pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -4,104 +4,32 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendTuneArgs',
|
19
|
-
'AuthBackendTuneArgsDict',
|
20
14
|
'ProviderAuthLoginArgs',
|
21
|
-
'ProviderAuthLoginArgsDict',
|
22
15
|
'ProviderAuthLoginAwsArgs',
|
23
|
-
'ProviderAuthLoginAwsArgsDict',
|
24
16
|
'ProviderAuthLoginAzureArgs',
|
25
|
-
'ProviderAuthLoginAzureArgsDict',
|
26
17
|
'ProviderAuthLoginCertArgs',
|
27
|
-
'ProviderAuthLoginCertArgsDict',
|
28
18
|
'ProviderAuthLoginGcpArgs',
|
29
|
-
'ProviderAuthLoginGcpArgsDict',
|
30
19
|
'ProviderAuthLoginJwtArgs',
|
31
|
-
'ProviderAuthLoginJwtArgsDict',
|
32
20
|
'ProviderAuthLoginKerberosArgs',
|
33
|
-
'ProviderAuthLoginKerberosArgsDict',
|
34
21
|
'ProviderAuthLoginOciArgs',
|
35
|
-
'ProviderAuthLoginOciArgsDict',
|
36
22
|
'ProviderAuthLoginOidcArgs',
|
37
|
-
'ProviderAuthLoginOidcArgsDict',
|
38
23
|
'ProviderAuthLoginRadiusArgs',
|
39
|
-
'ProviderAuthLoginRadiusArgsDict',
|
40
24
|
'ProviderAuthLoginTokenFileArgs',
|
41
|
-
'ProviderAuthLoginTokenFileArgsDict',
|
42
25
|
'ProviderAuthLoginUserpassArgs',
|
43
|
-
'ProviderAuthLoginUserpassArgsDict',
|
44
26
|
'ProviderClientAuthArgs',
|
45
|
-
'ProviderClientAuthArgsDict',
|
46
27
|
'ProviderHeaderArgs',
|
47
|
-
'ProviderHeaderArgsDict',
|
48
28
|
'GetPolicyDocumentRuleArgs',
|
49
|
-
'GetPolicyDocumentRuleArgsDict',
|
50
29
|
'GetPolicyDocumentRuleAllowedParameterArgs',
|
51
|
-
'GetPolicyDocumentRuleAllowedParameterArgsDict',
|
52
30
|
'GetPolicyDocumentRuleDeniedParameterArgs',
|
53
|
-
'GetPolicyDocumentRuleDeniedParameterArgsDict',
|
54
31
|
]
|
55
32
|
|
56
|
-
MYPY = False
|
57
|
-
|
58
|
-
if not MYPY:
|
59
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
60
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
61
|
-
"""
|
62
|
-
List of headers to whitelist and allowing
|
63
|
-
a plugin to include them in the response.
|
64
|
-
"""
|
65
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
66
|
-
"""
|
67
|
-
Specifies the list of keys that will
|
68
|
-
not be HMAC'd by audit devices in the request data object.
|
69
|
-
"""
|
70
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
71
|
-
"""
|
72
|
-
Specifies the list of keys that will
|
73
|
-
not be HMAC'd by audit devices in the response data object.
|
74
|
-
"""
|
75
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
76
|
-
"""
|
77
|
-
Specifies the default time-to-live.
|
78
|
-
If set, this overrides the global default.
|
79
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
80
|
-
"""
|
81
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
82
|
-
"""
|
83
|
-
Specifies whether to show this mount in
|
84
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
85
|
-
"""
|
86
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
87
|
-
"""
|
88
|
-
Specifies the maximum time-to-live.
|
89
|
-
If set, this overrides the global default.
|
90
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
91
|
-
"""
|
92
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
93
|
-
"""
|
94
|
-
List of headers to whitelist and
|
95
|
-
pass from the request to the backend.
|
96
|
-
"""
|
97
|
-
token_type: NotRequired[pulumi.Input[str]]
|
98
|
-
"""
|
99
|
-
Specifies the type of tokens that should be returned by
|
100
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
101
|
-
"""
|
102
|
-
elif False:
|
103
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
104
|
-
|
105
33
|
@pulumi.input_type
|
106
34
|
class AuthBackendTuneArgs:
|
107
35
|
def __init__(__self__, *,
|
@@ -257,22 +185,6 @@ class AuthBackendTuneArgs:
|
|
257
185
|
pulumi.set(self, "token_type", value)
|
258
186
|
|
259
187
|
|
260
|
-
if not MYPY:
|
261
|
-
class ProviderAuthLoginArgsDict(TypedDict):
|
262
|
-
path: pulumi.Input[str]
|
263
|
-
method: NotRequired[pulumi.Input[str]]
|
264
|
-
namespace: NotRequired[pulumi.Input[str]]
|
265
|
-
"""
|
266
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
267
|
-
"""
|
268
|
-
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
269
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
270
|
-
"""
|
271
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
272
|
-
"""
|
273
|
-
elif False:
|
274
|
-
ProviderAuthLoginArgsDict: TypeAlias = Mapping[str, Any]
|
275
|
-
|
276
188
|
@pulumi.input_type
|
277
189
|
class ProviderAuthLoginArgs:
|
278
190
|
def __init__(__self__, *,
|
@@ -347,75 +259,6 @@ class ProviderAuthLoginArgs:
|
|
347
259
|
pulumi.set(self, "use_root_namespace", value)
|
348
260
|
|
349
261
|
|
350
|
-
if not MYPY:
|
351
|
-
class ProviderAuthLoginAwsArgsDict(TypedDict):
|
352
|
-
role: pulumi.Input[str]
|
353
|
-
"""
|
354
|
-
The Vault role to use when logging into Vault.
|
355
|
-
"""
|
356
|
-
aws_access_key_id: NotRequired[pulumi.Input[str]]
|
357
|
-
"""
|
358
|
-
The AWS access key ID.
|
359
|
-
"""
|
360
|
-
aws_iam_endpoint: NotRequired[pulumi.Input[str]]
|
361
|
-
"""
|
362
|
-
The IAM endpoint URL.
|
363
|
-
"""
|
364
|
-
aws_profile: NotRequired[pulumi.Input[str]]
|
365
|
-
"""
|
366
|
-
The name of the AWS profile.
|
367
|
-
"""
|
368
|
-
aws_region: NotRequired[pulumi.Input[str]]
|
369
|
-
"""
|
370
|
-
The AWS region.
|
371
|
-
"""
|
372
|
-
aws_role_arn: NotRequired[pulumi.Input[str]]
|
373
|
-
"""
|
374
|
-
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
375
|
-
"""
|
376
|
-
aws_role_session_name: NotRequired[pulumi.Input[str]]
|
377
|
-
"""
|
378
|
-
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
379
|
-
"""
|
380
|
-
aws_secret_access_key: NotRequired[pulumi.Input[str]]
|
381
|
-
"""
|
382
|
-
The AWS secret access key.
|
383
|
-
"""
|
384
|
-
aws_session_token: NotRequired[pulumi.Input[str]]
|
385
|
-
"""
|
386
|
-
The AWS session token.
|
387
|
-
"""
|
388
|
-
aws_shared_credentials_file: NotRequired[pulumi.Input[str]]
|
389
|
-
"""
|
390
|
-
Path to the AWS shared credentials file.
|
391
|
-
"""
|
392
|
-
aws_sts_endpoint: NotRequired[pulumi.Input[str]]
|
393
|
-
"""
|
394
|
-
The STS endpoint URL.
|
395
|
-
"""
|
396
|
-
aws_web_identity_token_file: NotRequired[pulumi.Input[str]]
|
397
|
-
"""
|
398
|
-
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
399
|
-
"""
|
400
|
-
header_value: NotRequired[pulumi.Input[str]]
|
401
|
-
"""
|
402
|
-
The Vault header value to include in the STS signing request.
|
403
|
-
"""
|
404
|
-
mount: NotRequired[pulumi.Input[str]]
|
405
|
-
"""
|
406
|
-
The path where the authentication engine is mounted.
|
407
|
-
"""
|
408
|
-
namespace: NotRequired[pulumi.Input[str]]
|
409
|
-
"""
|
410
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
411
|
-
"""
|
412
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
413
|
-
"""
|
414
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
415
|
-
"""
|
416
|
-
elif False:
|
417
|
-
ProviderAuthLoginAwsArgsDict: TypeAlias = Mapping[str, Any]
|
418
|
-
|
419
262
|
@pulumi.input_type
|
420
263
|
class ProviderAuthLoginAwsArgs:
|
421
264
|
def __init__(__self__, *,
|
@@ -678,59 +521,6 @@ class ProviderAuthLoginAwsArgs:
|
|
678
521
|
pulumi.set(self, "use_root_namespace", value)
|
679
522
|
|
680
523
|
|
681
|
-
if not MYPY:
|
682
|
-
class ProviderAuthLoginAzureArgsDict(TypedDict):
|
683
|
-
resource_group_name: pulumi.Input[str]
|
684
|
-
"""
|
685
|
-
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
686
|
-
"""
|
687
|
-
role: pulumi.Input[str]
|
688
|
-
"""
|
689
|
-
Name of the login role.
|
690
|
-
"""
|
691
|
-
subscription_id: pulumi.Input[str]
|
692
|
-
"""
|
693
|
-
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
694
|
-
"""
|
695
|
-
client_id: NotRequired[pulumi.Input[str]]
|
696
|
-
"""
|
697
|
-
The identity's client ID.
|
698
|
-
"""
|
699
|
-
jwt: NotRequired[pulumi.Input[str]]
|
700
|
-
"""
|
701
|
-
A signed JSON Web Token. If not specified on will be created automatically
|
702
|
-
"""
|
703
|
-
mount: NotRequired[pulumi.Input[str]]
|
704
|
-
"""
|
705
|
-
The path where the authentication engine is mounted.
|
706
|
-
"""
|
707
|
-
namespace: NotRequired[pulumi.Input[str]]
|
708
|
-
"""
|
709
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
710
|
-
"""
|
711
|
-
scope: NotRequired[pulumi.Input[str]]
|
712
|
-
"""
|
713
|
-
The scopes to include in the token request.
|
714
|
-
"""
|
715
|
-
tenant_id: NotRequired[pulumi.Input[str]]
|
716
|
-
"""
|
717
|
-
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
718
|
-
"""
|
719
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
720
|
-
"""
|
721
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
722
|
-
"""
|
723
|
-
vm_name: NotRequired[pulumi.Input[str]]
|
724
|
-
"""
|
725
|
-
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
726
|
-
"""
|
727
|
-
vmss_name: NotRequired[pulumi.Input[str]]
|
728
|
-
"""
|
729
|
-
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
730
|
-
"""
|
731
|
-
elif False:
|
732
|
-
ProviderAuthLoginAzureArgsDict: TypeAlias = Mapping[str, Any]
|
733
|
-
|
734
524
|
@pulumi.input_type
|
735
525
|
class ProviderAuthLoginAzureArgs:
|
736
526
|
def __init__(__self__, *,
|
@@ -927,35 +717,6 @@ class ProviderAuthLoginAzureArgs:
|
|
927
717
|
pulumi.set(self, "vmss_name", value)
|
928
718
|
|
929
719
|
|
930
|
-
if not MYPY:
|
931
|
-
class ProviderAuthLoginCertArgsDict(TypedDict):
|
932
|
-
cert_file: pulumi.Input[str]
|
933
|
-
"""
|
934
|
-
Path to a file containing the client certificate.
|
935
|
-
"""
|
936
|
-
key_file: pulumi.Input[str]
|
937
|
-
"""
|
938
|
-
Path to a file containing the private key that the certificate was issued for.
|
939
|
-
"""
|
940
|
-
mount: NotRequired[pulumi.Input[str]]
|
941
|
-
"""
|
942
|
-
The path where the authentication engine is mounted.
|
943
|
-
"""
|
944
|
-
name: NotRequired[pulumi.Input[str]]
|
945
|
-
"""
|
946
|
-
Name of the certificate's role
|
947
|
-
"""
|
948
|
-
namespace: NotRequired[pulumi.Input[str]]
|
949
|
-
"""
|
950
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
951
|
-
"""
|
952
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
953
|
-
"""
|
954
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
955
|
-
"""
|
956
|
-
elif False:
|
957
|
-
ProviderAuthLoginCertArgsDict: TypeAlias = Mapping[str, Any]
|
958
|
-
|
959
720
|
@pulumi.input_type
|
960
721
|
class ProviderAuthLoginCertArgs:
|
961
722
|
def __init__(__self__, *,
|
@@ -1057,39 +818,6 @@ class ProviderAuthLoginCertArgs:
|
|
1057
818
|
pulumi.set(self, "use_root_namespace", value)
|
1058
819
|
|
1059
820
|
|
1060
|
-
if not MYPY:
|
1061
|
-
class ProviderAuthLoginGcpArgsDict(TypedDict):
|
1062
|
-
role: pulumi.Input[str]
|
1063
|
-
"""
|
1064
|
-
Name of the login role.
|
1065
|
-
"""
|
1066
|
-
credentials: NotRequired[pulumi.Input[str]]
|
1067
|
-
"""
|
1068
|
-
Path to the Google Cloud credentials file.
|
1069
|
-
"""
|
1070
|
-
jwt: NotRequired[pulumi.Input[str]]
|
1071
|
-
"""
|
1072
|
-
A signed JSON Web Token.
|
1073
|
-
"""
|
1074
|
-
mount: NotRequired[pulumi.Input[str]]
|
1075
|
-
"""
|
1076
|
-
The path where the authentication engine is mounted.
|
1077
|
-
"""
|
1078
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1079
|
-
"""
|
1080
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1081
|
-
"""
|
1082
|
-
service_account: NotRequired[pulumi.Input[str]]
|
1083
|
-
"""
|
1084
|
-
IAM service account.
|
1085
|
-
"""
|
1086
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1087
|
-
"""
|
1088
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1089
|
-
"""
|
1090
|
-
elif False:
|
1091
|
-
ProviderAuthLoginGcpArgsDict: TypeAlias = Mapping[str, Any]
|
1092
|
-
|
1093
821
|
@pulumi.input_type
|
1094
822
|
class ProviderAuthLoginGcpArgs:
|
1095
823
|
def __init__(__self__, *,
|
@@ -1208,31 +936,6 @@ class ProviderAuthLoginGcpArgs:
|
|
1208
936
|
pulumi.set(self, "use_root_namespace", value)
|
1209
937
|
|
1210
938
|
|
1211
|
-
if not MYPY:
|
1212
|
-
class ProviderAuthLoginJwtArgsDict(TypedDict):
|
1213
|
-
jwt: pulumi.Input[str]
|
1214
|
-
"""
|
1215
|
-
A signed JSON Web Token.
|
1216
|
-
"""
|
1217
|
-
role: pulumi.Input[str]
|
1218
|
-
"""
|
1219
|
-
Name of the login role.
|
1220
|
-
"""
|
1221
|
-
mount: NotRequired[pulumi.Input[str]]
|
1222
|
-
"""
|
1223
|
-
The path where the authentication engine is mounted.
|
1224
|
-
"""
|
1225
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1226
|
-
"""
|
1227
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1228
|
-
"""
|
1229
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1230
|
-
"""
|
1231
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1232
|
-
"""
|
1233
|
-
elif False:
|
1234
|
-
ProviderAuthLoginJwtArgsDict: TypeAlias = Mapping[str, Any]
|
1235
|
-
|
1236
939
|
@pulumi.input_type
|
1237
940
|
class ProviderAuthLoginJwtArgs:
|
1238
941
|
def __init__(__self__, *,
|
@@ -1318,55 +1021,6 @@ class ProviderAuthLoginJwtArgs:
|
|
1318
1021
|
pulumi.set(self, "use_root_namespace", value)
|
1319
1022
|
|
1320
1023
|
|
1321
|
-
if not MYPY:
|
1322
|
-
class ProviderAuthLoginKerberosArgsDict(TypedDict):
|
1323
|
-
disable_fast_negotiation: NotRequired[pulumi.Input[bool]]
|
1324
|
-
"""
|
1325
|
-
Disable the Kerberos FAST negotiation.
|
1326
|
-
"""
|
1327
|
-
keytab_path: NotRequired[pulumi.Input[str]]
|
1328
|
-
"""
|
1329
|
-
The Kerberos keytab file containing the entry of the login entity.
|
1330
|
-
"""
|
1331
|
-
krb5conf_path: NotRequired[pulumi.Input[str]]
|
1332
|
-
"""
|
1333
|
-
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1334
|
-
"""
|
1335
|
-
mount: NotRequired[pulumi.Input[str]]
|
1336
|
-
"""
|
1337
|
-
The path where the authentication engine is mounted.
|
1338
|
-
"""
|
1339
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1340
|
-
"""
|
1341
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1342
|
-
"""
|
1343
|
-
realm: NotRequired[pulumi.Input[str]]
|
1344
|
-
"""
|
1345
|
-
The Kerberos server's authoritative authentication domain
|
1346
|
-
"""
|
1347
|
-
remove_instance_name: NotRequired[pulumi.Input[bool]]
|
1348
|
-
"""
|
1349
|
-
Strip the host from the username found in the keytab.
|
1350
|
-
"""
|
1351
|
-
service: NotRequired[pulumi.Input[str]]
|
1352
|
-
"""
|
1353
|
-
The service principle name.
|
1354
|
-
"""
|
1355
|
-
token: NotRequired[pulumi.Input[str]]
|
1356
|
-
"""
|
1357
|
-
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1358
|
-
"""
|
1359
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1360
|
-
"""
|
1361
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1362
|
-
"""
|
1363
|
-
username: NotRequired[pulumi.Input[str]]
|
1364
|
-
"""
|
1365
|
-
The username to login into Kerberos with.
|
1366
|
-
"""
|
1367
|
-
elif False:
|
1368
|
-
ProviderAuthLoginKerberosArgsDict: TypeAlias = Mapping[str, Any]
|
1369
|
-
|
1370
1024
|
@pulumi.input_type
|
1371
1025
|
class ProviderAuthLoginKerberosArgs:
|
1372
1026
|
def __init__(__self__, *,
|
@@ -1550,31 +1204,6 @@ class ProviderAuthLoginKerberosArgs:
|
|
1550
1204
|
pulumi.set(self, "username", value)
|
1551
1205
|
|
1552
1206
|
|
1553
|
-
if not MYPY:
|
1554
|
-
class ProviderAuthLoginOciArgsDict(TypedDict):
|
1555
|
-
auth_type: pulumi.Input[str]
|
1556
|
-
"""
|
1557
|
-
Authentication type to use when getting OCI credentials.
|
1558
|
-
"""
|
1559
|
-
role: pulumi.Input[str]
|
1560
|
-
"""
|
1561
|
-
Name of the login role.
|
1562
|
-
"""
|
1563
|
-
mount: NotRequired[pulumi.Input[str]]
|
1564
|
-
"""
|
1565
|
-
The path where the authentication engine is mounted.
|
1566
|
-
"""
|
1567
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1568
|
-
"""
|
1569
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1570
|
-
"""
|
1571
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1572
|
-
"""
|
1573
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1574
|
-
"""
|
1575
|
-
elif False:
|
1576
|
-
ProviderAuthLoginOciArgsDict: TypeAlias = Mapping[str, Any]
|
1577
|
-
|
1578
1207
|
@pulumi.input_type
|
1579
1208
|
class ProviderAuthLoginOciArgs:
|
1580
1209
|
def __init__(__self__, *,
|
@@ -1660,35 +1289,6 @@ class ProviderAuthLoginOciArgs:
|
|
1660
1289
|
pulumi.set(self, "use_root_namespace", value)
|
1661
1290
|
|
1662
1291
|
|
1663
|
-
if not MYPY:
|
1664
|
-
class ProviderAuthLoginOidcArgsDict(TypedDict):
|
1665
|
-
role: pulumi.Input[str]
|
1666
|
-
"""
|
1667
|
-
Name of the login role.
|
1668
|
-
"""
|
1669
|
-
callback_address: NotRequired[pulumi.Input[str]]
|
1670
|
-
"""
|
1671
|
-
The callback address. Must be a valid URI without the path.
|
1672
|
-
"""
|
1673
|
-
callback_listener_address: NotRequired[pulumi.Input[str]]
|
1674
|
-
"""
|
1675
|
-
The callback listener's address. Must be a valid URI without the path.
|
1676
|
-
"""
|
1677
|
-
mount: NotRequired[pulumi.Input[str]]
|
1678
|
-
"""
|
1679
|
-
The path where the authentication engine is mounted.
|
1680
|
-
"""
|
1681
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1682
|
-
"""
|
1683
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1684
|
-
"""
|
1685
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1686
|
-
"""
|
1687
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1688
|
-
"""
|
1689
|
-
elif False:
|
1690
|
-
ProviderAuthLoginOidcArgsDict: TypeAlias = Mapping[str, Any]
|
1691
|
-
|
1692
1292
|
@pulumi.input_type
|
1693
1293
|
class ProviderAuthLoginOidcArgs:
|
1694
1294
|
def __init__(__self__, *,
|
@@ -1791,31 +1391,6 @@ class ProviderAuthLoginOidcArgs:
|
|
1791
1391
|
pulumi.set(self, "use_root_namespace", value)
|
1792
1392
|
|
1793
1393
|
|
1794
|
-
if not MYPY:
|
1795
|
-
class ProviderAuthLoginRadiusArgsDict(TypedDict):
|
1796
|
-
password: pulumi.Input[str]
|
1797
|
-
"""
|
1798
|
-
The Radius password for username.
|
1799
|
-
"""
|
1800
|
-
username: pulumi.Input[str]
|
1801
|
-
"""
|
1802
|
-
The Radius username.
|
1803
|
-
"""
|
1804
|
-
mount: NotRequired[pulumi.Input[str]]
|
1805
|
-
"""
|
1806
|
-
The path where the authentication engine is mounted.
|
1807
|
-
"""
|
1808
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1809
|
-
"""
|
1810
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1811
|
-
"""
|
1812
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1813
|
-
"""
|
1814
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1815
|
-
"""
|
1816
|
-
elif False:
|
1817
|
-
ProviderAuthLoginRadiusArgsDict: TypeAlias = Mapping[str, Any]
|
1818
|
-
|
1819
1394
|
@pulumi.input_type
|
1820
1395
|
class ProviderAuthLoginRadiusArgs:
|
1821
1396
|
def __init__(__self__, *,
|
@@ -1901,23 +1476,6 @@ class ProviderAuthLoginRadiusArgs:
|
|
1901
1476
|
pulumi.set(self, "use_root_namespace", value)
|
1902
1477
|
|
1903
1478
|
|
1904
|
-
if not MYPY:
|
1905
|
-
class ProviderAuthLoginTokenFileArgsDict(TypedDict):
|
1906
|
-
filename: pulumi.Input[str]
|
1907
|
-
"""
|
1908
|
-
The name of a file containing a single line that is a valid Vault token
|
1909
|
-
"""
|
1910
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1911
|
-
"""
|
1912
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1913
|
-
"""
|
1914
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1915
|
-
"""
|
1916
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
1917
|
-
"""
|
1918
|
-
elif False:
|
1919
|
-
ProviderAuthLoginTokenFileArgsDict: TypeAlias = Mapping[str, Any]
|
1920
|
-
|
1921
1479
|
@pulumi.input_type
|
1922
1480
|
class ProviderAuthLoginTokenFileArgs:
|
1923
1481
|
def __init__(__self__, *,
|
@@ -1972,35 +1530,6 @@ class ProviderAuthLoginTokenFileArgs:
|
|
1972
1530
|
pulumi.set(self, "use_root_namespace", value)
|
1973
1531
|
|
1974
1532
|
|
1975
|
-
if not MYPY:
|
1976
|
-
class ProviderAuthLoginUserpassArgsDict(TypedDict):
|
1977
|
-
username: pulumi.Input[str]
|
1978
|
-
"""
|
1979
|
-
Login with username
|
1980
|
-
"""
|
1981
|
-
mount: NotRequired[pulumi.Input[str]]
|
1982
|
-
"""
|
1983
|
-
The path where the authentication engine is mounted.
|
1984
|
-
"""
|
1985
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1986
|
-
"""
|
1987
|
-
The authentication engine's namespace. Conflicts with use_root_namespace
|
1988
|
-
"""
|
1989
|
-
password: NotRequired[pulumi.Input[str]]
|
1990
|
-
"""
|
1991
|
-
Login with password
|
1992
|
-
"""
|
1993
|
-
password_file: NotRequired[pulumi.Input[str]]
|
1994
|
-
"""
|
1995
|
-
Login with password from a file
|
1996
|
-
"""
|
1997
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1998
|
-
"""
|
1999
|
-
Authenticate to the root Vault namespace. Conflicts with namespace
|
2000
|
-
"""
|
2001
|
-
elif False:
|
2002
|
-
ProviderAuthLoginUserpassArgsDict: TypeAlias = Mapping[str, Any]
|
2003
|
-
|
2004
1533
|
@pulumi.input_type
|
2005
1534
|
class ProviderAuthLoginUserpassArgs:
|
2006
1535
|
def __init__(__self__, *,
|
@@ -2103,19 +1632,6 @@ class ProviderAuthLoginUserpassArgs:
|
|
2103
1632
|
pulumi.set(self, "use_root_namespace", value)
|
2104
1633
|
|
2105
1634
|
|
2106
|
-
if not MYPY:
|
2107
|
-
class ProviderClientAuthArgsDict(TypedDict):
|
2108
|
-
cert_file: pulumi.Input[str]
|
2109
|
-
"""
|
2110
|
-
Path to a file containing the client certificate.
|
2111
|
-
"""
|
2112
|
-
key_file: pulumi.Input[str]
|
2113
|
-
"""
|
2114
|
-
Path to a file containing the private key that the certificate was issued for.
|
2115
|
-
"""
|
2116
|
-
elif False:
|
2117
|
-
ProviderClientAuthArgsDict: TypeAlias = Mapping[str, Any]
|
2118
|
-
|
2119
1635
|
@pulumi.input_type
|
2120
1636
|
class ProviderClientAuthArgs:
|
2121
1637
|
def __init__(__self__, *,
|
@@ -2153,19 +1669,6 @@ class ProviderClientAuthArgs:
|
|
2153
1669
|
pulumi.set(self, "key_file", value)
|
2154
1670
|
|
2155
1671
|
|
2156
|
-
if not MYPY:
|
2157
|
-
class ProviderHeaderArgsDict(TypedDict):
|
2158
|
-
name: pulumi.Input[str]
|
2159
|
-
"""
|
2160
|
-
The header name
|
2161
|
-
"""
|
2162
|
-
value: pulumi.Input[str]
|
2163
|
-
"""
|
2164
|
-
The header value
|
2165
|
-
"""
|
2166
|
-
elif False:
|
2167
|
-
ProviderHeaderArgsDict: TypeAlias = Mapping[str, Any]
|
2168
|
-
|
2169
1672
|
@pulumi.input_type
|
2170
1673
|
class ProviderHeaderArgs:
|
2171
1674
|
def __init__(__self__, *,
|
@@ -2203,43 +1706,6 @@ class ProviderHeaderArgs:
|
|
2203
1706
|
pulumi.set(self, "value", value)
|
2204
1707
|
|
2205
1708
|
|
2206
|
-
if not MYPY:
|
2207
|
-
class GetPolicyDocumentRuleArgsDict(TypedDict):
|
2208
|
-
capabilities: Sequence[str]
|
2209
|
-
"""
|
2210
|
-
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2211
|
-
"""
|
2212
|
-
path: str
|
2213
|
-
"""
|
2214
|
-
A path in Vault that this rule applies to.
|
2215
|
-
"""
|
2216
|
-
allowed_parameters: NotRequired[Sequence['GetPolicyDocumentRuleAllowedParameterArgsDict']]
|
2217
|
-
"""
|
2218
|
-
Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
2219
|
-
"""
|
2220
|
-
denied_parameters: NotRequired[Sequence['GetPolicyDocumentRuleDeniedParameterArgsDict']]
|
2221
|
-
"""
|
2222
|
-
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2223
|
-
"""
|
2224
|
-
description: NotRequired[str]
|
2225
|
-
"""
|
2226
|
-
Description of the rule. Will be added as a comment to rendered rule.
|
2227
|
-
"""
|
2228
|
-
max_wrapping_ttl: NotRequired[str]
|
2229
|
-
"""
|
2230
|
-
The maximum allowed TTL that clients can specify for a wrapped response.
|
2231
|
-
"""
|
2232
|
-
min_wrapping_ttl: NotRequired[str]
|
2233
|
-
"""
|
2234
|
-
The minimum allowed TTL that clients can specify for a wrapped response.
|
2235
|
-
"""
|
2236
|
-
required_parameters: NotRequired[Sequence[str]]
|
2237
|
-
"""
|
2238
|
-
A list of parameters that must be specified.
|
2239
|
-
"""
|
2240
|
-
elif False:
|
2241
|
-
GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
|
2242
|
-
|
2243
1709
|
@pulumi.input_type
|
2244
1710
|
class GetPolicyDocumentRuleArgs:
|
2245
1711
|
def __init__(__self__, *,
|
@@ -2373,19 +1839,6 @@ class GetPolicyDocumentRuleArgs:
|
|
2373
1839
|
pulumi.set(self, "required_parameters", value)
|
2374
1840
|
|
2375
1841
|
|
2376
|
-
if not MYPY:
|
2377
|
-
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
2378
|
-
key: str
|
2379
|
-
"""
|
2380
|
-
name of permitted or denied parameter.
|
2381
|
-
"""
|
2382
|
-
values: Sequence[str]
|
2383
|
-
"""
|
2384
|
-
list of values what are permitted or denied by policy rule.
|
2385
|
-
"""
|
2386
|
-
elif False:
|
2387
|
-
GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
2388
|
-
|
2389
1842
|
@pulumi.input_type
|
2390
1843
|
class GetPolicyDocumentRuleAllowedParameterArgs:
|
2391
1844
|
def __init__(__self__, *,
|
@@ -2423,19 +1876,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
2423
1876
|
pulumi.set(self, "values", value)
|
2424
1877
|
|
2425
1878
|
|
2426
|
-
if not MYPY:
|
2427
|
-
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
2428
|
-
key: str
|
2429
|
-
"""
|
2430
|
-
name of permitted or denied parameter.
|
2431
|
-
"""
|
2432
|
-
values: Sequence[str]
|
2433
|
-
"""
|
2434
|
-
list of values what are permitted or denied by policy rule.
|
2435
|
-
"""
|
2436
|
-
elif False:
|
2437
|
-
GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
2438
|
-
|
2439
1879
|
@pulumi.input_type
|
2440
1880
|
class GetPolicyDocumentRuleDeniedParameterArgs:
|
2441
1881
|
def __init__(__self__, *,
|