pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -30,7 +35,7 @@ class SecretBackendRoleArgs:
|
|
30
35
|
Must be unique within the backend.
|
31
36
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
37
|
The value should not contain leading or trailing forward slashes.
|
33
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
39
|
*Available only for Vault Enterprise*.
|
35
40
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
36
41
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
@@ -80,7 +85,7 @@ class SecretBackendRoleArgs:
|
|
80
85
|
"""
|
81
86
|
The namespace to provision the resource in.
|
82
87
|
The value should not contain leading or trailing forward slashes.
|
83
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
88
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
84
89
|
*Available only for Vault Enterprise*.
|
85
90
|
"""
|
86
91
|
return pulumi.get(self, "namespace")
|
@@ -143,7 +148,7 @@ class _SecretBackendRoleState:
|
|
143
148
|
Must be unique within the backend.
|
144
149
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
149
154
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
@@ -194,7 +199,7 @@ class _SecretBackendRoleState:
|
|
194
199
|
"""
|
195
200
|
The namespace to provision the resource in.
|
196
201
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
202
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
203
|
*Available only for Vault Enterprise*.
|
199
204
|
"""
|
200
205
|
return pulumi.get(self, "namespace")
|
@@ -249,8 +254,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
249
254
|
name: Optional[pulumi.Input[str]] = None,
|
250
255
|
namespace: Optional[pulumi.Input[str]] = None,
|
251
256
|
tags: Optional[pulumi.Input[str]] = None,
|
252
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
253
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
257
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
258
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
254
259
|
__props__=None):
|
255
260
|
"""
|
256
261
|
## Example Usage
|
@@ -265,21 +270,22 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
265
270
|
password="password")
|
266
271
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
267
272
|
backend=rabbitmq.path,
|
273
|
+
name="deploy",
|
268
274
|
tags="tag1,tag2",
|
269
|
-
vhosts=[
|
270
|
-
host
|
271
|
-
configure
|
272
|
-
read
|
273
|
-
write
|
274
|
-
|
275
|
-
vhost_topics=[
|
276
|
-
vhosts
|
277
|
-
topic
|
278
|
-
read
|
279
|
-
write
|
280
|
-
|
281
|
-
host
|
282
|
-
|
275
|
+
vhosts=[{
|
276
|
+
"host": "/",
|
277
|
+
"configure": "",
|
278
|
+
"read": ".*",
|
279
|
+
"write": "",
|
280
|
+
}],
|
281
|
+
vhost_topics=[{
|
282
|
+
"vhosts": [{
|
283
|
+
"topic": "amq.topic",
|
284
|
+
"read": ".*",
|
285
|
+
"write": "",
|
286
|
+
}],
|
287
|
+
"host": "/",
|
288
|
+
}])
|
283
289
|
```
|
284
290
|
|
285
291
|
## Import
|
@@ -287,7 +293,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
287
293
|
RabbitMQ secret backend roles can be imported using the `path`, e.g.
|
288
294
|
|
289
295
|
```sh
|
290
|
-
|
296
|
+
$ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy
|
291
297
|
```
|
292
298
|
|
293
299
|
:param str resource_name: The name of the resource.
|
@@ -298,11 +304,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
298
304
|
Must be unique within the backend.
|
299
305
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
300
306
|
The value should not contain leading or trailing forward slashes.
|
301
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
307
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
308
|
*Available only for Vault Enterprise*.
|
303
309
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
304
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
310
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
311
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
306
312
|
"""
|
307
313
|
...
|
308
314
|
@overload
|
@@ -323,21 +329,22 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
323
329
|
password="password")
|
324
330
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
325
331
|
backend=rabbitmq.path,
|
332
|
+
name="deploy",
|
326
333
|
tags="tag1,tag2",
|
327
|
-
vhosts=[
|
328
|
-
host
|
329
|
-
configure
|
330
|
-
read
|
331
|
-
write
|
332
|
-
|
333
|
-
vhost_topics=[
|
334
|
-
vhosts
|
335
|
-
topic
|
336
|
-
read
|
337
|
-
write
|
338
|
-
|
339
|
-
host
|
340
|
-
|
334
|
+
vhosts=[{
|
335
|
+
"host": "/",
|
336
|
+
"configure": "",
|
337
|
+
"read": ".*",
|
338
|
+
"write": "",
|
339
|
+
}],
|
340
|
+
vhost_topics=[{
|
341
|
+
"vhosts": [{
|
342
|
+
"topic": "amq.topic",
|
343
|
+
"read": ".*",
|
344
|
+
"write": "",
|
345
|
+
}],
|
346
|
+
"host": "/",
|
347
|
+
}])
|
341
348
|
```
|
342
349
|
|
343
350
|
## Import
|
@@ -345,7 +352,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
345
352
|
RabbitMQ secret backend roles can be imported using the `path`, e.g.
|
346
353
|
|
347
354
|
```sh
|
348
|
-
|
355
|
+
$ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy
|
349
356
|
```
|
350
357
|
|
351
358
|
:param str resource_name: The name of the resource.
|
@@ -367,8 +374,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
367
374
|
name: Optional[pulumi.Input[str]] = None,
|
368
375
|
namespace: Optional[pulumi.Input[str]] = None,
|
369
376
|
tags: Optional[pulumi.Input[str]] = None,
|
370
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
371
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
377
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
378
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
372
379
|
__props__=None):
|
373
380
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
374
381
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -400,8 +407,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
400
407
|
name: Optional[pulumi.Input[str]] = None,
|
401
408
|
namespace: Optional[pulumi.Input[str]] = None,
|
402
409
|
tags: Optional[pulumi.Input[str]] = None,
|
403
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
404
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
410
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
411
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
|
405
412
|
"""
|
406
413
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
407
414
|
properties used to qualify the lookup.
|
@@ -415,11 +422,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
415
422
|
Must be unique within the backend.
|
416
423
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
417
424
|
The value should not contain leading or trailing forward slashes.
|
418
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
425
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
419
426
|
*Available only for Vault Enterprise*.
|
420
427
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
421
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
422
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
428
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
429
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
423
430
|
"""
|
424
431
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
425
432
|
|
@@ -457,7 +464,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
457
464
|
"""
|
458
465
|
The namespace to provision the resource in.
|
459
466
|
The value should not contain leading or trailing forward slashes.
|
460
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
467
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
461
468
|
*Available only for Vault Enterprise*.
|
462
469
|
"""
|
463
470
|
return pulumi.get(self, "namespace")
|
pulumi_vault/raft_autopilot.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RaftAutopilotArgs', 'RaftAutopilot']
|
@@ -39,7 +44,7 @@ class RaftAutopilotArgs:
|
|
39
44
|
voting nodes.
|
40
45
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
41
46
|
The value should not contain leading or trailing forward slashes.
|
42
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
47
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
48
|
*Available only for Vault Enterprise*.
|
44
49
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
45
50
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -146,7 +151,7 @@ class RaftAutopilotArgs:
|
|
146
151
|
"""
|
147
152
|
The namespace to provision the resource in.
|
148
153
|
The value should not contain leading or trailing forward slashes.
|
149
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
154
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
150
155
|
*Available only for Vault Enterprise*.
|
151
156
|
"""
|
152
157
|
return pulumi.get(self, "namespace")
|
@@ -197,7 +202,7 @@ class _RaftAutopilotState:
|
|
197
202
|
voting nodes.
|
198
203
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
199
204
|
The value should not contain leading or trailing forward slashes.
|
200
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
205
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
201
206
|
*Available only for Vault Enterprise*.
|
202
207
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
203
208
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -304,7 +309,7 @@ class _RaftAutopilotState:
|
|
304
309
|
"""
|
305
310
|
The namespace to provision the resource in.
|
306
311
|
The value should not contain leading or trailing forward slashes.
|
307
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
312
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
308
313
|
*Available only for Vault Enterprise*.
|
309
314
|
"""
|
310
315
|
return pulumi.get(self, "namespace")
|
@@ -367,7 +372,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
367
372
|
Raft Autopilot config can be imported using the ID, e.g.
|
368
373
|
|
369
374
|
```sh
|
370
|
-
|
375
|
+
$ pulumi import vault:index/raftAutopilot:RaftAutopilot autopilot sys/storage/raft/autopilot/configuration
|
371
376
|
```
|
372
377
|
|
373
378
|
:param str resource_name: The name of the resource.
|
@@ -387,7 +392,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
387
392
|
voting nodes.
|
388
393
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
389
394
|
The value should not contain leading or trailing forward slashes.
|
390
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
395
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
391
396
|
*Available only for Vault Enterprise*.
|
392
397
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
393
398
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -424,7 +429,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
424
429
|
Raft Autopilot config can be imported using the ID, e.g.
|
425
430
|
|
426
431
|
```sh
|
427
|
-
|
432
|
+
$ pulumi import vault:index/raftAutopilot:RaftAutopilot autopilot sys/storage/raft/autopilot/configuration
|
428
433
|
```
|
429
434
|
|
430
435
|
:param str resource_name: The name of the resource.
|
@@ -507,7 +512,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
507
512
|
voting nodes.
|
508
513
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
509
514
|
The value should not contain leading or trailing forward slashes.
|
510
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
515
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
511
516
|
*Available only for Vault Enterprise*.
|
512
517
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
513
518
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -587,7 +592,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
587
592
|
"""
|
588
593
|
The namespace to provision the resource in.
|
589
594
|
The value should not contain leading or trailing forward slashes.
|
590
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
595
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
591
596
|
*Available only for Vault Enterprise*.
|
592
597
|
"""
|
593
598
|
return pulumi.get(self, "namespace")
|