pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/rabbitmq/_inputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -27,19 +28,19 @@ MYPY = False
|
|
27
28
|
|
28
29
|
if not MYPY:
|
29
30
|
class SecretBackendRoleVhostArgsDict(TypedDict):
|
30
|
-
configure: pulumi.Input[str]
|
31
|
+
configure: pulumi.Input[builtins.str]
|
31
32
|
"""
|
32
33
|
The configure permissions for this vhost.
|
33
34
|
"""
|
34
|
-
host: pulumi.Input[str]
|
35
|
+
host: pulumi.Input[builtins.str]
|
35
36
|
"""
|
36
37
|
The vhost to set permissions for.
|
37
38
|
"""
|
38
|
-
read: pulumi.Input[str]
|
39
|
+
read: pulumi.Input[builtins.str]
|
39
40
|
"""
|
40
41
|
The read permissions for this vhost.
|
41
42
|
"""
|
42
|
-
write: pulumi.Input[str]
|
43
|
+
write: pulumi.Input[builtins.str]
|
43
44
|
"""
|
44
45
|
The write permissions for this vhost.
|
45
46
|
"""
|
@@ -49,15 +50,15 @@ elif False:
|
|
49
50
|
@pulumi.input_type
|
50
51
|
class SecretBackendRoleVhostArgs:
|
51
52
|
def __init__(__self__, *,
|
52
|
-
configure: pulumi.Input[str],
|
53
|
-
host: pulumi.Input[str],
|
54
|
-
read: pulumi.Input[str],
|
55
|
-
write: pulumi.Input[str]):
|
53
|
+
configure: pulumi.Input[builtins.str],
|
54
|
+
host: pulumi.Input[builtins.str],
|
55
|
+
read: pulumi.Input[builtins.str],
|
56
|
+
write: pulumi.Input[builtins.str]):
|
56
57
|
"""
|
57
|
-
:param pulumi.Input[str] configure: The configure permissions for this vhost.
|
58
|
-
:param pulumi.Input[str] host: The vhost to set permissions for.
|
59
|
-
:param pulumi.Input[str] read: The read permissions for this vhost.
|
60
|
-
:param pulumi.Input[str] write: The write permissions for this vhost.
|
58
|
+
:param pulumi.Input[builtins.str] configure: The configure permissions for this vhost.
|
59
|
+
:param pulumi.Input[builtins.str] host: The vhost to set permissions for.
|
60
|
+
:param pulumi.Input[builtins.str] read: The read permissions for this vhost.
|
61
|
+
:param pulumi.Input[builtins.str] write: The write permissions for this vhost.
|
61
62
|
"""
|
62
63
|
pulumi.set(__self__, "configure", configure)
|
63
64
|
pulumi.set(__self__, "host", host)
|
@@ -66,56 +67,56 @@ class SecretBackendRoleVhostArgs:
|
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def configure(self) -> pulumi.Input[str]:
|
70
|
+
def configure(self) -> pulumi.Input[builtins.str]:
|
70
71
|
"""
|
71
72
|
The configure permissions for this vhost.
|
72
73
|
"""
|
73
74
|
return pulumi.get(self, "configure")
|
74
75
|
|
75
76
|
@configure.setter
|
76
|
-
def configure(self, value: pulumi.Input[str]):
|
77
|
+
def configure(self, value: pulumi.Input[builtins.str]):
|
77
78
|
pulumi.set(self, "configure", value)
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def host(self) -> pulumi.Input[str]:
|
82
|
+
def host(self) -> pulumi.Input[builtins.str]:
|
82
83
|
"""
|
83
84
|
The vhost to set permissions for.
|
84
85
|
"""
|
85
86
|
return pulumi.get(self, "host")
|
86
87
|
|
87
88
|
@host.setter
|
88
|
-
def host(self, value: pulumi.Input[str]):
|
89
|
+
def host(self, value: pulumi.Input[builtins.str]):
|
89
90
|
pulumi.set(self, "host", value)
|
90
91
|
|
91
92
|
@property
|
92
93
|
@pulumi.getter
|
93
|
-
def read(self) -> pulumi.Input[str]:
|
94
|
+
def read(self) -> pulumi.Input[builtins.str]:
|
94
95
|
"""
|
95
96
|
The read permissions for this vhost.
|
96
97
|
"""
|
97
98
|
return pulumi.get(self, "read")
|
98
99
|
|
99
100
|
@read.setter
|
100
|
-
def read(self, value: pulumi.Input[str]):
|
101
|
+
def read(self, value: pulumi.Input[builtins.str]):
|
101
102
|
pulumi.set(self, "read", value)
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter
|
105
|
-
def write(self) -> pulumi.Input[str]:
|
106
|
+
def write(self) -> pulumi.Input[builtins.str]:
|
106
107
|
"""
|
107
108
|
The write permissions for this vhost.
|
108
109
|
"""
|
109
110
|
return pulumi.get(self, "write")
|
110
111
|
|
111
112
|
@write.setter
|
112
|
-
def write(self, value: pulumi.Input[str]):
|
113
|
+
def write(self, value: pulumi.Input[builtins.str]):
|
113
114
|
pulumi.set(self, "write", value)
|
114
115
|
|
115
116
|
|
116
117
|
if not MYPY:
|
117
118
|
class SecretBackendRoleVhostTopicArgsDict(TypedDict):
|
118
|
-
host: pulumi.Input[str]
|
119
|
+
host: pulumi.Input[builtins.str]
|
119
120
|
"""
|
120
121
|
The vhost to set permissions for.
|
121
122
|
"""
|
@@ -129,10 +130,10 @@ elif False:
|
|
129
130
|
@pulumi.input_type
|
130
131
|
class SecretBackendRoleVhostTopicArgs:
|
131
132
|
def __init__(__self__, *,
|
132
|
-
host: pulumi.Input[str],
|
133
|
+
host: pulumi.Input[builtins.str],
|
133
134
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]] = None):
|
134
135
|
"""
|
135
|
-
:param pulumi.Input[str] host: The vhost to set permissions for.
|
136
|
+
:param pulumi.Input[builtins.str] host: The vhost to set permissions for.
|
136
137
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
137
138
|
"""
|
138
139
|
pulumi.set(__self__, "host", host)
|
@@ -141,14 +142,14 @@ class SecretBackendRoleVhostTopicArgs:
|
|
141
142
|
|
142
143
|
@property
|
143
144
|
@pulumi.getter
|
144
|
-
def host(self) -> pulumi.Input[str]:
|
145
|
+
def host(self) -> pulumi.Input[builtins.str]:
|
145
146
|
"""
|
146
147
|
The vhost to set permissions for.
|
147
148
|
"""
|
148
149
|
return pulumi.get(self, "host")
|
149
150
|
|
150
151
|
@host.setter
|
151
|
-
def host(self, value: pulumi.Input[str]):
|
152
|
+
def host(self, value: pulumi.Input[builtins.str]):
|
152
153
|
pulumi.set(self, "host", value)
|
153
154
|
|
154
155
|
@property
|
@@ -166,15 +167,15 @@ class SecretBackendRoleVhostTopicArgs:
|
|
166
167
|
|
167
168
|
if not MYPY:
|
168
169
|
class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict):
|
169
|
-
read: pulumi.Input[str]
|
170
|
+
read: pulumi.Input[builtins.str]
|
170
171
|
"""
|
171
172
|
The read permissions for this vhost.
|
172
173
|
"""
|
173
|
-
topic: pulumi.Input[str]
|
174
|
+
topic: pulumi.Input[builtins.str]
|
174
175
|
"""
|
175
176
|
The vhost to set permissions for.
|
176
177
|
"""
|
177
|
-
write: pulumi.Input[str]
|
178
|
+
write: pulumi.Input[builtins.str]
|
178
179
|
"""
|
179
180
|
The write permissions for this vhost.
|
180
181
|
"""
|
@@ -184,13 +185,13 @@ elif False:
|
|
184
185
|
@pulumi.input_type
|
185
186
|
class SecretBackendRoleVhostTopicVhostArgs:
|
186
187
|
def __init__(__self__, *,
|
187
|
-
read: pulumi.Input[str],
|
188
|
-
topic: pulumi.Input[str],
|
189
|
-
write: pulumi.Input[str]):
|
188
|
+
read: pulumi.Input[builtins.str],
|
189
|
+
topic: pulumi.Input[builtins.str],
|
190
|
+
write: pulumi.Input[builtins.str]):
|
190
191
|
"""
|
191
|
-
:param pulumi.Input[str] read: The read permissions for this vhost.
|
192
|
-
:param pulumi.Input[str] topic: The vhost to set permissions for.
|
193
|
-
:param pulumi.Input[str] write: The write permissions for this vhost.
|
192
|
+
:param pulumi.Input[builtins.str] read: The read permissions for this vhost.
|
193
|
+
:param pulumi.Input[builtins.str] topic: The vhost to set permissions for.
|
194
|
+
:param pulumi.Input[builtins.str] write: The write permissions for this vhost.
|
194
195
|
"""
|
195
196
|
pulumi.set(__self__, "read", read)
|
196
197
|
pulumi.set(__self__, "topic", topic)
|
@@ -198,38 +199,38 @@ class SecretBackendRoleVhostTopicVhostArgs:
|
|
198
199
|
|
199
200
|
@property
|
200
201
|
@pulumi.getter
|
201
|
-
def read(self) -> pulumi.Input[str]:
|
202
|
+
def read(self) -> pulumi.Input[builtins.str]:
|
202
203
|
"""
|
203
204
|
The read permissions for this vhost.
|
204
205
|
"""
|
205
206
|
return pulumi.get(self, "read")
|
206
207
|
|
207
208
|
@read.setter
|
208
|
-
def read(self, value: pulumi.Input[str]):
|
209
|
+
def read(self, value: pulumi.Input[builtins.str]):
|
209
210
|
pulumi.set(self, "read", value)
|
210
211
|
|
211
212
|
@property
|
212
213
|
@pulumi.getter
|
213
|
-
def topic(self) -> pulumi.Input[str]:
|
214
|
+
def topic(self) -> pulumi.Input[builtins.str]:
|
214
215
|
"""
|
215
216
|
The vhost to set permissions for.
|
216
217
|
"""
|
217
218
|
return pulumi.get(self, "topic")
|
218
219
|
|
219
220
|
@topic.setter
|
220
|
-
def topic(self, value: pulumi.Input[str]):
|
221
|
+
def topic(self, value: pulumi.Input[builtins.str]):
|
221
222
|
pulumi.set(self, "topic", value)
|
222
223
|
|
223
224
|
@property
|
224
225
|
@pulumi.getter
|
225
|
-
def write(self) -> pulumi.Input[str]:
|
226
|
+
def write(self) -> pulumi.Input[builtins.str]:
|
226
227
|
"""
|
227
228
|
The write permissions for this vhost.
|
228
229
|
"""
|
229
230
|
return pulumi.get(self, "write")
|
230
231
|
|
231
232
|
@write.setter
|
232
|
-
def write(self, value: pulumi.Input[str]):
|
233
|
+
def write(self, value: pulumi.Input[builtins.str]):
|
233
234
|
pulumi.set(self, "write", value)
|
234
235
|
|
235
236
|
|
pulumi_vault/rabbitmq/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -24,15 +25,15 @@ __all__ = [
|
|
24
25
|
@pulumi.output_type
|
25
26
|
class SecretBackendRoleVhost(dict):
|
26
27
|
def __init__(__self__, *,
|
27
|
-
configure: str,
|
28
|
-
host: str,
|
29
|
-
read: str,
|
30
|
-
write: str):
|
28
|
+
configure: builtins.str,
|
29
|
+
host: builtins.str,
|
30
|
+
read: builtins.str,
|
31
|
+
write: builtins.str):
|
31
32
|
"""
|
32
|
-
:param str configure: The configure permissions for this vhost.
|
33
|
-
:param str host: The vhost to set permissions for.
|
34
|
-
:param str read: The read permissions for this vhost.
|
35
|
-
:param str write: The write permissions for this vhost.
|
33
|
+
:param builtins.str configure: The configure permissions for this vhost.
|
34
|
+
:param builtins.str host: The vhost to set permissions for.
|
35
|
+
:param builtins.str read: The read permissions for this vhost.
|
36
|
+
:param builtins.str write: The write permissions for this vhost.
|
36
37
|
"""
|
37
38
|
pulumi.set(__self__, "configure", configure)
|
38
39
|
pulumi.set(__self__, "host", host)
|
@@ -41,7 +42,7 @@ class SecretBackendRoleVhost(dict):
|
|
41
42
|
|
42
43
|
@property
|
43
44
|
@pulumi.getter
|
44
|
-
def configure(self) -> str:
|
45
|
+
def configure(self) -> builtins.str:
|
45
46
|
"""
|
46
47
|
The configure permissions for this vhost.
|
47
48
|
"""
|
@@ -49,7 +50,7 @@ class SecretBackendRoleVhost(dict):
|
|
49
50
|
|
50
51
|
@property
|
51
52
|
@pulumi.getter
|
52
|
-
def host(self) -> str:
|
53
|
+
def host(self) -> builtins.str:
|
53
54
|
"""
|
54
55
|
The vhost to set permissions for.
|
55
56
|
"""
|
@@ -57,7 +58,7 @@ class SecretBackendRoleVhost(dict):
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def read(self) -> str:
|
61
|
+
def read(self) -> builtins.str:
|
61
62
|
"""
|
62
63
|
The read permissions for this vhost.
|
63
64
|
"""
|
@@ -65,7 +66,7 @@ class SecretBackendRoleVhost(dict):
|
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter
|
68
|
-
def write(self) -> str:
|
69
|
+
def write(self) -> builtins.str:
|
69
70
|
"""
|
70
71
|
The write permissions for this vhost.
|
71
72
|
"""
|
@@ -75,10 +76,10 @@ class SecretBackendRoleVhost(dict):
|
|
75
76
|
@pulumi.output_type
|
76
77
|
class SecretBackendRoleVhostTopic(dict):
|
77
78
|
def __init__(__self__, *,
|
78
|
-
host: str,
|
79
|
+
host: builtins.str,
|
79
80
|
vhosts: Optional[Sequence['outputs.SecretBackendRoleVhostTopicVhost']] = None):
|
80
81
|
"""
|
81
|
-
:param str host: The vhost to set permissions for.
|
82
|
+
:param builtins.str host: The vhost to set permissions for.
|
82
83
|
:param Sequence['SecretBackendRoleVhostTopicVhostArgs'] vhosts: Specifies a map of virtual hosts to permissions.
|
83
84
|
"""
|
84
85
|
pulumi.set(__self__, "host", host)
|
@@ -87,7 +88,7 @@ class SecretBackendRoleVhostTopic(dict):
|
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter
|
90
|
-
def host(self) -> str:
|
91
|
+
def host(self) -> builtins.str:
|
91
92
|
"""
|
92
93
|
The vhost to set permissions for.
|
93
94
|
"""
|
@@ -105,13 +106,13 @@ class SecretBackendRoleVhostTopic(dict):
|
|
105
106
|
@pulumi.output_type
|
106
107
|
class SecretBackendRoleVhostTopicVhost(dict):
|
107
108
|
def __init__(__self__, *,
|
108
|
-
read: str,
|
109
|
-
topic: str,
|
110
|
-
write: str):
|
109
|
+
read: builtins.str,
|
110
|
+
topic: builtins.str,
|
111
|
+
write: builtins.str):
|
111
112
|
"""
|
112
|
-
:param str read: The read permissions for this vhost.
|
113
|
-
:param str topic: The vhost to set permissions for.
|
114
|
-
:param str write: The write permissions for this vhost.
|
113
|
+
:param builtins.str read: The read permissions for this vhost.
|
114
|
+
:param builtins.str topic: The vhost to set permissions for.
|
115
|
+
:param builtins.str write: The write permissions for this vhost.
|
115
116
|
"""
|
116
117
|
pulumi.set(__self__, "read", read)
|
117
118
|
pulumi.set(__self__, "topic", topic)
|
@@ -119,7 +120,7 @@ class SecretBackendRoleVhostTopicVhost(dict):
|
|
119
120
|
|
120
121
|
@property
|
121
122
|
@pulumi.getter
|
122
|
-
def read(self) -> str:
|
123
|
+
def read(self) -> builtins.str:
|
123
124
|
"""
|
124
125
|
The read permissions for this vhost.
|
125
126
|
"""
|
@@ -127,7 +128,7 @@ class SecretBackendRoleVhostTopicVhost(dict):
|
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter
|
130
|
-
def topic(self) -> str:
|
131
|
+
def topic(self) -> builtins.str:
|
131
132
|
"""
|
132
133
|
The vhost to set permissions for.
|
133
134
|
"""
|
@@ -135,7 +136,7 @@ class SecretBackendRoleVhostTopicVhost(dict):
|
|
135
136
|
|
136
137
|
@property
|
137
138
|
@pulumi.getter
|
138
|
-
def write(self) -> str:
|
139
|
+
def write(self) -> builtins.str:
|
139
140
|
"""
|
140
141
|
The write permissions for this vhost.
|
141
142
|
"""
|