pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -490,6 +490,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
490
490
|
|
491
491
|
## Example Usage
|
492
492
|
|
493
|
+
<!--Start PulumiCodeChooser -->
|
493
494
|
```python
|
494
495
|
import pulumi
|
495
496
|
import pulumi_vault as vault
|
@@ -499,11 +500,12 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
499
500
|
type="pki",
|
500
501
|
default_lease_ttl_seconds=3600,
|
501
502
|
max_lease_ttl_seconds=86400)
|
502
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
503
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
|
503
504
|
backend=pki.path,
|
504
505
|
expiry="72h",
|
505
506
|
disable=False)
|
506
507
|
```
|
508
|
+
<!--End PulumiCodeChooser -->
|
507
509
|
|
508
510
|
:param str resource_name: The name of the resource.
|
509
511
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -538,6 +540,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
538
540
|
|
539
541
|
## Example Usage
|
540
542
|
|
543
|
+
<!--Start PulumiCodeChooser -->
|
541
544
|
```python
|
542
545
|
import pulumi
|
543
546
|
import pulumi_vault as vault
|
@@ -547,11 +550,12 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
547
550
|
type="pki",
|
548
551
|
default_lease_ttl_seconds=3600,
|
549
552
|
max_lease_ttl_seconds=86400)
|
550
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
553
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
|
551
554
|
backend=pki.path,
|
552
555
|
expiry="72h",
|
553
556
|
disable=False)
|
554
557
|
```
|
558
|
+
<!--End PulumiCodeChooser -->
|
555
559
|
|
556
560
|
:param str resource_name: The name of the resource.
|
557
561
|
:param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
|
@@ -962,16 +962,18 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
962
962
|
"""
|
963
963
|
## Example Usage
|
964
964
|
|
965
|
+
<!--Start PulumiCodeChooser -->
|
965
966
|
```python
|
966
967
|
import pulumi
|
967
968
|
import pulumi_vault as vault
|
968
969
|
|
969
970
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
970
|
-
backend=pki["path"],
|
971
|
+
backend=vault_mount["pki"]["path"],
|
971
972
|
type="internal",
|
972
973
|
common_name="app.my.domain",
|
973
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
974
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
|
974
975
|
```
|
976
|
+
<!--End PulumiCodeChooser -->
|
975
977
|
|
976
978
|
:param str resource_name: The name of the resource.
|
977
979
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1020,16 +1022,18 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1020
1022
|
"""
|
1021
1023
|
## Example Usage
|
1022
1024
|
|
1025
|
+
<!--Start PulumiCodeChooser -->
|
1023
1026
|
```python
|
1024
1027
|
import pulumi
|
1025
1028
|
import pulumi_vault as vault
|
1026
1029
|
|
1027
1030
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
1028
|
-
backend=pki["path"],
|
1031
|
+
backend=vault_mount["pki"]["path"],
|
1029
1032
|
type="internal",
|
1030
1033
|
common_name="app.my.domain",
|
1031
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1034
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
|
1032
1035
|
```
|
1036
|
+
<!--End PulumiCodeChooser -->
|
1033
1037
|
|
1034
1038
|
:param str resource_name: The name of the resource.
|
1035
1039
|
:param SecretBackendIntermediateCertRequestArgs args: The arguments to use to populate this resource's properties.
|
@@ -187,6 +187,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
187
187
|
"""
|
188
188
|
## Example Usage
|
189
189
|
|
190
|
+
<!--Start PulumiCodeChooser -->
|
190
191
|
```python
|
191
192
|
import pulumi
|
192
193
|
import pulumi_vault as vault
|
@@ -203,7 +204,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
203
204
|
description="intermediate",
|
204
205
|
default_lease_ttl_seconds=86400,
|
205
206
|
max_lease_ttl_seconds=86400)
|
206
|
-
|
207
|
+
example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
|
207
208
|
backend=root.path,
|
208
209
|
type="internal",
|
209
210
|
common_name="RootOrg Root CA",
|
@@ -218,11 +219,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
218
219
|
country="US",
|
219
220
|
locality="San Francisco",
|
220
221
|
province="CA")
|
221
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
222
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
|
222
223
|
backend=intermediate.path,
|
223
|
-
type=
|
224
|
+
type=example_secret_backend_root_cert.type,
|
224
225
|
common_name="SubOrg Intermediate CA")
|
225
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
226
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
|
226
227
|
backend=root.path,
|
227
228
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
228
229
|
common_name="SubOrg Intermediate CA",
|
@@ -233,10 +234,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
233
234
|
locality="San Francisco",
|
234
235
|
province="CA",
|
235
236
|
revoke=True)
|
236
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
237
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
|
237
238
|
backend=intermediate.path,
|
238
239
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
239
240
|
```
|
241
|
+
<!--End PulumiCodeChooser -->
|
240
242
|
|
241
243
|
:param str resource_name: The name of the resource.
|
242
244
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -258,6 +260,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
258
260
|
"""
|
259
261
|
## Example Usage
|
260
262
|
|
263
|
+
<!--Start PulumiCodeChooser -->
|
261
264
|
```python
|
262
265
|
import pulumi
|
263
266
|
import pulumi_vault as vault
|
@@ -274,7 +277,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
274
277
|
description="intermediate",
|
275
278
|
default_lease_ttl_seconds=86400,
|
276
279
|
max_lease_ttl_seconds=86400)
|
277
|
-
|
280
|
+
example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
|
278
281
|
backend=root.path,
|
279
282
|
type="internal",
|
280
283
|
common_name="RootOrg Root CA",
|
@@ -289,11 +292,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
289
292
|
country="US",
|
290
293
|
locality="San Francisco",
|
291
294
|
province="CA")
|
292
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
295
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
|
293
296
|
backend=intermediate.path,
|
294
|
-
type=
|
297
|
+
type=example_secret_backend_root_cert.type,
|
295
298
|
common_name="SubOrg Intermediate CA")
|
296
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
299
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
|
297
300
|
backend=root.path,
|
298
301
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
299
302
|
common_name="SubOrg Intermediate CA",
|
@@ -304,10 +307,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
304
307
|
locality="San Francisco",
|
305
308
|
province="CA",
|
306
309
|
revoke=True)
|
307
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
310
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
|
308
311
|
backend=intermediate.path,
|
309
312
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
310
313
|
```
|
314
|
+
<!--End PulumiCodeChooser -->
|
311
315
|
|
312
316
|
:param str resource_name: The name of the resource.
|
313
317
|
:param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
|
@@ -486,6 +486,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
486
486
|
"""
|
487
487
|
## Example Usage
|
488
488
|
|
489
|
+
<!--Start PulumiCodeChooser -->
|
489
490
|
```python
|
490
491
|
import pulumi
|
491
492
|
import pulumi_vault as vault
|
@@ -505,6 +506,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
505
506
|
issuer_ref=root.issuer_id,
|
506
507
|
issuer_name="example-issuer")
|
507
508
|
```
|
509
|
+
<!--End PulumiCodeChooser -->
|
508
510
|
|
509
511
|
## Import
|
510
512
|
|
@@ -548,6 +550,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
548
550
|
"""
|
549
551
|
## Example Usage
|
550
552
|
|
553
|
+
<!--Start PulumiCodeChooser -->
|
551
554
|
```python
|
552
555
|
import pulumi
|
553
556
|
import pulumi_vault as vault
|
@@ -567,6 +570,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
567
570
|
issuer_ref=root.issuer_id,
|
568
571
|
issuer_name="example-issuer")
|
569
572
|
```
|
573
|
+
<!--End PulumiCodeChooser -->
|
570
574
|
|
571
575
|
## Import
|
572
576
|
|
@@ -1593,6 +1593,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1593
1593
|
|
1594
1594
|
## Example Usage
|
1595
1595
|
|
1596
|
+
<!--Start PulumiCodeChooser -->
|
1596
1597
|
```python
|
1597
1598
|
import pulumi
|
1598
1599
|
import pulumi_vault as vault
|
@@ -1604,7 +1605,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1604
1605
|
max_lease_ttl_seconds=86400)
|
1605
1606
|
role = vault.pki_secret.SecretBackendRole("role",
|
1606
1607
|
backend=pki.path,
|
1607
|
-
name="my_role",
|
1608
1608
|
ttl="3600",
|
1609
1609
|
allow_ip_sans=True,
|
1610
1610
|
key_type="rsa",
|
@@ -1615,6 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1615
1615
|
],
|
1616
1616
|
allow_subdomains=True)
|
1617
1617
|
```
|
1618
|
+
<!--End PulumiCodeChooser -->
|
1618
1619
|
|
1619
1620
|
## Import
|
1620
1621
|
|
@@ -1693,6 +1694,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1693
1694
|
|
1694
1695
|
## Example Usage
|
1695
1696
|
|
1697
|
+
<!--Start PulumiCodeChooser -->
|
1696
1698
|
```python
|
1697
1699
|
import pulumi
|
1698
1700
|
import pulumi_vault as vault
|
@@ -1704,7 +1706,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1704
1706
|
max_lease_ttl_seconds=86400)
|
1705
1707
|
role = vault.pki_secret.SecretBackendRole("role",
|
1706
1708
|
backend=pki.path,
|
1707
|
-
name="my_role",
|
1708
1709
|
ttl="3600",
|
1709
1710
|
allow_ip_sans=True,
|
1710
1711
|
key_type="rsa",
|
@@ -1715,6 +1716,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1715
1716
|
],
|
1716
1717
|
allow_subdomains=True)
|
1717
1718
|
```
|
1719
|
+
<!--End PulumiCodeChooser -->
|
1718
1720
|
|
1719
1721
|
## Import
|
1720
1722
|
|
@@ -1073,12 +1073,13 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1073
1073
|
"""
|
1074
1074
|
## Example Usage
|
1075
1075
|
|
1076
|
+
<!--Start PulumiCodeChooser -->
|
1076
1077
|
```python
|
1077
1078
|
import pulumi
|
1078
1079
|
import pulumi_vault as vault
|
1079
1080
|
|
1080
1081
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1081
|
-
backend=pki["path"],
|
1082
|
+
backend=vault_mount["pki"]["path"],
|
1082
1083
|
type="internal",
|
1083
1084
|
common_name="Root CA",
|
1084
1085
|
ttl="315360000",
|
@@ -1089,8 +1090,9 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1089
1090
|
exclude_cn_from_sans=True,
|
1090
1091
|
ou="My OU",
|
1091
1092
|
organization="My organization",
|
1092
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1093
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
|
1093
1094
|
```
|
1095
|
+
<!--End PulumiCodeChooser -->
|
1094
1096
|
|
1095
1097
|
:param str resource_name: The name of the resource.
|
1096
1098
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1141,12 +1143,13 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1141
1143
|
"""
|
1142
1144
|
## Example Usage
|
1143
1145
|
|
1146
|
+
<!--Start PulumiCodeChooser -->
|
1144
1147
|
```python
|
1145
1148
|
import pulumi
|
1146
1149
|
import pulumi_vault as vault
|
1147
1150
|
|
1148
1151
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1149
|
-
backend=pki["path"],
|
1152
|
+
backend=vault_mount["pki"]["path"],
|
1150
1153
|
type="internal",
|
1151
1154
|
common_name="Root CA",
|
1152
1155
|
ttl="315360000",
|
@@ -1157,8 +1160,9 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1157
1160
|
exclude_cn_from_sans=True,
|
1158
1161
|
ou="My OU",
|
1159
1162
|
organization="My organization",
|
1160
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1163
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
|
1161
1164
|
```
|
1165
|
+
<!--End PulumiCodeChooser -->
|
1162
1166
|
|
1163
1167
|
:param str resource_name: The name of the resource.
|
1164
1168
|
:param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -900,19 +900,21 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
900
900
|
|
901
901
|
## Example Usage
|
902
902
|
|
903
|
+
<!--Start PulumiCodeChooser -->
|
903
904
|
```python
|
904
905
|
import pulumi
|
905
906
|
import pulumi_vault as vault
|
906
907
|
|
907
908
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
908
|
-
backend=
|
909
|
-
csr=intermediate["csr"],
|
909
|
+
backend=vault_mount["root"]["path"],
|
910
|
+
csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
|
910
911
|
common_name="Intermediate CA",
|
911
912
|
exclude_cn_from_sans=True,
|
912
913
|
ou="My OU",
|
913
914
|
organization="My organization",
|
914
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
915
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
|
915
916
|
```
|
917
|
+
<!--End PulumiCodeChooser -->
|
916
918
|
|
917
919
|
:param str resource_name: The name of the resource.
|
918
920
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -957,19 +959,21 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
957
959
|
|
958
960
|
## Example Usage
|
959
961
|
|
962
|
+
<!--Start PulumiCodeChooser -->
|
960
963
|
```python
|
961
964
|
import pulumi
|
962
965
|
import pulumi_vault as vault
|
963
966
|
|
964
967
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
965
|
-
backend=
|
966
|
-
csr=intermediate["csr"],
|
968
|
+
backend=vault_mount["root"]["path"],
|
969
|
+
csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
|
967
970
|
common_name="Intermediate CA",
|
968
971
|
exclude_cn_from_sans=True,
|
969
972
|
ou="My OU",
|
970
973
|
organization="My organization",
|
971
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
974
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
|
972
975
|
```
|
976
|
+
<!--End PulumiCodeChooser -->
|
973
977
|
|
974
978
|
:param str resource_name: The name of the resource.
|
975
979
|
:param SecretBackendRootSignIntermediateArgs args: The arguments to use to populate this resource's properties.
|
@@ -648,13 +648,13 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
648
648
|
"""
|
649
649
|
## Example Usage
|
650
650
|
|
651
|
+
<!--Start PulumiCodeChooser -->
|
651
652
|
```python
|
652
653
|
import pulumi
|
653
654
|
import pulumi_vault as vault
|
654
655
|
|
655
656
|
test = vault.pki_secret.SecretBackendSign("test",
|
656
|
-
backend=pki["path"],
|
657
|
-
name=admin["name"],
|
657
|
+
backend=vault_mount["pki"]["path"],
|
658
658
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
659
659
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
660
660
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -684,8 +684,9 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
684
684
|
-----END CERTIFICATE REQUEST-----
|
685
685
|
\"\"\",
|
686
686
|
common_name="test.my.domain",
|
687
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
687
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
|
688
688
|
```
|
689
|
+
<!--End PulumiCodeChooser -->
|
689
690
|
|
690
691
|
:param str resource_name: The name of the resource.
|
691
692
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -720,13 +721,13 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
720
721
|
"""
|
721
722
|
## Example Usage
|
722
723
|
|
724
|
+
<!--Start PulumiCodeChooser -->
|
723
725
|
```python
|
724
726
|
import pulumi
|
725
727
|
import pulumi_vault as vault
|
726
728
|
|
727
729
|
test = vault.pki_secret.SecretBackendSign("test",
|
728
|
-
backend=pki["path"],
|
729
|
-
name=admin["name"],
|
730
|
+
backend=vault_mount["pki"]["path"],
|
730
731
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
731
732
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
732
733
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -756,8 +757,9 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
756
757
|
-----END CERTIFICATE REQUEST-----
|
757
758
|
\"\"\",
|
758
759
|
common_name="test.my.domain",
|
759
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
760
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
|
760
761
|
```
|
762
|
+
<!--End PulumiCodeChooser -->
|
761
763
|
|
762
764
|
:param str resource_name: The name of the resource.
|
763
765
|
:param SecretBackendSignArgs args: The arguments to use to populate this resource's properties.
|
pulumi_vault/provider.py
CHANGED
@@ -49,6 +49,7 @@ class ProviderArgs:
|
|
49
49
|
The set of arguments for constructing a Provider resource.
|
50
50
|
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
51
51
|
:param pulumi.Input[str] token: Token to use to authenticate to Vault.
|
52
|
+
:param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
|
52
53
|
:param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
53
54
|
:param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
|
54
55
|
:param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
|
@@ -173,6 +174,9 @@ class ProviderArgs:
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter(name="addAddressToEnv")
|
175
176
|
def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
|
177
|
+
"""
|
178
|
+
If true, adds the value of the `address` argument to the Terraform process environment.
|
179
|
+
"""
|
176
180
|
return pulumi.get(self, "add_address_to_env")
|
177
181
|
|
178
182
|
@add_address_to_env.setter
|
@@ -552,6 +556,7 @@ class Provider(pulumi.ProviderResource):
|
|
552
556
|
|
553
557
|
:param str resource_name: The name of the resource.
|
554
558
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
559
|
+
:param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
|
555
560
|
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
556
561
|
:param pulumi.Input[pulumi.InputType['ProviderAuthLoginArgs']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
557
562
|
:param pulumi.Input[pulumi.InputType['ProviderAuthLoginAwsArgs']] auth_login_aws: Login to vault using the AWS method
|
@@ -698,6 +703,9 @@ class Provider(pulumi.ProviderResource):
|
|
698
703
|
@property
|
699
704
|
@pulumi.getter(name="addAddressToEnv")
|
700
705
|
def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
|
706
|
+
"""
|
707
|
+
If true, adds the value of the `address` argument to the Terraform process environment.
|
708
|
+
"""
|
701
709
|
return pulumi.get(self, "add_address_to_env")
|
702
710
|
|
703
711
|
@property
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -15,7 +15,6 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
|
15
15
|
class QuotaLeaseCountArgs:
|
16
16
|
def __init__(__self__, *,
|
17
17
|
max_leases: pulumi.Input[int],
|
18
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
19
18
|
name: Optional[pulumi.Input[str]] = None,
|
20
19
|
namespace: Optional[pulumi.Input[str]] = None,
|
21
20
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -24,7 +23,6 @@ class QuotaLeaseCountArgs:
|
|
24
23
|
The set of arguments for constructing a QuotaLeaseCount resource.
|
25
24
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
26
25
|
rule. The `max_leases` must be positive.
|
27
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
28
26
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
29
27
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
28
|
The value should not contain leading or trailing forward slashes.
|
@@ -39,8 +37,6 @@ class QuotaLeaseCountArgs:
|
|
39
37
|
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
40
38
|
"""
|
41
39
|
pulumi.set(__self__, "max_leases", max_leases)
|
42
|
-
if inheritable is not None:
|
43
|
-
pulumi.set(__self__, "inheritable", inheritable)
|
44
40
|
if name is not None:
|
45
41
|
pulumi.set(__self__, "name", name)
|
46
42
|
if namespace is not None:
|
@@ -63,18 +59,6 @@ class QuotaLeaseCountArgs:
|
|
63
59
|
def max_leases(self, value: pulumi.Input[int]):
|
64
60
|
pulumi.set(self, "max_leases", value)
|
65
61
|
|
66
|
-
@property
|
67
|
-
@pulumi.getter
|
68
|
-
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
69
|
-
"""
|
70
|
-
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
71
|
-
"""
|
72
|
-
return pulumi.get(self, "inheritable")
|
73
|
-
|
74
|
-
@inheritable.setter
|
75
|
-
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
76
|
-
pulumi.set(self, "inheritable", value)
|
77
|
-
|
78
62
|
@property
|
79
63
|
@pulumi.getter
|
80
64
|
def name(self) -> Optional[pulumi.Input[str]]:
|
@@ -135,7 +119,6 @@ class QuotaLeaseCountArgs:
|
|
135
119
|
@pulumi.input_type
|
136
120
|
class _QuotaLeaseCountState:
|
137
121
|
def __init__(__self__, *,
|
138
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
139
122
|
max_leases: Optional[pulumi.Input[int]] = None,
|
140
123
|
name: Optional[pulumi.Input[str]] = None,
|
141
124
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -143,7 +126,6 @@ class _QuotaLeaseCountState:
|
|
143
126
|
role: Optional[pulumi.Input[str]] = None):
|
144
127
|
"""
|
145
128
|
Input properties used for looking up and filtering QuotaLeaseCount resources.
|
146
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
147
129
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
148
130
|
rule. The `max_leases` must be positive.
|
149
131
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -159,8 +141,6 @@ class _QuotaLeaseCountState:
|
|
159
141
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
160
142
|
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
161
143
|
"""
|
162
|
-
if inheritable is not None:
|
163
|
-
pulumi.set(__self__, "inheritable", inheritable)
|
164
144
|
if max_leases is not None:
|
165
145
|
pulumi.set(__self__, "max_leases", max_leases)
|
166
146
|
if name is not None:
|
@@ -172,18 +152,6 @@ class _QuotaLeaseCountState:
|
|
172
152
|
if role is not None:
|
173
153
|
pulumi.set(__self__, "role", role)
|
174
154
|
|
175
|
-
@property
|
176
|
-
@pulumi.getter
|
177
|
-
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
178
|
-
"""
|
179
|
-
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
180
|
-
"""
|
181
|
-
return pulumi.get(self, "inheritable")
|
182
|
-
|
183
|
-
@inheritable.setter
|
184
|
-
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
185
|
-
pulumi.set(self, "inheritable", value)
|
186
|
-
|
187
155
|
@property
|
188
156
|
@pulumi.getter(name="maxLeases")
|
189
157
|
def max_leases(self) -> Optional[pulumi.Input[int]]:
|
@@ -259,7 +227,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
259
227
|
def __init__(__self__,
|
260
228
|
resource_name: str,
|
261
229
|
opts: Optional[pulumi.ResourceOptions] = None,
|
262
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
263
230
|
max_leases: Optional[pulumi.Input[int]] = None,
|
264
231
|
name: Optional[pulumi.Input[str]] = None,
|
265
232
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -278,15 +245,16 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
278
245
|
|
279
246
|
## Example Usage
|
280
247
|
|
248
|
+
<!--Start PulumiCodeChooser -->
|
281
249
|
```python
|
282
250
|
import pulumi
|
283
251
|
import pulumi_vault as vault
|
284
252
|
|
285
253
|
global_ = vault.QuotaLeaseCount("global",
|
286
|
-
|
287
|
-
path=""
|
288
|
-
max_leases=100)
|
254
|
+
max_leases=100,
|
255
|
+
path="")
|
289
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
290
258
|
|
291
259
|
## Import
|
292
260
|
|
@@ -298,7 +266,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
298
266
|
|
299
267
|
:param str resource_name: The name of the resource.
|
300
268
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
301
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
302
269
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
303
270
|
rule. The `max_leases` must be positive.
|
304
271
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -332,15 +299,16 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
332
299
|
|
333
300
|
## Example Usage
|
334
301
|
|
302
|
+
<!--Start PulumiCodeChooser -->
|
335
303
|
```python
|
336
304
|
import pulumi
|
337
305
|
import pulumi_vault as vault
|
338
306
|
|
339
307
|
global_ = vault.QuotaLeaseCount("global",
|
340
|
-
|
341
|
-
path=""
|
342
|
-
max_leases=100)
|
308
|
+
max_leases=100,
|
309
|
+
path="")
|
343
310
|
```
|
311
|
+
<!--End PulumiCodeChooser -->
|
344
312
|
|
345
313
|
## Import
|
346
314
|
|
@@ -365,7 +333,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
365
333
|
def _internal_init(__self__,
|
366
334
|
resource_name: str,
|
367
335
|
opts: Optional[pulumi.ResourceOptions] = None,
|
368
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
369
336
|
max_leases: Optional[pulumi.Input[int]] = None,
|
370
337
|
name: Optional[pulumi.Input[str]] = None,
|
371
338
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -380,7 +347,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
380
347
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
381
348
|
__props__ = QuotaLeaseCountArgs.__new__(QuotaLeaseCountArgs)
|
382
349
|
|
383
|
-
__props__.__dict__["inheritable"] = inheritable
|
384
350
|
if max_leases is None and not opts.urn:
|
385
351
|
raise TypeError("Missing required property 'max_leases'")
|
386
352
|
__props__.__dict__["max_leases"] = max_leases
|
@@ -398,7 +364,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
398
364
|
def get(resource_name: str,
|
399
365
|
id: pulumi.Input[str],
|
400
366
|
opts: Optional[pulumi.ResourceOptions] = None,
|
401
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
402
367
|
max_leases: Optional[pulumi.Input[int]] = None,
|
403
368
|
name: Optional[pulumi.Input[str]] = None,
|
404
369
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -411,7 +376,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
411
376
|
:param str resource_name: The unique name of the resulting resource.
|
412
377
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
413
378
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
414
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
415
379
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
416
380
|
rule. The `max_leases` must be positive.
|
417
381
|
:param pulumi.Input[str] name: Name of the rate limit quota
|
@@ -431,7 +395,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
431
395
|
|
432
396
|
__props__ = _QuotaLeaseCountState.__new__(_QuotaLeaseCountState)
|
433
397
|
|
434
|
-
__props__.__dict__["inheritable"] = inheritable
|
435
398
|
__props__.__dict__["max_leases"] = max_leases
|
436
399
|
__props__.__dict__["name"] = name
|
437
400
|
__props__.__dict__["namespace"] = namespace
|
@@ -439,14 +402,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
439
402
|
__props__.__dict__["role"] = role
|
440
403
|
return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
|
441
404
|
|
442
|
-
@property
|
443
|
-
@pulumi.getter
|
444
|
-
def inheritable(self) -> pulumi.Output[Optional[bool]]:
|
445
|
-
"""
|
446
|
-
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
447
|
-
"""
|
448
|
-
return pulumi.get(self, "inheritable")
|
449
|
-
|
450
405
|
@property
|
451
406
|
@pulumi.getter(name="maxLeases")
|
452
407
|
def max_leases(self) -> pulumi.Output[int]:
|