pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,16 +20,16 @@ __all__ = ['RgpPolicyArgs', 'RgpPolicy']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class RgpPolicyArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
enforcement_level: pulumi.Input[str],
|
23
|
-
policy: pulumi.Input[str],
|
24
|
-
name: Optional[pulumi.Input[str]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
enforcement_level: pulumi.Input[builtins.str],
|
24
|
+
policy: pulumi.Input[builtins.str],
|
25
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a RgpPolicy resource.
|
28
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
29
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
30
|
-
:param pulumi.Input[str] name: The name of the policy
|
31
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
30
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
31
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
32
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
32
33
|
The value should not contain leading or trailing forward slashes.
|
33
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
35
|
*Available only for Vault Enterprise*.
|
@@ -42,43 +43,43 @@ class RgpPolicyArgs:
|
|
42
43
|
|
43
44
|
@property
|
44
45
|
@pulumi.getter(name="enforcementLevel")
|
45
|
-
def enforcement_level(self) -> pulumi.Input[str]:
|
46
|
+
def enforcement_level(self) -> pulumi.Input[builtins.str]:
|
46
47
|
"""
|
47
48
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
48
49
|
"""
|
49
50
|
return pulumi.get(self, "enforcement_level")
|
50
51
|
|
51
52
|
@enforcement_level.setter
|
52
|
-
def enforcement_level(self, value: pulumi.Input[str]):
|
53
|
+
def enforcement_level(self, value: pulumi.Input[builtins.str]):
|
53
54
|
pulumi.set(self, "enforcement_level", value)
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def policy(self) -> pulumi.Input[str]:
|
58
|
+
def policy(self) -> pulumi.Input[builtins.str]:
|
58
59
|
"""
|
59
60
|
String containing a Sentinel policy
|
60
61
|
"""
|
61
62
|
return pulumi.get(self, "policy")
|
62
63
|
|
63
64
|
@policy.setter
|
64
|
-
def policy(self, value: pulumi.Input[str]):
|
65
|
+
def policy(self, value: pulumi.Input[builtins.str]):
|
65
66
|
pulumi.set(self, "policy", value)
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
70
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
70
71
|
"""
|
71
72
|
The name of the policy
|
72
73
|
"""
|
73
74
|
return pulumi.get(self, "name")
|
74
75
|
|
75
76
|
@name.setter
|
76
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
77
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
77
78
|
pulumi.set(self, "name", value)
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
82
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
82
83
|
"""
|
83
84
|
The namespace to provision the resource in.
|
84
85
|
The value should not contain leading or trailing forward slashes.
|
@@ -88,26 +89,26 @@ class RgpPolicyArgs:
|
|
88
89
|
return pulumi.get(self, "namespace")
|
89
90
|
|
90
91
|
@namespace.setter
|
91
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
92
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
92
93
|
pulumi.set(self, "namespace", value)
|
93
94
|
|
94
95
|
|
95
96
|
@pulumi.input_type
|
96
97
|
class _RgpPolicyState:
|
97
98
|
def __init__(__self__, *,
|
98
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
99
|
-
name: Optional[pulumi.Input[str]] = None,
|
100
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
101
|
-
policy: Optional[pulumi.Input[str]] = None):
|
99
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
100
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
101
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
102
|
+
policy: Optional[pulumi.Input[builtins.str]] = None):
|
102
103
|
"""
|
103
104
|
Input properties used for looking up and filtering RgpPolicy resources.
|
104
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
105
|
-
:param pulumi.Input[str] name: The name of the policy
|
106
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
106
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
107
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
107
108
|
The value should not contain leading or trailing forward slashes.
|
108
109
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
110
|
*Available only for Vault Enterprise*.
|
110
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
111
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
111
112
|
"""
|
112
113
|
if enforcement_level is not None:
|
113
114
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -120,31 +121,31 @@ class _RgpPolicyState:
|
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter(name="enforcementLevel")
|
123
|
-
def enforcement_level(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
126
127
|
"""
|
127
128
|
return pulumi.get(self, "enforcement_level")
|
128
129
|
|
129
130
|
@enforcement_level.setter
|
130
|
-
def enforcement_level(self, value: Optional[pulumi.Input[str]]):
|
131
|
+
def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
|
131
132
|
pulumi.set(self, "enforcement_level", value)
|
132
133
|
|
133
134
|
@property
|
134
135
|
@pulumi.getter
|
135
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
136
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
136
137
|
"""
|
137
138
|
The name of the policy
|
138
139
|
"""
|
139
140
|
return pulumi.get(self, "name")
|
140
141
|
|
141
142
|
@name.setter
|
142
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
143
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
143
144
|
pulumi.set(self, "name", value)
|
144
145
|
|
145
146
|
@property
|
146
147
|
@pulumi.getter
|
147
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
148
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
148
149
|
"""
|
149
150
|
The namespace to provision the resource in.
|
150
151
|
The value should not contain leading or trailing forward slashes.
|
@@ -154,19 +155,19 @@ class _RgpPolicyState:
|
|
154
155
|
return pulumi.get(self, "namespace")
|
155
156
|
|
156
157
|
@namespace.setter
|
157
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
158
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
158
159
|
pulumi.set(self, "namespace", value)
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter
|
162
|
-
def policy(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
def policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
163
164
|
"""
|
164
165
|
String containing a Sentinel policy
|
165
166
|
"""
|
166
167
|
return pulumi.get(self, "policy")
|
167
168
|
|
168
169
|
@policy.setter
|
169
|
-
def policy(self, value: Optional[pulumi.Input[str]]):
|
170
|
+
def policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
170
171
|
pulumi.set(self, "policy", value)
|
171
172
|
|
172
173
|
|
@@ -175,10 +176,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
175
176
|
def __init__(__self__,
|
176
177
|
resource_name: str,
|
177
178
|
opts: Optional[pulumi.ResourceOptions] = None,
|
178
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
179
|
-
name: Optional[pulumi.Input[str]] = None,
|
180
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
181
|
-
policy: Optional[pulumi.Input[str]] = None,
|
179
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
180
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
181
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
182
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
182
183
|
__props__=None):
|
183
184
|
"""
|
184
185
|
Provides a resource to manage Role Governing Policy (RGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
|
@@ -202,13 +203,13 @@ class RgpPolicy(pulumi.CustomResource):
|
|
202
203
|
|
203
204
|
:param str resource_name: The name of the resource.
|
204
205
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
205
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
206
|
-
:param pulumi.Input[str] name: The name of the policy
|
207
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
206
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
207
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
208
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
208
209
|
The value should not contain leading or trailing forward slashes.
|
209
210
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
210
211
|
*Available only for Vault Enterprise*.
|
211
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
212
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
212
213
|
"""
|
213
214
|
...
|
214
215
|
@overload
|
@@ -251,10 +252,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
251
252
|
def _internal_init(__self__,
|
252
253
|
resource_name: str,
|
253
254
|
opts: Optional[pulumi.ResourceOptions] = None,
|
254
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
255
|
-
name: Optional[pulumi.Input[str]] = None,
|
256
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
257
|
-
policy: Optional[pulumi.Input[str]] = None,
|
255
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
256
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
257
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
258
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
258
259
|
__props__=None):
|
259
260
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
260
261
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -282,10 +283,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
282
283
|
def get(resource_name: str,
|
283
284
|
id: pulumi.Input[str],
|
284
285
|
opts: Optional[pulumi.ResourceOptions] = None,
|
285
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
286
|
-
name: Optional[pulumi.Input[str]] = None,
|
287
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
288
|
-
policy: Optional[pulumi.Input[str]] = None) -> 'RgpPolicy':
|
286
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
287
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
288
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
289
|
+
policy: Optional[pulumi.Input[builtins.str]] = None) -> 'RgpPolicy':
|
289
290
|
"""
|
290
291
|
Get an existing RgpPolicy resource's state with the given name, id, and optional extra
|
291
292
|
properties used to qualify the lookup.
|
@@ -293,13 +294,13 @@ class RgpPolicy(pulumi.CustomResource):
|
|
293
294
|
:param str resource_name: The unique name of the resulting resource.
|
294
295
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
295
296
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
296
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
297
|
-
:param pulumi.Input[str] name: The name of the policy
|
298
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
297
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
298
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
299
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
299
300
|
The value should not contain leading or trailing forward slashes.
|
300
301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
301
302
|
*Available only for Vault Enterprise*.
|
302
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
303
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
303
304
|
"""
|
304
305
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
305
306
|
|
@@ -313,7 +314,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
313
314
|
|
314
315
|
@property
|
315
316
|
@pulumi.getter(name="enforcementLevel")
|
316
|
-
def enforcement_level(self) -> pulumi.Output[str]:
|
317
|
+
def enforcement_level(self) -> pulumi.Output[builtins.str]:
|
317
318
|
"""
|
318
319
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
319
320
|
"""
|
@@ -321,7 +322,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
321
322
|
|
322
323
|
@property
|
323
324
|
@pulumi.getter
|
324
|
-
def name(self) -> pulumi.Output[str]:
|
325
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
325
326
|
"""
|
326
327
|
The name of the policy
|
327
328
|
"""
|
@@ -329,7 +330,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
329
330
|
|
330
331
|
@property
|
331
332
|
@pulumi.getter
|
332
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
333
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
333
334
|
"""
|
334
335
|
The namespace to provision the resource in.
|
335
336
|
The value should not contain leading or trailing forward slashes.
|
@@ -340,7 +341,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
340
341
|
|
341
342
|
@property
|
342
343
|
@pulumi.getter
|
343
|
-
def policy(self) -> pulumi.Output[str]:
|
344
|
+
def policy(self) -> pulumi.Output[builtins.str]:
|
344
345
|
"""
|
345
346
|
String containing a Sentinel policy
|
346
347
|
"""
|
pulumi_vault/saml/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|