
|
301
339
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -318,6 +356,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
318
356
|
import pulumi_vault as vault
|
319
357
|
|
320
358
|
global_ = vault.QuotaRateLimit("global",
|
359
|
+
name="global",
|
321
360
|
path="",
|
322
361
|
rate=100)
|
323
362
|
```
|
@@ -327,13 +366,14 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
327
366
|
Rate limit quotas can be imported using their names
|
328
367
|
|
329
368
|
```sh
|
330
|
-
|
369
|
+
$ pulumi import vault:index/quotaRateLimit:QuotaRateLimit global global
|
331
370
|
```
|
332
371
|
|
333
372
|
:param str resource_name: The name of the resource.
|
334
373
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
335
374
|
:param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
|
336
375
|
be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
|
376
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
337
377
|
:param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
|
338
378
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
339
379
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -371,6 +411,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
371
411
|
import pulumi_vault as vault
|
372
412
|
|
373
413
|
global_ = vault.QuotaRateLimit("global",
|
414
|
+
name="global",
|
374
415
|
path="",
|
375
416
|
rate=100)
|
376
417
|
```
|
@@ -380,7 +421,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
380
421
|
Rate limit quotas can be imported using their names
|
381
422
|
|
382
423
|
```sh
|
383
|
-
|
424
|
+
$ pulumi import vault:index/quotaRateLimit:QuotaRateLimit global global
|
384
425
|
```
|
385
426
|
|
386
427
|
:param str resource_name: The name of the resource.
|
@@ -399,6 +440,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
399
440
|
resource_name: str,
|
400
441
|
opts: Optional[pulumi.ResourceOptions] = None,
|
401
442
|
block_interval: Optional[pulumi.Input[int]] = None,
|
443
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
402
444
|
interval: Optional[pulumi.Input[int]] = None,
|
403
445
|
name: Optional[pulumi.Input[str]] = None,
|
404
446
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -415,6 +457,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
415
457
|
__props__ = QuotaRateLimitArgs.__new__(QuotaRateLimitArgs)
|
416
458
|
|
417
459
|
__props__.__dict__["block_interval"] = block_interval
|
460
|
+
__props__.__dict__["inheritable"] = inheritable
|
418
461
|
__props__.__dict__["interval"] = interval
|
419
462
|
__props__.__dict__["name"] = name
|
420
463
|
__props__.__dict__["namespace"] = namespace
|
@@ -434,6 +477,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
434
477
|
id: pulumi.Input[str],
|
435
478
|
opts: Optional[pulumi.ResourceOptions] = None,
|
436
479
|
block_interval: Optional[pulumi.Input[int]] = None,
|
480
|
+
inheritable: Optional[pulumi.Input[bool]] = None,
|
437
481
|
interval: Optional[pulumi.Input[int]] = None,
|
438
482
|
name: Optional[pulumi.Input[str]] = None,
|
439
483
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -449,6 +493,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
449
493
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
450
494
|
:param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
|
451
495
|
be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
|
496
|
+
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
452
497
|
:param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
|
453
498
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
454
499
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -470,6 +515,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
470
515
|
__props__ = _QuotaRateLimitState.__new__(_QuotaRateLimitState)
|
471
516
|
|
472
517
|
__props__.__dict__["block_interval"] = block_interval
|
518
|
+
__props__.__dict__["inheritable"] = inheritable
|
473
519
|
__props__.__dict__["interval"] = interval
|
474
520
|
__props__.__dict__["name"] = name
|
475
521
|
__props__.__dict__["namespace"] = namespace
|
@@ -487,6 +533,14 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
487
533
|
"""
|
488
534
|
return pulumi.get(self, "block_interval")
|
489
535
|
|
536
|
+
@property
|
537
|
+
@pulumi.getter
|
538
|
+
def inheritable(self) -> pulumi.Output[Optional[bool]]:
|
539
|
+
"""
|
540
|
+
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
541
|
+
"""
|
542
|
+
return pulumi.get(self, "inheritable")
|
543
|
+
|
490
544
|
@property
|
491
545
|
@pulumi.getter
|
492
546
|
def interval(self) -> pulumi.Output[int]:
|
pulumi_vault/rabbitmq/_inputs.py
CHANGED
@@ -4,17 +4,48 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretBackendRoleVhostArgs',
|
19
|
+
'SecretBackendRoleVhostArgsDict',
|
14
20
|
'SecretBackendRoleVhostTopicArgs',
|
21
|
+
'SecretBackendRoleVhostTopicArgsDict',
|
15
22
|
'SecretBackendRoleVhostTopicVhostArgs',
|
23
|
+
'SecretBackendRoleVhostTopicVhostArgsDict',
|
16
24
|
]
|
17
25
|
|
26
|
+
MYPY = False
|
27
|
+
|
28
|
+
if not MYPY:
|
29
|
+
class SecretBackendRoleVhostArgsDict(TypedDict):
|
30
|
+
configure: pulumi.Input[str]
|
31
|
+
"""
|
32
|
+
The configure permissions for this vhost.
|
33
|
+
"""
|
34
|
+
host: pulumi.Input[str]
|
35
|
+
"""
|
36
|
+
The vhost to set permissions for.
|
37
|
+
"""
|
38
|
+
read: pulumi.Input[str]
|
39
|
+
"""
|
40
|
+
The read permissions for this vhost.
|
41
|
+
"""
|
42
|
+
write: pulumi.Input[str]
|
43
|
+
"""
|
44
|
+
The write permissions for this vhost.
|
45
|
+
"""
|
46
|
+
elif False:
|
47
|
+
SecretBackendRoleVhostArgsDict: TypeAlias = Mapping[str, Any]
|
48
|
+
|
18
49
|
@pulumi.input_type
|
19
50
|
class SecretBackendRoleVhostArgs:
|
20
51
|
def __init__(__self__, *,
|
@@ -82,6 +113,19 @@ class SecretBackendRoleVhostArgs:
|
|
82
113
|
pulumi.set(self, "write", value)
|
83
114
|
|
84
115
|
|
116
|
+
if not MYPY:
|
117
|
+
class SecretBackendRoleVhostTopicArgsDict(TypedDict):
|
118
|
+
host: pulumi.Input[str]
|
119
|
+
"""
|
120
|
+
The vhost to set permissions for.
|
121
|
+
"""
|
122
|
+
vhosts: NotRequired[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgsDict']]]]
|
123
|
+
"""
|
124
|
+
Specifies a map of virtual hosts to permissions.
|
125
|
+
"""
|
126
|
+
elif False:
|
127
|
+
SecretBackendRoleVhostTopicArgsDict: TypeAlias = Mapping[str, Any]
|
128
|
+
|
85
129
|
@pulumi.input_type
|
86
130
|
class SecretBackendRoleVhostTopicArgs:
|
87
131
|
def __init__(__self__, *,
|
@@ -120,6 +164,23 @@ class SecretBackendRoleVhostTopicArgs:
|
|
120
164
|
pulumi.set(self, "vhosts", value)
|
121
165
|
|
122
166
|
|
167
|
+
if not MYPY:
|
168
|
+
class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict):
|
169
|
+
read: pulumi.Input[str]
|
170
|
+
"""
|
171
|
+
The read permissions for this vhost.
|
172
|
+
"""
|
173
|
+
topic: pulumi.Input[str]
|
174
|
+
"""
|
175
|
+
The vhost to set permissions for.
|
176
|
+
"""
|
177
|
+
write: pulumi.Input[str]
|
178
|
+
"""
|
179
|
+
The write permissions for this vhost.
|
180
|
+
"""
|
181
|
+
elif False:
|
182
|
+
SecretBackendRoleVhostTopicVhostArgsDict: TypeAlias = Mapping[str, Any]
|
183
|
+
|
123
184
|
@pulumi.input_type
|
124
185
|
class SecretBackendRoleVhostTopicVhostArgs:
|
125
186
|
def __init__(__self__, *,
|
pulumi_vault/rabbitmq/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -40,7 +45,7 @@ class SecretBackendArgs:
|
|
40
45
|
for credentials issued by this backend.
|
41
46
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
42
47
|
The value should not contain leading or trailing forward slashes.
|
43
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
48
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
49
|
*Available only for Vault Enterprise*.
|
45
50
|
:param pulumi.Input[str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
46
51
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -164,7 +169,7 @@ class SecretBackendArgs:
|
|
164
169
|
"""
|
165
170
|
The namespace to provision the resource in.
|
166
171
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
172
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
173
|
*Available only for Vault Enterprise*.
|
169
174
|
"""
|
170
175
|
return pulumi.get(self, "namespace")
|
@@ -251,7 +256,7 @@ class _SecretBackendState:
|
|
251
256
|
for credentials issued by this backend.
|
252
257
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
253
258
|
The value should not contain leading or trailing forward slashes.
|
254
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
259
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
260
|
*Available only for Vault Enterprise*.
|
256
261
|
:param pulumi.Input[str] password: Specifies the RabbitMQ management administrator password.
|
257
262
|
:param pulumi.Input[str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
@@ -356,7 +361,7 @@ class _SecretBackendState:
|
|
356
361
|
"""
|
357
362
|
The namespace to provision the resource in.
|
358
363
|
The value should not contain leading or trailing forward slashes.
|
359
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
364
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
360
365
|
*Available only for Vault Enterprise*.
|
361
366
|
"""
|
362
367
|
return pulumi.get(self, "namespace")
|
@@ -467,8 +472,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
467
472
|
|
468
473
|
rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
|
469
474
|
connection_uri="https://.....",
|
470
|
-
|
471
|
-
|
475
|
+
username="user",
|
476
|
+
password="password")
|
472
477
|
```
|
473
478
|
|
474
479
|
## Import
|
@@ -476,7 +481,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
476
481
|
RabbitMQ secret backends can be imported using the `path`, e.g.
|
477
482
|
|
478
483
|
```sh
|
479
|
-
|
484
|
+
$ pulumi import vault:rabbitMq/secretBackend:SecretBackend rabbitmq rabbitmq
|
480
485
|
```
|
481
486
|
|
482
487
|
:param str resource_name: The name of the resource.
|
@@ -491,7 +496,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
491
496
|
for credentials issued by this backend.
|
492
497
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
493
498
|
The value should not contain leading or trailing forward slashes.
|
494
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
499
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
495
500
|
*Available only for Vault Enterprise*.
|
496
501
|
:param pulumi.Input[str] password: Specifies the RabbitMQ management administrator password.
|
497
502
|
:param pulumi.Input[str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
@@ -517,8 +522,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
517
522
|
|
518
523
|
rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
|
519
524
|
connection_uri="https://.....",
|
520
|
-
|
521
|
-
|
525
|
+
username="user",
|
526
|
+
password="password")
|
522
527
|
```
|
523
528
|
|
524
529
|
## Import
|
@@ -526,7 +531,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
526
531
|
RabbitMQ secret backends can be imported using the `path`, e.g.
|
527
532
|
|
528
533
|
```sh
|
529
|
-
|
534
|
+
$ pulumi import vault:rabbitMq/secretBackend:SecretBackend rabbitmq rabbitmq
|
530
535
|
```
|
531
536
|
|
532
537
|
:param str resource_name: The name of the resource.
|
@@ -624,7 +629,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
624
629
|
for credentials issued by this backend.
|
625
630
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
626
631
|
The value should not contain leading or trailing forward slashes.
|
627
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
632
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
628
633
|
*Available only for Vault Enterprise*.
|
629
634
|
:param pulumi.Input[str] password: Specifies the RabbitMQ management administrator password.
|
630
635
|
:param pulumi.Input[str] password_policy: Specifies a password policy to use when creating dynamic credentials. Defaults to generating an alphanumeric password if not set.
|
@@ -702,7 +707,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
702
707
|
"""
|
703
708
|
The namespace to provision the resource in.
|
704
709
|
The value should not contain leading or trailing forward slashes.
|
705
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
710
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
706
711
|
*Available only for Vault Enterprise*.
|
707
712
|
"""
|
708
713
|
return pulumi.get(self, "namespace")
|