pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
@@ -19,7 +24,9 @@ class AuthBackendRoleSecretIdArgs:
|
|
19
24
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
25
|
metadata: Optional[pulumi.Input[str]] = None,
|
21
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
22
28
|
secret_id: Optional[pulumi.Input[str]] = None,
|
29
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
23
30
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
24
31
|
wrapping_ttl: Optional[pulumi.Input[str]] = None):
|
25
32
|
"""
|
@@ -32,10 +39,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
32
39
|
key-value pairs to be set on tokens issued with this SecretID.
|
33
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
41
|
The value should not contain leading or trailing forward slashes.
|
35
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
43
|
*Available only for Vault Enterprise*.
|
44
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
37
45
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
38
46
|
mode. Defaults to Vault auto-generating SecretIDs.
|
47
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
39
48
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
40
49
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
41
50
|
invalidated through unwrapping.
|
@@ -53,8 +62,12 @@ class AuthBackendRoleSecretIdArgs:
|
|
53
62
|
pulumi.set(__self__, "metadata", metadata)
|
54
63
|
if namespace is not None:
|
55
64
|
pulumi.set(__self__, "namespace", namespace)
|
65
|
+
if num_uses is not None:
|
66
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
56
67
|
if secret_id is not None:
|
57
68
|
pulumi.set(__self__, "secret_id", secret_id)
|
69
|
+
if ttl is not None:
|
70
|
+
pulumi.set(__self__, "ttl", ttl)
|
58
71
|
if with_wrapped_accessor is not None:
|
59
72
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
60
73
|
if wrapping_ttl is not None:
|
@@ -116,7 +129,7 @@ class AuthBackendRoleSecretIdArgs:
|
|
116
129
|
"""
|
117
130
|
The namespace to provision the resource in.
|
118
131
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
132
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
133
|
*Available only for Vault Enterprise*.
|
121
134
|
"""
|
122
135
|
return pulumi.get(self, "namespace")
|
@@ -125,6 +138,18 @@ class AuthBackendRoleSecretIdArgs:
|
|
125
138
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
126
139
|
pulumi.set(self, "namespace", value)
|
127
140
|
|
141
|
+
@property
|
142
|
+
@pulumi.getter(name="numUses")
|
143
|
+
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
144
|
+
"""
|
145
|
+
The number of uses for the secret-id.
|
146
|
+
"""
|
147
|
+
return pulumi.get(self, "num_uses")
|
148
|
+
|
149
|
+
@num_uses.setter
|
150
|
+
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
151
|
+
pulumi.set(self, "num_uses", value)
|
152
|
+
|
128
153
|
@property
|
129
154
|
@pulumi.getter(name="secretId")
|
130
155
|
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
@@ -138,6 +163,18 @@ class AuthBackendRoleSecretIdArgs:
|
|
138
163
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
139
164
|
pulumi.set(self, "secret_id", value)
|
140
165
|
|
166
|
+
@property
|
167
|
+
@pulumi.getter
|
168
|
+
def ttl(self) -> Optional[pulumi.Input[int]]:
|
169
|
+
"""
|
170
|
+
The TTL duration of the SecretID.
|
171
|
+
"""
|
172
|
+
return pulumi.get(self, "ttl")
|
173
|
+
|
174
|
+
@ttl.setter
|
175
|
+
def ttl(self, value: Optional[pulumi.Input[int]]):
|
176
|
+
pulumi.set(self, "ttl", value)
|
177
|
+
|
141
178
|
@property
|
142
179
|
@pulumi.getter(name="withWrappedAccessor")
|
143
180
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -176,8 +213,10 @@ class _AuthBackendRoleSecretIdState:
|
|
176
213
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
177
214
|
metadata: Optional[pulumi.Input[str]] = None,
|
178
215
|
namespace: Optional[pulumi.Input[str]] = None,
|
216
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
179
217
|
role_name: Optional[pulumi.Input[str]] = None,
|
180
218
|
secret_id: Optional[pulumi.Input[str]] = None,
|
219
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
181
220
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
182
221
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
183
222
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -192,11 +231,13 @@ class _AuthBackendRoleSecretIdState:
|
|
192
231
|
key-value pairs to be set on tokens issued with this SecretID.
|
193
232
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
194
233
|
The value should not contain leading or trailing forward slashes.
|
195
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
234
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
235
|
*Available only for Vault Enterprise*.
|
236
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
197
237
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
198
238
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
199
239
|
mode. Defaults to Vault auto-generating SecretIDs.
|
240
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
200
241
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
201
242
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
202
243
|
invalidated through unwrapping.
|
@@ -218,10 +259,14 @@ class _AuthBackendRoleSecretIdState:
|
|
218
259
|
pulumi.set(__self__, "metadata", metadata)
|
219
260
|
if namespace is not None:
|
220
261
|
pulumi.set(__self__, "namespace", namespace)
|
262
|
+
if num_uses is not None:
|
263
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
221
264
|
if role_name is not None:
|
222
265
|
pulumi.set(__self__, "role_name", role_name)
|
223
266
|
if secret_id is not None:
|
224
267
|
pulumi.set(__self__, "secret_id", secret_id)
|
268
|
+
if ttl is not None:
|
269
|
+
pulumi.set(__self__, "ttl", ttl)
|
225
270
|
if with_wrapped_accessor is not None:
|
226
271
|
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
227
272
|
if wrapping_accessor is not None:
|
@@ -287,7 +332,7 @@ class _AuthBackendRoleSecretIdState:
|
|
287
332
|
"""
|
288
333
|
The namespace to provision the resource in.
|
289
334
|
The value should not contain leading or trailing forward slashes.
|
290
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
291
336
|
*Available only for Vault Enterprise*.
|
292
337
|
"""
|
293
338
|
return pulumi.get(self, "namespace")
|
@@ -296,6 +341,18 @@ class _AuthBackendRoleSecretIdState:
|
|
296
341
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
297
342
|
pulumi.set(self, "namespace", value)
|
298
343
|
|
344
|
+
@property
|
345
|
+
@pulumi.getter(name="numUses")
|
346
|
+
def num_uses(self) -> Optional[pulumi.Input[int]]:
|
347
|
+
"""
|
348
|
+
The number of uses for the secret-id.
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "num_uses")
|
351
|
+
|
352
|
+
@num_uses.setter
|
353
|
+
def num_uses(self, value: Optional[pulumi.Input[int]]):
|
354
|
+
pulumi.set(self, "num_uses", value)
|
355
|
+
|
299
356
|
@property
|
300
357
|
@pulumi.getter(name="roleName")
|
301
358
|
def role_name(self) -> Optional[pulumi.Input[str]]:
|
@@ -321,6 +378,18 @@ class _AuthBackendRoleSecretIdState:
|
|
321
378
|
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
322
379
|
pulumi.set(self, "secret_id", value)
|
323
380
|
|
381
|
+
@property
|
382
|
+
@pulumi.getter
|
383
|
+
def ttl(self) -> Optional[pulumi.Input[int]]:
|
384
|
+
"""
|
385
|
+
The TTL duration of the SecretID.
|
386
|
+
"""
|
387
|
+
return pulumi.get(self, "ttl")
|
388
|
+
|
389
|
+
@ttl.setter
|
390
|
+
def ttl(self, value: Optional[pulumi.Input[int]]):
|
391
|
+
pulumi.set(self, "ttl", value)
|
392
|
+
|
324
393
|
@property
|
325
394
|
@pulumi.getter(name="withWrappedAccessor")
|
326
395
|
def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
|
@@ -385,8 +454,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
385
454
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
386
455
|
metadata: Optional[pulumi.Input[str]] = None,
|
387
456
|
namespace: Optional[pulumi.Input[str]] = None,
|
457
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
388
458
|
role_name: Optional[pulumi.Input[str]] = None,
|
389
459
|
secret_id: Optional[pulumi.Input[str]] = None,
|
460
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
390
461
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
391
462
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
392
463
|
__props__=None):
|
@@ -397,7 +468,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
397
468
|
|
398
469
|
## Example Usage
|
399
470
|
|
400
|
-
<!--Start PulumiCodeChooser -->
|
401
471
|
```python
|
402
472
|
import pulumi
|
403
473
|
import json
|
@@ -419,7 +489,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
419
489
|
"hello": "world",
|
420
490
|
}))
|
421
491
|
```
|
422
|
-
<!--End PulumiCodeChooser -->
|
423
492
|
|
424
493
|
:param str resource_name: The name of the resource.
|
425
494
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -430,11 +499,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
430
499
|
key-value pairs to be set on tokens issued with this SecretID.
|
431
500
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
432
501
|
The value should not contain leading or trailing forward slashes.
|
433
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
502
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
434
503
|
*Available only for Vault Enterprise*.
|
504
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
435
505
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
436
506
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
437
507
|
mode. Defaults to Vault auto-generating SecretIDs.
|
508
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
438
509
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
439
510
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
440
511
|
invalidated through unwrapping.
|
@@ -456,7 +527,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
456
527
|
|
457
528
|
## Example Usage
|
458
529
|
|
459
|
-
<!--Start PulumiCodeChooser -->
|
460
530
|
```python
|
461
531
|
import pulumi
|
462
532
|
import json
|
@@ -478,7 +548,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
478
548
|
"hello": "world",
|
479
549
|
}))
|
480
550
|
```
|
481
|
-
<!--End PulumiCodeChooser -->
|
482
551
|
|
483
552
|
:param str resource_name: The name of the resource.
|
484
553
|
:param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
|
@@ -499,8 +568,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
499
568
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
500
569
|
metadata: Optional[pulumi.Input[str]] = None,
|
501
570
|
namespace: Optional[pulumi.Input[str]] = None,
|
571
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
502
572
|
role_name: Optional[pulumi.Input[str]] = None,
|
503
573
|
secret_id: Optional[pulumi.Input[str]] = None,
|
574
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
504
575
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
505
576
|
wrapping_ttl: Optional[pulumi.Input[str]] = None,
|
506
577
|
__props__=None):
|
@@ -516,10 +587,12 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
516
587
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
517
588
|
__props__.__dict__["metadata"] = metadata
|
518
589
|
__props__.__dict__["namespace"] = namespace
|
590
|
+
__props__.__dict__["num_uses"] = num_uses
|
519
591
|
if role_name is None and not opts.urn:
|
520
592
|
raise TypeError("Missing required property 'role_name'")
|
521
593
|
__props__.__dict__["role_name"] = role_name
|
522
594
|
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
595
|
+
__props__.__dict__["ttl"] = ttl
|
523
596
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
524
597
|
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
525
598
|
__props__.__dict__["accessor"] = None
|
@@ -544,8 +617,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
544
617
|
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
545
618
|
metadata: Optional[pulumi.Input[str]] = None,
|
546
619
|
namespace: Optional[pulumi.Input[str]] = None,
|
620
|
+
num_uses: Optional[pulumi.Input[int]] = None,
|
547
621
|
role_name: Optional[pulumi.Input[str]] = None,
|
548
622
|
secret_id: Optional[pulumi.Input[str]] = None,
|
623
|
+
ttl: Optional[pulumi.Input[int]] = None,
|
549
624
|
with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
|
550
625
|
wrapping_accessor: Optional[pulumi.Input[str]] = None,
|
551
626
|
wrapping_token: Optional[pulumi.Input[str]] = None,
|
@@ -565,11 +640,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
565
640
|
key-value pairs to be set on tokens issued with this SecretID.
|
566
641
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
567
642
|
The value should not contain leading or trailing forward slashes.
|
568
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
643
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
569
644
|
*Available only for Vault Enterprise*.
|
645
|
+
:param pulumi.Input[int] num_uses: The number of uses for the secret-id.
|
570
646
|
:param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
|
571
647
|
:param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
|
572
648
|
mode. Defaults to Vault auto-generating SecretIDs.
|
649
|
+
:param pulumi.Input[int] ttl: The TTL duration of the SecretID.
|
573
650
|
:param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
574
651
|
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
575
652
|
invalidated through unwrapping.
|
@@ -590,8 +667,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
590
667
|
__props__.__dict__["cidr_lists"] = cidr_lists
|
591
668
|
__props__.__dict__["metadata"] = metadata
|
592
669
|
__props__.__dict__["namespace"] = namespace
|
670
|
+
__props__.__dict__["num_uses"] = num_uses
|
593
671
|
__props__.__dict__["role_name"] = role_name
|
594
672
|
__props__.__dict__["secret_id"] = secret_id
|
673
|
+
__props__.__dict__["ttl"] = ttl
|
595
674
|
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
596
675
|
__props__.__dict__["wrapping_accessor"] = wrapping_accessor
|
597
676
|
__props__.__dict__["wrapping_token"] = wrapping_token
|
@@ -638,11 +717,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
638
717
|
"""
|
639
718
|
The namespace to provision the resource in.
|
640
719
|
The value should not contain leading or trailing forward slashes.
|
641
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
720
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
642
721
|
*Available only for Vault Enterprise*.
|
643
722
|
"""
|
644
723
|
return pulumi.get(self, "namespace")
|
645
724
|
|
725
|
+
@property
|
726
|
+
@pulumi.getter(name="numUses")
|
727
|
+
def num_uses(self) -> pulumi.Output[Optional[int]]:
|
728
|
+
"""
|
729
|
+
The number of uses for the secret-id.
|
730
|
+
"""
|
731
|
+
return pulumi.get(self, "num_uses")
|
732
|
+
|
646
733
|
@property
|
647
734
|
@pulumi.getter(name="roleName")
|
648
735
|
def role_name(self) -> pulumi.Output[str]:
|
@@ -660,6 +747,14 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
660
747
|
"""
|
661
748
|
return pulumi.get(self, "secret_id")
|
662
749
|
|
750
|
+
@property
|
751
|
+
@pulumi.getter
|
752
|
+
def ttl(self) -> pulumi.Output[Optional[int]]:
|
753
|
+
"""
|
754
|
+
The TTL duration of the SecretID.
|
755
|
+
"""
|
756
|
+
return pulumi.get(self, "ttl")
|
757
|
+
|
663
758
|
@property
|
664
759
|
@pulumi.getter(name="withWrappedAccessor")
|
665
760
|
def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -92,7 +97,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
92
97
|
|
93
98
|
## Example Usage
|
94
99
|
|
95
|
-
<!--Start PulumiCodeChooser -->
|
96
100
|
```python
|
97
101
|
import pulumi
|
98
102
|
import pulumi_vault as vault
|
@@ -101,7 +105,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
101
105
|
role_name="my-role")
|
102
106
|
pulumi.export("role-id", role.role_id)
|
103
107
|
```
|
104
|
-
<!--End PulumiCodeChooser -->
|
105
108
|
|
106
109
|
|
107
110
|
:param str backend: The unique name for the AppRole backend the role to
|
@@ -125,19 +128,15 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
125
128
|
namespace=pulumi.get(__ret__, 'namespace'),
|
126
129
|
role_id=pulumi.get(__ret__, 'role_id'),
|
127
130
|
role_name=pulumi.get(__ret__, 'role_name'))
|
128
|
-
|
129
|
-
|
130
|
-
@_utilities.lift_output_func(get_auth_backend_role_id)
|
131
131
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
132
132
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
133
133
|
role_name: Optional[pulumi.Input[str]] = None,
|
134
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
134
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
135
135
|
"""
|
136
136
|
Reads the Role ID of an AppRole from a Vault server.
|
137
137
|
|
138
138
|
## Example Usage
|
139
139
|
|
140
|
-
<!--Start PulumiCodeChooser -->
|
141
140
|
```python
|
142
141
|
import pulumi
|
143
142
|
import pulumi_vault as vault
|
@@ -146,7 +145,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
146
145
|
role_name="my-role")
|
147
146
|
pulumi.export("role-id", role.role_id)
|
148
147
|
```
|
149
|
-
<!--End PulumiCodeChooser -->
|
150
148
|
|
151
149
|
|
152
150
|
:param str backend: The unique name for the AppRole backend the role to
|
@@ -157,4 +155,15 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
157
155
|
*Available only for Vault Enterprise*.
|
158
156
|
:param str role_name: The name of the role to retrieve the Role ID for.
|
159
157
|
"""
|
160
|
-
|
158
|
+
__args__ = dict()
|
159
|
+
__args__['backend'] = backend
|
160
|
+
__args__['namespace'] = namespace
|
161
|
+
__args__['roleName'] = role_name
|
162
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
|
+
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
|
+
backend=pulumi.get(__response__, 'backend'),
|
166
|
+
id=pulumi.get(__response__, 'id'),
|
167
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
168
|
+
role_id=pulumi.get(__response__, 'role_id'),
|
169
|
+
role_name=pulumi.get(__response__, 'role_name')))
|
pulumi_vault/audit.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuditArgs', 'Audit']
|
@@ -30,7 +35,7 @@ class AuditArgs:
|
|
30
35
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
31
36
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
37
|
The value should not contain leading or trailing forward slashes.
|
33
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
39
|
*Available only for Vault Enterprise*.
|
35
40
|
:param pulumi.Input[str] path: The path to mount the audit device. This defaults to the type.
|
36
41
|
"""
|
@@ -101,7 +106,7 @@ class AuditArgs:
|
|
101
106
|
"""
|
102
107
|
The namespace to provision the resource in.
|
103
108
|
The value should not contain leading or trailing forward slashes.
|
104
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
109
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
105
110
|
*Available only for Vault Enterprise*.
|
106
111
|
"""
|
107
112
|
return pulumi.get(self, "namespace")
|
@@ -138,7 +143,7 @@ class _AuditState:
|
|
138
143
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
139
144
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
140
145
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
147
|
*Available only for Vault Enterprise*.
|
143
148
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
144
149
|
|
@@ -189,7 +194,7 @@ class _AuditState:
|
|
189
194
|
"""
|
190
195
|
The namespace to provision the resource in.
|
191
196
|
The value should not contain leading or trailing forward slashes.
|
192
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
197
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
193
198
|
*Available only for Vault Enterprise*.
|
194
199
|
"""
|
195
200
|
return pulumi.get(self, "namespace")
|
@@ -254,37 +259,33 @@ class Audit(pulumi.CustomResource):
|
|
254
259
|
|
255
260
|
### File Audit Device)
|
256
261
|
|
257
|
-
<!--Start PulumiCodeChooser -->
|
258
262
|
```python
|
259
263
|
import pulumi
|
260
264
|
import pulumi_vault as vault
|
261
265
|
|
262
266
|
test = vault.Audit("test",
|
267
|
+
type="file",
|
263
268
|
options={
|
264
269
|
"file_path": "C:/temp/audit.txt",
|
265
|
-
}
|
266
|
-
type="file")
|
270
|
+
})
|
267
271
|
```
|
268
|
-
<!--End PulumiCodeChooser -->
|
269
272
|
|
270
273
|
### Socket Audit Device)
|
271
274
|
|
272
|
-
<!--Start PulumiCodeChooser -->
|
273
275
|
```python
|
274
276
|
import pulumi
|
275
277
|
import pulumi_vault as vault
|
276
278
|
|
277
279
|
test = vault.Audit("test",
|
280
|
+
type="socket",
|
281
|
+
path="app_socket",
|
278
282
|
local=False,
|
279
283
|
options={
|
280
284
|
"address": "127.0.0.1:8000",
|
281
|
-
"description": "application x socket",
|
282
285
|
"socket_type": "tcp",
|
283
|
-
|
284
|
-
|
285
|
-
type="socket")
|
286
|
+
"description": "application x socket",
|
287
|
+
})
|
286
288
|
```
|
287
|
-
<!--End PulumiCodeChooser -->
|
288
289
|
|
289
290
|
## Import
|
290
291
|
|
@@ -300,7 +301,7 @@ class Audit(pulumi.CustomResource):
|
|
300
301
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
301
302
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
302
303
|
The value should not contain leading or trailing forward slashes.
|
303
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
304
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
304
305
|
*Available only for Vault Enterprise*.
|
305
306
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
306
307
|
|
@@ -319,37 +320,33 @@ class Audit(pulumi.CustomResource):
|
|
319
320
|
|
320
321
|
### File Audit Device)
|
321
322
|
|
322
|
-
<!--Start PulumiCodeChooser -->
|
323
323
|
```python
|
324
324
|
import pulumi
|
325
325
|
import pulumi_vault as vault
|
326
326
|
|
327
327
|
test = vault.Audit("test",
|
328
|
+
type="file",
|
328
329
|
options={
|
329
330
|
"file_path": "C:/temp/audit.txt",
|
330
|
-
}
|
331
|
-
type="file")
|
331
|
+
})
|
332
332
|
```
|
333
|
-
<!--End PulumiCodeChooser -->
|
334
333
|
|
335
334
|
### Socket Audit Device)
|
336
335
|
|
337
|
-
<!--Start PulumiCodeChooser -->
|
338
336
|
```python
|
339
337
|
import pulumi
|
340
338
|
import pulumi_vault as vault
|
341
339
|
|
342
340
|
test = vault.Audit("test",
|
341
|
+
type="socket",
|
342
|
+
path="app_socket",
|
343
343
|
local=False,
|
344
344
|
options={
|
345
345
|
"address": "127.0.0.1:8000",
|
346
|
-
"description": "application x socket",
|
347
346
|
"socket_type": "tcp",
|
348
|
-
|
349
|
-
|
350
|
-
type="socket")
|
347
|
+
"description": "application x socket",
|
348
|
+
})
|
351
349
|
```
|
352
|
-
<!--End PulumiCodeChooser -->
|
353
350
|
|
354
351
|
## Import
|
355
352
|
|
@@ -426,7 +423,7 @@ class Audit(pulumi.CustomResource):
|
|
426
423
|
:param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
427
424
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
428
425
|
The value should not contain leading or trailing forward slashes.
|
429
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
426
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
430
427
|
*Available only for Vault Enterprise*.
|
431
428
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
|
432
429
|
|
@@ -468,7 +465,7 @@ class Audit(pulumi.CustomResource):
|
|
468
465
|
"""
|
469
466
|
The namespace to provision the resource in.
|
470
467
|
The value should not contain leading or trailing forward slashes.
|
471
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
468
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
472
469
|
*Available only for Vault Enterprise*.
|
473
470
|
"""
|
474
471
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
@@ -142,14 +147,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
142
147
|
|
143
148
|
## Example Usage
|
144
149
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
150
|
```python
|
147
151
|
import pulumi
|
148
152
|
import pulumi_vault as vault
|
149
153
|
|
150
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
154
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
155
|
+
name="X-Forwarded-For",
|
156
|
+
hmac=False)
|
151
157
|
```
|
152
|
-
<!--End PulumiCodeChooser -->
|
153
158
|
|
154
159
|
:param str resource_name: The name of the resource.
|
155
160
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -173,14 +178,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
173
178
|
|
174
179
|
## Example Usage
|
175
180
|
|
176
|
-
<!--Start PulumiCodeChooser -->
|
177
181
|
```python
|
178
182
|
import pulumi
|
179
183
|
import pulumi_vault as vault
|
180
184
|
|
181
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
185
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
186
|
+
name="X-Forwarded-For",
|
187
|
+
hmac=False)
|
182
188
|
```
|
183
|
-
<!--End PulumiCodeChooser -->
|
184
189
|
|
185
190
|
:param str resource_name: The name of the resource.
|
186
191
|
:param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.
|