pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/egp_policy.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,18 +20,18 @@ __all__ = ['EgpPolicyArgs', 'EgpPolicy']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class EgpPolicyArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
enforcement_level: pulumi.Input[str],
|
23
|
-
paths: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
|
-
policy: pulumi.Input[str],
|
25
|
-
name: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
enforcement_level: pulumi.Input[builtins.str],
|
24
|
+
paths: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
25
|
+
policy: pulumi.Input[builtins.str],
|
26
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a EgpPolicy resource.
|
29
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
30
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
31
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
32
|
-
:param pulumi.Input[str] name: The name of the policy
|
33
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
31
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
|
32
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
33
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
34
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
34
35
|
The value should not contain leading or trailing forward slashes.
|
35
36
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
37
|
*Available only for Vault Enterprise*.
|
@@ -45,55 +46,55 @@ class EgpPolicyArgs:
|
|
45
46
|
|
46
47
|
@property
|
47
48
|
@pulumi.getter(name="enforcementLevel")
|
48
|
-
def enforcement_level(self) -> pulumi.Input[str]:
|
49
|
+
def enforcement_level(self) -> pulumi.Input[builtins.str]:
|
49
50
|
"""
|
50
51
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
51
52
|
"""
|
52
53
|
return pulumi.get(self, "enforcement_level")
|
53
54
|
|
54
55
|
@enforcement_level.setter
|
55
|
-
def enforcement_level(self, value: pulumi.Input[str]):
|
56
|
+
def enforcement_level(self, value: pulumi.Input[builtins.str]):
|
56
57
|
pulumi.set(self, "enforcement_level", value)
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def paths(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
61
|
+
def paths(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
61
62
|
"""
|
62
63
|
List of paths to which the policy will be applied to
|
63
64
|
"""
|
64
65
|
return pulumi.get(self, "paths")
|
65
66
|
|
66
67
|
@paths.setter
|
67
|
-
def paths(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
68
|
+
def paths(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
68
69
|
pulumi.set(self, "paths", value)
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter
|
72
|
-
def policy(self) -> pulumi.Input[str]:
|
73
|
+
def policy(self) -> pulumi.Input[builtins.str]:
|
73
74
|
"""
|
74
75
|
String containing a Sentinel policy
|
75
76
|
"""
|
76
77
|
return pulumi.get(self, "policy")
|
77
78
|
|
78
79
|
@policy.setter
|
79
|
-
def policy(self, value: pulumi.Input[str]):
|
80
|
+
def policy(self, value: pulumi.Input[builtins.str]):
|
80
81
|
pulumi.set(self, "policy", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
85
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
85
86
|
"""
|
86
87
|
The name of the policy
|
87
88
|
"""
|
88
89
|
return pulumi.get(self, "name")
|
89
90
|
|
90
91
|
@name.setter
|
91
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
92
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
92
93
|
pulumi.set(self, "name", value)
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
97
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
97
98
|
"""
|
98
99
|
The namespace to provision the resource in.
|
99
100
|
The value should not contain leading or trailing forward slashes.
|
@@ -103,28 +104,28 @@ class EgpPolicyArgs:
|
|
103
104
|
return pulumi.get(self, "namespace")
|
104
105
|
|
105
106
|
@namespace.setter
|
106
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
107
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
107
108
|
pulumi.set(self, "namespace", value)
|
108
109
|
|
109
110
|
|
110
111
|
@pulumi.input_type
|
111
112
|
class _EgpPolicyState:
|
112
113
|
def __init__(__self__, *,
|
113
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
114
|
-
name: Optional[pulumi.Input[str]] = None,
|
115
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
116
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
117
|
-
policy: Optional[pulumi.Input[str]] = None):
|
114
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
115
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
116
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
117
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
118
|
+
policy: Optional[pulumi.Input[builtins.str]] = None):
|
118
119
|
"""
|
119
120
|
Input properties used for looking up and filtering EgpPolicy resources.
|
120
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
121
|
-
:param pulumi.Input[str] name: The name of the policy
|
122
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
122
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
123
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
123
124
|
The value should not contain leading or trailing forward slashes.
|
124
125
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
125
126
|
*Available only for Vault Enterprise*.
|
126
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
127
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
127
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
|
128
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
128
129
|
"""
|
129
130
|
if enforcement_level is not None:
|
130
131
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -139,31 +140,31 @@ class _EgpPolicyState:
|
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter(name="enforcementLevel")
|
142
|
-
def enforcement_level(self) -> Optional[pulumi.Input[str]]:
|
143
|
+
def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
|
143
144
|
"""
|
144
145
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
145
146
|
"""
|
146
147
|
return pulumi.get(self, "enforcement_level")
|
147
148
|
|
148
149
|
@enforcement_level.setter
|
149
|
-
def enforcement_level(self, value: Optional[pulumi.Input[str]]):
|
150
|
+
def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
|
150
151
|
pulumi.set(self, "enforcement_level", value)
|
151
152
|
|
152
153
|
@property
|
153
154
|
@pulumi.getter
|
154
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
155
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
155
156
|
"""
|
156
157
|
The name of the policy
|
157
158
|
"""
|
158
159
|
return pulumi.get(self, "name")
|
159
160
|
|
160
161
|
@name.setter
|
161
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
162
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
162
163
|
pulumi.set(self, "name", value)
|
163
164
|
|
164
165
|
@property
|
165
166
|
@pulumi.getter
|
166
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
167
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
167
168
|
"""
|
168
169
|
The namespace to provision the resource in.
|
169
170
|
The value should not contain leading or trailing forward slashes.
|
@@ -173,31 +174,31 @@ class _EgpPolicyState:
|
|
173
174
|
return pulumi.get(self, "namespace")
|
174
175
|
|
175
176
|
@namespace.setter
|
176
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
177
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
177
178
|
pulumi.set(self, "namespace", value)
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter
|
181
|
-
def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
182
|
+
def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
182
183
|
"""
|
183
184
|
List of paths to which the policy will be applied to
|
184
185
|
"""
|
185
186
|
return pulumi.get(self, "paths")
|
186
187
|
|
187
188
|
@paths.setter
|
188
|
-
def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
189
|
+
def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
189
190
|
pulumi.set(self, "paths", value)
|
190
191
|
|
191
192
|
@property
|
192
193
|
@pulumi.getter
|
193
|
-
def policy(self) -> Optional[pulumi.Input[str]]:
|
194
|
+
def policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
194
195
|
"""
|
195
196
|
String containing a Sentinel policy
|
196
197
|
"""
|
197
198
|
return pulumi.get(self, "policy")
|
198
199
|
|
199
200
|
@policy.setter
|
200
|
-
def policy(self, value: Optional[pulumi.Input[str]]):
|
201
|
+
def policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
201
202
|
pulumi.set(self, "policy", value)
|
202
203
|
|
203
204
|
|
@@ -206,11 +207,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
206
207
|
def __init__(__self__,
|
207
208
|
resource_name: str,
|
208
209
|
opts: Optional[pulumi.ResourceOptions] = None,
|
209
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
210
|
-
name: Optional[pulumi.Input[str]] = None,
|
211
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
212
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
213
|
-
policy: Optional[pulumi.Input[str]] = None,
|
210
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
211
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
213
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
214
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
214
215
|
__props__=None):
|
215
216
|
"""
|
216
217
|
Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
|
@@ -235,14 +236,14 @@ class EgpPolicy(pulumi.CustomResource):
|
|
235
236
|
|
236
237
|
:param str resource_name: The name of the resource.
|
237
238
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
238
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
239
|
-
:param pulumi.Input[str] name: The name of the policy
|
240
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
239
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
240
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
241
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
241
242
|
The value should not contain leading or trailing forward slashes.
|
242
243
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
243
244
|
*Available only for Vault Enterprise*.
|
244
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
245
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
245
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
|
246
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
246
247
|
"""
|
247
248
|
...
|
248
249
|
@overload
|
@@ -286,11 +287,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
286
287
|
def _internal_init(__self__,
|
287
288
|
resource_name: str,
|
288
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
289
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
290
|
-
name: Optional[pulumi.Input[str]] = None,
|
291
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
292
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
293
|
-
policy: Optional[pulumi.Input[str]] = None,
|
290
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
291
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
293
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
294
|
+
policy: Optional[pulumi.Input[builtins.str]] = None,
|
294
295
|
__props__=None):
|
295
296
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
296
297
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -321,11 +322,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
321
322
|
def get(resource_name: str,
|
322
323
|
id: pulumi.Input[str],
|
323
324
|
opts: Optional[pulumi.ResourceOptions] = None,
|
324
|
-
enforcement_level: Optional[pulumi.Input[str]] = None,
|
325
|
-
name: Optional[pulumi.Input[str]] = None,
|
326
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
327
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
328
|
-
policy: Optional[pulumi.Input[str]] = None) -> 'EgpPolicy':
|
325
|
+
enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
|
326
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
327
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
328
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
329
|
+
policy: Optional[pulumi.Input[builtins.str]] = None) -> 'EgpPolicy':
|
329
330
|
"""
|
330
331
|
Get an existing EgpPolicy resource's state with the given name, id, and optional extra
|
331
332
|
properties used to qualify the lookup.
|
@@ -333,14 +334,14 @@ class EgpPolicy(pulumi.CustomResource):
|
|
333
334
|
:param str resource_name: The unique name of the resulting resource.
|
334
335
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
335
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
337
|
-
:param pulumi.Input[str] name: The name of the policy
|
338
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
337
|
+
:param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
338
|
+
:param pulumi.Input[builtins.str] name: The name of the policy
|
339
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
339
340
|
The value should not contain leading or trailing forward slashes.
|
340
341
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
341
342
|
*Available only for Vault Enterprise*.
|
342
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
343
|
-
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
343
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
|
344
|
+
:param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
|
344
345
|
"""
|
345
346
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
346
347
|
|
@@ -355,7 +356,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
355
356
|
|
356
357
|
@property
|
357
358
|
@pulumi.getter(name="enforcementLevel")
|
358
|
-
def enforcement_level(self) -> pulumi.Output[str]:
|
359
|
+
def enforcement_level(self) -> pulumi.Output[builtins.str]:
|
359
360
|
"""
|
360
361
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
361
362
|
"""
|
@@ -363,7 +364,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
363
364
|
|
364
365
|
@property
|
365
366
|
@pulumi.getter
|
366
|
-
def name(self) -> pulumi.Output[str]:
|
367
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
367
368
|
"""
|
368
369
|
The name of the policy
|
369
370
|
"""
|
@@ -371,7 +372,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
371
372
|
|
372
373
|
@property
|
373
374
|
@pulumi.getter
|
374
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
375
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
375
376
|
"""
|
376
377
|
The namespace to provision the resource in.
|
377
378
|
The value should not contain leading or trailing forward slashes.
|
@@ -382,7 +383,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
382
383
|
|
383
384
|
@property
|
384
385
|
@pulumi.getter
|
385
|
-
def paths(self) -> pulumi.Output[Sequence[str]]:
|
386
|
+
def paths(self) -> pulumi.Output[Sequence[builtins.str]]:
|
386
387
|
"""
|
387
388
|
List of paths to which the policy will be applied to
|
388
389
|
"""
|
@@ -390,7 +391,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
390
391
|
|
391
392
|
@property
|
392
393
|
@pulumi.getter
|
393
|
-
def policy(self) -> pulumi.Output[str]:
|
394
|
+
def policy(self) -> pulumi.Output[builtins.str]:
|
394
395
|
"""
|
395
396
|
String containing a Sentinel policy
|
396
397
|
"""
|
pulumi_vault/gcp/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|