pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -299,7 +299,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
-
<!--Start PulumiCodeChooser -->
|
303
302
|
```python
|
304
303
|
import pulumi
|
305
304
|
import pulumi_vault as vault
|
@@ -321,7 +320,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
321
320
|
role_id=example.role_id,
|
322
321
|
secret_id=id.secret_id)
|
323
322
|
```
|
324
|
-
<!--End PulumiCodeChooser -->
|
325
323
|
|
326
324
|
:param str resource_name: The name of the resource.
|
327
325
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -347,7 +345,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
347
345
|
|
348
346
|
## Example Usage
|
349
347
|
|
350
|
-
<!--Start PulumiCodeChooser -->
|
351
348
|
```python
|
352
349
|
import pulumi
|
353
350
|
import pulumi_vault as vault
|
@@ -369,7 +366,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
369
366
|
role_id=example.role_id,
|
370
367
|
secret_id=id.secret_id)
|
371
368
|
```
|
372
|
-
<!--End PulumiCodeChooser -->
|
373
369
|
|
374
370
|
:param str resource_name: The name of the resource.
|
375
371
|
:param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
|
@@ -51,32 +51,15 @@ class AuthBackendRoleArgs:
|
|
51
51
|
expire. A value of zero will allow unlimited uses.
|
52
52
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
53
53
|
expires.
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
55
|
-
|
56
|
-
|
57
|
-
:param pulumi.Input[
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
:param pulumi.Input[int]
|
62
|
-
|
63
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
64
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
65
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
66
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
67
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
68
|
-
token generated using this role should never expire. The token should be renewed within the
|
69
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
70
|
-
value of this field. Specified in seconds.
|
71
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
72
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
73
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
74
|
-
Its current value will be referenced at renewal time.
|
75
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
76
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
77
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
78
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
79
|
-
requests a different type at generation time.
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
55
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
56
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
57
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
58
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
59
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
61
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
62
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
80
63
|
"""
|
81
64
|
pulumi.set(__self__, "role_name", role_name)
|
82
65
|
if backend is not None:
|
@@ -222,9 +205,7 @@ class AuthBackendRoleArgs:
|
|
222
205
|
@pulumi.getter(name="tokenBoundCidrs")
|
223
206
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
224
207
|
"""
|
225
|
-
|
226
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
227
|
-
as well.
|
208
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
228
209
|
"""
|
229
210
|
return pulumi.get(self, "token_bound_cidrs")
|
230
211
|
|
@@ -236,10 +217,7 @@ class AuthBackendRoleArgs:
|
|
236
217
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
237
218
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
238
219
|
"""
|
239
|
-
|
240
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
241
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
242
|
-
`token_max_ttl` would otherwise allow a renewal.
|
220
|
+
Generated Token's Explicit Maximum TTL in seconds
|
243
221
|
"""
|
244
222
|
return pulumi.get(self, "token_explicit_max_ttl")
|
245
223
|
|
@@ -251,8 +229,7 @@ class AuthBackendRoleArgs:
|
|
251
229
|
@pulumi.getter(name="tokenMaxTtl")
|
252
230
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
253
231
|
"""
|
254
|
-
The maximum lifetime
|
255
|
-
Its current value will be referenced at renewal time.
|
232
|
+
The maximum lifetime of the generated token
|
256
233
|
"""
|
257
234
|
return pulumi.get(self, "token_max_ttl")
|
258
235
|
|
@@ -264,8 +241,7 @@ class AuthBackendRoleArgs:
|
|
264
241
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
265
242
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
266
243
|
"""
|
267
|
-
If
|
268
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
244
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
269
245
|
"""
|
270
246
|
return pulumi.get(self, "token_no_default_policy")
|
271
247
|
|
@@ -277,8 +253,7 @@ class AuthBackendRoleArgs:
|
|
277
253
|
@pulumi.getter(name="tokenNumUses")
|
278
254
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
279
255
|
"""
|
280
|
-
The
|
281
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
256
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
282
257
|
"""
|
283
258
|
return pulumi.get(self, "token_num_uses")
|
284
259
|
|
@@ -290,10 +265,7 @@ class AuthBackendRoleArgs:
|
|
290
265
|
@pulumi.getter(name="tokenPeriod")
|
291
266
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
292
267
|
"""
|
293
|
-
|
294
|
-
token generated using this role should never expire. The token should be renewed within the
|
295
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
296
|
-
value of this field. Specified in seconds.
|
268
|
+
Generated Token's Period
|
297
269
|
"""
|
298
270
|
return pulumi.get(self, "token_period")
|
299
271
|
|
@@ -305,8 +277,7 @@ class AuthBackendRoleArgs:
|
|
305
277
|
@pulumi.getter(name="tokenPolicies")
|
306
278
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
307
279
|
"""
|
308
|
-
|
309
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
280
|
+
Generated Token's Policies
|
310
281
|
"""
|
311
282
|
return pulumi.get(self, "token_policies")
|
312
283
|
|
@@ -318,8 +289,7 @@ class AuthBackendRoleArgs:
|
|
318
289
|
@pulumi.getter(name="tokenTtl")
|
319
290
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
320
291
|
"""
|
321
|
-
The
|
322
|
-
Its current value will be referenced at renewal time.
|
292
|
+
The initial ttl of the token to generate in seconds
|
323
293
|
"""
|
324
294
|
return pulumi.get(self, "token_ttl")
|
325
295
|
|
@@ -331,11 +301,7 @@ class AuthBackendRoleArgs:
|
|
331
301
|
@pulumi.getter(name="tokenType")
|
332
302
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
333
303
|
"""
|
334
|
-
The type of token
|
335
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
336
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
337
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
338
|
-
requests a different type at generation time.
|
304
|
+
The type of token to generate, service or batch
|
339
305
|
"""
|
340
306
|
return pulumi.get(self, "token_type")
|
341
307
|
|
@@ -384,32 +350,15 @@ class _AuthBackendRoleState:
|
|
384
350
|
expire. A value of zero will allow unlimited uses.
|
385
351
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
386
352
|
expires.
|
387
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
388
|
-
|
389
|
-
|
390
|
-
:param pulumi.Input[
|
391
|
-
|
392
|
-
|
393
|
-
|
394
|
-
:param pulumi.Input[int]
|
395
|
-
|
396
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
397
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
398
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
399
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
400
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
401
|
-
token generated using this role should never expire. The token should be renewed within the
|
402
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
403
|
-
value of this field. Specified in seconds.
|
404
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
405
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
406
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
407
|
-
Its current value will be referenced at renewal time.
|
408
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
409
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
410
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
411
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
412
|
-
requests a different type at generation time.
|
353
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
354
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
355
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
356
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
357
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
358
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
359
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
360
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
361
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
413
362
|
"""
|
414
363
|
if backend is not None:
|
415
364
|
pulumi.set(__self__, "backend", backend)
|
@@ -556,9 +505,7 @@ class _AuthBackendRoleState:
|
|
556
505
|
@pulumi.getter(name="tokenBoundCidrs")
|
557
506
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
558
507
|
"""
|
559
|
-
|
560
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
561
|
-
as well.
|
508
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
562
509
|
"""
|
563
510
|
return pulumi.get(self, "token_bound_cidrs")
|
564
511
|
|
@@ -570,10 +517,7 @@ class _AuthBackendRoleState:
|
|
570
517
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
571
518
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
572
519
|
"""
|
573
|
-
|
574
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
575
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
576
|
-
`token_max_ttl` would otherwise allow a renewal.
|
520
|
+
Generated Token's Explicit Maximum TTL in seconds
|
577
521
|
"""
|
578
522
|
return pulumi.get(self, "token_explicit_max_ttl")
|
579
523
|
|
@@ -585,8 +529,7 @@ class _AuthBackendRoleState:
|
|
585
529
|
@pulumi.getter(name="tokenMaxTtl")
|
586
530
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
587
531
|
"""
|
588
|
-
The maximum lifetime
|
589
|
-
Its current value will be referenced at renewal time.
|
532
|
+
The maximum lifetime of the generated token
|
590
533
|
"""
|
591
534
|
return pulumi.get(self, "token_max_ttl")
|
592
535
|
|
@@ -598,8 +541,7 @@ class _AuthBackendRoleState:
|
|
598
541
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
599
542
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
600
543
|
"""
|
601
|
-
If
|
602
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
544
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
603
545
|
"""
|
604
546
|
return pulumi.get(self, "token_no_default_policy")
|
605
547
|
|
@@ -611,8 +553,7 @@ class _AuthBackendRoleState:
|
|
611
553
|
@pulumi.getter(name="tokenNumUses")
|
612
554
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
613
555
|
"""
|
614
|
-
The
|
615
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
556
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
616
557
|
"""
|
617
558
|
return pulumi.get(self, "token_num_uses")
|
618
559
|
|
@@ -624,10 +565,7 @@ class _AuthBackendRoleState:
|
|
624
565
|
@pulumi.getter(name="tokenPeriod")
|
625
566
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
626
567
|
"""
|
627
|
-
|
628
|
-
token generated using this role should never expire. The token should be renewed within the
|
629
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
630
|
-
value of this field. Specified in seconds.
|
568
|
+
Generated Token's Period
|
631
569
|
"""
|
632
570
|
return pulumi.get(self, "token_period")
|
633
571
|
|
@@ -639,8 +577,7 @@ class _AuthBackendRoleState:
|
|
639
577
|
@pulumi.getter(name="tokenPolicies")
|
640
578
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
641
579
|
"""
|
642
|
-
|
643
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
580
|
+
Generated Token's Policies
|
644
581
|
"""
|
645
582
|
return pulumi.get(self, "token_policies")
|
646
583
|
|
@@ -652,8 +589,7 @@ class _AuthBackendRoleState:
|
|
652
589
|
@pulumi.getter(name="tokenTtl")
|
653
590
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
654
591
|
"""
|
655
|
-
The
|
656
|
-
Its current value will be referenced at renewal time.
|
592
|
+
The initial ttl of the token to generate in seconds
|
657
593
|
"""
|
658
594
|
return pulumi.get(self, "token_ttl")
|
659
595
|
|
@@ -665,11 +601,7 @@ class _AuthBackendRoleState:
|
|
665
601
|
@pulumi.getter(name="tokenType")
|
666
602
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
667
603
|
"""
|
668
|
-
The type of token
|
669
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
670
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
671
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
672
|
-
requests a different type at generation time.
|
604
|
+
The type of token to generate, service or batch
|
673
605
|
"""
|
674
606
|
return pulumi.get(self, "token_type")
|
675
607
|
|
@@ -708,7 +640,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
708
640
|
|
709
641
|
## Example Usage
|
710
642
|
|
711
|
-
<!--Start PulumiCodeChooser -->
|
712
643
|
```python
|
713
644
|
import pulumi
|
714
645
|
import pulumi_vault as vault
|
@@ -723,7 +654,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
723
654
|
"prod",
|
724
655
|
])
|
725
656
|
```
|
726
|
-
<!--End PulumiCodeChooser -->
|
727
657
|
|
728
658
|
## Import
|
729
659
|
|
@@ -753,32 +683,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
753
683
|
expire. A value of zero will allow unlimited uses.
|
754
684
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
755
685
|
expires.
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
757
|
-
|
758
|
-
|
759
|
-
:param pulumi.Input[
|
760
|
-
|
761
|
-
|
762
|
-
|
763
|
-
:param pulumi.Input[int]
|
764
|
-
|
765
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
768
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
-
token generated using this role should never expire. The token should be renewed within the
|
771
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
-
value of this field. Specified in seconds.
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
-
Its current value will be referenced at renewal time.
|
777
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
-
requests a different type at generation time.
|
686
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
687
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
688
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
689
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
690
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
691
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
692
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
693
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
694
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
782
695
|
"""
|
783
696
|
...
|
784
697
|
@overload
|
@@ -793,7 +706,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
793
706
|
|
794
707
|
## Example Usage
|
795
708
|
|
796
|
-
<!--Start PulumiCodeChooser -->
|
797
709
|
```python
|
798
710
|
import pulumi
|
799
711
|
import pulumi_vault as vault
|
@@ -808,7 +720,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
808
720
|
"prod",
|
809
721
|
])
|
810
722
|
```
|
811
|
-
<!--End PulumiCodeChooser -->
|
812
723
|
|
813
724
|
## Import
|
814
725
|
|
@@ -930,32 +841,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
930
841
|
expire. A value of zero will allow unlimited uses.
|
931
842
|
:param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
|
932
843
|
expires.
|
933
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
934
|
-
|
935
|
-
|
936
|
-
:param pulumi.Input[
|
937
|
-
|
938
|
-
|
939
|
-
|
940
|
-
:param pulumi.Input[int]
|
941
|
-
|
942
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
943
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
944
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
|
945
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
946
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
947
|
-
token generated using this role should never expire. The token should be renewed within the
|
948
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
949
|
-
value of this field. Specified in seconds.
|
950
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
951
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
952
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
953
|
-
Its current value will be referenced at renewal time.
|
954
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
955
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
956
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
957
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
958
|
-
requests a different type at generation time.
|
844
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
845
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
846
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
847
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
848
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
849
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
850
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
851
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
852
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
959
853
|
"""
|
960
854
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
961
855
|
|
@@ -1058,9 +952,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1058
952
|
@pulumi.getter(name="tokenBoundCidrs")
|
1059
953
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1060
954
|
"""
|
1061
|
-
|
1062
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1063
|
-
as well.
|
955
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1064
956
|
"""
|
1065
957
|
return pulumi.get(self, "token_bound_cidrs")
|
1066
958
|
|
@@ -1068,10 +960,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1068
960
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1069
961
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1070
962
|
"""
|
1071
|
-
|
1072
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1073
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1074
|
-
`token_max_ttl` would otherwise allow a renewal.
|
963
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1075
964
|
"""
|
1076
965
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1077
966
|
|
@@ -1079,8 +968,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1079
968
|
@pulumi.getter(name="tokenMaxTtl")
|
1080
969
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1081
970
|
"""
|
1082
|
-
The maximum lifetime
|
1083
|
-
Its current value will be referenced at renewal time.
|
971
|
+
The maximum lifetime of the generated token
|
1084
972
|
"""
|
1085
973
|
return pulumi.get(self, "token_max_ttl")
|
1086
974
|
|
@@ -1088,8 +976,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1088
976
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1089
977
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1090
978
|
"""
|
1091
|
-
If
|
1092
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
979
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1093
980
|
"""
|
1094
981
|
return pulumi.get(self, "token_no_default_policy")
|
1095
982
|
|
@@ -1097,8 +984,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1097
984
|
@pulumi.getter(name="tokenNumUses")
|
1098
985
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1099
986
|
"""
|
1100
|
-
The
|
1101
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
987
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1102
988
|
"""
|
1103
989
|
return pulumi.get(self, "token_num_uses")
|
1104
990
|
|
@@ -1106,10 +992,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1106
992
|
@pulumi.getter(name="tokenPeriod")
|
1107
993
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1108
994
|
"""
|
1109
|
-
|
1110
|
-
token generated using this role should never expire. The token should be renewed within the
|
1111
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1112
|
-
value of this field. Specified in seconds.
|
995
|
+
Generated Token's Period
|
1113
996
|
"""
|
1114
997
|
return pulumi.get(self, "token_period")
|
1115
998
|
|
@@ -1117,8 +1000,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1117
1000
|
@pulumi.getter(name="tokenPolicies")
|
1118
1001
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1119
1002
|
"""
|
1120
|
-
|
1121
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1003
|
+
Generated Token's Policies
|
1122
1004
|
"""
|
1123
1005
|
return pulumi.get(self, "token_policies")
|
1124
1006
|
|
@@ -1126,8 +1008,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1126
1008
|
@pulumi.getter(name="tokenTtl")
|
1127
1009
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1128
1010
|
"""
|
1129
|
-
The
|
1130
|
-
Its current value will be referenced at renewal time.
|
1011
|
+
The initial ttl of the token to generate in seconds
|
1131
1012
|
"""
|
1132
1013
|
return pulumi.get(self, "token_ttl")
|
1133
1014
|
|
@@ -1135,11 +1016,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1135
1016
|
@pulumi.getter(name="tokenType")
|
1136
1017
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1137
1018
|
"""
|
1138
|
-
The type of token
|
1139
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1140
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1141
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1142
|
-
requests a different type at generation time.
|
1019
|
+
The type of token to generate, service or batch
|
1143
1020
|
"""
|
1144
1021
|
return pulumi.get(self, "token_type")
|
1145
1022
|
|
@@ -397,7 +397,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
397
397
|
|
398
398
|
## Example Usage
|
399
399
|
|
400
|
-
<!--Start PulumiCodeChooser -->
|
401
400
|
```python
|
402
401
|
import pulumi
|
403
402
|
import json
|
@@ -419,7 +418,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
419
418
|
"hello": "world",
|
420
419
|
}))
|
421
420
|
```
|
422
|
-
<!--End PulumiCodeChooser -->
|
423
421
|
|
424
422
|
:param str resource_name: The name of the resource.
|
425
423
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -456,7 +454,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
456
454
|
|
457
455
|
## Example Usage
|
458
456
|
|
459
|
-
<!--Start PulumiCodeChooser -->
|
460
457
|
```python
|
461
458
|
import pulumi
|
462
459
|
import json
|
@@ -478,7 +475,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
478
475
|
"hello": "world",
|
479
476
|
}))
|
480
477
|
```
|
481
|
-
<!--End PulumiCodeChooser -->
|
482
478
|
|
483
479
|
:param str resource_name: The name of the resource.
|
484
480
|
:param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
|
@@ -92,7 +92,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
92
92
|
|
93
93
|
## Example Usage
|
94
94
|
|
95
|
-
<!--Start PulumiCodeChooser -->
|
96
95
|
```python
|
97
96
|
import pulumi
|
98
97
|
import pulumi_vault as vault
|
@@ -101,7 +100,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
101
100
|
role_name="my-role")
|
102
101
|
pulumi.export("role-id", role.role_id)
|
103
102
|
```
|
104
|
-
<!--End PulumiCodeChooser -->
|
105
103
|
|
106
104
|
|
107
105
|
:param str backend: The unique name for the AppRole backend the role to
|
@@ -137,7 +135,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
137
135
|
|
138
136
|
## Example Usage
|
139
137
|
|
140
|
-
<!--Start PulumiCodeChooser -->
|
141
138
|
```python
|
142
139
|
import pulumi
|
143
140
|
import pulumi_vault as vault
|
@@ -146,7 +143,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
146
143
|
role_name="my-role")
|
147
144
|
pulumi.export("role-id", role.role_id)
|
148
145
|
```
|
149
|
-
<!--End PulumiCodeChooser -->
|
150
146
|
|
151
147
|
|
152
148
|
:param str backend: The unique name for the AppRole backend the role to
|
pulumi_vault/audit.py
CHANGED
@@ -254,7 +254,6 @@ class Audit(pulumi.CustomResource):
|
|
254
254
|
|
255
255
|
### File Audit Device)
|
256
256
|
|
257
|
-
<!--Start PulumiCodeChooser -->
|
258
257
|
```python
|
259
258
|
import pulumi
|
260
259
|
import pulumi_vault as vault
|
@@ -265,11 +264,9 @@ class Audit(pulumi.CustomResource):
|
|
265
264
|
"file_path": "C:/temp/audit.txt",
|
266
265
|
})
|
267
266
|
```
|
268
|
-
<!--End PulumiCodeChooser -->
|
269
267
|
|
270
268
|
### Socket Audit Device)
|
271
269
|
|
272
|
-
<!--Start PulumiCodeChooser -->
|
273
270
|
```python
|
274
271
|
import pulumi
|
275
272
|
import pulumi_vault as vault
|
@@ -284,7 +281,6 @@ class Audit(pulumi.CustomResource):
|
|
284
281
|
"description": "application x socket",
|
285
282
|
})
|
286
283
|
```
|
287
|
-
<!--End PulumiCodeChooser -->
|
288
284
|
|
289
285
|
## Import
|
290
286
|
|
@@ -319,7 +315,6 @@ class Audit(pulumi.CustomResource):
|
|
319
315
|
|
320
316
|
### File Audit Device)
|
321
317
|
|
322
|
-
<!--Start PulumiCodeChooser -->
|
323
318
|
```python
|
324
319
|
import pulumi
|
325
320
|
import pulumi_vault as vault
|
@@ -330,11 +325,9 @@ class Audit(pulumi.CustomResource):
|
|
330
325
|
"file_path": "C:/temp/audit.txt",
|
331
326
|
})
|
332
327
|
```
|
333
|
-
<!--End PulumiCodeChooser -->
|
334
328
|
|
335
329
|
### Socket Audit Device)
|
336
330
|
|
337
|
-
<!--Start PulumiCodeChooser -->
|
338
331
|
```python
|
339
332
|
import pulumi
|
340
333
|
import pulumi_vault as vault
|
@@ -349,7 +342,6 @@ class Audit(pulumi.CustomResource):
|
|
349
342
|
"description": "application x socket",
|
350
343
|
})
|
351
344
|
```
|
352
|
-
<!--End PulumiCodeChooser -->
|
353
345
|
|
354
346
|
## Import
|
355
347
|
|