pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -93,12 +94,12 @@ class GetAuthBackendRoleResult:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def backend(self) -> Optional[str]:
|
97
|
+
def backend(self) -> Optional[builtins.str]:
|
97
98
|
return pulumi.get(self, "backend")
|
98
99
|
|
99
100
|
@property
|
100
101
|
@pulumi.getter(name="boundInstanceGroups")
|
101
|
-
def bound_instance_groups(self) -> Sequence[str]:
|
102
|
+
def bound_instance_groups(self) -> Sequence[builtins.str]:
|
102
103
|
"""
|
103
104
|
GCP regions bound to the role. Returned when `type` is `gce`.
|
104
105
|
"""
|
@@ -106,7 +107,7 @@ class GetAuthBackendRoleResult:
|
|
106
107
|
|
107
108
|
@property
|
108
109
|
@pulumi.getter(name="boundLabels")
|
109
|
-
def bound_labels(self) -> Sequence[str]:
|
110
|
+
def bound_labels(self) -> Sequence[builtins.str]:
|
110
111
|
"""
|
111
112
|
GCP labels bound to the role. Returned when `type` is `gce`.
|
112
113
|
"""
|
@@ -114,7 +115,7 @@ class GetAuthBackendRoleResult:
|
|
114
115
|
|
115
116
|
@property
|
116
117
|
@pulumi.getter(name="boundProjects")
|
117
|
-
def bound_projects(self) -> Sequence[str]:
|
118
|
+
def bound_projects(self) -> Sequence[builtins.str]:
|
118
119
|
"""
|
119
120
|
GCP projects bound to the role.
|
120
121
|
"""
|
@@ -122,7 +123,7 @@ class GetAuthBackendRoleResult:
|
|
122
123
|
|
123
124
|
@property
|
124
125
|
@pulumi.getter(name="boundRegions")
|
125
|
-
def bound_regions(self) -> Sequence[str]:
|
126
|
+
def bound_regions(self) -> Sequence[builtins.str]:
|
126
127
|
"""
|
127
128
|
GCP regions bound to the role. Returned when `type` is `gce`.
|
128
129
|
"""
|
@@ -130,7 +131,7 @@ class GetAuthBackendRoleResult:
|
|
130
131
|
|
131
132
|
@property
|
132
133
|
@pulumi.getter(name="boundServiceAccounts")
|
133
|
-
def bound_service_accounts(self) -> Sequence[str]:
|
134
|
+
def bound_service_accounts(self) -> Sequence[builtins.str]:
|
134
135
|
"""
|
135
136
|
GCP service accounts bound to the role. Returned when `type` is `iam`.
|
136
137
|
"""
|
@@ -138,7 +139,7 @@ class GetAuthBackendRoleResult:
|
|
138
139
|
|
139
140
|
@property
|
140
141
|
@pulumi.getter(name="boundZones")
|
141
|
-
def bound_zones(self) -> Sequence[str]:
|
142
|
+
def bound_zones(self) -> Sequence[builtins.str]:
|
142
143
|
"""
|
143
144
|
GCP zones bound to the role. Returned when `type` is `gce`.
|
144
145
|
"""
|
@@ -146,7 +147,7 @@ class GetAuthBackendRoleResult:
|
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter
|
149
|
-
def id(self) -> str:
|
150
|
+
def id(self) -> builtins.str:
|
150
151
|
"""
|
151
152
|
The provider-assigned unique ID for this managed resource.
|
152
153
|
"""
|
@@ -154,12 +155,12 @@ class GetAuthBackendRoleResult:
|
|
154
155
|
|
155
156
|
@property
|
156
157
|
@pulumi.getter
|
157
|
-
def namespace(self) -> Optional[str]:
|
158
|
+
def namespace(self) -> Optional[builtins.str]:
|
158
159
|
return pulumi.get(self, "namespace")
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter(name="roleId")
|
162
|
-
def role_id(self) -> str:
|
163
|
+
def role_id(self) -> builtins.str:
|
163
164
|
"""
|
164
165
|
The RoleID of the GCP role.
|
165
166
|
"""
|
@@ -167,12 +168,12 @@ class GetAuthBackendRoleResult:
|
|
167
168
|
|
168
169
|
@property
|
169
170
|
@pulumi.getter(name="roleName")
|
170
|
-
def role_name(self) -> str:
|
171
|
+
def role_name(self) -> builtins.str:
|
171
172
|
return pulumi.get(self, "role_name")
|
172
173
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter(name="tokenBoundCidrs")
|
175
|
-
def token_bound_cidrs(self) -> Optional[Sequence[str]]:
|
176
|
+
def token_bound_cidrs(self) -> Optional[Sequence[builtins.str]]:
|
176
177
|
"""
|
177
178
|
List of CIDR blocks; if set, specifies blocks of IP
|
178
179
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -182,7 +183,7 @@ class GetAuthBackendRoleResult:
|
|
182
183
|
|
183
184
|
@property
|
184
185
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
185
|
-
def token_explicit_max_ttl(self) -> Optional[int]:
|
186
|
+
def token_explicit_max_ttl(self) -> Optional[builtins.int]:
|
186
187
|
"""
|
187
188
|
If set, will encode an
|
188
189
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -193,7 +194,7 @@ class GetAuthBackendRoleResult:
|
|
193
194
|
|
194
195
|
@property
|
195
196
|
@pulumi.getter(name="tokenMaxTtl")
|
196
|
-
def token_max_ttl(self) -> Optional[int]:
|
197
|
+
def token_max_ttl(self) -> Optional[builtins.int]:
|
197
198
|
"""
|
198
199
|
The maximum lifetime for generated tokens in number of seconds.
|
199
200
|
Its current value will be referenced at renewal time.
|
@@ -202,7 +203,7 @@ class GetAuthBackendRoleResult:
|
|
202
203
|
|
203
204
|
@property
|
204
205
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
205
|
-
def token_no_default_policy(self) -> Optional[bool]:
|
206
|
+
def token_no_default_policy(self) -> Optional[builtins.bool]:
|
206
207
|
"""
|
207
208
|
If set, the default policy will not be set on
|
208
209
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -211,7 +212,7 @@ class GetAuthBackendRoleResult:
|
|
211
212
|
|
212
213
|
@property
|
213
214
|
@pulumi.getter(name="tokenNumUses")
|
214
|
-
def token_num_uses(self) -> Optional[int]:
|
215
|
+
def token_num_uses(self) -> Optional[builtins.int]:
|
215
216
|
"""
|
216
217
|
The
|
217
218
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
@@ -221,7 +222,7 @@ class GetAuthBackendRoleResult:
|
|
221
222
|
|
222
223
|
@property
|
223
224
|
@pulumi.getter(name="tokenPeriod")
|
224
|
-
def token_period(self) -> Optional[int]:
|
225
|
+
def token_period(self) -> Optional[builtins.int]:
|
225
226
|
"""
|
226
227
|
(Optional) If set, indicates that the
|
227
228
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -232,7 +233,7 @@ class GetAuthBackendRoleResult:
|
|
232
233
|
|
233
234
|
@property
|
234
235
|
@pulumi.getter(name="tokenPolicies")
|
235
|
-
def token_policies(self) -> Optional[Sequence[str]]:
|
236
|
+
def token_policies(self) -> Optional[Sequence[builtins.str]]:
|
236
237
|
"""
|
237
238
|
List of policies to encode onto generated tokens. Depending
|
238
239
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -241,7 +242,7 @@ class GetAuthBackendRoleResult:
|
|
241
242
|
|
242
243
|
@property
|
243
244
|
@pulumi.getter(name="tokenTtl")
|
244
|
-
def token_ttl(self) -> Optional[int]:
|
245
|
+
def token_ttl(self) -> Optional[builtins.int]:
|
245
246
|
"""
|
246
247
|
The incremental lifetime for generated tokens in number of seconds.
|
247
248
|
Its current value will be referenced at renewal time.
|
@@ -250,7 +251,7 @@ class GetAuthBackendRoleResult:
|
|
250
251
|
|
251
252
|
@property
|
252
253
|
@pulumi.getter(name="tokenType")
|
253
|
-
def token_type(self) -> Optional[str]:
|
254
|
+
def token_type(self) -> Optional[builtins.str]:
|
254
255
|
"""
|
255
256
|
The type of token that should be generated. Can be `service`,
|
256
257
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
@@ -262,7 +263,7 @@ class GetAuthBackendRoleResult:
|
|
262
263
|
|
263
264
|
@property
|
264
265
|
@pulumi.getter
|
265
|
-
def type(self) -> str:
|
266
|
+
def type(self) -> builtins.str:
|
266
267
|
"""
|
267
268
|
Type of GCP role. Expected values are `iam` or `gce`.
|
268
269
|
"""
|
@@ -298,18 +299,18 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
298
299
|
type=self.type)
|
299
300
|
|
300
301
|
|
301
|
-
def get_auth_backend_role(backend: Optional[str] = None,
|
302
|
-
namespace: Optional[str] = None,
|
303
|
-
role_name: Optional[str] = None,
|
304
|
-
token_bound_cidrs: Optional[Sequence[str]] = None,
|
305
|
-
token_explicit_max_ttl: Optional[int] = None,
|
306
|
-
token_max_ttl: Optional[int] = None,
|
307
|
-
token_no_default_policy: Optional[bool] = None,
|
308
|
-
token_num_uses: Optional[int] = None,
|
309
|
-
token_period: Optional[int] = None,
|
310
|
-
token_policies: Optional[Sequence[str]] = None,
|
311
|
-
token_ttl: Optional[int] = None,
|
312
|
-
token_type: Optional[str] = None,
|
302
|
+
def get_auth_backend_role(backend: Optional[builtins.str] = None,
|
303
|
+
namespace: Optional[builtins.str] = None,
|
304
|
+
role_name: Optional[builtins.str] = None,
|
305
|
+
token_bound_cidrs: Optional[Sequence[builtins.str]] = None,
|
306
|
+
token_explicit_max_ttl: Optional[builtins.int] = None,
|
307
|
+
token_max_ttl: Optional[builtins.int] = None,
|
308
|
+
token_no_default_policy: Optional[builtins.bool] = None,
|
309
|
+
token_num_uses: Optional[builtins.int] = None,
|
310
|
+
token_period: Optional[builtins.int] = None,
|
311
|
+
token_policies: Optional[Sequence[builtins.str]] = None,
|
312
|
+
token_ttl: Optional[builtins.int] = None,
|
313
|
+
token_type: Optional[builtins.str] = None,
|
313
314
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
|
314
315
|
"""
|
315
316
|
Reads a GCP auth role from a Vault server.
|
@@ -326,35 +327,35 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
326
327
|
```
|
327
328
|
|
328
329
|
|
329
|
-
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
330
|
-
:param str namespace: The namespace of the target resource.
|
330
|
+
:param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
331
|
+
:param builtins.str namespace: The namespace of the target resource.
|
331
332
|
The value should not contain leading or trailing forward slashes.
|
332
333
|
The `namespace` is always relative to the provider's configured namespace.
|
333
334
|
*Available only for Vault Enterprise*.
|
334
|
-
:param str role_name: The name of the role to retrieve the Role ID for.
|
335
|
-
:param Sequence[str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
335
|
+
:param builtins.str role_name: The name of the role to retrieve the Role ID for.
|
336
|
+
:param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
336
337
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
337
338
|
as well.
|
338
|
-
:param int token_explicit_max_ttl: If set, will encode an
|
339
|
+
:param builtins.int token_explicit_max_ttl: If set, will encode an
|
339
340
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
340
341
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
341
342
|
`token_max_ttl` would otherwise allow a renewal.
|
342
|
-
:param int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
343
|
+
:param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
343
344
|
Its current value will be referenced at renewal time.
|
344
|
-
:param bool token_no_default_policy: If set, the default policy will not be set on
|
345
|
+
:param builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
345
346
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
346
|
-
:param int token_num_uses: The
|
347
|
+
:param builtins.int token_num_uses: The
|
347
348
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
348
349
|
if any, in number of seconds to set on the token.
|
349
|
-
:param int token_period: (Optional) If set, indicates that the
|
350
|
+
:param builtins.int token_period: (Optional) If set, indicates that the
|
350
351
|
token generated using this role should never expire. The token should be renewed within the
|
351
352
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
352
353
|
value of this field. Specified in seconds.
|
353
|
-
:param Sequence[str] token_policies: List of policies to encode onto generated tokens. Depending
|
354
|
+
:param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
354
355
|
on the auth method, this list may be supplemented by user/group/other values.
|
355
|
-
:param int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
356
|
+
:param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
356
357
|
Its current value will be referenced at renewal time.
|
357
|
-
:param str token_type: The type of token that should be generated. Can be `service`,
|
358
|
+
:param builtins.str token_type: The type of token that should be generated. Can be `service`,
|
358
359
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
359
360
|
`service` tokens). For token store roles, there are two additional possibilities:
|
360
361
|
`default-service` and `default-batch` which specify the type to return unless the client
|
@@ -398,18 +399,18 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
398
399
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
399
400
|
token_type=pulumi.get(__ret__, 'token_type'),
|
400
401
|
type=pulumi.get(__ret__, 'type'))
|
401
|
-
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
402
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
403
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
404
|
-
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
405
|
-
token_explicit_max_ttl: Optional[pulumi.Input[Optional[int]]] = None,
|
406
|
-
token_max_ttl: Optional[pulumi.Input[Optional[int]]] = None,
|
407
|
-
token_no_default_policy: Optional[pulumi.Input[Optional[bool]]] = None,
|
408
|
-
token_num_uses: Optional[pulumi.Input[Optional[int]]] = None,
|
409
|
-
token_period: Optional[pulumi.Input[Optional[int]]] = None,
|
410
|
-
token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
411
|
-
token_ttl: Optional[pulumi.Input[Optional[int]]] = None,
|
412
|
-
token_type: Optional[pulumi.Input[Optional[str]]] = None,
|
402
|
+
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
403
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
404
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
405
|
+
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
|
406
|
+
token_explicit_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
407
|
+
token_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
408
|
+
token_no_default_policy: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
409
|
+
token_num_uses: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
410
|
+
token_period: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
411
|
+
token_policies: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
|
412
|
+
token_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
413
|
+
token_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
413
414
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
414
415
|
"""
|
415
416
|
Reads a GCP auth role from a Vault server.
|
@@ -426,35 +427,35 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
426
427
|
```
|
427
428
|
|
428
429
|
|
429
|
-
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
430
|
-
:param str namespace: The namespace of the target resource.
|
430
|
+
:param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
431
|
+
:param builtins.str namespace: The namespace of the target resource.
|
431
432
|
The value should not contain leading or trailing forward slashes.
|
432
433
|
The `namespace` is always relative to the provider's configured namespace.
|
433
434
|
*Available only for Vault Enterprise*.
|
434
|
-
:param str role_name: The name of the role to retrieve the Role ID for.
|
435
|
-
:param Sequence[str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
435
|
+
:param builtins.str role_name: The name of the role to retrieve the Role ID for.
|
436
|
+
:param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
436
437
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
437
438
|
as well.
|
438
|
-
:param int token_explicit_max_ttl: If set, will encode an
|
439
|
+
:param builtins.int token_explicit_max_ttl: If set, will encode an
|
439
440
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
440
441
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
441
442
|
`token_max_ttl` would otherwise allow a renewal.
|
442
|
-
:param int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
443
|
+
:param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
443
444
|
Its current value will be referenced at renewal time.
|
444
|
-
:param bool token_no_default_policy: If set, the default policy will not be set on
|
445
|
+
:param builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
445
446
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
446
|
-
:param int token_num_uses: The
|
447
|
+
:param builtins.int token_num_uses: The
|
447
448
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
448
449
|
if any, in number of seconds to set on the token.
|
449
|
-
:param int token_period: (Optional) If set, indicates that the
|
450
|
+
:param builtins.int token_period: (Optional) If set, indicates that the
|
450
451
|
token generated using this role should never expire. The token should be renewed within the
|
451
452
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
452
453
|
value of this field. Specified in seconds.
|
453
|
-
:param Sequence[str] token_policies: List of policies to encode onto generated tokens. Depending
|
454
|
+
:param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
454
455
|
on the auth method, this list may be supplemented by user/group/other values.
|
455
|
-
:param int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
456
|
+
:param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
456
457
|
Its current value will be referenced at renewal time.
|
457
|
-
:param str token_type: The type of token that should be generated. Can be `service`,
|
458
|
+
:param builtins.str token_type: The type of token that should be generated. Can be `service`,
|
458
459
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
459
460
|
`service` tokens). For token store roles, there are two additional possibilities:
|
460
461
|
`default-service` and `default-batch` which specify the type to return unless the client
|
pulumi_vault/gcp/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -24,18 +25,18 @@ __all__ = [
|
|
24
25
|
@pulumi.output_type
|
25
26
|
class AuthBackendCustomEndpoint(dict):
|
26
27
|
def __init__(__self__, *,
|
27
|
-
api: Optional[str] = None,
|
28
|
-
compute: Optional[str] = None,
|
29
|
-
crm: Optional[str] = None,
|
30
|
-
iam: Optional[str] = None):
|
28
|
+
api: Optional[builtins.str] = None,
|
29
|
+
compute: Optional[builtins.str] = None,
|
30
|
+
crm: Optional[builtins.str] = None,
|
31
|
+
iam: Optional[builtins.str] = None):
|
31
32
|
"""
|
32
|
-
:param str api: Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
33
|
-
:param str compute: Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
33
|
+
:param builtins.str api: Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
34
|
+
:param builtins.str compute: Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
34
35
|
|
35
36
|
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
36
37
|
The `scheme://` and `:port` portions of the endpoint value are optional.
|
37
|
-
:param str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
38
|
-
:param str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
38
|
+
:param builtins.str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
39
|
+
:param builtins.str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
39
40
|
"""
|
40
41
|
if api is not None:
|
41
42
|
pulumi.set(__self__, "api", api)
|
@@ -48,7 +49,7 @@ class AuthBackendCustomEndpoint(dict):
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def api(self) -> Optional[str]:
|
52
|
+
def api(self) -> Optional[builtins.str]:
|
52
53
|
"""
|
53
54
|
Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
54
55
|
"""
|
@@ -56,7 +57,7 @@ class AuthBackendCustomEndpoint(dict):
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def compute(self) -> Optional[str]:
|
60
|
+
def compute(self) -> Optional[builtins.str]:
|
60
61
|
"""
|
61
62
|
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
62
63
|
|
@@ -67,7 +68,7 @@ class AuthBackendCustomEndpoint(dict):
|
|
67
68
|
|
68
69
|
@property
|
69
70
|
@pulumi.getter
|
70
|
-
def crm(self) -> Optional[str]:
|
71
|
+
def crm(self) -> Optional[builtins.str]:
|
71
72
|
"""
|
72
73
|
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
73
74
|
"""
|
@@ -75,7 +76,7 @@ class AuthBackendCustomEndpoint(dict):
|
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter
|
78
|
-
def iam(self) -> Optional[str]:
|
79
|
+
def iam(self) -> Optional[builtins.str]:
|
79
80
|
"""
|
80
81
|
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
81
82
|
"""
|
@@ -116,32 +117,32 @@ class AuthBackendTune(dict):
|
|
116
117
|
return super().get(key, default)
|
117
118
|
|
118
119
|
def __init__(__self__, *,
|
119
|
-
allowed_response_headers: Optional[Sequence[str]] = None,
|
120
|
-
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
|
121
|
-
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
|
122
|
-
default_lease_ttl: Optional[str] = None,
|
123
|
-
listing_visibility: Optional[str] = None,
|
124
|
-
max_lease_ttl: Optional[str] = None,
|
125
|
-
passthrough_request_headers: Optional[Sequence[str]] = None,
|
126
|
-
token_type: Optional[str] = None):
|
127
|
-
"""
|
128
|
-
:param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
|
120
|
+
allowed_response_headers: Optional[Sequence[builtins.str]] = None,
|
121
|
+
audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
|
122
|
+
audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
|
123
|
+
default_lease_ttl: Optional[builtins.str] = None,
|
124
|
+
listing_visibility: Optional[builtins.str] = None,
|
125
|
+
max_lease_ttl: Optional[builtins.str] = None,
|
126
|
+
passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
|
127
|
+
token_type: Optional[builtins.str] = None):
|
128
|
+
"""
|
129
|
+
:param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
129
130
|
a plugin to include them in the response.
|
130
|
-
:param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
131
|
+
:param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
131
132
|
not be HMAC'd by audit devices in the request data object.
|
132
|
-
:param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
133
|
+
:param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
133
134
|
not be HMAC'd by audit devices in the response data object.
|
134
|
-
:param str default_lease_ttl: Specifies the default time-to-live.
|
135
|
+
:param builtins.str default_lease_ttl: Specifies the default time-to-live.
|
135
136
|
If set, this overrides the global default.
|
136
137
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
137
|
-
:param str listing_visibility: Specifies whether to show this mount in
|
138
|
+
:param builtins.str listing_visibility: Specifies whether to show this mount in
|
138
139
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
139
|
-
:param str max_lease_ttl: Specifies the maximum time-to-live.
|
140
|
+
:param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
140
141
|
If set, this overrides the global default.
|
141
142
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
142
|
-
:param Sequence[str] passthrough_request_headers: List of headers to whitelist and
|
143
|
+
:param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
|
143
144
|
pass from the request to the backend.
|
144
|
-
:param str token_type: Specifies the type of tokens that should be returned by
|
145
|
+
:param builtins.str token_type: Specifies the type of tokens that should be returned by
|
145
146
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
146
147
|
|
147
148
|
|
@@ -166,7 +167,7 @@ class AuthBackendTune(dict):
|
|
166
167
|
|
167
168
|
@property
|
168
169
|
@pulumi.getter(name="allowedResponseHeaders")
|
169
|
-
def allowed_response_headers(self) -> Optional[Sequence[str]]:
|
170
|
+
def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
|
170
171
|
"""
|
171
172
|
List of headers to whitelist and allowing
|
172
173
|
a plugin to include them in the response.
|
@@ -175,7 +176,7 @@ class AuthBackendTune(dict):
|
|
175
176
|
|
176
177
|
@property
|
177
178
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
178
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
|
179
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
|
179
180
|
"""
|
180
181
|
Specifies the list of keys that will
|
181
182
|
not be HMAC'd by audit devices in the request data object.
|
@@ -184,7 +185,7 @@ class AuthBackendTune(dict):
|
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
187
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
|
188
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
|
188
189
|
"""
|
189
190
|
Specifies the list of keys that will
|
190
191
|
not be HMAC'd by audit devices in the response data object.
|
@@ -193,7 +194,7 @@ class AuthBackendTune(dict):
|
|
193
194
|
|
194
195
|
@property
|
195
196
|
@pulumi.getter(name="defaultLeaseTtl")
|
196
|
-
def default_lease_ttl(self) -> Optional[str]:
|
197
|
+
def default_lease_ttl(self) -> Optional[builtins.str]:
|
197
198
|
"""
|
198
199
|
Specifies the default time-to-live.
|
199
200
|
If set, this overrides the global default.
|
@@ -203,7 +204,7 @@ class AuthBackendTune(dict):
|
|
203
204
|
|
204
205
|
@property
|
205
206
|
@pulumi.getter(name="listingVisibility")
|
206
|
-
def listing_visibility(self) -> Optional[str]:
|
207
|
+
def listing_visibility(self) -> Optional[builtins.str]:
|
207
208
|
"""
|
208
209
|
Specifies whether to show this mount in
|
209
210
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -212,7 +213,7 @@ class AuthBackendTune(dict):
|
|
212
213
|
|
213
214
|
@property
|
214
215
|
@pulumi.getter(name="maxLeaseTtl")
|
215
|
-
def max_lease_ttl(self) -> Optional[str]:
|
216
|
+
def max_lease_ttl(self) -> Optional[builtins.str]:
|
216
217
|
"""
|
217
218
|
Specifies the maximum time-to-live.
|
218
219
|
If set, this overrides the global default.
|
@@ -222,7 +223,7 @@ class AuthBackendTune(dict):
|
|
222
223
|
|
223
224
|
@property
|
224
225
|
@pulumi.getter(name="passthroughRequestHeaders")
|
225
|
-
def passthrough_request_headers(self) -> Optional[Sequence[str]]:
|
226
|
+
def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
|
226
227
|
"""
|
227
228
|
List of headers to whitelist and
|
228
229
|
pass from the request to the backend.
|
@@ -231,7 +232,7 @@ class AuthBackendTune(dict):
|
|
231
232
|
|
232
233
|
@property
|
233
234
|
@pulumi.getter(name="tokenType")
|
234
|
-
def token_type(self) -> Optional[str]:
|
235
|
+
def token_type(self) -> Optional[builtins.str]:
|
235
236
|
"""
|
236
237
|
Specifies the type of tokens that should be returned by
|
237
238
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -245,18 +246,18 @@ class AuthBackendTune(dict):
|
|
245
246
|
@pulumi.output_type
|
246
247
|
class SecretRolesetBinding(dict):
|
247
248
|
def __init__(__self__, *,
|
248
|
-
resource: str,
|
249
|
-
roles: Sequence[str]):
|
249
|
+
resource: builtins.str,
|
250
|
+
roles: Sequence[builtins.str]):
|
250
251
|
"""
|
251
|
-
:param str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
252
|
-
:param Sequence[str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
252
|
+
:param builtins.str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
253
|
+
:param Sequence[builtins.str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
253
254
|
"""
|
254
255
|
pulumi.set(__self__, "resource", resource)
|
255
256
|
pulumi.set(__self__, "roles", roles)
|
256
257
|
|
257
258
|
@property
|
258
259
|
@pulumi.getter
|
259
|
-
def resource(self) -> str:
|
260
|
+
def resource(self) -> builtins.str:
|
260
261
|
"""
|
261
262
|
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
262
263
|
"""
|
@@ -264,7 +265,7 @@ class SecretRolesetBinding(dict):
|
|
264
265
|
|
265
266
|
@property
|
266
267
|
@pulumi.getter
|
267
|
-
def roles(self) -> Sequence[str]:
|
268
|
+
def roles(self) -> Sequence[builtins.str]:
|
268
269
|
"""
|
269
270
|
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
270
271
|
"""
|
@@ -274,18 +275,18 @@ class SecretRolesetBinding(dict):
|
|
274
275
|
@pulumi.output_type
|
275
276
|
class SecretStaticAccountBinding(dict):
|
276
277
|
def __init__(__self__, *,
|
277
|
-
resource: str,
|
278
|
-
roles: Sequence[str]):
|
278
|
+
resource: builtins.str,
|
279
|
+
roles: Sequence[builtins.str]):
|
279
280
|
"""
|
280
|
-
:param str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
281
|
-
:param Sequence[str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
281
|
+
:param builtins.str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
282
|
+
:param Sequence[builtins.str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
282
283
|
"""
|
283
284
|
pulumi.set(__self__, "resource", resource)
|
284
285
|
pulumi.set(__self__, "roles", roles)
|
285
286
|
|
286
287
|
@property
|
287
288
|
@pulumi.getter
|
288
|
-
def resource(self) -> str:
|
289
|
+
def resource(self) -> builtins.str:
|
289
290
|
"""
|
290
291
|
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
291
292
|
"""
|
@@ -293,7 +294,7 @@ class SecretStaticAccountBinding(dict):
|
|
293
294
|
|
294
295
|
@property
|
295
296
|
@pulumi.getter
|
296
|
-
def roles(self) -> Sequence[str]:
|
297
|
+
def roles(self) -> Sequence[builtins.str]:
|
297
298
|
"""
|
298
299
|
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
299
300
|
"""
|