pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
pulumi_vault/okta/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -39,18 +40,18 @@ class AuthBackendGroup(dict):
|
|
39
40
|
return super().get(key, default)
|
40
41
|
|
41
42
|
def __init__(__self__, *,
|
42
|
-
group_name: str,
|
43
|
-
policies: Sequence[str]):
|
43
|
+
group_name: builtins.str,
|
44
|
+
policies: Sequence[builtins.str]):
|
44
45
|
"""
|
45
|
-
:param str group_name: Name of the Okta group
|
46
|
-
:param Sequence[str] policies: Policies to associate with this group
|
46
|
+
:param builtins.str group_name: Name of the Okta group
|
47
|
+
:param Sequence[builtins.str] policies: Policies to associate with this group
|
47
48
|
"""
|
48
49
|
pulumi.set(__self__, "group_name", group_name)
|
49
50
|
pulumi.set(__self__, "policies", policies)
|
50
51
|
|
51
52
|
@property
|
52
53
|
@pulumi.getter(name="groupName")
|
53
|
-
def group_name(self) -> str:
|
54
|
+
def group_name(self) -> builtins.str:
|
54
55
|
"""
|
55
56
|
Name of the Okta group
|
56
57
|
"""
|
@@ -58,7 +59,7 @@ class AuthBackendGroup(dict):
|
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def policies(self) -> Sequence[str]:
|
62
|
+
def policies(self) -> Sequence[builtins.str]:
|
62
63
|
"""
|
63
64
|
Policies to associate with this group
|
64
65
|
"""
|
@@ -68,13 +69,13 @@ class AuthBackendGroup(dict):
|
|
68
69
|
@pulumi.output_type
|
69
70
|
class AuthBackendUser(dict):
|
70
71
|
def __init__(__self__, *,
|
71
|
-
username: str,
|
72
|
-
groups: Optional[Sequence[str]] = None,
|
73
|
-
policies: Optional[Sequence[str]] = None):
|
72
|
+
username: builtins.str,
|
73
|
+
groups: Optional[Sequence[builtins.str]] = None,
|
74
|
+
policies: Optional[Sequence[builtins.str]] = None):
|
74
75
|
"""
|
75
|
-
:param str username: Name of the user within Okta
|
76
|
-
:param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
|
77
|
-
:param Sequence[str] policies: Policies to associate with this user
|
76
|
+
:param builtins.str username: Name of the user within Okta
|
77
|
+
:param Sequence[builtins.str] groups: Groups within the Okta auth backend to associate with this user
|
78
|
+
:param Sequence[builtins.str] policies: Policies to associate with this user
|
78
79
|
"""
|
79
80
|
pulumi.set(__self__, "username", username)
|
80
81
|
if groups is not None:
|
@@ -84,7 +85,7 @@ class AuthBackendUser(dict):
|
|
84
85
|
|
85
86
|
@property
|
86
87
|
@pulumi.getter
|
87
|
-
def username(self) -> str:
|
88
|
+
def username(self) -> builtins.str:
|
88
89
|
"""
|
89
90
|
Name of the user within Okta
|
90
91
|
"""
|
@@ -92,7 +93,7 @@ class AuthBackendUser(dict):
|
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter
|
95
|
-
def groups(self) -> Optional[Sequence[str]]:
|
96
|
+
def groups(self) -> Optional[Sequence[builtins.str]]:
|
96
97
|
"""
|
97
98
|
Groups within the Okta auth backend to associate with this user
|
98
99
|
"""
|
@@ -100,7 +101,7 @@ class AuthBackendUser(dict):
|
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter
|
103
|
-
def policies(self) -> Optional[Sequence[str]]:
|
104
|
+
def policies(self) -> Optional[Sequence[builtins.str]]:
|
104
105
|
"""
|
105
106
|
Policies to associate with this user
|
106
107
|
"""
|
pulumi_vault/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -56,32 +57,32 @@ class AuthBackendTune(dict):
|
|
56
57
|
return super().get(key, default)
|
57
58
|
|
58
59
|
def __init__(__self__, *,
|
59
|
-
allowed_response_headers: Optional[Sequence[str]] = None,
|
60
|
-
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
|
61
|
-
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
|
62
|
-
default_lease_ttl: Optional[str] = None,
|
63
|
-
listing_visibility: Optional[str] = None,
|
64
|
-
max_lease_ttl: Optional[str] = None,
|
65
|
-
passthrough_request_headers: Optional[Sequence[str]] = None,
|
66
|
-
token_type: Optional[str] = None):
|
67
|
-
"""
|
68
|
-
:param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
|
60
|
+
allowed_response_headers: Optional[Sequence[builtins.str]] = None,
|
61
|
+
audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
|
62
|
+
audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
|
63
|
+
default_lease_ttl: Optional[builtins.str] = None,
|
64
|
+
listing_visibility: Optional[builtins.str] = None,
|
65
|
+
max_lease_ttl: Optional[builtins.str] = None,
|
66
|
+
passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
|
67
|
+
token_type: Optional[builtins.str] = None):
|
68
|
+
"""
|
69
|
+
:param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
69
70
|
a plugin to include them in the response.
|
70
|
-
:param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
71
|
+
:param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
71
72
|
not be HMAC'd by audit devices in the request data object.
|
72
|
-
:param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
73
|
+
:param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
73
74
|
not be HMAC'd by audit devices in the response data object.
|
74
|
-
:param str default_lease_ttl: Specifies the default time-to-live.
|
75
|
+
:param builtins.str default_lease_ttl: Specifies the default time-to-live.
|
75
76
|
If set, this overrides the global default.
|
76
77
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
77
|
-
:param str listing_visibility: Specifies whether to show this mount in
|
78
|
+
:param builtins.str listing_visibility: Specifies whether to show this mount in
|
78
79
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
79
|
-
:param str max_lease_ttl: Specifies the maximum time-to-live.
|
80
|
+
:param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
80
81
|
If set, this overrides the global default.
|
81
82
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
82
|
-
:param Sequence[str] passthrough_request_headers: List of headers to whitelist and
|
83
|
+
:param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
|
83
84
|
pass from the request to the backend.
|
84
|
-
:param str token_type: Specifies the type of tokens that should be returned by
|
85
|
+
:param builtins.str token_type: Specifies the type of tokens that should be returned by
|
85
86
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
86
87
|
"""
|
87
88
|
if allowed_response_headers is not None:
|
@@ -103,7 +104,7 @@ class AuthBackendTune(dict):
|
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="allowedResponseHeaders")
|
106
|
-
def allowed_response_headers(self) -> Optional[Sequence[str]]:
|
107
|
+
def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
|
107
108
|
"""
|
108
109
|
List of headers to whitelist and allowing
|
109
110
|
a plugin to include them in the response.
|
@@ -112,7 +113,7 @@ class AuthBackendTune(dict):
|
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
115
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
|
116
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
|
116
117
|
"""
|
117
118
|
Specifies the list of keys that will
|
118
119
|
not be HMAC'd by audit devices in the request data object.
|
@@ -121,7 +122,7 @@ class AuthBackendTune(dict):
|
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
124
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
|
125
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
|
125
126
|
"""
|
126
127
|
Specifies the list of keys that will
|
127
128
|
not be HMAC'd by audit devices in the response data object.
|
@@ -130,7 +131,7 @@ class AuthBackendTune(dict):
|
|
130
131
|
|
131
132
|
@property
|
132
133
|
@pulumi.getter(name="defaultLeaseTtl")
|
133
|
-
def default_lease_ttl(self) -> Optional[str]:
|
134
|
+
def default_lease_ttl(self) -> Optional[builtins.str]:
|
134
135
|
"""
|
135
136
|
Specifies the default time-to-live.
|
136
137
|
If set, this overrides the global default.
|
@@ -140,7 +141,7 @@ class AuthBackendTune(dict):
|
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter(name="listingVisibility")
|
143
|
-
def listing_visibility(self) -> Optional[str]:
|
144
|
+
def listing_visibility(self) -> Optional[builtins.str]:
|
144
145
|
"""
|
145
146
|
Specifies whether to show this mount in
|
146
147
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -149,7 +150,7 @@ class AuthBackendTune(dict):
|
|
149
150
|
|
150
151
|
@property
|
151
152
|
@pulumi.getter(name="maxLeaseTtl")
|
152
|
-
def max_lease_ttl(self) -> Optional[str]:
|
153
|
+
def max_lease_ttl(self) -> Optional[builtins.str]:
|
153
154
|
"""
|
154
155
|
Specifies the maximum time-to-live.
|
155
156
|
If set, this overrides the global default.
|
@@ -159,7 +160,7 @@ class AuthBackendTune(dict):
|
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter(name="passthroughRequestHeaders")
|
162
|
-
def passthrough_request_headers(self) -> Optional[Sequence[str]]:
|
163
|
+
def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
|
163
164
|
"""
|
164
165
|
List of headers to whitelist and
|
165
166
|
pass from the request to the backend.
|
@@ -168,7 +169,7 @@ class AuthBackendTune(dict):
|
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter(name="tokenType")
|
171
|
-
def token_type(self) -> Optional[str]:
|
172
|
+
def token_type(self) -> Optional[builtins.str]:
|
172
173
|
"""
|
173
174
|
Specifies the type of tokens that should be returned by
|
174
175
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -179,23 +180,25 @@ class AuthBackendTune(dict):
|
|
179
180
|
@pulumi.output_type
|
180
181
|
class GetPolicyDocumentRuleResult(dict):
|
181
182
|
def __init__(__self__, *,
|
182
|
-
capabilities: Sequence[str],
|
183
|
-
path: str,
|
183
|
+
capabilities: Sequence[builtins.str],
|
184
|
+
path: builtins.str,
|
184
185
|
allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
|
185
186
|
denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
|
186
|
-
description: Optional[str] = None,
|
187
|
-
max_wrapping_ttl: Optional[str] = None,
|
188
|
-
min_wrapping_ttl: Optional[str] = None,
|
189
|
-
required_parameters: Optional[Sequence[str]] = None
|
190
|
-
|
191
|
-
|
192
|
-
:param str
|
187
|
+
description: Optional[builtins.str] = None,
|
188
|
+
max_wrapping_ttl: Optional[builtins.str] = None,
|
189
|
+
min_wrapping_ttl: Optional[builtins.str] = None,
|
190
|
+
required_parameters: Optional[Sequence[builtins.str]] = None,
|
191
|
+
subscribe_event_types: Optional[Sequence[builtins.str]] = None):
|
192
|
+
"""
|
193
|
+
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
194
|
+
:param builtins.str path: A path in Vault that this rule applies to.
|
193
195
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
194
196
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
195
|
-
:param str description: Description of the rule. Will be added as a comment to rendered rule.
|
196
|
-
:param str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
197
|
-
:param str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
198
|
-
:param Sequence[str] required_parameters: A list of parameters that must be specified.
|
197
|
+
:param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
198
|
+
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
199
|
+
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
200
|
+
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
201
|
+
:param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
199
202
|
"""
|
200
203
|
pulumi.set(__self__, "capabilities", capabilities)
|
201
204
|
pulumi.set(__self__, "path", path)
|
@@ -211,10 +214,12 @@ class GetPolicyDocumentRuleResult(dict):
|
|
211
214
|
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
212
215
|
if required_parameters is not None:
|
213
216
|
pulumi.set(__self__, "required_parameters", required_parameters)
|
217
|
+
if subscribe_event_types is not None:
|
218
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
214
219
|
|
215
220
|
@property
|
216
221
|
@pulumi.getter
|
217
|
-
def capabilities(self) -> Sequence[str]:
|
222
|
+
def capabilities(self) -> Sequence[builtins.str]:
|
218
223
|
"""
|
219
224
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
220
225
|
"""
|
@@ -222,7 +227,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
222
227
|
|
223
228
|
@property
|
224
229
|
@pulumi.getter
|
225
|
-
def path(self) -> str:
|
230
|
+
def path(self) -> builtins.str:
|
226
231
|
"""
|
227
232
|
A path in Vault that this rule applies to.
|
228
233
|
"""
|
@@ -246,7 +251,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
246
251
|
|
247
252
|
@property
|
248
253
|
@pulumi.getter
|
249
|
-
def description(self) -> Optional[str]:
|
254
|
+
def description(self) -> Optional[builtins.str]:
|
250
255
|
"""
|
251
256
|
Description of the rule. Will be added as a comment to rendered rule.
|
252
257
|
"""
|
@@ -254,7 +259,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
254
259
|
|
255
260
|
@property
|
256
261
|
@pulumi.getter(name="maxWrappingTtl")
|
257
|
-
def max_wrapping_ttl(self) -> Optional[str]:
|
262
|
+
def max_wrapping_ttl(self) -> Optional[builtins.str]:
|
258
263
|
"""
|
259
264
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
260
265
|
"""
|
@@ -262,7 +267,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
262
267
|
|
263
268
|
@property
|
264
269
|
@pulumi.getter(name="minWrappingTtl")
|
265
|
-
def min_wrapping_ttl(self) -> Optional[str]:
|
270
|
+
def min_wrapping_ttl(self) -> Optional[builtins.str]:
|
266
271
|
"""
|
267
272
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
268
273
|
"""
|
@@ -270,38 +275,46 @@ class GetPolicyDocumentRuleResult(dict):
|
|
270
275
|
|
271
276
|
@property
|
272
277
|
@pulumi.getter(name="requiredParameters")
|
273
|
-
def required_parameters(self) -> Optional[Sequence[str]]:
|
278
|
+
def required_parameters(self) -> Optional[Sequence[builtins.str]]:
|
274
279
|
"""
|
275
280
|
A list of parameters that must be specified.
|
276
281
|
"""
|
277
282
|
return pulumi.get(self, "required_parameters")
|
278
283
|
|
284
|
+
@property
|
285
|
+
@pulumi.getter(name="subscribeEventTypes")
|
286
|
+
def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
|
287
|
+
"""
|
288
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
289
|
+
"""
|
290
|
+
return pulumi.get(self, "subscribe_event_types")
|
291
|
+
|
279
292
|
|
280
293
|
@pulumi.output_type
|
281
294
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
282
295
|
def __init__(__self__, *,
|
283
|
-
key: str,
|
284
|
-
values: Sequence[str]):
|
296
|
+
key: builtins.str,
|
297
|
+
values: Sequence[builtins.str]):
|
285
298
|
"""
|
286
|
-
:param str key:
|
287
|
-
:param Sequence[str] values: list of values what are permitted
|
299
|
+
:param builtins.str key: Name of permitted key.
|
300
|
+
:param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
|
288
301
|
"""
|
289
302
|
pulumi.set(__self__, "key", key)
|
290
303
|
pulumi.set(__self__, "values", values)
|
291
304
|
|
292
305
|
@property
|
293
306
|
@pulumi.getter
|
294
|
-
def key(self) -> str:
|
307
|
+
def key(self) -> builtins.str:
|
295
308
|
"""
|
296
|
-
|
309
|
+
Name of permitted key.
|
297
310
|
"""
|
298
311
|
return pulumi.get(self, "key")
|
299
312
|
|
300
313
|
@property
|
301
314
|
@pulumi.getter
|
302
|
-
def values(self) -> Sequence[str]:
|
315
|
+
def values(self) -> Sequence[builtins.str]:
|
303
316
|
"""
|
304
|
-
list of values what are permitted
|
317
|
+
A list of values what are permitted by policy rule.
|
305
318
|
"""
|
306
319
|
return pulumi.get(self, "values")
|
307
320
|
|
@@ -309,28 +322,28 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
309
322
|
@pulumi.output_type
|
310
323
|
class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
311
324
|
def __init__(__self__, *,
|
312
|
-
key: str,
|
313
|
-
values: Sequence[str]):
|
325
|
+
key: builtins.str,
|
326
|
+
values: Sequence[builtins.str]):
|
314
327
|
"""
|
315
|
-
:param str key:
|
316
|
-
:param Sequence[str] values: list of values what are
|
328
|
+
:param builtins.str key: Name of denied key.
|
329
|
+
:param Sequence[builtins.str] values: A list of values what are denied by policy rule.
|
317
330
|
"""
|
318
331
|
pulumi.set(__self__, "key", key)
|
319
332
|
pulumi.set(__self__, "values", values)
|
320
333
|
|
321
334
|
@property
|
322
335
|
@pulumi.getter
|
323
|
-
def key(self) -> str:
|
336
|
+
def key(self) -> builtins.str:
|
324
337
|
"""
|
325
|
-
|
338
|
+
Name of denied key.
|
326
339
|
"""
|
327
340
|
return pulumi.get(self, "key")
|
328
341
|
|
329
342
|
@property
|
330
343
|
@pulumi.getter
|
331
|
-
def values(self) -> Sequence[str]:
|
344
|
+
def values(self) -> Sequence[builtins.str]:
|
332
345
|
"""
|
333
|
-
list of values what are
|
346
|
+
A list of values what are denied by policy rule.
|
334
347
|
"""
|
335
348
|
return pulumi.get(self, "values")
|
336
349
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,14 +20,14 @@ __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class PasswordPolicyArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
policy: pulumi.Input[str],
|
23
|
-
name: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
policy: pulumi.Input[builtins.str],
|
24
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
25
26
|
"""
|
26
27
|
The set of arguments for constructing a PasswordPolicy resource.
|
27
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
28
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
29
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
29
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
30
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
30
31
|
The value should not contain leading or trailing forward slashes.
|
31
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
33
|
*Available only for Vault Enterprise*.
|
@@ -39,31 +40,31 @@ class PasswordPolicyArgs:
|
|
39
40
|
|
40
41
|
@property
|
41
42
|
@pulumi.getter
|
42
|
-
def policy(self) -> pulumi.Input[str]:
|
43
|
+
def policy(self) -> pulumi.Input[builtins.str]:
|
43
44
|
"""
|
44
45
|
String containing a password policy.
|
45
46
|
"""
|
46
47
|
return pulumi.get(self, "policy")
|
47
48
|
|
48
49
|
@policy.setter
|
49
|
-
def policy(self, value: pulumi.Input[str]):
|
50
|
+
def policy(self, value: pulumi.Input[builtins.str]):
|
50
51
|
pulumi.set(self, "policy", value)
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
55
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
55
56
|
"""
|
56
57
|
The name of the password policy.
|
57
58
|
"""
|
58
59
|
return pulumi.get(self, "name")
|
59
60
|
|
60
61
|
@name.setter
|
61
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
62
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
62
63
|
pulumi.set(self, "name", value)
|
63
64
|
|
64
65
|
@property
|
65
66
|
@pulumi.getter
|
66
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
67
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
67
68
|
"""
|
68
69
|
The namespace to provision the resource in.
|
69
70
|
The value should not contain leading or trailing forward slashes.
|
@@ -73,24 +74,24 @@ class PasswordPolicyArgs:
|
|
73
74
|
return pulumi.get(self, "namespace")
|
74
75
|
|
75
76
|
@namespace.setter
|
76
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
77
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
77
78
|
pulumi.set(self, "namespace", value)
|
78
79
|
|
79
80
|
|
80
81
|
@pulumi.input_type
|
81
82
|
class _PasswordPolicyState:
|
82
83
|
def __init__(__self__, *,
|
83
|
-
name: Optional[pulumi.Input[str]] = None,
|
84
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
85
|
-
policy: Optional[pulumi.Input[str]] = None):
|
84
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
85
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
86
|
+
policy: Optional[pulumi.Input[builtins.str]] = None):
|
86
87
|
"""
|
87
88
|
Input properties used for looking up and filtering PasswordPolicy resources.
|
88
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
89
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
89
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
90
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
90
91
|
The value should not contain leading or trailing forward slashes.
|
91
92
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
92
93
|
*Available only for Vault Enterprise*.
|
93
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
94
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
94
95
|
"""
|
95
96
|
if name is not None:
|
96
97
|
pulumi.set(__self__, "name", name)
|
@@ -101,19 +102,19 @@ class _PasswordPolicyState:
|
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter
|
104
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
105
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
105
106
|
"""
|
106
107
|
The name of the password policy.
|
107
108
|
"""
|
108
109
|
return pulumi.get(self, "name")
|
109
110
|
|
110
111
|
@name.setter
|
111
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
112
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
112
113
|
pulumi.set(self, "name", value)
|
113
114
|
|
114
115
|
@property
|
115
116
|
@pulumi.getter
|
116
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
117
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
117
118
|
"""
|
118
119
|
The namespace to provision the resource in.
|
119
120
|
The value should not contain leading or trailing forward slashes.
|
@@ -123,19 +124,19 @@ class _PasswordPolicyState:
|
|
123
124
|
return pulumi.get(self, "namespace")
|
124
125
|
|
125
126
|
@namespace.setter
|
126
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
127
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
127
128
|
pulumi.set(self, "namespace", value)
|
128
129
|
|
129
130
|
@property
|
130
131
|
@pulumi.getter
|
131
|
-
def policy(self) -> Optional[pulumi.Input[str]]:
|
132
|
+
def policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
132
133
|
"""
|
133
134
|
String containing a password policy.
|
134
135
|
"""
|
135
136
|
return pulumi.get(self, "policy")
|
136
137
|
|
137
138
|
@policy.setter
|
138
|
-
def policy(self, value: Optional[pulumi.Input[str]]):
|
139
|
+
def policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
139
140
|
pulumi.set(self, "policy", value)
|
140
141
|
|
141
142
|
|
@@ -144,9 +145,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
144
145
|
def __init__(__self__,
|
145
146
|
resource_name: str,
|
146
147
|
opts: Optional[pulumi.ResourceOptions] = None,
|
147
|
-
name: Optional[pulumi.Input[str]] = None,
|
148
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
149
|
-
policy: Optional[pulumi.Input[str]] = None,
|
148
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
149
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
150
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
150
151
|
__props__=None):
|
151
152
|
"""
|
152
153
|
Provides a resource to manage Password Policies
|
@@ -178,12 +179,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
178
179
|
|
179
180
|
:param str resource_name: The name of the resource.
|
180
181
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
181
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
182
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
182
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
183
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
183
184
|
The value should not contain leading or trailing forward slashes.
|
184
185
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
185
186
|
*Available only for Vault Enterprise*.
|
186
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
187
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
187
188
|
"""
|
188
189
|
...
|
189
190
|
@overload
|
@@ -234,9 +235,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
234
235
|
def _internal_init(__self__,
|
235
236
|
resource_name: str,
|
236
237
|
opts: Optional[pulumi.ResourceOptions] = None,
|
237
|
-
name: Optional[pulumi.Input[str]] = None,
|
238
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
239
|
-
policy: Optional[pulumi.Input[str]] = None,
|
238
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
239
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
240
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
240
241
|
__props__=None):
|
241
242
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
242
243
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -261,9 +262,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
261
262
|
def get(resource_name: str,
|
262
263
|
id: pulumi.Input[str],
|
263
264
|
opts: Optional[pulumi.ResourceOptions] = None,
|
264
|
-
name: Optional[pulumi.Input[str]] = None,
|
265
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
266
|
-
policy: Optional[pulumi.Input[str]] = None) -> 'PasswordPolicy':
|
265
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
267
|
+
policy: Optional[pulumi.Input[builtins.str]] = None) -> 'PasswordPolicy':
|
267
268
|
"""
|
268
269
|
Get an existing PasswordPolicy resource's state with the given name, id, and optional extra
|
269
270
|
properties used to qualify the lookup.
|
@@ -271,12 +272,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
271
272
|
:param str resource_name: The unique name of the resulting resource.
|
272
273
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
273
274
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
274
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
275
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
275
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
276
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
276
277
|
The value should not contain leading or trailing forward slashes.
|
277
278
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
278
279
|
*Available only for Vault Enterprise*.
|
279
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
280
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
280
281
|
"""
|
281
282
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
282
283
|
|
@@ -289,7 +290,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
289
290
|
|
290
291
|
@property
|
291
292
|
@pulumi.getter
|
292
|
-
def name(self) -> pulumi.Output[str]:
|
293
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
293
294
|
"""
|
294
295
|
The name of the password policy.
|
295
296
|
"""
|
@@ -297,7 +298,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter
|
300
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
301
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
301
302
|
"""
|
302
303
|
The namespace to provision the resource in.
|
303
304
|
The value should not contain leading or trailing forward slashes.
|
@@ -308,7 +309,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
308
309
|
|
309
310
|
@property
|
310
311
|
@pulumi.getter
|
311
|
-
def policy(self) -> pulumi.Output[str]:
|
312
|
+
def policy(self) -> pulumi.Output[builtins.str]:
|
312
313
|
"""
|
313
314
|
String containing a password policy.
|
314
315
|
"""
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|