pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -23,44 +24,44 @@ MYPY = False
|
|
23
24
|
|
24
25
|
if not MYPY:
|
25
26
|
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
27
28
|
"""
|
28
29
|
List of headers to whitelist and allowing
|
29
30
|
a plugin to include them in the response.
|
30
31
|
"""
|
31
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
32
33
|
"""
|
33
34
|
Specifies the list of keys that will
|
34
35
|
not be HMAC'd by audit devices in the request data object.
|
35
36
|
"""
|
36
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
37
38
|
"""
|
38
39
|
Specifies the list of keys that will
|
39
40
|
not be HMAC'd by audit devices in the response data object.
|
40
41
|
"""
|
41
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
default_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
|
42
43
|
"""
|
43
44
|
Specifies the default time-to-live.
|
44
45
|
If set, this overrides the global default.
|
45
46
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
47
|
"""
|
47
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
listing_visibility: NotRequired[pulumi.Input[builtins.str]]
|
48
49
|
"""
|
49
50
|
Specifies whether to show this mount in
|
50
51
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
52
|
"""
|
52
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
max_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
|
53
54
|
"""
|
54
55
|
Specifies the maximum time-to-live.
|
55
56
|
If set, this overrides the global default.
|
56
57
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
58
|
"""
|
58
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
59
60
|
"""
|
60
61
|
List of headers to whitelist and
|
61
62
|
pass from the request to the backend.
|
62
63
|
"""
|
63
|
-
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
token_type: NotRequired[pulumi.Input[builtins.str]]
|
64
65
|
"""
|
65
66
|
Specifies the type of tokens that should be returned by
|
66
67
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -71,32 +72,32 @@ elif False:
|
|
71
72
|
@pulumi.input_type
|
72
73
|
class AuthBackendTuneArgs:
|
73
74
|
def __init__(__self__, *,
|
74
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
75
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
76
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
77
|
-
default_lease_ttl: Optional[pulumi.Input[str]] = None,
|
78
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
79
|
-
max_lease_ttl: Optional[pulumi.Input[str]] = None,
|
80
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
81
|
-
token_type: Optional[pulumi.Input[str]] = None):
|
82
|
-
"""
|
83
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to whitelist and allowing
|
75
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
76
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
77
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
78
|
+
default_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
79
|
+
listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
|
80
|
+
max_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
81
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
82
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None):
|
83
|
+
"""
|
84
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
84
85
|
a plugin to include them in the response.
|
85
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
86
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
86
87
|
not be HMAC'd by audit devices in the request data object.
|
87
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
88
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
88
89
|
not be HMAC'd by audit devices in the response data object.
|
89
|
-
:param pulumi.Input[str] default_lease_ttl: Specifies the default time-to-live.
|
90
|
+
:param pulumi.Input[builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
90
91
|
If set, this overrides the global default.
|
91
92
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
92
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in
|
93
|
+
:param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in
|
93
94
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
94
|
-
:param pulumi.Input[str] max_lease_ttl: Specifies the maximum time-to-live.
|
95
|
+
:param pulumi.Input[builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
95
96
|
If set, this overrides the global default.
|
96
97
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
97
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to whitelist and
|
98
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
98
99
|
pass from the request to the backend.
|
99
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
100
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
100
101
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
101
102
|
"""
|
102
103
|
if allowed_response_headers is not None:
|
@@ -118,7 +119,7 @@ class AuthBackendTuneArgs:
|
|
118
119
|
|
119
120
|
@property
|
120
121
|
@pulumi.getter(name="allowedResponseHeaders")
|
121
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
122
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
122
123
|
"""
|
123
124
|
List of headers to whitelist and allowing
|
124
125
|
a plugin to include them in the response.
|
@@ -126,12 +127,12 @@ class AuthBackendTuneArgs:
|
|
126
127
|
return pulumi.get(self, "allowed_response_headers")
|
127
128
|
|
128
129
|
@allowed_response_headers.setter
|
129
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
130
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
130
131
|
pulumi.set(self, "allowed_response_headers", value)
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
134
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
135
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
135
136
|
"""
|
136
137
|
Specifies the list of keys that will
|
137
138
|
not be HMAC'd by audit devices in the request data object.
|
@@ -139,12 +140,12 @@ class AuthBackendTuneArgs:
|
|
139
140
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
140
141
|
|
141
142
|
@audit_non_hmac_request_keys.setter
|
142
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
143
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
143
144
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
144
145
|
|
145
146
|
@property
|
146
147
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
147
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
148
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
148
149
|
"""
|
149
150
|
Specifies the list of keys that will
|
150
151
|
not be HMAC'd by audit devices in the response data object.
|
@@ -152,12 +153,12 @@ class AuthBackendTuneArgs:
|
|
152
153
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
153
154
|
|
154
155
|
@audit_non_hmac_response_keys.setter
|
155
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
156
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
156
157
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter(name="defaultLeaseTtl")
|
160
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
161
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
161
162
|
"""
|
162
163
|
Specifies the default time-to-live.
|
163
164
|
If set, this overrides the global default.
|
@@ -166,12 +167,12 @@ class AuthBackendTuneArgs:
|
|
166
167
|
return pulumi.get(self, "default_lease_ttl")
|
167
168
|
|
168
169
|
@default_lease_ttl.setter
|
169
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
170
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
170
171
|
pulumi.set(self, "default_lease_ttl", value)
|
171
172
|
|
172
173
|
@property
|
173
174
|
@pulumi.getter(name="listingVisibility")
|
174
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
175
|
+
def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
|
175
176
|
"""
|
176
177
|
Specifies whether to show this mount in
|
177
178
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -179,12 +180,12 @@ class AuthBackendTuneArgs:
|
|
179
180
|
return pulumi.get(self, "listing_visibility")
|
180
181
|
|
181
182
|
@listing_visibility.setter
|
182
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
183
|
+
def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
|
183
184
|
pulumi.set(self, "listing_visibility", value)
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter(name="maxLeaseTtl")
|
187
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
188
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
188
189
|
"""
|
189
190
|
Specifies the maximum time-to-live.
|
190
191
|
If set, this overrides the global default.
|
@@ -193,12 +194,12 @@ class AuthBackendTuneArgs:
|
|
193
194
|
return pulumi.get(self, "max_lease_ttl")
|
194
195
|
|
195
196
|
@max_lease_ttl.setter
|
196
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
197
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
197
198
|
pulumi.set(self, "max_lease_ttl", value)
|
198
199
|
|
199
200
|
@property
|
200
201
|
@pulumi.getter(name="passthroughRequestHeaders")
|
201
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
202
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
202
203
|
"""
|
203
204
|
List of headers to whitelist and
|
204
205
|
pass from the request to the backend.
|
@@ -206,12 +207,12 @@ class AuthBackendTuneArgs:
|
|
206
207
|
return pulumi.get(self, "passthrough_request_headers")
|
207
208
|
|
208
209
|
@passthrough_request_headers.setter
|
209
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
210
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
210
211
|
pulumi.set(self, "passthrough_request_headers", value)
|
211
212
|
|
212
213
|
@property
|
213
214
|
@pulumi.getter(name="tokenType")
|
214
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
215
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
215
216
|
"""
|
216
217
|
Specifies the type of tokens that should be returned by
|
217
218
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -219,7 +220,7 @@ class AuthBackendTuneArgs:
|
|
219
220
|
return pulumi.get(self, "token_type")
|
220
221
|
|
221
222
|
@token_type.setter
|
222
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
223
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
223
224
|
pulumi.set(self, "token_type", value)
|
224
225
|
|
225
226
|
|