pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -1577,7 +1582,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1577
1582
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1578
1583
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1579
1584
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1580
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1585
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1581
1586
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1582
1587
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1583
1588
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1671,7 +1676,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1671
1676
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1672
1677
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1673
1678
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1674
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1679
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1675
1680
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1676
1681
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1677
1682
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1775,7 +1780,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1775
1780
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1776
1781
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1777
1782
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1778
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1783
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1779
1784
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1780
1785
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1781
1786
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1888,7 +1893,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1888
1893
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1889
1894
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1890
1895
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1891
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1896
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1892
1897
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1893
1898
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1894
1899
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1950,7 +1955,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1950
1955
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1951
1956
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1952
1957
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1953
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1958
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1954
1959
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1955
1960
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1956
1961
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootSignIntermediateArgs', 'SecretBackendRootSignIntermediate']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendSignArgs', 'SecretBackendSign']
|
pulumi_vault/plugin.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PluginArgs', 'Plugin']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PluginPinnedVersionArgs', 'PluginPinnedVersion']
|
pulumi_vault/policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PolicyArgs', 'Policy']
|
pulumi_vault/provider.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from ._inputs import *
|
12
17
|
|
@@ -513,22 +518,22 @@ class Provider(pulumi.ProviderResource):
|
|
513
518
|
opts: Optional[pulumi.ResourceOptions] = None,
|
514
519
|
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
515
520
|
address: Optional[pulumi.Input[str]] = None,
|
516
|
-
auth_login: Optional[pulumi.Input[
|
517
|
-
auth_login_aws: Optional[pulumi.Input[
|
518
|
-
auth_login_azure: Optional[pulumi.Input[
|
519
|
-
auth_login_cert: Optional[pulumi.Input[
|
520
|
-
auth_login_gcp: Optional[pulumi.Input[
|
521
|
-
auth_login_jwt: Optional[pulumi.Input[
|
522
|
-
auth_login_kerberos: Optional[pulumi.Input[
|
523
|
-
auth_login_oci: Optional[pulumi.Input[
|
524
|
-
auth_login_oidc: Optional[pulumi.Input[
|
525
|
-
auth_login_radius: Optional[pulumi.Input[
|
526
|
-
auth_login_token_file: Optional[pulumi.Input[
|
527
|
-
auth_login_userpass: Optional[pulumi.Input[
|
521
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
522
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
523
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
524
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
525
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
526
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
527
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
528
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
529
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
530
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
531
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
532
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
528
533
|
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
529
534
|
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
530
|
-
client_auth: Optional[pulumi.Input[
|
531
|
-
headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
535
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
536
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
532
537
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
533
538
|
max_retries: Optional[pulumi.Input[int]] = None,
|
534
539
|
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
@@ -551,22 +556,22 @@ class Provider(pulumi.ProviderResource):
|
|
551
556
|
:param str resource_name: The name of the resource.
|
552
557
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
553
558
|
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
554
|
-
:param pulumi.Input[
|
555
|
-
:param pulumi.Input[
|
556
|
-
:param pulumi.Input[
|
557
|
-
:param pulumi.Input[
|
558
|
-
:param pulumi.Input[
|
559
|
-
:param pulumi.Input[
|
560
|
-
:param pulumi.Input[
|
561
|
-
:param pulumi.Input[
|
562
|
-
:param pulumi.Input[
|
563
|
-
:param pulumi.Input[
|
564
|
-
:param pulumi.Input[
|
565
|
-
:param pulumi.Input[
|
559
|
+
:param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
560
|
+
:param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
|
561
|
+
:param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
|
562
|
+
:param pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']] auth_login_cert: Login to vault using the cert method
|
563
|
+
:param pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']] auth_login_gcp: Login to vault using the gcp method
|
564
|
+
:param pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']] auth_login_jwt: Login to vault using the jwt method
|
565
|
+
:param pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']] auth_login_kerberos: Login to vault using the kerberos method
|
566
|
+
:param pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']] auth_login_oci: Login to vault using the OCI method
|
567
|
+
:param pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']] auth_login_oidc: Login to vault using the oidc method
|
568
|
+
:param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
|
569
|
+
:param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
|
570
|
+
:param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
|
566
571
|
:param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
567
572
|
:param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
568
|
-
:param pulumi.Input[
|
569
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
573
|
+
:param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
|
574
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
|
570
575
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
571
576
|
:param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
572
577
|
:param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
@@ -610,22 +615,22 @@ class Provider(pulumi.ProviderResource):
|
|
610
615
|
opts: Optional[pulumi.ResourceOptions] = None,
|
611
616
|
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
612
617
|
address: Optional[pulumi.Input[str]] = None,
|
613
|
-
auth_login: Optional[pulumi.Input[
|
614
|
-
auth_login_aws: Optional[pulumi.Input[
|
615
|
-
auth_login_azure: Optional[pulumi.Input[
|
616
|
-
auth_login_cert: Optional[pulumi.Input[
|
617
|
-
auth_login_gcp: Optional[pulumi.Input[
|
618
|
-
auth_login_jwt: Optional[pulumi.Input[
|
619
|
-
auth_login_kerberos: Optional[pulumi.Input[
|
620
|
-
auth_login_oci: Optional[pulumi.Input[
|
621
|
-
auth_login_oidc: Optional[pulumi.Input[
|
622
|
-
auth_login_radius: Optional[pulumi.Input[
|
623
|
-
auth_login_token_file: Optional[pulumi.Input[
|
624
|
-
auth_login_userpass: Optional[pulumi.Input[
|
618
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
619
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
620
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
621
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
622
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
623
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
624
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
625
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
626
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
627
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
628
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
629
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
625
630
|
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
626
631
|
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
627
|
-
client_auth: Optional[pulumi.Input[
|
628
|
-
headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
632
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
633
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
629
634
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
630
635
|
max_retries: Optional[pulumi.Input[int]] = None,
|
631
636
|
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
pulumi_vault/quota_rate_limit.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['QuotaRateLimitArgs', 'QuotaRateLimit']
|
pulumi_vault/rabbitmq/_inputs.py
CHANGED
@@ -4,17 +4,48 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretBackendRoleVhostArgs',
|
19
|
+
'SecretBackendRoleVhostArgsDict',
|
14
20
|
'SecretBackendRoleVhostTopicArgs',
|
21
|
+
'SecretBackendRoleVhostTopicArgsDict',
|
15
22
|
'SecretBackendRoleVhostTopicVhostArgs',
|
23
|
+
'SecretBackendRoleVhostTopicVhostArgsDict',
|
16
24
|
]
|
17
25
|
|
26
|
+
MYPY = False
|
27
|
+
|
28
|
+
if not MYPY:
|
29
|
+
class SecretBackendRoleVhostArgsDict(TypedDict):
|
30
|
+
configure: pulumi.Input[str]
|
31
|
+
"""
|
32
|
+
The configure permissions for this vhost.
|
33
|
+
"""
|
34
|
+
host: pulumi.Input[str]
|
35
|
+
"""
|
36
|
+
The vhost to set permissions for.
|
37
|
+
"""
|
38
|
+
read: pulumi.Input[str]
|
39
|
+
"""
|
40
|
+
The read permissions for this vhost.
|
41
|
+
"""
|
42
|
+
write: pulumi.Input[str]
|
43
|
+
"""
|
44
|
+
The write permissions for this vhost.
|
45
|
+
"""
|
46
|
+
elif False:
|
47
|
+
SecretBackendRoleVhostArgsDict: TypeAlias = Mapping[str, Any]
|
48
|
+
|
18
49
|
@pulumi.input_type
|
19
50
|
class SecretBackendRoleVhostArgs:
|
20
51
|
def __init__(__self__, *,
|
@@ -82,6 +113,19 @@ class SecretBackendRoleVhostArgs:
|
|
82
113
|
pulumi.set(self, "write", value)
|
83
114
|
|
84
115
|
|
116
|
+
if not MYPY:
|
117
|
+
class SecretBackendRoleVhostTopicArgsDict(TypedDict):
|
118
|
+
host: pulumi.Input[str]
|
119
|
+
"""
|
120
|
+
The vhost to set permissions for.
|
121
|
+
"""
|
122
|
+
vhosts: NotRequired[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgsDict']]]]
|
123
|
+
"""
|
124
|
+
Specifies a map of virtual hosts to permissions.
|
125
|
+
"""
|
126
|
+
elif False:
|
127
|
+
SecretBackendRoleVhostTopicArgsDict: TypeAlias = Mapping[str, Any]
|
128
|
+
|
85
129
|
@pulumi.input_type
|
86
130
|
class SecretBackendRoleVhostTopicArgs:
|
87
131
|
def __init__(__self__, *,
|
@@ -120,6 +164,23 @@ class SecretBackendRoleVhostTopicArgs:
|
|
120
164
|
pulumi.set(self, "vhosts", value)
|
121
165
|
|
122
166
|
|
167
|
+
if not MYPY:
|
168
|
+
class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict):
|
169
|
+
read: pulumi.Input[str]
|
170
|
+
"""
|
171
|
+
The read permissions for this vhost.
|
172
|
+
"""
|
173
|
+
topic: pulumi.Input[str]
|
174
|
+
"""
|
175
|
+
The vhost to set permissions for.
|
176
|
+
"""
|
177
|
+
write: pulumi.Input[str]
|
178
|
+
"""
|
179
|
+
The write permissions for this vhost.
|
180
|
+
"""
|
181
|
+
elif False:
|
182
|
+
SecretBackendRoleVhostTopicVhostArgsDict: TypeAlias = Mapping[str, Any]
|
183
|
+
|
123
184
|
@pulumi.input_type
|
124
185
|
class SecretBackendRoleVhostTopicVhostArgs:
|
125
186
|
def __init__(__self__, *,
|
pulumi_vault/rabbitmq/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -249,8 +254,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
249
254
|
name: Optional[pulumi.Input[str]] = None,
|
250
255
|
namespace: Optional[pulumi.Input[str]] = None,
|
251
256
|
tags: Optional[pulumi.Input[str]] = None,
|
252
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
253
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
257
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
258
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
254
259
|
__props__=None):
|
255
260
|
"""
|
256
261
|
## Example Usage
|
@@ -267,20 +272,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
267
272
|
backend=rabbitmq.path,
|
268
273
|
name="deploy",
|
269
274
|
tags="tag1,tag2",
|
270
|
-
vhosts=[
|
271
|
-
host
|
272
|
-
configure
|
273
|
-
read
|
274
|
-
write
|
275
|
-
|
276
|
-
vhost_topics=[
|
277
|
-
vhosts
|
278
|
-
topic
|
279
|
-
read
|
280
|
-
write
|
281
|
-
|
282
|
-
host
|
283
|
-
|
275
|
+
vhosts=[{
|
276
|
+
"host": "/",
|
277
|
+
"configure": "",
|
278
|
+
"read": ".*",
|
279
|
+
"write": "",
|
280
|
+
}],
|
281
|
+
vhost_topics=[{
|
282
|
+
"vhosts": [{
|
283
|
+
"topic": "amq.topic",
|
284
|
+
"read": ".*",
|
285
|
+
"write": "",
|
286
|
+
}],
|
287
|
+
"host": "/",
|
288
|
+
}])
|
284
289
|
```
|
285
290
|
|
286
291
|
## Import
|
@@ -302,8 +307,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
302
307
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
303
308
|
*Available only for Vault Enterprise*.
|
304
309
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
306
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
310
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
311
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
307
312
|
"""
|
308
313
|
...
|
309
314
|
@overload
|
@@ -326,20 +331,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
326
331
|
backend=rabbitmq.path,
|
327
332
|
name="deploy",
|
328
333
|
tags="tag1,tag2",
|
329
|
-
vhosts=[
|
330
|
-
host
|
331
|
-
configure
|
332
|
-
read
|
333
|
-
write
|
334
|
-
|
335
|
-
vhost_topics=[
|
336
|
-
vhosts
|
337
|
-
topic
|
338
|
-
read
|
339
|
-
write
|
340
|
-
|
341
|
-
host
|
342
|
-
|
334
|
+
vhosts=[{
|
335
|
+
"host": "/",
|
336
|
+
"configure": "",
|
337
|
+
"read": ".*",
|
338
|
+
"write": "",
|
339
|
+
}],
|
340
|
+
vhost_topics=[{
|
341
|
+
"vhosts": [{
|
342
|
+
"topic": "amq.topic",
|
343
|
+
"read": ".*",
|
344
|
+
"write": "",
|
345
|
+
}],
|
346
|
+
"host": "/",
|
347
|
+
}])
|
343
348
|
```
|
344
349
|
|
345
350
|
## Import
|
@@ -369,8 +374,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
369
374
|
name: Optional[pulumi.Input[str]] = None,
|
370
375
|
namespace: Optional[pulumi.Input[str]] = None,
|
371
376
|
tags: Optional[pulumi.Input[str]] = None,
|
372
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
373
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
377
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
378
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
374
379
|
__props__=None):
|
375
380
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
376
381
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -402,8 +407,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
402
407
|
name: Optional[pulumi.Input[str]] = None,
|
403
408
|
namespace: Optional[pulumi.Input[str]] = None,
|
404
409
|
tags: Optional[pulumi.Input[str]] = None,
|
405
|
-
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[
|
406
|
-
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
410
|
+
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
411
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
|
407
412
|
"""
|
408
413
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
409
414
|
properties used to qualify the lookup.
|
@@ -420,8 +425,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
420
425
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
421
426
|
*Available only for Vault Enterprise*.
|
422
427
|
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
423
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
424
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
428
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
429
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
425
430
|
"""
|
426
431
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
427
432
|
|
pulumi_vault/raft_autopilot.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RaftAutopilotArgs', 'RaftAutopilot']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RaftSnapshotAgentConfigArgs', 'RaftSnapshotAgentConfig']
|