pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,17 +20,17 @@ __all__ = ['SecretScopeArgs', 'SecretScope']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretScopeArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
path: pulumi.Input[str],
|
23
|
-
scope: pulumi.Input[str],
|
24
|
-
force: Optional[pulumi.Input[bool]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
path: pulumi.Input[builtins.str],
|
24
|
+
scope: pulumi.Input[builtins.str],
|
25
|
+
force: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a SecretScope resource.
|
28
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
29
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
29
30
|
not begin or end with a `/`. Defaults to `kmip`.
|
30
|
-
:param pulumi.Input[str] scope: Name of the scope.
|
31
|
-
:param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
32
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
|
+
:param pulumi.Input[builtins.str] scope: Name of the scope.
|
32
|
+
:param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
33
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
33
34
|
The value should not contain leading or trailing forward slashes.
|
34
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
36
|
*Available only for Vault Enterprise*.
|
@@ -43,7 +44,7 @@ class SecretScopeArgs:
|
|
43
44
|
|
44
45
|
@property
|
45
46
|
@pulumi.getter
|
46
|
-
def path(self) -> pulumi.Input[str]:
|
47
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
47
48
|
"""
|
48
49
|
The unique path this backend should be mounted at. Must
|
49
50
|
not begin or end with a `/`. Defaults to `kmip`.
|
@@ -51,36 +52,36 @@ class SecretScopeArgs:
|
|
51
52
|
return pulumi.get(self, "path")
|
52
53
|
|
53
54
|
@path.setter
|
54
|
-
def path(self, value: pulumi.Input[str]):
|
55
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
55
56
|
pulumi.set(self, "path", value)
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def scope(self) -> pulumi.Input[str]:
|
60
|
+
def scope(self) -> pulumi.Input[builtins.str]:
|
60
61
|
"""
|
61
62
|
Name of the scope.
|
62
63
|
"""
|
63
64
|
return pulumi.get(self, "scope")
|
64
65
|
|
65
66
|
@scope.setter
|
66
|
-
def scope(self, value: pulumi.Input[str]):
|
67
|
+
def scope(self, value: pulumi.Input[builtins.str]):
|
67
68
|
pulumi.set(self, "scope", value)
|
68
69
|
|
69
70
|
@property
|
70
71
|
@pulumi.getter
|
71
|
-
def force(self) -> Optional[pulumi.Input[bool]]:
|
72
|
+
def force(self) -> Optional[pulumi.Input[builtins.bool]]:
|
72
73
|
"""
|
73
74
|
Boolean field to force deletion even if there are managed objects in the scope.
|
74
75
|
"""
|
75
76
|
return pulumi.get(self, "force")
|
76
77
|
|
77
78
|
@force.setter
|
78
|
-
def force(self, value: Optional[pulumi.Input[bool]]):
|
79
|
+
def force(self, value: Optional[pulumi.Input[builtins.bool]]):
|
79
80
|
pulumi.set(self, "force", value)
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter
|
83
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
84
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
84
85
|
"""
|
85
86
|
The namespace to provision the resource in.
|
86
87
|
The value should not contain leading or trailing forward slashes.
|
@@ -90,27 +91,27 @@ class SecretScopeArgs:
|
|
90
91
|
return pulumi.get(self, "namespace")
|
91
92
|
|
92
93
|
@namespace.setter
|
93
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
94
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
94
95
|
pulumi.set(self, "namespace", value)
|
95
96
|
|
96
97
|
|
97
98
|
@pulumi.input_type
|
98
99
|
class _SecretScopeState:
|
99
100
|
def __init__(__self__, *,
|
100
|
-
force: Optional[pulumi.Input[bool]] = None,
|
101
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
102
|
-
path: Optional[pulumi.Input[str]] = None,
|
103
|
-
scope: Optional[pulumi.Input[str]] = None):
|
101
|
+
force: Optional[pulumi.Input[builtins.bool]] = None,
|
102
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
103
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
104
|
+
scope: Optional[pulumi.Input[builtins.str]] = None):
|
104
105
|
"""
|
105
106
|
Input properties used for looking up and filtering SecretScope resources.
|
106
|
-
:param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
107
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
107
|
+
:param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
108
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
108
109
|
The value should not contain leading or trailing forward slashes.
|
109
110
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
110
111
|
*Available only for Vault Enterprise*.
|
111
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
112
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
112
113
|
not begin or end with a `/`. Defaults to `kmip`.
|
113
|
-
:param pulumi.Input[str] scope: Name of the scope.
|
114
|
+
:param pulumi.Input[builtins.str] scope: Name of the scope.
|
114
115
|
"""
|
115
116
|
if force is not None:
|
116
117
|
pulumi.set(__self__, "force", force)
|
@@ -123,19 +124,19 @@ class _SecretScopeState:
|
|
123
124
|
|
124
125
|
@property
|
125
126
|
@pulumi.getter
|
126
|
-
def force(self) -> Optional[pulumi.Input[bool]]:
|
127
|
+
def force(self) -> Optional[pulumi.Input[builtins.bool]]:
|
127
128
|
"""
|
128
129
|
Boolean field to force deletion even if there are managed objects in the scope.
|
129
130
|
"""
|
130
131
|
return pulumi.get(self, "force")
|
131
132
|
|
132
133
|
@force.setter
|
133
|
-
def force(self, value: Optional[pulumi.Input[bool]]):
|
134
|
+
def force(self, value: Optional[pulumi.Input[builtins.bool]]):
|
134
135
|
pulumi.set(self, "force", value)
|
135
136
|
|
136
137
|
@property
|
137
138
|
@pulumi.getter
|
138
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
139
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
139
140
|
"""
|
140
141
|
The namespace to provision the resource in.
|
141
142
|
The value should not contain leading or trailing forward slashes.
|
@@ -145,12 +146,12 @@ class _SecretScopeState:
|
|
145
146
|
return pulumi.get(self, "namespace")
|
146
147
|
|
147
148
|
@namespace.setter
|
148
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
149
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
149
150
|
pulumi.set(self, "namespace", value)
|
150
151
|
|
151
152
|
@property
|
152
153
|
@pulumi.getter
|
153
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
154
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
154
155
|
"""
|
155
156
|
The unique path this backend should be mounted at. Must
|
156
157
|
not begin or end with a `/`. Defaults to `kmip`.
|
@@ -158,19 +159,19 @@ class _SecretScopeState:
|
|
158
159
|
return pulumi.get(self, "path")
|
159
160
|
|
160
161
|
@path.setter
|
161
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
162
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
162
163
|
pulumi.set(self, "path", value)
|
163
164
|
|
164
165
|
@property
|
165
166
|
@pulumi.getter
|
166
|
-
def scope(self) -> Optional[pulumi.Input[str]]:
|
167
|
+
def scope(self) -> Optional[pulumi.Input[builtins.str]]:
|
167
168
|
"""
|
168
169
|
Name of the scope.
|
169
170
|
"""
|
170
171
|
return pulumi.get(self, "scope")
|
171
172
|
|
172
173
|
@scope.setter
|
173
|
-
def scope(self, value: Optional[pulumi.Input[str]]):
|
174
|
+
def scope(self, value: Optional[pulumi.Input[builtins.str]]):
|
174
175
|
pulumi.set(self, "scope", value)
|
175
176
|
|
176
177
|
|
@@ -179,10 +180,10 @@ class SecretScope(pulumi.CustomResource):
|
|
179
180
|
def __init__(__self__,
|
180
181
|
resource_name: str,
|
181
182
|
opts: Optional[pulumi.ResourceOptions] = None,
|
182
|
-
force: Optional[pulumi.Input[bool]] = None,
|
183
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
184
|
-
path: Optional[pulumi.Input[str]] = None,
|
185
|
-
scope: Optional[pulumi.Input[str]] = None,
|
183
|
+
force: Optional[pulumi.Input[builtins.bool]] = None,
|
184
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
185
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
186
|
+
scope: Optional[pulumi.Input[builtins.str]] = None,
|
186
187
|
__props__=None):
|
187
188
|
"""
|
188
189
|
Manages KMIP Secret Scopes in a Vault server. This feature requires
|
@@ -214,14 +215,14 @@ class SecretScope(pulumi.CustomResource):
|
|
214
215
|
|
215
216
|
:param str resource_name: The name of the resource.
|
216
217
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
217
|
-
:param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
218
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
218
|
+
:param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
219
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
219
220
|
The value should not contain leading or trailing forward slashes.
|
220
221
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
221
222
|
*Available only for Vault Enterprise*.
|
222
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
223
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
223
224
|
not begin or end with a `/`. Defaults to `kmip`.
|
224
|
-
:param pulumi.Input[str] scope: Name of the scope.
|
225
|
+
:param pulumi.Input[builtins.str] scope: Name of the scope.
|
225
226
|
"""
|
226
227
|
...
|
227
228
|
@overload
|
@@ -272,10 +273,10 @@ class SecretScope(pulumi.CustomResource):
|
|
272
273
|
def _internal_init(__self__,
|
273
274
|
resource_name: str,
|
274
275
|
opts: Optional[pulumi.ResourceOptions] = None,
|
275
|
-
force: Optional[pulumi.Input[bool]] = None,
|
276
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
277
|
-
path: Optional[pulumi.Input[str]] = None,
|
278
|
-
scope: Optional[pulumi.Input[str]] = None,
|
276
|
+
force: Optional[pulumi.Input[builtins.bool]] = None,
|
277
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
278
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
279
|
+
scope: Optional[pulumi.Input[builtins.str]] = None,
|
279
280
|
__props__=None):
|
280
281
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
281
282
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -303,10 +304,10 @@ class SecretScope(pulumi.CustomResource):
|
|
303
304
|
def get(resource_name: str,
|
304
305
|
id: pulumi.Input[str],
|
305
306
|
opts: Optional[pulumi.ResourceOptions] = None,
|
306
|
-
force: Optional[pulumi.Input[bool]] = None,
|
307
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
308
|
-
path: Optional[pulumi.Input[str]] = None,
|
309
|
-
scope: Optional[pulumi.Input[str]] = None) -> 'SecretScope':
|
307
|
+
force: Optional[pulumi.Input[builtins.bool]] = None,
|
308
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
309
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
310
|
+
scope: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretScope':
|
310
311
|
"""
|
311
312
|
Get an existing SecretScope resource's state with the given name, id, and optional extra
|
312
313
|
properties used to qualify the lookup.
|
@@ -314,14 +315,14 @@ class SecretScope(pulumi.CustomResource):
|
|
314
315
|
:param str resource_name: The unique name of the resulting resource.
|
315
316
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
316
317
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
317
|
-
:param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
318
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
318
|
+
:param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
319
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
319
320
|
The value should not contain leading or trailing forward slashes.
|
320
321
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
321
322
|
*Available only for Vault Enterprise*.
|
322
|
-
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
323
|
+
:param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
|
323
324
|
not begin or end with a `/`. Defaults to `kmip`.
|
324
|
-
:param pulumi.Input[str] scope: Name of the scope.
|
325
|
+
:param pulumi.Input[builtins.str] scope: Name of the scope.
|
325
326
|
"""
|
326
327
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
327
328
|
|
@@ -335,7 +336,7 @@ class SecretScope(pulumi.CustomResource):
|
|
335
336
|
|
336
337
|
@property
|
337
338
|
@pulumi.getter
|
338
|
-
def force(self) -> pulumi.Output[Optional[bool]]:
|
339
|
+
def force(self) -> pulumi.Output[Optional[builtins.bool]]:
|
339
340
|
"""
|
340
341
|
Boolean field to force deletion even if there are managed objects in the scope.
|
341
342
|
"""
|
@@ -343,7 +344,7 @@ class SecretScope(pulumi.CustomResource):
|
|
343
344
|
|
344
345
|
@property
|
345
346
|
@pulumi.getter
|
346
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
347
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
347
348
|
"""
|
348
349
|
The namespace to provision the resource in.
|
349
350
|
The value should not contain leading or trailing forward slashes.
|
@@ -354,7 +355,7 @@ class SecretScope(pulumi.CustomResource):
|
|
354
355
|
|
355
356
|
@property
|
356
357
|
@pulumi.getter
|
357
|
-
def path(self) -> pulumi.Output[str]:
|
358
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
358
359
|
"""
|
359
360
|
The unique path this backend should be mounted at. Must
|
360
361
|
not begin or end with a `/`. Defaults to `kmip`.
|
@@ -363,7 +364,7 @@ class SecretScope(pulumi.CustomResource):
|
|
363
364
|
|
364
365
|
@property
|
365
366
|
@pulumi.getter
|
366
|
-
def scope(self) -> pulumi.Output[str]:
|
367
|
+
def scope(self) -> pulumi.Output[builtins.str]:
|
367
368
|
"""
|
368
369
|
Name of the scope.
|
369
370
|
"""
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|