pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,14 +20,14 @@ __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuditRequestHeaderArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
hmac: Optional[pulumi.Input[bool]] = None,
|
23
|
-
name: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
hmac: Optional[pulumi.Input[builtins.bool]] = None,
|
24
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
25
26
|
"""
|
26
27
|
The set of arguments for constructing a AuditRequestHeader resource.
|
27
|
-
:param pulumi.Input[bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
28
|
-
:param pulumi.Input[str] name: The name of the request header to audit.
|
29
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
28
|
+
:param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
29
|
+
:param pulumi.Input[builtins.str] name: The name of the request header to audit.
|
30
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
30
31
|
"""
|
31
32
|
if hmac is not None:
|
32
33
|
pulumi.set(__self__, "hmac", hmac)
|
@@ -37,52 +38,52 @@ class AuditRequestHeaderArgs:
|
|
37
38
|
|
38
39
|
@property
|
39
40
|
@pulumi.getter
|
40
|
-
def hmac(self) -> Optional[pulumi.Input[bool]]:
|
41
|
+
def hmac(self) -> Optional[pulumi.Input[builtins.bool]]:
|
41
42
|
"""
|
42
43
|
Whether this header's value should be HMAC'd in the audit logs.
|
43
44
|
"""
|
44
45
|
return pulumi.get(self, "hmac")
|
45
46
|
|
46
47
|
@hmac.setter
|
47
|
-
def hmac(self, value: Optional[pulumi.Input[bool]]):
|
48
|
+
def hmac(self, value: Optional[pulumi.Input[builtins.bool]]):
|
48
49
|
pulumi.set(self, "hmac", value)
|
49
50
|
|
50
51
|
@property
|
51
52
|
@pulumi.getter
|
52
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
53
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
53
54
|
"""
|
54
55
|
The name of the request header to audit.
|
55
56
|
"""
|
56
57
|
return pulumi.get(self, "name")
|
57
58
|
|
58
59
|
@name.setter
|
59
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
60
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
60
61
|
pulumi.set(self, "name", value)
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
65
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
65
66
|
"""
|
66
67
|
Target namespace. (requires Enterprise)
|
67
68
|
"""
|
68
69
|
return pulumi.get(self, "namespace")
|
69
70
|
|
70
71
|
@namespace.setter
|
71
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
72
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
72
73
|
pulumi.set(self, "namespace", value)
|
73
74
|
|
74
75
|
|
75
76
|
@pulumi.input_type
|
76
77
|
class _AuditRequestHeaderState:
|
77
78
|
def __init__(__self__, *,
|
78
|
-
hmac: Optional[pulumi.Input[bool]] = None,
|
79
|
-
name: Optional[pulumi.Input[str]] = None,
|
80
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
79
|
+
hmac: Optional[pulumi.Input[builtins.bool]] = None,
|
80
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
81
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
81
82
|
"""
|
82
83
|
Input properties used for looking up and filtering AuditRequestHeader resources.
|
83
|
-
:param pulumi.Input[bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
84
|
-
:param pulumi.Input[str] name: The name of the request header to audit.
|
85
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
84
|
+
:param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
85
|
+
:param pulumi.Input[builtins.str] name: The name of the request header to audit.
|
86
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
86
87
|
"""
|
87
88
|
if hmac is not None:
|
88
89
|
pulumi.set(__self__, "hmac", hmac)
|
@@ -93,38 +94,38 @@ class _AuditRequestHeaderState:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def hmac(self) -> Optional[pulumi.Input[bool]]:
|
97
|
+
def hmac(self) -> Optional[pulumi.Input[builtins.bool]]:
|
97
98
|
"""
|
98
99
|
Whether this header's value should be HMAC'd in the audit logs.
|
99
100
|
"""
|
100
101
|
return pulumi.get(self, "hmac")
|
101
102
|
|
102
103
|
@hmac.setter
|
103
|
-
def hmac(self, value: Optional[pulumi.Input[bool]]):
|
104
|
+
def hmac(self, value: Optional[pulumi.Input[builtins.bool]]):
|
104
105
|
pulumi.set(self, "hmac", value)
|
105
106
|
|
106
107
|
@property
|
107
108
|
@pulumi.getter
|
108
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
109
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
109
110
|
"""
|
110
111
|
The name of the request header to audit.
|
111
112
|
"""
|
112
113
|
return pulumi.get(self, "name")
|
113
114
|
|
114
115
|
@name.setter
|
115
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
116
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
116
117
|
pulumi.set(self, "name", value)
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter
|
120
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
121
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
121
122
|
"""
|
122
123
|
Target namespace. (requires Enterprise)
|
123
124
|
"""
|
124
125
|
return pulumi.get(self, "namespace")
|
125
126
|
|
126
127
|
@namespace.setter
|
127
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
128
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
128
129
|
pulumi.set(self, "namespace", value)
|
129
130
|
|
130
131
|
|
@@ -133,9 +134,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
133
134
|
def __init__(__self__,
|
134
135
|
resource_name: str,
|
135
136
|
opts: Optional[pulumi.ResourceOptions] = None,
|
136
|
-
hmac: Optional[pulumi.Input[bool]] = None,
|
137
|
-
name: Optional[pulumi.Input[str]] = None,
|
138
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
137
|
+
hmac: Optional[pulumi.Input[builtins.bool]] = None,
|
138
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
139
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
139
140
|
__props__=None):
|
140
141
|
"""
|
141
142
|
Manages additional request headers that appear in audited requests.
|
@@ -158,9 +159,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
158
159
|
|
159
160
|
:param str resource_name: The name of the resource.
|
160
161
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
161
|
-
:param pulumi.Input[bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
162
|
-
:param pulumi.Input[str] name: The name of the request header to audit.
|
163
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
162
|
+
:param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
163
|
+
:param pulumi.Input[builtins.str] name: The name of the request header to audit.
|
164
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
164
165
|
"""
|
165
166
|
...
|
166
167
|
@overload
|
@@ -202,9 +203,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
202
203
|
def _internal_init(__self__,
|
203
204
|
resource_name: str,
|
204
205
|
opts: Optional[pulumi.ResourceOptions] = None,
|
205
|
-
hmac: Optional[pulumi.Input[bool]] = None,
|
206
|
-
name: Optional[pulumi.Input[str]] = None,
|
207
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
206
|
+
hmac: Optional[pulumi.Input[builtins.bool]] = None,
|
207
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
208
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
208
209
|
__props__=None):
|
209
210
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
210
211
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -227,9 +228,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
227
228
|
def get(resource_name: str,
|
228
229
|
id: pulumi.Input[str],
|
229
230
|
opts: Optional[pulumi.ResourceOptions] = None,
|
230
|
-
hmac: Optional[pulumi.Input[bool]] = None,
|
231
|
-
name: Optional[pulumi.Input[str]] = None,
|
232
|
-
namespace: Optional[pulumi.Input[str]] = None) -> 'AuditRequestHeader':
|
231
|
+
hmac: Optional[pulumi.Input[builtins.bool]] = None,
|
232
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
233
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'AuditRequestHeader':
|
233
234
|
"""
|
234
235
|
Get an existing AuditRequestHeader resource's state with the given name, id, and optional extra
|
235
236
|
properties used to qualify the lookup.
|
@@ -237,9 +238,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
237
238
|
:param str resource_name: The unique name of the resulting resource.
|
238
239
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
239
240
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
240
|
-
:param pulumi.Input[bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
241
|
-
:param pulumi.Input[str] name: The name of the request header to audit.
|
242
|
-
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
241
|
+
:param pulumi.Input[builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
242
|
+
:param pulumi.Input[builtins.str] name: The name of the request header to audit.
|
243
|
+
:param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
|
243
244
|
"""
|
244
245
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
245
246
|
|
@@ -252,7 +253,7 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
252
253
|
|
253
254
|
@property
|
254
255
|
@pulumi.getter
|
255
|
-
def hmac(self) -> pulumi.Output[Optional[bool]]:
|
256
|
+
def hmac(self) -> pulumi.Output[Optional[builtins.bool]]:
|
256
257
|
"""
|
257
258
|
Whether this header's value should be HMAC'd in the audit logs.
|
258
259
|
"""
|
@@ -260,7 +261,7 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
260
261
|
|
261
262
|
@property
|
262
263
|
@pulumi.getter
|
263
|
-
def name(self) -> pulumi.Output[str]:
|
264
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
264
265
|
"""
|
265
266
|
The name of the request header to audit.
|
266
267
|
"""
|
@@ -268,7 +269,7 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
268
269
|
|
269
270
|
@property
|
270
271
|
@pulumi.getter
|
271
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
272
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
272
273
|
"""
|
273
274
|
Target namespace. (requires Enterprise)
|
274
275
|
"""
|