pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendRoletagBlacklistArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
-
safety_buffer: Optional[pulumi.Input[int]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a AuthBackendRoletagBlacklist resource.
|
28
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
29
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
29
30
|
mounted at.
|
30
|
-
:param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
|
31
|
+
:param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
31
32
|
tidying of the roletag blacklist entries. Defaults to false.
|
32
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
33
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
33
34
|
The value should not contain leading or trailing forward slashes.
|
34
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
36
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
|
37
|
+
:param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
|
37
38
|
beyond the roletag expiration, before it is removed from the backend storage.
|
38
39
|
Defaults to 259,200 seconds, or 72 hours.
|
39
40
|
"""
|
@@ -47,7 +48,7 @@ class AuthBackendRoletagBlacklistArgs:
|
|
47
48
|
|
48
49
|
@property
|
49
50
|
@pulumi.getter
|
50
|
-
def backend(self) -> pulumi.Input[str]:
|
51
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
51
52
|
"""
|
52
53
|
The path the AWS auth backend being configured was
|
53
54
|
mounted at.
|
@@ -55,12 +56,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
55
56
|
return pulumi.get(self, "backend")
|
56
57
|
|
57
58
|
@backend.setter
|
58
|
-
def backend(self, value: pulumi.Input[str]):
|
59
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
59
60
|
pulumi.set(self, "backend", value)
|
60
61
|
|
61
62
|
@property
|
62
63
|
@pulumi.getter(name="disablePeriodicTidy")
|
63
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
|
64
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
64
65
|
"""
|
65
66
|
If set to true, disables the periodic
|
66
67
|
tidying of the roletag blacklist entries. Defaults to false.
|
@@ -68,12 +69,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
68
69
|
return pulumi.get(self, "disable_periodic_tidy")
|
69
70
|
|
70
71
|
@disable_periodic_tidy.setter
|
71
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
|
72
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
72
73
|
pulumi.set(self, "disable_periodic_tidy", value)
|
73
74
|
|
74
75
|
@property
|
75
76
|
@pulumi.getter
|
76
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
77
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
77
78
|
"""
|
78
79
|
The namespace to provision the resource in.
|
79
80
|
The value should not contain leading or trailing forward slashes.
|
@@ -83,12 +84,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
83
84
|
return pulumi.get(self, "namespace")
|
84
85
|
|
85
86
|
@namespace.setter
|
86
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
87
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
87
88
|
pulumi.set(self, "namespace", value)
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter(name="safetyBuffer")
|
91
|
-
def safety_buffer(self) -> Optional[pulumi.Input[int]]:
|
92
|
+
def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
|
92
93
|
"""
|
93
94
|
The amount of extra time that must have passed
|
94
95
|
beyond the roletag expiration, before it is removed from the backend storage.
|
@@ -97,28 +98,28 @@ class AuthBackendRoletagBlacklistArgs:
|
|
97
98
|
return pulumi.get(self, "safety_buffer")
|
98
99
|
|
99
100
|
@safety_buffer.setter
|
100
|
-
def safety_buffer(self, value: Optional[pulumi.Input[int]]):
|
101
|
+
def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
|
101
102
|
pulumi.set(self, "safety_buffer", value)
|
102
103
|
|
103
104
|
|
104
105
|
@pulumi.input_type
|
105
106
|
class _AuthBackendRoletagBlacklistState:
|
106
107
|
def __init__(__self__, *,
|
107
|
-
backend: Optional[pulumi.Input[str]] = None,
|
108
|
-
disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
|
109
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
110
|
-
safety_buffer: Optional[pulumi.Input[int]] = None):
|
108
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
109
|
+
disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
|
110
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
111
|
+
safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
|
111
112
|
"""
|
112
113
|
Input properties used for looking up and filtering AuthBackendRoletagBlacklist resources.
|
113
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
114
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
114
115
|
mounted at.
|
115
|
-
:param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
|
116
|
+
:param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
116
117
|
tidying of the roletag blacklist entries. Defaults to false.
|
117
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
118
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
118
119
|
The value should not contain leading or trailing forward slashes.
|
119
120
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
121
|
*Available only for Vault Enterprise*.
|
121
|
-
:param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
|
122
|
+
:param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
|
122
123
|
beyond the roletag expiration, before it is removed from the backend storage.
|
123
124
|
Defaults to 259,200 seconds, or 72 hours.
|
124
125
|
"""
|
@@ -133,7 +134,7 @@ class _AuthBackendRoletagBlacklistState:
|
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter
|
136
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
137
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
137
138
|
"""
|
138
139
|
The path the AWS auth backend being configured was
|
139
140
|
mounted at.
|
@@ -141,12 +142,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
141
142
|
return pulumi.get(self, "backend")
|
142
143
|
|
143
144
|
@backend.setter
|
144
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
145
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
145
146
|
pulumi.set(self, "backend", value)
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter(name="disablePeriodicTidy")
|
149
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
|
150
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
150
151
|
"""
|
151
152
|
If set to true, disables the periodic
|
152
153
|
tidying of the roletag blacklist entries. Defaults to false.
|
@@ -154,12 +155,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
154
155
|
return pulumi.get(self, "disable_periodic_tidy")
|
155
156
|
|
156
157
|
@disable_periodic_tidy.setter
|
157
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
|
158
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
158
159
|
pulumi.set(self, "disable_periodic_tidy", value)
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter
|
162
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
163
164
|
"""
|
164
165
|
The namespace to provision the resource in.
|
165
166
|
The value should not contain leading or trailing forward slashes.
|
@@ -169,12 +170,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
169
170
|
return pulumi.get(self, "namespace")
|
170
171
|
|
171
172
|
@namespace.setter
|
172
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
173
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
173
174
|
pulumi.set(self, "namespace", value)
|
174
175
|
|
175
176
|
@property
|
176
177
|
@pulumi.getter(name="safetyBuffer")
|
177
|
-
def safety_buffer(self) -> Optional[pulumi.Input[int]]:
|
178
|
+
def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
|
178
179
|
"""
|
179
180
|
The amount of extra time that must have passed
|
180
181
|
beyond the roletag expiration, before it is removed from the backend storage.
|
@@ -183,7 +184,7 @@ class _AuthBackendRoletagBlacklistState:
|
|
183
184
|
return pulumi.get(self, "safety_buffer")
|
184
185
|
|
185
186
|
@safety_buffer.setter
|
186
|
-
def safety_buffer(self, value: Optional[pulumi.Input[int]]):
|
187
|
+
def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
|
187
188
|
pulumi.set(self, "safety_buffer", value)
|
188
189
|
|
189
190
|
|
@@ -192,10 +193,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
192
193
|
def __init__(__self__,
|
193
194
|
resource_name: str,
|
194
195
|
opts: Optional[pulumi.ResourceOptions] = None,
|
195
|
-
backend: Optional[pulumi.Input[str]] = None,
|
196
|
-
disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
|
197
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
198
|
-
safety_buffer: Optional[pulumi.Input[int]] = None,
|
196
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
197
|
+
disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
|
198
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
199
|
+
safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
|
199
200
|
__props__=None):
|
200
201
|
"""
|
201
202
|
Configures the periodic tidying operation of the blacklisted role tag entries.
|
@@ -214,15 +215,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
214
215
|
|
215
216
|
:param str resource_name: The name of the resource.
|
216
217
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
217
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
218
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
218
219
|
mounted at.
|
219
|
-
:param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
|
220
|
+
:param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
220
221
|
tidying of the roletag blacklist entries. Defaults to false.
|
221
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
222
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
222
223
|
The value should not contain leading or trailing forward slashes.
|
223
224
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
224
225
|
*Available only for Vault Enterprise*.
|
225
|
-
:param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
|
226
|
+
:param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
|
226
227
|
beyond the roletag expiration, before it is removed from the backend storage.
|
227
228
|
Defaults to 259,200 seconds, or 72 hours.
|
228
229
|
"""
|
@@ -262,10 +263,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
262
263
|
def _internal_init(__self__,
|
263
264
|
resource_name: str,
|
264
265
|
opts: Optional[pulumi.ResourceOptions] = None,
|
265
|
-
backend: Optional[pulumi.Input[str]] = None,
|
266
|
-
disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
|
267
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
268
|
-
safety_buffer: Optional[pulumi.Input[int]] = None,
|
266
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
267
|
+
disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
|
268
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
269
|
+
safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
|
269
270
|
__props__=None):
|
270
271
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
271
272
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -291,10 +292,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
291
292
|
def get(resource_name: str,
|
292
293
|
id: pulumi.Input[str],
|
293
294
|
opts: Optional[pulumi.ResourceOptions] = None,
|
294
|
-
backend: Optional[pulumi.Input[str]] = None,
|
295
|
-
disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
|
296
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
297
|
-
safety_buffer: Optional[pulumi.Input[int]] = None) -> 'AuthBackendRoletagBlacklist':
|
295
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
296
|
+
disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
|
297
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
298
|
+
safety_buffer: Optional[pulumi.Input[builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
|
298
299
|
"""
|
299
300
|
Get an existing AuthBackendRoletagBlacklist resource's state with the given name, id, and optional extra
|
300
301
|
properties used to qualify the lookup.
|
@@ -302,15 +303,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
302
303
|
:param str resource_name: The unique name of the resulting resource.
|
303
304
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
304
305
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
305
|
-
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
306
|
+
:param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
|
306
307
|
mounted at.
|
307
|
-
:param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
|
308
|
+
:param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
308
309
|
tidying of the roletag blacklist entries. Defaults to false.
|
309
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
310
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
310
311
|
The value should not contain leading or trailing forward slashes.
|
311
312
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
312
313
|
*Available only for Vault Enterprise*.
|
313
|
-
:param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
|
314
|
+
:param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
|
314
315
|
beyond the roletag expiration, before it is removed from the backend storage.
|
315
316
|
Defaults to 259,200 seconds, or 72 hours.
|
316
317
|
"""
|
@@ -326,7 +327,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
326
327
|
|
327
328
|
@property
|
328
329
|
@pulumi.getter
|
329
|
-
def backend(self) -> pulumi.Output[str]:
|
330
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
330
331
|
"""
|
331
332
|
The path the AWS auth backend being configured was
|
332
333
|
mounted at.
|
@@ -335,7 +336,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
335
336
|
|
336
337
|
@property
|
337
338
|
@pulumi.getter(name="disablePeriodicTidy")
|
338
|
-
def disable_periodic_tidy(self) -> pulumi.Output[Optional[bool]]:
|
339
|
+
def disable_periodic_tidy(self) -> pulumi.Output[Optional[builtins.bool]]:
|
339
340
|
"""
|
340
341
|
If set to true, disables the periodic
|
341
342
|
tidying of the roletag blacklist entries. Defaults to false.
|
@@ -344,7 +345,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
344
345
|
|
345
346
|
@property
|
346
347
|
@pulumi.getter
|
347
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
348
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
348
349
|
"""
|
349
350
|
The namespace to provision the resource in.
|
350
351
|
The value should not contain leading or trailing forward slashes.
|
@@ -355,7 +356,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
355
356
|
|
356
357
|
@property
|
357
358
|
@pulumi.getter(name="safetyBuffer")
|
358
|
-
def safety_buffer(self) -> pulumi.Output[Optional[int]]:
|
359
|
+
def safety_buffer(self) -> pulumi.Output[Optional[builtins.int]]:
|
359
360
|
"""
|
360
361
|
The amount of extra time that must have passed
|
361
362
|
beyond the roletag expiration, before it is removed from the backend storage.
|