pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -30,7 +35,7 @@ class SecretBackendRoleArgs:
|
|
30
35
|
Must be unique within the backend.
|
31
36
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
37
|
The value should not contain leading or trailing forward slashes.
|
33
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
39
|
*Available only for Vault Enterprise*.
|
35
40
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
36
41
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
@@ -80,7 +85,7 @@ class SecretBackendRoleArgs:
|
|
80
85
|
"""
|
81
86
|
The namespace to provision the resource in.
|
82
87
|
The value should not contain leading or trailing forward slashes.
|
83
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
88
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
84
89
|
*Available only for Vault Enterprise*.
|
85
90
|
"""
|
86
91
|
return pulumi.get(self, "namespace")
|
@@ -143,7 +148,7 @@ class _SecretBackendRoleState:
|
|
143
148
|
Must be unique within the backend.
|
144
149
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
149
154
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
@@ -194,7 +199,7 @@ class _SecretBackendRoleState:
|
|
194
199
|
"""
|
195
200
|
The namespace to provision the resource in.
|
196
201
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
202
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
203
|
*Available only for Vault Enterprise*.
|
199
204
|
"""
|
200
205
|
return pulumi.get(self, "namespace")
|
@@ -249,13 +254,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
249
254
|
name: Optional[pulumi.Input[str]] = None,
|
250
255
|
namespace: Optional[pulumi.Input[str]] = None,
|
251
256
|
tags: Optional[pulumi.Input[str]] = None,
|
252
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
253
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
257
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
258
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
254
259
|
__props__=None):
|
255
260
|
"""
|
256
261
|
## Example Usage
|
257
262
|
|
258
|
-
<!--Start PulumiCodeChooser -->
|
259
263
|
```python
|
260
264
|
import pulumi
|
261
265
|
import pulumi_vault as vault
|
@@ -266,23 +270,23 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
266
270
|
password="password")
|
267
271
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
268
272
|
backend=rabbitmq.path,
|
273
|
+
name="deploy",
|
269
274
|
tags="tag1,tag2",
|
270
|
-
vhosts=[
|
271
|
-
host
|
272
|
-
configure
|
273
|
-
read
|
274
|
-
write
|
275
|
-
|
276
|
-
vhost_topics=[
|
277
|
-
vhosts
|
278
|
-
topic
|
279
|
-
read
|
280
|
-
write
|
281
|
-
|
282
|
-
host
|
283
|
-
|
275
|
+
vhosts=[{
|
276
|
+
"host": "/",
|
277
|
+
"configure": "",
|
278
|
+
"read": ".*",
|
279
|
+
"write": "",
|
280
|
+
}],
|
281
|
+
vhost_topics=[{
|
282
|
+
"vhosts": [{
|
283
|
+
"topic": "amq.topic",
|
284
|
+
"read": ".*",
|
285
|
+
"write": "",
|
286
|
+
}],
|
287
|
+
"host": "/",
|
288
|
+
}])
|
284
289
|
```
|
285
|
-
<!--End PulumiCodeChooser -->
|
286
290
|
|
287
291
|
## Import
|
288
292
|
|
@@ -300,11 +304,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
300
304
|
Must be unique within the backend.
|
301
305
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
302
306
|
The value should not contain leading or trailing forward slashes.
|
303
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
307
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
304
308
|
*Available only for Vault Enterprise*.
|
305
309
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
306
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
307
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
310
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
311
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
308
312
|
"""
|
309
313
|
...
|
310
314
|
@overload
|
@@ -315,7 +319,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
315
319
|
"""
|
316
320
|
## Example Usage
|
317
321
|
|
318
|
-
<!--Start PulumiCodeChooser -->
|
319
322
|
```python
|
320
323
|
import pulumi
|
321
324
|
import pulumi_vault as vault
|
@@ -326,23 +329,23 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
326
329
|
password="password")
|
327
330
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
328
331
|
backend=rabbitmq.path,
|
332
|
+
name="deploy",
|
329
333
|
tags="tag1,tag2",
|
330
|
-
vhosts=[
|
331
|
-
host
|
332
|
-
configure
|
333
|
-
read
|
334
|
-
write
|
335
|
-
|
336
|
-
vhost_topics=[
|
337
|
-
vhosts
|
338
|
-
topic
|
339
|
-
read
|
340
|
-
write
|
341
|
-
|
342
|
-
host
|
343
|
-
|
334
|
+
vhosts=[{
|
335
|
+
"host": "/",
|
336
|
+
"configure": "",
|
337
|
+
"read": ".*",
|
338
|
+
"write": "",
|
339
|
+
}],
|
340
|
+
vhost_topics=[{
|
341
|
+
"vhosts": [{
|
342
|
+
"topic": "amq.topic",
|
343
|
+
"read": ".*",
|
344
|
+
"write": "",
|
345
|
+
}],
|
346
|
+
"host": "/",
|
347
|
+
}])
|
344
348
|
```
|
345
|
-
<!--End PulumiCodeChooser -->
|
346
349
|
|
347
350
|
## Import
|
348
351
|
|
@@ -371,8 +374,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
371
374
|
name: Optional[pulumi.Input[str]] = None,
|
372
375
|
namespace: Optional[pulumi.Input[str]] = None,
|
373
376
|
tags: Optional[pulumi.Input[str]] = None,
|
374
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
375
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
377
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
378
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
376
379
|
__props__=None):
|
377
380
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
378
381
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -404,8 +407,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
404
407
|
name: Optional[pulumi.Input[str]] = None,
|
405
408
|
namespace: Optional[pulumi.Input[str]] = None,
|
406
409
|
tags: Optional[pulumi.Input[str]] = None,
|
407
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
408
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
410
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
411
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
|
409
412
|
"""
|
410
413
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
411
414
|
properties used to qualify the lookup.
|
@@ -419,11 +422,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
419
422
|
Must be unique within the backend.
|
420
423
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
421
424
|
The value should not contain leading or trailing forward slashes.
|
422
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
425
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
423
426
|
*Available only for Vault Enterprise*.
|
424
427
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
425
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
426
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
428
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
429
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
427
430
|
"""
|
428
431
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
429
432
|
|
@@ -461,7 +464,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
461
464
|
"""
|
462
465
|
The namespace to provision the resource in.
|
463
466
|
The value should not contain leading or trailing forward slashes.
|
464
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
467
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
465
468
|
*Available only for Vault Enterprise*.
|
466
469
|
"""
|
467
470
|
return pulumi.get(self, "namespace")
|
pulumi_vault/raft_autopilot.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RaftAutopilotArgs', 'RaftAutopilot']
|
@@ -39,7 +44,7 @@ class RaftAutopilotArgs:
|
|
39
44
|
voting nodes.
|
40
45
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
41
46
|
The value should not contain leading or trailing forward slashes.
|
42
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
47
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
48
|
*Available only for Vault Enterprise*.
|
44
49
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
45
50
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -146,7 +151,7 @@ class RaftAutopilotArgs:
|
|
146
151
|
"""
|
147
152
|
The namespace to provision the resource in.
|
148
153
|
The value should not contain leading or trailing forward slashes.
|
149
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
154
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
150
155
|
*Available only for Vault Enterprise*.
|
151
156
|
"""
|
152
157
|
return pulumi.get(self, "namespace")
|
@@ -197,7 +202,7 @@ class _RaftAutopilotState:
|
|
197
202
|
voting nodes.
|
198
203
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
199
204
|
The value should not contain leading or trailing forward slashes.
|
200
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
205
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
201
206
|
*Available only for Vault Enterprise*.
|
202
207
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
203
208
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -304,7 +309,7 @@ class _RaftAutopilotState:
|
|
304
309
|
"""
|
305
310
|
The namespace to provision the resource in.
|
306
311
|
The value should not contain leading or trailing forward slashes.
|
307
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
312
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
308
313
|
*Available only for Vault Enterprise*.
|
309
314
|
"""
|
310
315
|
return pulumi.get(self, "namespace")
|
@@ -349,7 +354,6 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
349
354
|
|
350
355
|
## Example Usage
|
351
356
|
|
352
|
-
<!--Start PulumiCodeChooser -->
|
353
357
|
```python
|
354
358
|
import pulumi
|
355
359
|
import pulumi_vault as vault
|
@@ -362,7 +366,6 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
362
366
|
min_quorum=3,
|
363
367
|
server_stabilization_time="10s")
|
364
368
|
```
|
365
|
-
<!--End PulumiCodeChooser -->
|
366
369
|
|
367
370
|
## Import
|
368
371
|
|
@@ -389,7 +392,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
389
392
|
voting nodes.
|
390
393
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
391
394
|
The value should not contain leading or trailing forward slashes.
|
392
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
395
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
393
396
|
*Available only for Vault Enterprise*.
|
394
397
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
395
398
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -408,7 +411,6 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
408
411
|
|
409
412
|
## Example Usage
|
410
413
|
|
411
|
-
<!--Start PulumiCodeChooser -->
|
412
414
|
```python
|
413
415
|
import pulumi
|
414
416
|
import pulumi_vault as vault
|
@@ -421,7 +423,6 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
421
423
|
min_quorum=3,
|
422
424
|
server_stabilization_time="10s")
|
423
425
|
```
|
424
|
-
<!--End PulumiCodeChooser -->
|
425
426
|
|
426
427
|
## Import
|
427
428
|
|
@@ -511,7 +512,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
511
512
|
voting nodes.
|
512
513
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
513
514
|
The value should not contain leading or trailing forward slashes.
|
514
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
515
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
515
516
|
*Available only for Vault Enterprise*.
|
516
517
|
:param pulumi.Input[str] server_stabilization_time: Minimum amount of time a server must be
|
517
518
|
stable in the 'healthy' state before being added to the cluster.
|
@@ -591,7 +592,7 @@ class RaftAutopilot(pulumi.CustomResource):
|
|
591
592
|
"""
|
592
593
|
The namespace to provision the resource in.
|
593
594
|
The value should not contain leading or trailing forward slashes.
|
594
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
595
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
595
596
|
*Available only for Vault Enterprise*.
|
596
597
|
"""
|
597
598
|
return pulumi.get(self, "namespace")
|