pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -51,15 +51,32 @@ class AuthBackendRoleArgs:
|
|
51
51
|
expire. A value of zero will allow unlimited uses.
|
52
52
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
53
53
|
expires.
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
55
|
-
|
56
|
-
|
57
|
-
:param pulumi.Input[
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
:param pulumi.Input[int]
|
62
|
-
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
55
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
56
|
+
as well.
|
57
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
58
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
59
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
60
|
+
`token_max_ttl` would otherwise allow a renewal.
|
61
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
62
|
+
Its current value will be referenced at renewal time.
|
63
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
64
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
65
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
66
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
67
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
68
|
+
token generated using this role should never expire. The token should be renewed within the
|
69
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
70
|
+
value of this field. Specified in seconds.
|
71
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
72
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
73
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
74
|
+
Its current value will be referenced at renewal time.
|
75
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
76
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
77
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
78
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
79
|
+
requests a different type at generation time.
|
63
80
|
"""
|
64
81
|
pulumi.set(__self__, "role_name", role_name)
|
65
82
|
if backend is not None:
|
@@ -205,7 +222,9 @@ class AuthBackendRoleArgs:
|
|
205
222
|
@pulumi.getter(name="tokenBoundCidrs")
|
206
223
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
207
224
|
"""
|
208
|
-
|
225
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
226
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
227
|
+
as well.
|
209
228
|
"""
|
210
229
|
return pulumi.get(self, "token_bound_cidrs")
|
211
230
|
|
@@ -217,7 +236,10 @@ class AuthBackendRoleArgs:
|
|
217
236
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
218
237
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
219
238
|
"""
|
220
|
-
|
239
|
+
If set, will encode an
|
240
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
241
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
242
|
+
`token_max_ttl` would otherwise allow a renewal.
|
221
243
|
"""
|
222
244
|
return pulumi.get(self, "token_explicit_max_ttl")
|
223
245
|
|
@@ -229,7 +251,8 @@ class AuthBackendRoleArgs:
|
|
229
251
|
@pulumi.getter(name="tokenMaxTtl")
|
230
252
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
231
253
|
"""
|
232
|
-
The maximum lifetime
|
254
|
+
The maximum lifetime for generated tokens in number of seconds.
|
255
|
+
Its current value will be referenced at renewal time.
|
233
256
|
"""
|
234
257
|
return pulumi.get(self, "token_max_ttl")
|
235
258
|
|
@@ -241,7 +264,8 @@ class AuthBackendRoleArgs:
|
|
241
264
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
242
265
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
243
266
|
"""
|
244
|
-
If
|
267
|
+
If set, the default policy will not be set on
|
268
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
245
269
|
"""
|
246
270
|
return pulumi.get(self, "token_no_default_policy")
|
247
271
|
|
@@ -253,7 +277,8 @@ class AuthBackendRoleArgs:
|
|
253
277
|
@pulumi.getter(name="tokenNumUses")
|
254
278
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
255
279
|
"""
|
256
|
-
The maximum number
|
280
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
281
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
257
282
|
"""
|
258
283
|
return pulumi.get(self, "token_num_uses")
|
259
284
|
|
@@ -265,7 +290,10 @@ class AuthBackendRoleArgs:
|
|
265
290
|
@pulumi.getter(name="tokenPeriod")
|
266
291
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
267
292
|
"""
|
268
|
-
|
293
|
+
If set, indicates that the
|
294
|
+
token generated using this role should never expire. The token should be renewed within the
|
295
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
296
|
+
value of this field. Specified in seconds.
|
269
297
|
"""
|
270
298
|
return pulumi.get(self, "token_period")
|
271
299
|
|
@@ -277,7 +305,8 @@ class AuthBackendRoleArgs:
|
|
277
305
|
@pulumi.getter(name="tokenPolicies")
|
278
306
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
279
307
|
"""
|
280
|
-
|
308
|
+
List of policies to encode onto generated tokens. Depending
|
309
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
281
310
|
"""
|
282
311
|
return pulumi.get(self, "token_policies")
|
283
312
|
|
@@ -289,7 +318,8 @@ class AuthBackendRoleArgs:
|
|
289
318
|
@pulumi.getter(name="tokenTtl")
|
290
319
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
291
320
|
"""
|
292
|
-
The
|
321
|
+
The incremental lifetime for generated tokens in number of seconds.
|
322
|
+
Its current value will be referenced at renewal time.
|
293
323
|
"""
|
294
324
|
return pulumi.get(self, "token_ttl")
|
295
325
|
|
@@ -301,7 +331,11 @@ class AuthBackendRoleArgs:
|
|
301
331
|
@pulumi.getter(name="tokenType")
|
302
332
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
303
333
|
"""
|
304
|
-
The type of token
|
334
|
+
The type of token that should be generated. Can be `service`,
|
335
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
336
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
337
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
338
|
+
requests a different type at generation time.
|
305
339
|
"""
|
306
340
|
return pulumi.get(self, "token_type")
|
307
341
|
|
@@ -350,15 +384,32 @@ class _AuthBackendRoleState:
|
|
350
384
|
expire. A value of zero will allow unlimited uses.
|
351
385
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
352
386
|
expires.
|
353
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
354
|
-
|
355
|
-
|
356
|
-
:param pulumi.Input[
|
357
|
-
|
358
|
-
|
359
|
-
|
360
|
-
:param pulumi.Input[int]
|
361
|
-
|
387
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
388
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
389
|
+
as well.
|
390
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
391
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
392
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
393
|
+
`token_max_ttl` would otherwise allow a renewal.
|
394
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
395
|
+
Its current value will be referenced at renewal time.
|
396
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
397
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
398
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
399
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
400
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
401
|
+
token generated using this role should never expire. The token should be renewed within the
|
402
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
403
|
+
value of this field. Specified in seconds.
|
404
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
405
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
406
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
407
|
+
Its current value will be referenced at renewal time.
|
408
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
409
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
410
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
411
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
412
|
+
requests a different type at generation time.
|
362
413
|
"""
|
363
414
|
if backend is not None:
|
364
415
|
pulumi.set(__self__, "backend", backend)
|
@@ -505,7 +556,9 @@ class _AuthBackendRoleState:
|
|
505
556
|
@pulumi.getter(name="tokenBoundCidrs")
|
506
557
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
507
558
|
"""
|
508
|
-
|
559
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
560
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
561
|
+
as well.
|
509
562
|
"""
|
510
563
|
return pulumi.get(self, "token_bound_cidrs")
|
511
564
|
|
@@ -517,7 +570,10 @@ class _AuthBackendRoleState:
|
|
517
570
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
518
571
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
519
572
|
"""
|
520
|
-
|
573
|
+
If set, will encode an
|
574
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
575
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
576
|
+
`token_max_ttl` would otherwise allow a renewal.
|
521
577
|
"""
|
522
578
|
return pulumi.get(self, "token_explicit_max_ttl")
|
523
579
|
|
@@ -529,7 +585,8 @@ class _AuthBackendRoleState:
|
|
529
585
|
@pulumi.getter(name="tokenMaxTtl")
|
530
586
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
531
587
|
"""
|
532
|
-
The maximum lifetime
|
588
|
+
The maximum lifetime for generated tokens in number of seconds.
|
589
|
+
Its current value will be referenced at renewal time.
|
533
590
|
"""
|
534
591
|
return pulumi.get(self, "token_max_ttl")
|
535
592
|
|
@@ -541,7 +598,8 @@ class _AuthBackendRoleState:
|
|
541
598
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
542
599
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
543
600
|
"""
|
544
|
-
If
|
601
|
+
If set, the default policy will not be set on
|
602
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
545
603
|
"""
|
546
604
|
return pulumi.get(self, "token_no_default_policy")
|
547
605
|
|
@@ -553,7 +611,8 @@ class _AuthBackendRoleState:
|
|
553
611
|
@pulumi.getter(name="tokenNumUses")
|
554
612
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
555
613
|
"""
|
556
|
-
The maximum number
|
614
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
615
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
557
616
|
"""
|
558
617
|
return pulumi.get(self, "token_num_uses")
|
559
618
|
|
@@ -565,7 +624,10 @@ class _AuthBackendRoleState:
|
|
565
624
|
@pulumi.getter(name="tokenPeriod")
|
566
625
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
567
626
|
"""
|
568
|
-
|
627
|
+
If set, indicates that the
|
628
|
+
token generated using this role should never expire. The token should be renewed within the
|
629
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
630
|
+
value of this field. Specified in seconds.
|
569
631
|
"""
|
570
632
|
return pulumi.get(self, "token_period")
|
571
633
|
|
@@ -577,7 +639,8 @@ class _AuthBackendRoleState:
|
|
577
639
|
@pulumi.getter(name="tokenPolicies")
|
578
640
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
579
641
|
"""
|
580
|
-
|
642
|
+
List of policies to encode onto generated tokens. Depending
|
643
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
581
644
|
"""
|
582
645
|
return pulumi.get(self, "token_policies")
|
583
646
|
|
@@ -589,7 +652,8 @@ class _AuthBackendRoleState:
|
|
589
652
|
@pulumi.getter(name="tokenTtl")
|
590
653
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
591
654
|
"""
|
592
|
-
The
|
655
|
+
The incremental lifetime for generated tokens in number of seconds.
|
656
|
+
Its current value will be referenced at renewal time.
|
593
657
|
"""
|
594
658
|
return pulumi.get(self, "token_ttl")
|
595
659
|
|
@@ -601,7 +665,11 @@ class _AuthBackendRoleState:
|
|
601
665
|
@pulumi.getter(name="tokenType")
|
602
666
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
603
667
|
"""
|
604
|
-
The type of token
|
668
|
+
The type of token that should be generated. Can be `service`,
|
669
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
670
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
671
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
672
|
+
requests a different type at generation time.
|
605
673
|
"""
|
606
674
|
return pulumi.get(self, "token_type")
|
607
675
|
|
@@ -640,6 +708,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
640
708
|
|
641
709
|
## Example Usage
|
642
710
|
|
711
|
+
<!--Start PulumiCodeChooser -->
|
643
712
|
```python
|
644
713
|
import pulumi
|
645
714
|
import pulumi_vault as vault
|
@@ -654,6 +723,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
654
723
|
"prod",
|
655
724
|
])
|
656
725
|
```
|
726
|
+
<!--End PulumiCodeChooser -->
|
657
727
|
|
658
728
|
## Import
|
659
729
|
|
@@ -683,15 +753,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
683
753
|
expire. A value of zero will allow unlimited uses.
|
684
754
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
685
755
|
expires.
|
686
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
687
|
-
|
688
|
-
|
689
|
-
:param pulumi.Input[
|
690
|
-
|
691
|
-
|
692
|
-
|
693
|
-
:param pulumi.Input[int]
|
694
|
-
|
756
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
757
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
758
|
+
as well.
|
759
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
760
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
761
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
762
|
+
`token_max_ttl` would otherwise allow a renewal.
|
763
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
764
|
+
Its current value will be referenced at renewal time.
|
765
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
768
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
+
token generated using this role should never expire. The token should be renewed within the
|
771
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
+
value of this field. Specified in seconds.
|
773
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
+
Its current value will be referenced at renewal time.
|
777
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
+
requests a different type at generation time.
|
695
782
|
"""
|
696
783
|
...
|
697
784
|
@overload
|
@@ -706,6 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
706
793
|
|
707
794
|
## Example Usage
|
708
795
|
|
796
|
+
<!--Start PulumiCodeChooser -->
|
709
797
|
```python
|
710
798
|
import pulumi
|
711
799
|
import pulumi_vault as vault
|
@@ -720,6 +808,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
720
808
|
"prod",
|
721
809
|
])
|
722
810
|
```
|
811
|
+
<!--End PulumiCodeChooser -->
|
723
812
|
|
724
813
|
## Import
|
725
814
|
|
@@ -841,15 +930,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
841
930
|
expire. A value of zero will allow unlimited uses.
|
842
931
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
843
932
|
expires.
|
844
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
845
|
-
|
846
|
-
|
847
|
-
:param pulumi.Input[
|
848
|
-
|
849
|
-
|
850
|
-
|
851
|
-
:param pulumi.Input[int]
|
852
|
-
|
933
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
934
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
935
|
+
as well.
|
936
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
937
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
938
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
939
|
+
`token_max_ttl` would otherwise allow a renewal.
|
940
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
941
|
+
Its current value will be referenced at renewal time.
|
942
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
943
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
944
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
945
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
946
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
947
|
+
token generated using this role should never expire. The token should be renewed within the
|
948
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
949
|
+
value of this field. Specified in seconds.
|
950
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
951
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
952
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
953
|
+
Its current value will be referenced at renewal time.
|
954
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
955
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
956
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
957
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
958
|
+
requests a different type at generation time.
|
853
959
|
"""
|
854
960
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
855
961
|
|
@@ -952,7 +1058,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
952
1058
|
@pulumi.getter(name="tokenBoundCidrs")
|
953
1059
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
954
1060
|
"""
|
955
|
-
|
1061
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1062
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1063
|
+
as well.
|
956
1064
|
"""
|
957
1065
|
return pulumi.get(self, "token_bound_cidrs")
|
958
1066
|
|
@@ -960,7 +1068,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
960
1068
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
961
1069
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
962
1070
|
"""
|
963
|
-
|
1071
|
+
If set, will encode an
|
1072
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1073
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1074
|
+
`token_max_ttl` would otherwise allow a renewal.
|
964
1075
|
"""
|
965
1076
|
return pulumi.get(self, "token_explicit_max_ttl")
|
966
1077
|
|
@@ -968,7 +1079,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
968
1079
|
@pulumi.getter(name="tokenMaxTtl")
|
969
1080
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
970
1081
|
"""
|
971
|
-
The maximum lifetime
|
1082
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1083
|
+
Its current value will be referenced at renewal time.
|
972
1084
|
"""
|
973
1085
|
return pulumi.get(self, "token_max_ttl")
|
974
1086
|
|
@@ -976,7 +1088,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
976
1088
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
977
1089
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
978
1090
|
"""
|
979
|
-
If
|
1091
|
+
If set, the default policy will not be set on
|
1092
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
980
1093
|
"""
|
981
1094
|
return pulumi.get(self, "token_no_default_policy")
|
982
1095
|
|
@@ -984,7 +1097,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
984
1097
|
@pulumi.getter(name="tokenNumUses")
|
985
1098
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
986
1099
|
"""
|
987
|
-
The maximum number
|
1100
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
1101
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
988
1102
|
"""
|
989
1103
|
return pulumi.get(self, "token_num_uses")
|
990
1104
|
|
@@ -992,7 +1106,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
992
1106
|
@pulumi.getter(name="tokenPeriod")
|
993
1107
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
994
1108
|
"""
|
995
|
-
|
1109
|
+
If set, indicates that the
|
1110
|
+
token generated using this role should never expire. The token should be renewed within the
|
1111
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1112
|
+
value of this field. Specified in seconds.
|
996
1113
|
"""
|
997
1114
|
return pulumi.get(self, "token_period")
|
998
1115
|
|
@@ -1000,7 +1117,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1000
1117
|
@pulumi.getter(name="tokenPolicies")
|
1001
1118
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1002
1119
|
"""
|
1003
|
-
|
1120
|
+
List of policies to encode onto generated tokens. Depending
|
1121
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1004
1122
|
"""
|
1005
1123
|
return pulumi.get(self, "token_policies")
|
1006
1124
|
|
@@ -1008,7 +1126,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1008
1126
|
@pulumi.getter(name="tokenTtl")
|
1009
1127
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1010
1128
|
"""
|
1011
|
-
The
|
1129
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1130
|
+
Its current value will be referenced at renewal time.
|
1012
1131
|
"""
|
1013
1132
|
return pulumi.get(self, "token_ttl")
|
1014
1133
|
|
@@ -1016,7 +1135,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1016
1135
|
@pulumi.getter(name="tokenType")
|
1017
1136
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1018
1137
|
"""
|
1019
|
-
The type of token
|
1138
|
+
The type of token that should be generated. Can be `service`,
|
1139
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1140
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1141
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1142
|
+
requests a different type at generation time.
|
1020
1143
|
"""
|
1021
1144
|
return pulumi.get(self, "token_type")
|
1022
1145
|
|
@@ -397,6 +397,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
397
397
|
|
398
398
|
## Example Usage
|
399
399
|
|
400
|
+
<!--Start PulumiCodeChooser -->
|
400
401
|
```python
|
401
402
|
import pulumi
|
402
403
|
import json
|
@@ -418,6 +419,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
418
419
|
"hello": "world",
|
419
420
|
}))
|
420
421
|
```
|
422
|
+
<!--End PulumiCodeChooser -->
|
421
423
|
|
422
424
|
:param str resource_name: The name of the resource.
|
423
425
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -454,6 +456,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
454
456
|
|
455
457
|
## Example Usage
|
456
458
|
|
459
|
+
<!--Start PulumiCodeChooser -->
|
457
460
|
```python
|
458
461
|
import pulumi
|
459
462
|
import json
|
@@ -475,6 +478,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
475
478
|
"hello": "world",
|
476
479
|
}))
|
477
480
|
```
|
481
|
+
<!--End PulumiCodeChooser -->
|
478
482
|
|
479
483
|
:param str resource_name: The name of the resource.
|
480
484
|
:param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
|
@@ -92,6 +92,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
92
92
|
|
93
93
|
## Example Usage
|
94
94
|
|
95
|
+
<!--Start PulumiCodeChooser -->
|
95
96
|
```python
|
96
97
|
import pulumi
|
97
98
|
import pulumi_vault as vault
|
@@ -100,6 +101,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
100
101
|
role_name="my-role")
|
101
102
|
pulumi.export("role-id", role.role_id)
|
102
103
|
```
|
104
|
+
<!--End PulumiCodeChooser -->
|
103
105
|
|
104
106
|
|
105
107
|
:param str backend: The unique name for the AppRole backend the role to
|
@@ -135,6 +137,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
135
137
|
|
136
138
|
## Example Usage
|
137
139
|
|
140
|
+
<!--Start PulumiCodeChooser -->
|
138
141
|
```python
|
139
142
|
import pulumi
|
140
143
|
import pulumi_vault as vault
|
@@ -143,6 +146,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
143
146
|
role_name="my-role")
|
144
147
|
pulumi.export("role-id", role.role_id)
|
145
148
|
```
|
149
|
+
<!--End PulumiCodeChooser -->
|
146
150
|
|
147
151
|
|
148
152
|
:param str backend: The unique name for the AppRole backend the role to
|
pulumi_vault/audit.py
CHANGED
@@ -254,33 +254,37 @@ class Audit(pulumi.CustomResource):
|
|
254
254
|
|
255
255
|
### File Audit Device)
|
256
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
257
258
|
```python
|
258
259
|
import pulumi
|
259
260
|
import pulumi_vault as vault
|
260
261
|
|
261
262
|
test = vault.Audit("test",
|
262
|
-
type="file",
|
263
263
|
options={
|
264
264
|
"file_path": "C:/temp/audit.txt",
|
265
|
-
}
|
265
|
+
},
|
266
|
+
type="file")
|
266
267
|
```
|
268
|
+
<!--End PulumiCodeChooser -->
|
267
269
|
|
268
270
|
### Socket Audit Device)
|
269
271
|
|
272
|
+
<!--Start PulumiCodeChooser -->
|
270
273
|
```python
|
271
274
|
import pulumi
|
272
275
|
import pulumi_vault as vault
|
273
276
|
|
274
277
|
test = vault.Audit("test",
|
275
|
-
type="socket",
|
276
|
-
path="app_socket",
|
277
278
|
local=False,
|
278
279
|
options={
|
279
280
|
"address": "127.0.0.1:8000",
|
280
|
-
"socket_type": "tcp",
|
281
281
|
"description": "application x socket",
|
282
|
-
|
282
|
+
"socket_type": "tcp",
|
283
|
+
},
|
284
|
+
path="app_socket",
|
285
|
+
type="socket")
|
283
286
|
```
|
287
|
+
<!--End PulumiCodeChooser -->
|
284
288
|
|
285
289
|
## Import
|
286
290
|
|
@@ -315,33 +319,37 @@ class Audit(pulumi.CustomResource):
|
|
315
319
|
|
316
320
|
### File Audit Device)
|
317
321
|
|
322
|
+
<!--Start PulumiCodeChooser -->
|
318
323
|
```python
|
319
324
|
import pulumi
|
320
325
|
import pulumi_vault as vault
|
321
326
|
|
322
327
|
test = vault.Audit("test",
|
323
|
-
type="file",
|
324
328
|
options={
|
325
329
|
"file_path": "C:/temp/audit.txt",
|
326
|
-
}
|
330
|
+
},
|
331
|
+
type="file")
|
327
332
|
```
|
333
|
+
<!--End PulumiCodeChooser -->
|
328
334
|
|
329
335
|
### Socket Audit Device)
|
330
336
|
|
337
|
+
<!--Start PulumiCodeChooser -->
|
331
338
|
```python
|
332
339
|
import pulumi
|
333
340
|
import pulumi_vault as vault
|
334
341
|
|
335
342
|
test = vault.Audit("test",
|
336
|
-
type="socket",
|
337
|
-
path="app_socket",
|
338
343
|
local=False,
|
339
344
|
options={
|
340
345
|
"address": "127.0.0.1:8000",
|
341
|
-
"socket_type": "tcp",
|
342
346
|
"description": "application x socket",
|
343
|
-
|
347
|
+
"socket_type": "tcp",
|
348
|
+
},
|
349
|
+
path="app_socket",
|
350
|
+
type="socket")
|
344
351
|
```
|
352
|
+
<!--End PulumiCodeChooser -->
|
345
353
|
|
346
354
|
## Import
|
347
355
|
|