pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/okta/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -39,18 +40,18 @@ class AuthBackendGroup(dict):
|
|
39
40
|
return super().get(key, default)
|
40
41
|
|
41
42
|
def __init__(__self__, *,
|
42
|
-
group_name: str,
|
43
|
-
policies: Sequence[str]):
|
43
|
+
group_name: builtins.str,
|
44
|
+
policies: Sequence[builtins.str]):
|
44
45
|
"""
|
45
|
-
:param str group_name: Name of the Okta group
|
46
|
-
:param Sequence[str] policies: Policies to associate with this group
|
46
|
+
:param builtins.str group_name: Name of the Okta group
|
47
|
+
:param Sequence[builtins.str] policies: Policies to associate with this group
|
47
48
|
"""
|
48
49
|
pulumi.set(__self__, "group_name", group_name)
|
49
50
|
pulumi.set(__self__, "policies", policies)
|
50
51
|
|
51
52
|
@property
|
52
53
|
@pulumi.getter(name="groupName")
|
53
|
-
def group_name(self) -> str:
|
54
|
+
def group_name(self) -> builtins.str:
|
54
55
|
"""
|
55
56
|
Name of the Okta group
|
56
57
|
"""
|
@@ -58,7 +59,7 @@ class AuthBackendGroup(dict):
|
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def policies(self) -> Sequence[str]:
|
62
|
+
def policies(self) -> Sequence[builtins.str]:
|
62
63
|
"""
|
63
64
|
Policies to associate with this group
|
64
65
|
"""
|
@@ -68,13 +69,13 @@ class AuthBackendGroup(dict):
|
|
68
69
|
@pulumi.output_type
|
69
70
|
class AuthBackendUser(dict):
|
70
71
|
def __init__(__self__, *,
|
71
|
-
username: str,
|
72
|
-
groups: Optional[Sequence[str]] = None,
|
73
|
-
policies: Optional[Sequence[str]] = None):
|
72
|
+
username: builtins.str,
|
73
|
+
groups: Optional[Sequence[builtins.str]] = None,
|
74
|
+
policies: Optional[Sequence[builtins.str]] = None):
|
74
75
|
"""
|
75
|
-
:param str username: Name of the user within Okta
|
76
|
-
:param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
|
77
|
-
:param Sequence[str] policies: Policies to associate with this user
|
76
|
+
:param builtins.str username: Name of the user within Okta
|
77
|
+
:param Sequence[builtins.str] groups: Groups within the Okta auth backend to associate with this user
|
78
|
+
:param Sequence[builtins.str] policies: Policies to associate with this user
|
78
79
|
"""
|
79
80
|
pulumi.set(__self__, "username", username)
|
80
81
|
if groups is not None:
|
@@ -84,7 +85,7 @@ class AuthBackendUser(dict):
|
|
84
85
|
|
85
86
|
@property
|
86
87
|
@pulumi.getter
|
87
|
-
def username(self) -> str:
|
88
|
+
def username(self) -> builtins.str:
|
88
89
|
"""
|
89
90
|
Name of the user within Okta
|
90
91
|
"""
|
@@ -92,7 +93,7 @@ class AuthBackendUser(dict):
|
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter
|
95
|
-
def groups(self) -> Optional[Sequence[str]]:
|
96
|
+
def groups(self) -> Optional[Sequence[builtins.str]]:
|
96
97
|
"""
|
97
98
|
Groups within the Okta auth backend to associate with this user
|
98
99
|
"""
|
@@ -100,7 +101,7 @@ class AuthBackendUser(dict):
|
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter
|
103
|
-
def policies(self) -> Optional[Sequence[str]]:
|
104
|
+
def policies(self) -> Optional[Sequence[builtins.str]]:
|
104
105
|
"""
|
105
106
|
Policies to associate with this user
|
106
107
|
"""
|
pulumi_vault/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -56,32 +57,32 @@ class AuthBackendTune(dict):
|
|
56
57
|
return super().get(key, default)
|
57
58
|
|
58
59
|
def __init__(__self__, *,
|
59
|
-
allowed_response_headers: Optional[Sequence[str]] = None,
|
60
|
-
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
|
61
|
-
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
|
62
|
-
default_lease_ttl: Optional[str] = None,
|
63
|
-
listing_visibility: Optional[str] = None,
|
64
|
-
max_lease_ttl: Optional[str] = None,
|
65
|
-
passthrough_request_headers: Optional[Sequence[str]] = None,
|
66
|
-
token_type: Optional[str] = None):
|
67
|
-
"""
|
68
|
-
:param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
|
60
|
+
allowed_response_headers: Optional[Sequence[builtins.str]] = None,
|
61
|
+
audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
|
62
|
+
audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
|
63
|
+
default_lease_ttl: Optional[builtins.str] = None,
|
64
|
+
listing_visibility: Optional[builtins.str] = None,
|
65
|
+
max_lease_ttl: Optional[builtins.str] = None,
|
66
|
+
passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
|
67
|
+
token_type: Optional[builtins.str] = None):
|
68
|
+
"""
|
69
|
+
:param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
69
70
|
a plugin to include them in the response.
|
70
|
-
:param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
71
|
+
:param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
71
72
|
not be HMAC'd by audit devices in the request data object.
|
72
|
-
:param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
73
|
+
:param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
73
74
|
not be HMAC'd by audit devices in the response data object.
|
74
|
-
:param str default_lease_ttl: Specifies the default time-to-live.
|
75
|
+
:param builtins.str default_lease_ttl: Specifies the default time-to-live.
|
75
76
|
If set, this overrides the global default.
|
76
77
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
77
|
-
:param str listing_visibility: Specifies whether to show this mount in
|
78
|
+
:param builtins.str listing_visibility: Specifies whether to show this mount in
|
78
79
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
79
|
-
:param str max_lease_ttl: Specifies the maximum time-to-live.
|
80
|
+
:param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
80
81
|
If set, this overrides the global default.
|
81
82
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
82
|
-
:param Sequence[str] passthrough_request_headers: List of headers to whitelist and
|
83
|
+
:param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
|
83
84
|
pass from the request to the backend.
|
84
|
-
:param str token_type: Specifies the type of tokens that should be returned by
|
85
|
+
:param builtins.str token_type: Specifies the type of tokens that should be returned by
|
85
86
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
86
87
|
"""
|
87
88
|
if allowed_response_headers is not None:
|
@@ -103,7 +104,7 @@ class AuthBackendTune(dict):
|
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="allowedResponseHeaders")
|
106
|
-
def allowed_response_headers(self) -> Optional[Sequence[str]]:
|
107
|
+
def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
|
107
108
|
"""
|
108
109
|
List of headers to whitelist and allowing
|
109
110
|
a plugin to include them in the response.
|
@@ -112,7 +113,7 @@ class AuthBackendTune(dict):
|
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
115
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
|
116
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
|
116
117
|
"""
|
117
118
|
Specifies the list of keys that will
|
118
119
|
not be HMAC'd by audit devices in the request data object.
|
@@ -121,7 +122,7 @@ class AuthBackendTune(dict):
|
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
124
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
|
125
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
|
125
126
|
"""
|
126
127
|
Specifies the list of keys that will
|
127
128
|
not be HMAC'd by audit devices in the response data object.
|
@@ -130,7 +131,7 @@ class AuthBackendTune(dict):
|
|
130
131
|
|
131
132
|
@property
|
132
133
|
@pulumi.getter(name="defaultLeaseTtl")
|
133
|
-
def default_lease_ttl(self) -> Optional[str]:
|
134
|
+
def default_lease_ttl(self) -> Optional[builtins.str]:
|
134
135
|
"""
|
135
136
|
Specifies the default time-to-live.
|
136
137
|
If set, this overrides the global default.
|
@@ -140,7 +141,7 @@ class AuthBackendTune(dict):
|
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter(name="listingVisibility")
|
143
|
-
def listing_visibility(self) -> Optional[str]:
|
144
|
+
def listing_visibility(self) -> Optional[builtins.str]:
|
144
145
|
"""
|
145
146
|
Specifies whether to show this mount in
|
146
147
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -149,7 +150,7 @@ class AuthBackendTune(dict):
|
|
149
150
|
|
150
151
|
@property
|
151
152
|
@pulumi.getter(name="maxLeaseTtl")
|
152
|
-
def max_lease_ttl(self) -> Optional[str]:
|
153
|
+
def max_lease_ttl(self) -> Optional[builtins.str]:
|
153
154
|
"""
|
154
155
|
Specifies the maximum time-to-live.
|
155
156
|
If set, this overrides the global default.
|
@@ -159,7 +160,7 @@ class AuthBackendTune(dict):
|
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter(name="passthroughRequestHeaders")
|
162
|
-
def passthrough_request_headers(self) -> Optional[Sequence[str]]:
|
163
|
+
def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
|
163
164
|
"""
|
164
165
|
List of headers to whitelist and
|
165
166
|
pass from the request to the backend.
|
@@ -168,7 +169,7 @@ class AuthBackendTune(dict):
|
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter(name="tokenType")
|
171
|
-
def token_type(self) -> Optional[str]:
|
172
|
+
def token_type(self) -> Optional[builtins.str]:
|
172
173
|
"""
|
173
174
|
Specifies the type of tokens that should be returned by
|
174
175
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -179,23 +180,23 @@ class AuthBackendTune(dict):
|
|
179
180
|
@pulumi.output_type
|
180
181
|
class GetPolicyDocumentRuleResult(dict):
|
181
182
|
def __init__(__self__, *,
|
182
|
-
capabilities: Sequence[str],
|
183
|
-
path: str,
|
183
|
+
capabilities: Sequence[builtins.str],
|
184
|
+
path: builtins.str,
|
184
185
|
allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
|
185
186
|
denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
|
186
|
-
description: Optional[str] = None,
|
187
|
-
max_wrapping_ttl: Optional[str] = None,
|
188
|
-
min_wrapping_ttl: Optional[str] = None,
|
189
|
-
required_parameters: Optional[Sequence[str]] = None):
|
187
|
+
description: Optional[builtins.str] = None,
|
188
|
+
max_wrapping_ttl: Optional[builtins.str] = None,
|
189
|
+
min_wrapping_ttl: Optional[builtins.str] = None,
|
190
|
+
required_parameters: Optional[Sequence[builtins.str]] = None):
|
190
191
|
"""
|
191
|
-
:param Sequence[str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
192
|
-
:param str path: A path in Vault that this rule applies to.
|
192
|
+
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
193
|
+
:param builtins.str path: A path in Vault that this rule applies to.
|
193
194
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
194
195
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
195
|
-
:param str description: Description of the rule. Will be added as a comment to rendered rule.
|
196
|
-
:param str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
197
|
-
:param str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
198
|
-
:param Sequence[str] required_parameters: A list of parameters that must be specified.
|
196
|
+
:param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
197
|
+
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
198
|
+
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
199
|
+
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
199
200
|
"""
|
200
201
|
pulumi.set(__self__, "capabilities", capabilities)
|
201
202
|
pulumi.set(__self__, "path", path)
|
@@ -214,7 +215,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
214
215
|
|
215
216
|
@property
|
216
217
|
@pulumi.getter
|
217
|
-
def capabilities(self) -> Sequence[str]:
|
218
|
+
def capabilities(self) -> Sequence[builtins.str]:
|
218
219
|
"""
|
219
220
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
220
221
|
"""
|
@@ -222,7 +223,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
222
223
|
|
223
224
|
@property
|
224
225
|
@pulumi.getter
|
225
|
-
def path(self) -> str:
|
226
|
+
def path(self) -> builtins.str:
|
226
227
|
"""
|
227
228
|
A path in Vault that this rule applies to.
|
228
229
|
"""
|
@@ -246,7 +247,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
246
247
|
|
247
248
|
@property
|
248
249
|
@pulumi.getter
|
249
|
-
def description(self) -> Optional[str]:
|
250
|
+
def description(self) -> Optional[builtins.str]:
|
250
251
|
"""
|
251
252
|
Description of the rule. Will be added as a comment to rendered rule.
|
252
253
|
"""
|
@@ -254,7 +255,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
254
255
|
|
255
256
|
@property
|
256
257
|
@pulumi.getter(name="maxWrappingTtl")
|
257
|
-
def max_wrapping_ttl(self) -> Optional[str]:
|
258
|
+
def max_wrapping_ttl(self) -> Optional[builtins.str]:
|
258
259
|
"""
|
259
260
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
260
261
|
"""
|
@@ -262,7 +263,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
262
263
|
|
263
264
|
@property
|
264
265
|
@pulumi.getter(name="minWrappingTtl")
|
265
|
-
def min_wrapping_ttl(self) -> Optional[str]:
|
266
|
+
def min_wrapping_ttl(self) -> Optional[builtins.str]:
|
266
267
|
"""
|
267
268
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
268
269
|
"""
|
@@ -270,7 +271,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
270
271
|
|
271
272
|
@property
|
272
273
|
@pulumi.getter(name="requiredParameters")
|
273
|
-
def required_parameters(self) -> Optional[Sequence[str]]:
|
274
|
+
def required_parameters(self) -> Optional[Sequence[builtins.str]]:
|
274
275
|
"""
|
275
276
|
A list of parameters that must be specified.
|
276
277
|
"""
|
@@ -280,18 +281,18 @@ class GetPolicyDocumentRuleResult(dict):
|
|
280
281
|
@pulumi.output_type
|
281
282
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
282
283
|
def __init__(__self__, *,
|
283
|
-
key: str,
|
284
|
-
values: Sequence[str]):
|
284
|
+
key: builtins.str,
|
285
|
+
values: Sequence[builtins.str]):
|
285
286
|
"""
|
286
|
-
:param str key: name of permitted or denied parameter.
|
287
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
287
|
+
:param builtins.str key: name of permitted or denied parameter.
|
288
|
+
:param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
|
288
289
|
"""
|
289
290
|
pulumi.set(__self__, "key", key)
|
290
291
|
pulumi.set(__self__, "values", values)
|
291
292
|
|
292
293
|
@property
|
293
294
|
@pulumi.getter
|
294
|
-
def key(self) -> str:
|
295
|
+
def key(self) -> builtins.str:
|
295
296
|
"""
|
296
297
|
name of permitted or denied parameter.
|
297
298
|
"""
|
@@ -299,7 +300,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
299
300
|
|
300
301
|
@property
|
301
302
|
@pulumi.getter
|
302
|
-
def values(self) -> Sequence[str]:
|
303
|
+
def values(self) -> Sequence[builtins.str]:
|
303
304
|
"""
|
304
305
|
list of values what are permitted or denied by policy rule.
|
305
306
|
"""
|
@@ -309,18 +310,18 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
309
310
|
@pulumi.output_type
|
310
311
|
class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
311
312
|
def __init__(__self__, *,
|
312
|
-
key: str,
|
313
|
-
values: Sequence[str]):
|
313
|
+
key: builtins.str,
|
314
|
+
values: Sequence[builtins.str]):
|
314
315
|
"""
|
315
|
-
:param str key: name of permitted or denied parameter.
|
316
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
316
|
+
:param builtins.str key: name of permitted or denied parameter.
|
317
|
+
:param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
|
317
318
|
"""
|
318
319
|
pulumi.set(__self__, "key", key)
|
319
320
|
pulumi.set(__self__, "values", values)
|
320
321
|
|
321
322
|
@property
|
322
323
|
@pulumi.getter
|
323
|
-
def key(self) -> str:
|
324
|
+
def key(self) -> builtins.str:
|
324
325
|
"""
|
325
326
|
name of permitted or denied parameter.
|
326
327
|
"""
|
@@ -328,7 +329,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
328
329
|
|
329
330
|
@property
|
330
331
|
@pulumi.getter
|
331
|
-
def values(self) -> Sequence[str]:
|
332
|
+
def values(self) -> Sequence[builtins.str]:
|
332
333
|
"""
|
333
334
|
list of values what are permitted or denied by policy rule.
|
334
335
|
"""
|
pulumi_vault/password_policy.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,14 +20,14 @@ __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class PasswordPolicyArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
policy: pulumi.Input[str],
|
23
|
-
name: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
policy: pulumi.Input[builtins.str],
|
24
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
25
26
|
"""
|
26
27
|
The set of arguments for constructing a PasswordPolicy resource.
|
27
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
28
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
29
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
29
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
30
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
30
31
|
The value should not contain leading or trailing forward slashes.
|
31
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
33
|
*Available only for Vault Enterprise*.
|
@@ -39,31 +40,31 @@ class PasswordPolicyArgs:
|
|
39
40
|
|
40
41
|
@property
|
41
42
|
@pulumi.getter
|
42
|
-
def policy(self) -> pulumi.Input[str]:
|
43
|
+
def policy(self) -> pulumi.Input[builtins.str]:
|
43
44
|
"""
|
44
45
|
String containing a password policy.
|
45
46
|
"""
|
46
47
|
return pulumi.get(self, "policy")
|
47
48
|
|
48
49
|
@policy.setter
|
49
|
-
def policy(self, value: pulumi.Input[str]):
|
50
|
+
def policy(self, value: pulumi.Input[builtins.str]):
|
50
51
|
pulumi.set(self, "policy", value)
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
55
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
55
56
|
"""
|
56
57
|
The name of the password policy.
|
57
58
|
"""
|
58
59
|
return pulumi.get(self, "name")
|
59
60
|
|
60
61
|
@name.setter
|
61
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
62
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
62
63
|
pulumi.set(self, "name", value)
|
63
64
|
|
64
65
|
@property
|
65
66
|
@pulumi.getter
|
66
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
67
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
67
68
|
"""
|
68
69
|
The namespace to provision the resource in.
|
69
70
|
The value should not contain leading or trailing forward slashes.
|
@@ -73,24 +74,24 @@ class PasswordPolicyArgs:
|
|
73
74
|
return pulumi.get(self, "namespace")
|
74
75
|
|
75
76
|
@namespace.setter
|
76
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
77
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
77
78
|
pulumi.set(self, "namespace", value)
|
78
79
|
|
79
80
|
|
80
81
|
@pulumi.input_type
|
81
82
|
class _PasswordPolicyState:
|
82
83
|
def __init__(__self__, *,
|
83
|
-
name: Optional[pulumi.Input[str]] = None,
|
84
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
85
|
-
policy: Optional[pulumi.Input[str]] = None):
|
84
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
85
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
86
|
+
policy: Optional[pulumi.Input[builtins.str]] = None):
|
86
87
|
"""
|
87
88
|
Input properties used for looking up and filtering PasswordPolicy resources.
|
88
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
89
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
89
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
90
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
90
91
|
The value should not contain leading or trailing forward slashes.
|
91
92
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
92
93
|
*Available only for Vault Enterprise*.
|
93
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
94
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
94
95
|
"""
|
95
96
|
if name is not None:
|
96
97
|
pulumi.set(__self__, "name", name)
|
@@ -101,19 +102,19 @@ class _PasswordPolicyState:
|
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter
|
104
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
105
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
105
106
|
"""
|
106
107
|
The name of the password policy.
|
107
108
|
"""
|
108
109
|
return pulumi.get(self, "name")
|
109
110
|
|
110
111
|
@name.setter
|
111
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
112
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
112
113
|
pulumi.set(self, "name", value)
|
113
114
|
|
114
115
|
@property
|
115
116
|
@pulumi.getter
|
116
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
117
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
117
118
|
"""
|
118
119
|
The namespace to provision the resource in.
|
119
120
|
The value should not contain leading or trailing forward slashes.
|
@@ -123,19 +124,19 @@ class _PasswordPolicyState:
|
|
123
124
|
return pulumi.get(self, "namespace")
|
124
125
|
|
125
126
|
@namespace.setter
|
126
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
127
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
127
128
|
pulumi.set(self, "namespace", value)
|
128
129
|
|
129
130
|
@property
|
130
131
|
@pulumi.getter
|
131
|
-
def policy(self) -> Optional[pulumi.Input[str]]:
|
132
|
+
def policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
132
133
|
"""
|
133
134
|
String containing a password policy.
|
134
135
|
"""
|
135
136
|
return pulumi.get(self, "policy")
|
136
137
|
|
137
138
|
@policy.setter
|
138
|
-
def policy(self, value: Optional[pulumi.Input[str]]):
|
139
|
+
def policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
139
140
|
pulumi.set(self, "policy", value)
|
140
141
|
|
141
142
|
|
@@ -144,9 +145,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
144
145
|
def __init__(__self__,
|
145
146
|
resource_name: str,
|
146
147
|
opts: Optional[pulumi.ResourceOptions] = None,
|
147
|
-
name: Optional[pulumi.Input[str]] = None,
|
148
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
149
|
-
policy: Optional[pulumi.Input[str]] = None,
|
148
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
149
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
150
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
150
151
|
__props__=None):
|
151
152
|
"""
|
152
153
|
Provides a resource to manage Password Policies
|
@@ -178,12 +179,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
178
179
|
|
179
180
|
:param str resource_name: The name of the resource.
|
180
181
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
181
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
182
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
182
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
183
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
183
184
|
The value should not contain leading or trailing forward slashes.
|
184
185
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
185
186
|
*Available only for Vault Enterprise*.
|
186
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
187
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
187
188
|
"""
|
188
189
|
...
|
189
190
|
@overload
|
@@ -234,9 +235,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
234
235
|
def _internal_init(__self__,
|
235
236
|
resource_name: str,
|
236
237
|
opts: Optional[pulumi.ResourceOptions] = None,
|
237
|
-
name: Optional[pulumi.Input[str]] = None,
|
238
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
239
|
-
policy: Optional[pulumi.Input[str]] = None,
|
238
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
239
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
240
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
240
241
|
__props__=None):
|
241
242
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
242
243
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -261,9 +262,9 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
261
262
|
def get(resource_name: str,
|
262
263
|
id: pulumi.Input[str],
|
263
264
|
opts: Optional[pulumi.ResourceOptions] = None,
|
264
|
-
name: Optional[pulumi.Input[str]] = None,
|
265
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
266
|
-
policy: Optional[pulumi.Input[str]] = None) -> 'PasswordPolicy':
|
265
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
267
|
+
policy: Optional[pulumi.Input[builtins.str]] = None) -> 'PasswordPolicy':
|
267
268
|
"""
|
268
269
|
Get an existing PasswordPolicy resource's state with the given name, id, and optional extra
|
269
270
|
properties used to qualify the lookup.
|
@@ -271,12 +272,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
271
272
|
:param str resource_name: The unique name of the resulting resource.
|
272
273
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
273
274
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
274
|
-
:param pulumi.Input[str] name: The name of the password policy.
|
275
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
275
|
+
:param pulumi.Input[builtins.str] name: The name of the password policy.
|
276
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
276
277
|
The value should not contain leading or trailing forward slashes.
|
277
278
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
278
279
|
*Available only for Vault Enterprise*.
|
279
|
-
:param pulumi.Input[str] policy: String containing a password policy.
|
280
|
+
:param pulumi.Input[builtins.str] policy: String containing a password policy.
|
280
281
|
"""
|
281
282
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
282
283
|
|
@@ -289,7 +290,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
289
290
|
|
290
291
|
@property
|
291
292
|
@pulumi.getter
|
292
|
-
def name(self) -> pulumi.Output[str]:
|
293
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
293
294
|
"""
|
294
295
|
The name of the password policy.
|
295
296
|
"""
|
@@ -297,7 +298,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter
|
300
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
301
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
301
302
|
"""
|
302
303
|
The namespace to provision the resource in.
|
303
304
|
The value should not contain leading or trailing forward slashes.
|
@@ -308,7 +309,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
308
309
|
|
309
310
|
@property
|
310
311
|
@pulumi.getter
|
311
|
-
def policy(self) -> pulumi.Output[str]:
|
312
|
+
def policy(self) -> pulumi.Output[builtins.str]:
|
312
313
|
"""
|
313
314
|
String containing a password policy.
|
314
315
|
"""
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|