pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,23 +22,23 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class SecretBackendRoleArgs:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
backend: pulumi.Input[str],
|
25
|
-
name: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
tags: Optional[pulumi.Input[str]] = None,
|
25
|
+
backend: pulumi.Input[builtins.str],
|
26
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
tags: Optional[pulumi.Input[builtins.str]] = None,
|
28
29
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
|
29
30
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
|
30
31
|
"""
|
31
32
|
The set of arguments for constructing a SecretBackendRole resource.
|
32
|
-
:param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
|
33
|
+
:param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
33
34
|
with no leading or trailing `/`s.
|
34
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
35
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
35
36
|
Must be unique within the backend.
|
36
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
37
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
37
38
|
The value should not contain leading or trailing forward slashes.
|
38
39
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
40
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
41
|
+
:param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
41
42
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
42
43
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
43
44
|
"""
|
@@ -55,7 +56,7 @@ class SecretBackendRoleArgs:
|
|
55
56
|
|
56
57
|
@property
|
57
58
|
@pulumi.getter
|
58
|
-
def backend(self) -> pulumi.Input[str]:
|
59
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
59
60
|
"""
|
60
61
|
The path the RabbitMQ secret backend is mounted at,
|
61
62
|
with no leading or trailing `/`s.
|
@@ -63,12 +64,12 @@ class SecretBackendRoleArgs:
|
|
63
64
|
return pulumi.get(self, "backend")
|
64
65
|
|
65
66
|
@backend.setter
|
66
|
-
def backend(self, value: pulumi.Input[str]):
|
67
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
67
68
|
pulumi.set(self, "backend", value)
|
68
69
|
|
69
70
|
@property
|
70
71
|
@pulumi.getter
|
71
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
72
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
72
73
|
"""
|
73
74
|
The name to identify this role within the backend.
|
74
75
|
Must be unique within the backend.
|
@@ -76,12 +77,12 @@ class SecretBackendRoleArgs:
|
|
76
77
|
return pulumi.get(self, "name")
|
77
78
|
|
78
79
|
@name.setter
|
79
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
80
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
80
81
|
pulumi.set(self, "name", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
85
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
85
86
|
"""
|
86
87
|
The namespace to provision the resource in.
|
87
88
|
The value should not contain leading or trailing forward slashes.
|
@@ -91,19 +92,19 @@ class SecretBackendRoleArgs:
|
|
91
92
|
return pulumi.get(self, "namespace")
|
92
93
|
|
93
94
|
@namespace.setter
|
94
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
95
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
95
96
|
pulumi.set(self, "namespace", value)
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter
|
99
|
-
def tags(self) -> Optional[pulumi.Input[str]]:
|
100
|
+
def tags(self) -> Optional[pulumi.Input[builtins.str]]:
|
100
101
|
"""
|
101
102
|
Specifies a comma-separated RabbitMQ management tags.
|
102
103
|
"""
|
103
104
|
return pulumi.get(self, "tags")
|
104
105
|
|
105
106
|
@tags.setter
|
106
|
-
def tags(self, value: Optional[pulumi.Input[str]]):
|
107
|
+
def tags(self, value: Optional[pulumi.Input[builtins.str]]):
|
107
108
|
pulumi.set(self, "tags", value)
|
108
109
|
|
109
110
|
@property
|
@@ -134,23 +135,23 @@ class SecretBackendRoleArgs:
|
|
134
135
|
@pulumi.input_type
|
135
136
|
class _SecretBackendRoleState:
|
136
137
|
def __init__(__self__, *,
|
137
|
-
backend: Optional[pulumi.Input[str]] = None,
|
138
|
-
name: Optional[pulumi.Input[str]] = None,
|
139
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
140
|
-
tags: Optional[pulumi.Input[str]] = None,
|
138
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
139
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
140
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
141
|
+
tags: Optional[pulumi.Input[builtins.str]] = None,
|
141
142
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
|
142
143
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
|
143
144
|
"""
|
144
145
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
145
|
-
:param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
|
146
|
+
:param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
146
147
|
with no leading or trailing `/`s.
|
147
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
148
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
148
149
|
Must be unique within the backend.
|
149
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
150
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
150
151
|
The value should not contain leading or trailing forward slashes.
|
151
152
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
152
153
|
*Available only for Vault Enterprise*.
|
153
|
-
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
154
|
+
:param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
154
155
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
155
156
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
156
157
|
"""
|
@@ -169,7 +170,7 @@ class _SecretBackendRoleState:
|
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter
|
172
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
173
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
173
174
|
"""
|
174
175
|
The path the RabbitMQ secret backend is mounted at,
|
175
176
|
with no leading or trailing `/`s.
|
@@ -177,12 +178,12 @@ class _SecretBackendRoleState:
|
|
177
178
|
return pulumi.get(self, "backend")
|
178
179
|
|
179
180
|
@backend.setter
|
180
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
181
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
181
182
|
pulumi.set(self, "backend", value)
|
182
183
|
|
183
184
|
@property
|
184
185
|
@pulumi.getter
|
185
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
186
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
186
187
|
"""
|
187
188
|
The name to identify this role within the backend.
|
188
189
|
Must be unique within the backend.
|
@@ -190,12 +191,12 @@ class _SecretBackendRoleState:
|
|
190
191
|
return pulumi.get(self, "name")
|
191
192
|
|
192
193
|
@name.setter
|
193
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
194
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
194
195
|
pulumi.set(self, "name", value)
|
195
196
|
|
196
197
|
@property
|
197
198
|
@pulumi.getter
|
198
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
199
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
199
200
|
"""
|
200
201
|
The namespace to provision the resource in.
|
201
202
|
The value should not contain leading or trailing forward slashes.
|
@@ -205,19 +206,19 @@ class _SecretBackendRoleState:
|
|
205
206
|
return pulumi.get(self, "namespace")
|
206
207
|
|
207
208
|
@namespace.setter
|
208
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
209
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
209
210
|
pulumi.set(self, "namespace", value)
|
210
211
|
|
211
212
|
@property
|
212
213
|
@pulumi.getter
|
213
|
-
def tags(self) -> Optional[pulumi.Input[str]]:
|
214
|
+
def tags(self) -> Optional[pulumi.Input[builtins.str]]:
|
214
215
|
"""
|
215
216
|
Specifies a comma-separated RabbitMQ management tags.
|
216
217
|
"""
|
217
218
|
return pulumi.get(self, "tags")
|
218
219
|
|
219
220
|
@tags.setter
|
220
|
-
def tags(self, value: Optional[pulumi.Input[str]]):
|
221
|
+
def tags(self, value: Optional[pulumi.Input[builtins.str]]):
|
221
222
|
pulumi.set(self, "tags", value)
|
222
223
|
|
223
224
|
@property
|
@@ -250,10 +251,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
250
251
|
def __init__(__self__,
|
251
252
|
resource_name: str,
|
252
253
|
opts: Optional[pulumi.ResourceOptions] = None,
|
253
|
-
backend: Optional[pulumi.Input[str]] = None,
|
254
|
-
name: Optional[pulumi.Input[str]] = None,
|
255
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
256
|
-
tags: Optional[pulumi.Input[str]] = None,
|
254
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
255
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
256
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
257
|
+
tags: Optional[pulumi.Input[builtins.str]] = None,
|
257
258
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
258
259
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
259
260
|
__props__=None):
|
@@ -298,15 +299,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
298
299
|
|
299
300
|
:param str resource_name: The name of the resource.
|
300
301
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
301
|
-
:param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
|
302
|
+
:param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
302
303
|
with no leading or trailing `/`s.
|
303
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
304
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
304
305
|
Must be unique within the backend.
|
305
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
306
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
306
307
|
The value should not contain leading or trailing forward slashes.
|
307
308
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
308
309
|
*Available only for Vault Enterprise*.
|
309
|
-
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
310
|
+
:param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
310
311
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
311
312
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
312
313
|
"""
|
@@ -370,10 +371,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
370
371
|
def _internal_init(__self__,
|
371
372
|
resource_name: str,
|
372
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
373
|
-
backend: Optional[pulumi.Input[str]] = None,
|
374
|
-
name: Optional[pulumi.Input[str]] = None,
|
375
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
376
|
-
tags: Optional[pulumi.Input[str]] = None,
|
374
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
375
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
376
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
377
|
+
tags: Optional[pulumi.Input[builtins.str]] = None,
|
377
378
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
378
379
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
379
380
|
__props__=None):
|
@@ -403,10 +404,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
403
404
|
def get(resource_name: str,
|
404
405
|
id: pulumi.Input[str],
|
405
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
406
|
-
backend: Optional[pulumi.Input[str]] = None,
|
407
|
-
name: Optional[pulumi.Input[str]] = None,
|
408
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
409
|
-
tags: Optional[pulumi.Input[str]] = None,
|
407
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
408
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
409
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
410
|
+
tags: Optional[pulumi.Input[builtins.str]] = None,
|
410
411
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
411
412
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
|
412
413
|
"""
|
@@ -416,15 +417,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
416
417
|
:param str resource_name: The unique name of the resulting resource.
|
417
418
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
418
419
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
419
|
-
:param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
|
420
|
+
:param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
420
421
|
with no leading or trailing `/`s.
|
421
|
-
:param pulumi.Input[str] name: The name to identify this role within the backend.
|
422
|
+
:param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
|
422
423
|
Must be unique within the backend.
|
423
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
424
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
424
425
|
The value should not contain leading or trailing forward slashes.
|
425
426
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
426
427
|
*Available only for Vault Enterprise*.
|
427
|
-
:param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
|
428
|
+
:param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
428
429
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
429
430
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
430
431
|
"""
|
@@ -442,7 +443,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
442
443
|
|
443
444
|
@property
|
444
445
|
@pulumi.getter
|
445
|
-
def backend(self) -> pulumi.Output[str]:
|
446
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
446
447
|
"""
|
447
448
|
The path the RabbitMQ secret backend is mounted at,
|
448
449
|
with no leading or trailing `/`s.
|
@@ -451,7 +452,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
451
452
|
|
452
453
|
@property
|
453
454
|
@pulumi.getter
|
454
|
-
def name(self) -> pulumi.Output[str]:
|
455
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
455
456
|
"""
|
456
457
|
The name to identify this role within the backend.
|
457
458
|
Must be unique within the backend.
|
@@ -460,7 +461,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
460
461
|
|
461
462
|
@property
|
462
463
|
@pulumi.getter
|
463
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
464
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
464
465
|
"""
|
465
466
|
The namespace to provision the resource in.
|
466
467
|
The value should not contain leading or trailing forward slashes.
|
@@ -471,7 +472,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
471
472
|
|
472
473
|
@property
|
473
474
|
@pulumi.getter
|
474
|
-
def tags(self) -> pulumi.Output[Optional[str]]:
|
475
|
+
def tags(self) -> pulumi.Output[Optional[builtins.str]]:
|
475
476
|
"""
|
476
477
|
Specifies a comma-separated RabbitMQ management tags.
|
477
478
|
"""
|