pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
pulumi_vault/github/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -52,32 +53,32 @@ class AuthBackendTune(dict):
|
|
52
53
|
return super().get(key, default)
|
53
54
|
|
54
55
|
def __init__(__self__, *,
|
55
|
-
allowed_response_headers: Optional[Sequence[str]] = None,
|
56
|
-
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
|
57
|
-
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
|
58
|
-
default_lease_ttl: Optional[str] = None,
|
59
|
-
listing_visibility: Optional[str] = None,
|
60
|
-
max_lease_ttl: Optional[str] = None,
|
61
|
-
passthrough_request_headers: Optional[Sequence[str]] = None,
|
62
|
-
token_type: Optional[str] = None):
|
63
|
-
"""
|
64
|
-
:param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
|
56
|
+
allowed_response_headers: Optional[Sequence[builtins.str]] = None,
|
57
|
+
audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
|
58
|
+
audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
|
59
|
+
default_lease_ttl: Optional[builtins.str] = None,
|
60
|
+
listing_visibility: Optional[builtins.str] = None,
|
61
|
+
max_lease_ttl: Optional[builtins.str] = None,
|
62
|
+
passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
|
63
|
+
token_type: Optional[builtins.str] = None):
|
64
|
+
"""
|
65
|
+
:param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
65
66
|
a plugin to include them in the response.
|
66
|
-
:param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
67
|
+
:param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
67
68
|
not be HMAC'd by audit devices in the request data object.
|
68
|
-
:param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
69
|
+
:param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
69
70
|
not be HMAC'd by audit devices in the response data object.
|
70
|
-
:param str default_lease_ttl: Specifies the default time-to-live.
|
71
|
+
:param builtins.str default_lease_ttl: Specifies the default time-to-live.
|
71
72
|
If set, this overrides the global default.
|
72
73
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
73
|
-
:param str listing_visibility: Specifies whether to show this mount in
|
74
|
+
:param builtins.str listing_visibility: Specifies whether to show this mount in
|
74
75
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
75
|
-
:param str max_lease_ttl: Specifies the maximum time-to-live.
|
76
|
+
:param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
76
77
|
If set, this overrides the global default.
|
77
78
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
78
|
-
:param Sequence[str] passthrough_request_headers: List of headers to whitelist and
|
79
|
+
:param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
|
79
80
|
pass from the request to the backend.
|
80
|
-
:param str token_type: Specifies the type of tokens that should be returned by
|
81
|
+
:param builtins.str token_type: Specifies the type of tokens that should be returned by
|
81
82
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
82
83
|
"""
|
83
84
|
if allowed_response_headers is not None:
|
@@ -99,7 +100,7 @@ class AuthBackendTune(dict):
|
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="allowedResponseHeaders")
|
102
|
-
def allowed_response_headers(self) -> Optional[Sequence[str]]:
|
103
|
+
def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
|
103
104
|
"""
|
104
105
|
List of headers to whitelist and allowing
|
105
106
|
a plugin to include them in the response.
|
@@ -108,7 +109,7 @@ class AuthBackendTune(dict):
|
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
111
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
|
112
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
|
112
113
|
"""
|
113
114
|
Specifies the list of keys that will
|
114
115
|
not be HMAC'd by audit devices in the request data object.
|
@@ -117,7 +118,7 @@ class AuthBackendTune(dict):
|
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
120
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
|
121
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
|
121
122
|
"""
|
122
123
|
Specifies the list of keys that will
|
123
124
|
not be HMAC'd by audit devices in the response data object.
|
@@ -126,7 +127,7 @@ class AuthBackendTune(dict):
|
|
126
127
|
|
127
128
|
@property
|
128
129
|
@pulumi.getter(name="defaultLeaseTtl")
|
129
|
-
def default_lease_ttl(self) -> Optional[str]:
|
130
|
+
def default_lease_ttl(self) -> Optional[builtins.str]:
|
130
131
|
"""
|
131
132
|
Specifies the default time-to-live.
|
132
133
|
If set, this overrides the global default.
|
@@ -136,7 +137,7 @@ class AuthBackendTune(dict):
|
|
136
137
|
|
137
138
|
@property
|
138
139
|
@pulumi.getter(name="listingVisibility")
|
139
|
-
def listing_visibility(self) -> Optional[str]:
|
140
|
+
def listing_visibility(self) -> Optional[builtins.str]:
|
140
141
|
"""
|
141
142
|
Specifies whether to show this mount in
|
142
143
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -145,7 +146,7 @@ class AuthBackendTune(dict):
|
|
145
146
|
|
146
147
|
@property
|
147
148
|
@pulumi.getter(name="maxLeaseTtl")
|
148
|
-
def max_lease_ttl(self) -> Optional[str]:
|
149
|
+
def max_lease_ttl(self) -> Optional[builtins.str]:
|
149
150
|
"""
|
150
151
|
Specifies the maximum time-to-live.
|
151
152
|
If set, this overrides the global default.
|
@@ -155,7 +156,7 @@ class AuthBackendTune(dict):
|
|
155
156
|
|
156
157
|
@property
|
157
158
|
@pulumi.getter(name="passthroughRequestHeaders")
|
158
|
-
def passthrough_request_headers(self) -> Optional[Sequence[str]]:
|
159
|
+
def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
|
159
160
|
"""
|
160
161
|
List of headers to whitelist and
|
161
162
|
pass from the request to the backend.
|
@@ -164,7 +165,7 @@ class AuthBackendTune(dict):
|
|
164
165
|
|
165
166
|
@property
|
166
167
|
@pulumi.getter(name="tokenType")
|
167
|
-
def token_type(self) -> Optional[str]:
|
168
|
+
def token_type(self) -> Optional[builtins.str]:
|
168
169
|
"""
|
169
170
|
Specifies the type of tokens that should be returned by
|
170
171
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
pulumi_vault/github/team.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,20 +20,20 @@ __all__ = ['TeamArgs', 'Team']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class TeamArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
team: pulumi.Input[str],
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
team: pulumi.Input[builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a Team resource.
|
28
|
-
:param pulumi.Input[str] team: GitHub team name in "slugified" format.
|
29
|
-
:param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
29
|
+
:param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
|
30
|
+
:param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
30
31
|
if not specified.
|
31
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
32
33
|
The value should not contain leading or trailing forward slashes.
|
33
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
35
|
*Available only for Vault Enterprise*.
|
35
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
36
37
|
issued using this role.
|
37
38
|
"""
|
38
39
|
pulumi.set(__self__, "team", team)
|
@@ -45,19 +46,19 @@ class TeamArgs:
|
|
45
46
|
|
46
47
|
@property
|
47
48
|
@pulumi.getter
|
48
|
-
def team(self) -> pulumi.Input[str]:
|
49
|
+
def team(self) -> pulumi.Input[builtins.str]:
|
49
50
|
"""
|
50
51
|
GitHub team name in "slugified" format.
|
51
52
|
"""
|
52
53
|
return pulumi.get(self, "team")
|
53
54
|
|
54
55
|
@team.setter
|
55
|
-
def team(self, value: pulumi.Input[str]):
|
56
|
+
def team(self, value: pulumi.Input[builtins.str]):
|
56
57
|
pulumi.set(self, "team", value)
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
61
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
61
62
|
"""
|
62
63
|
Path where the github auth backend is mounted. Defaults to `github`
|
63
64
|
if not specified.
|
@@ -65,12 +66,12 @@ class TeamArgs:
|
|
65
66
|
return pulumi.get(self, "backend")
|
66
67
|
|
67
68
|
@backend.setter
|
68
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
69
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
69
70
|
pulumi.set(self, "backend", value)
|
70
71
|
|
71
72
|
@property
|
72
73
|
@pulumi.getter
|
73
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
74
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
74
75
|
"""
|
75
76
|
The namespace to provision the resource in.
|
76
77
|
The value should not contain leading or trailing forward slashes.
|
@@ -80,12 +81,12 @@ class TeamArgs:
|
|
80
81
|
return pulumi.get(self, "namespace")
|
81
82
|
|
82
83
|
@namespace.setter
|
83
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
84
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
84
85
|
pulumi.set(self, "namespace", value)
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
89
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
89
90
|
"""
|
90
91
|
An array of strings specifying the policies to be set on tokens
|
91
92
|
issued using this role.
|
@@ -93,28 +94,28 @@ class TeamArgs:
|
|
93
94
|
return pulumi.get(self, "policies")
|
94
95
|
|
95
96
|
@policies.setter
|
96
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
97
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
97
98
|
pulumi.set(self, "policies", value)
|
98
99
|
|
99
100
|
|
100
101
|
@pulumi.input_type
|
101
102
|
class _TeamState:
|
102
103
|
def __init__(__self__, *,
|
103
|
-
backend: Optional[pulumi.Input[str]] = None,
|
104
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
105
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
106
|
-
team: Optional[pulumi.Input[str]] = None):
|
104
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
105
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
106
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
107
|
+
team: Optional[pulumi.Input[builtins.str]] = None):
|
107
108
|
"""
|
108
109
|
Input properties used for looking up and filtering Team resources.
|
109
|
-
:param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
110
|
+
:param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
110
111
|
if not specified.
|
111
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
112
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
112
113
|
The value should not contain leading or trailing forward slashes.
|
113
114
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
114
115
|
*Available only for Vault Enterprise*.
|
115
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
116
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
116
117
|
issued using this role.
|
117
|
-
:param pulumi.Input[str] team: GitHub team name in "slugified" format.
|
118
|
+
:param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
|
118
119
|
"""
|
119
120
|
if backend is not None:
|
120
121
|
pulumi.set(__self__, "backend", backend)
|
@@ -127,7 +128,7 @@ class _TeamState:
|
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter
|
130
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
131
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
131
132
|
"""
|
132
133
|
Path where the github auth backend is mounted. Defaults to `github`
|
133
134
|
if not specified.
|
@@ -135,12 +136,12 @@ class _TeamState:
|
|
135
136
|
return pulumi.get(self, "backend")
|
136
137
|
|
137
138
|
@backend.setter
|
138
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
139
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
139
140
|
pulumi.set(self, "backend", value)
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter
|
143
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
144
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
144
145
|
"""
|
145
146
|
The namespace to provision the resource in.
|
146
147
|
The value should not contain leading or trailing forward slashes.
|
@@ -150,12 +151,12 @@ class _TeamState:
|
|
150
151
|
return pulumi.get(self, "namespace")
|
151
152
|
|
152
153
|
@namespace.setter
|
153
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
154
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
154
155
|
pulumi.set(self, "namespace", value)
|
155
156
|
|
156
157
|
@property
|
157
158
|
@pulumi.getter
|
158
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
159
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
159
160
|
"""
|
160
161
|
An array of strings specifying the policies to be set on tokens
|
161
162
|
issued using this role.
|
@@ -163,19 +164,19 @@ class _TeamState:
|
|
163
164
|
return pulumi.get(self, "policies")
|
164
165
|
|
165
166
|
@policies.setter
|
166
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
167
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
167
168
|
pulumi.set(self, "policies", value)
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter
|
171
|
-
def team(self) -> Optional[pulumi.Input[str]]:
|
172
|
+
def team(self) -> Optional[pulumi.Input[builtins.str]]:
|
172
173
|
"""
|
173
174
|
GitHub team name in "slugified" format.
|
174
175
|
"""
|
175
176
|
return pulumi.get(self, "team")
|
176
177
|
|
177
178
|
@team.setter
|
178
|
-
def team(self, value: Optional[pulumi.Input[str]]):
|
179
|
+
def team(self, value: Optional[pulumi.Input[builtins.str]]):
|
179
180
|
pulumi.set(self, "team", value)
|
180
181
|
|
181
182
|
|
@@ -184,10 +185,10 @@ class Team(pulumi.CustomResource):
|
|
184
185
|
def __init__(__self__,
|
185
186
|
resource_name: str,
|
186
187
|
opts: Optional[pulumi.ResourceOptions] = None,
|
187
|
-
backend: Optional[pulumi.Input[str]] = None,
|
188
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
189
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
190
|
-
team: Optional[pulumi.Input[str]] = None,
|
188
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
189
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
190
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
191
|
+
team: Optional[pulumi.Input[builtins.str]] = None,
|
191
192
|
__props__=None):
|
192
193
|
"""
|
193
194
|
Manages policy mappings for Github Teams authenticated via Github. See the [Vault
|
@@ -220,15 +221,15 @@ class Team(pulumi.CustomResource):
|
|
220
221
|
|
221
222
|
:param str resource_name: The name of the resource.
|
222
223
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
223
|
-
:param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
224
|
+
:param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
224
225
|
if not specified.
|
225
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
226
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
226
227
|
The value should not contain leading or trailing forward slashes.
|
227
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
228
229
|
*Available only for Vault Enterprise*.
|
229
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
230
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
230
231
|
issued using this role.
|
231
|
-
:param pulumi.Input[str] team: GitHub team name in "slugified" format.
|
232
|
+
:param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
|
232
233
|
"""
|
233
234
|
...
|
234
235
|
@overload
|
@@ -280,10 +281,10 @@ class Team(pulumi.CustomResource):
|
|
280
281
|
def _internal_init(__self__,
|
281
282
|
resource_name: str,
|
282
283
|
opts: Optional[pulumi.ResourceOptions] = None,
|
283
|
-
backend: Optional[pulumi.Input[str]] = None,
|
284
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
285
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
286
|
-
team: Optional[pulumi.Input[str]] = None,
|
284
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
285
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
286
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
287
|
+
team: Optional[pulumi.Input[builtins.str]] = None,
|
287
288
|
__props__=None):
|
288
289
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
289
290
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -309,10 +310,10 @@ class Team(pulumi.CustomResource):
|
|
309
310
|
def get(resource_name: str,
|
310
311
|
id: pulumi.Input[str],
|
311
312
|
opts: Optional[pulumi.ResourceOptions] = None,
|
312
|
-
backend: Optional[pulumi.Input[str]] = None,
|
313
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
314
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
315
|
-
team: Optional[pulumi.Input[str]] = None) -> 'Team':
|
313
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
314
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
315
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
316
|
+
team: Optional[pulumi.Input[builtins.str]] = None) -> 'Team':
|
316
317
|
"""
|
317
318
|
Get an existing Team resource's state with the given name, id, and optional extra
|
318
319
|
properties used to qualify the lookup.
|
@@ -320,15 +321,15 @@ class Team(pulumi.CustomResource):
|
|
320
321
|
:param str resource_name: The unique name of the resulting resource.
|
321
322
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
322
323
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
323
|
-
:param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
324
|
+
:param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
324
325
|
if not specified.
|
325
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
326
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
326
327
|
The value should not contain leading or trailing forward slashes.
|
327
328
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
328
329
|
*Available only for Vault Enterprise*.
|
329
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
330
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
330
331
|
issued using this role.
|
331
|
-
:param pulumi.Input[str] team: GitHub team name in "slugified" format.
|
332
|
+
:param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
|
332
333
|
"""
|
333
334
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
334
335
|
|
@@ -342,7 +343,7 @@ class Team(pulumi.CustomResource):
|
|
342
343
|
|
343
344
|
@property
|
344
345
|
@pulumi.getter
|
345
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
346
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
346
347
|
"""
|
347
348
|
Path where the github auth backend is mounted. Defaults to `github`
|
348
349
|
if not specified.
|
@@ -351,7 +352,7 @@ class Team(pulumi.CustomResource):
|
|
351
352
|
|
352
353
|
@property
|
353
354
|
@pulumi.getter
|
354
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
355
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
355
356
|
"""
|
356
357
|
The namespace to provision the resource in.
|
357
358
|
The value should not contain leading or trailing forward slashes.
|
@@ -362,7 +363,7 @@ class Team(pulumi.CustomResource):
|
|
362
363
|
|
363
364
|
@property
|
364
365
|
@pulumi.getter
|
365
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
366
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
366
367
|
"""
|
367
368
|
An array of strings specifying the policies to be set on tokens
|
368
369
|
issued using this role.
|
@@ -371,7 +372,7 @@ class Team(pulumi.CustomResource):
|
|
371
372
|
|
372
373
|
@property
|
373
374
|
@pulumi.getter
|
374
|
-
def team(self) -> pulumi.Output[str]:
|
375
|
+
def team(self) -> pulumi.Output[builtins.str]:
|
375
376
|
"""
|
376
377
|
GitHub team name in "slugified" format.
|
377
378
|
"""
|