pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -18,6 +17,7 @@ from . import outputs
|
|
18
17
|
|
19
18
|
__all__ = [
|
20
19
|
'AuthBackendTune',
|
20
|
+
'OciAuthBackendTune',
|
21
21
|
'GetPolicyDocumentRuleResult',
|
22
22
|
'GetPolicyDocumentRuleAllowedParameterResult',
|
23
23
|
'GetPolicyDocumentRuleDeniedParameterResult',
|
@@ -57,32 +57,32 @@ class AuthBackendTune(dict):
|
|
57
57
|
return super().get(key, default)
|
58
58
|
|
59
59
|
def __init__(__self__, *,
|
60
|
-
allowed_response_headers: Optional[Sequence[
|
61
|
-
audit_non_hmac_request_keys: Optional[Sequence[
|
62
|
-
audit_non_hmac_response_keys: Optional[Sequence[
|
63
|
-
default_lease_ttl: Optional[
|
64
|
-
listing_visibility: Optional[
|
65
|
-
max_lease_ttl: Optional[
|
66
|
-
passthrough_request_headers: Optional[Sequence[
|
67
|
-
token_type: Optional[
|
68
|
-
"""
|
69
|
-
:param Sequence[
|
60
|
+
allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
|
61
|
+
audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
|
62
|
+
audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
|
63
|
+
default_lease_ttl: Optional[_builtins.str] = None,
|
64
|
+
listing_visibility: Optional[_builtins.str] = None,
|
65
|
+
max_lease_ttl: Optional[_builtins.str] = None,
|
66
|
+
passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
|
67
|
+
token_type: Optional[_builtins.str] = None):
|
68
|
+
"""
|
69
|
+
:param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
70
70
|
a plugin to include them in the response.
|
71
|
-
:param Sequence[
|
71
|
+
:param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
72
72
|
not be HMAC'd by audit devices in the request data object.
|
73
|
-
:param Sequence[
|
73
|
+
:param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
74
74
|
not be HMAC'd by audit devices in the response data object.
|
75
|
-
:param
|
75
|
+
:param _builtins.str default_lease_ttl: Specifies the default time-to-live.
|
76
76
|
If set, this overrides the global default.
|
77
77
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
78
|
-
:param
|
78
|
+
:param _builtins.str listing_visibility: Specifies whether to show this mount in
|
79
79
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
80
|
-
:param
|
80
|
+
:param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
81
81
|
If set, this overrides the global default.
|
82
82
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
83
|
-
:param Sequence[
|
83
|
+
:param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
|
84
84
|
pass from the request to the backend.
|
85
|
-
:param
|
85
|
+
:param _builtins.str token_type: Specifies the type of tokens that should be returned by
|
86
86
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
87
87
|
"""
|
88
88
|
if allowed_response_headers is not None:
|
@@ -102,36 +102,36 @@ class AuthBackendTune(dict):
|
|
102
102
|
if token_type is not None:
|
103
103
|
pulumi.set(__self__, "token_type", token_type)
|
104
104
|
|
105
|
-
@property
|
105
|
+
@_builtins.property
|
106
106
|
@pulumi.getter(name="allowedResponseHeaders")
|
107
|
-
def allowed_response_headers(self) -> Optional[Sequence[
|
107
|
+
def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
|
108
108
|
"""
|
109
109
|
List of headers to whitelist and allowing
|
110
110
|
a plugin to include them in the response.
|
111
111
|
"""
|
112
112
|
return pulumi.get(self, "allowed_response_headers")
|
113
113
|
|
114
|
-
@property
|
114
|
+
@_builtins.property
|
115
115
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
116
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[
|
116
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
|
117
117
|
"""
|
118
118
|
Specifies the list of keys that will
|
119
119
|
not be HMAC'd by audit devices in the request data object.
|
120
120
|
"""
|
121
121
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
122
122
|
|
123
|
-
@property
|
123
|
+
@_builtins.property
|
124
124
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
125
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[
|
125
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
|
126
126
|
"""
|
127
127
|
Specifies the list of keys that will
|
128
128
|
not be HMAC'd by audit devices in the response data object.
|
129
129
|
"""
|
130
130
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
131
131
|
|
132
|
-
@property
|
132
|
+
@_builtins.property
|
133
133
|
@pulumi.getter(name="defaultLeaseTtl")
|
134
|
-
def default_lease_ttl(self) -> Optional[
|
134
|
+
def default_lease_ttl(self) -> Optional[_builtins.str]:
|
135
135
|
"""
|
136
136
|
Specifies the default time-to-live.
|
137
137
|
If set, this overrides the global default.
|
@@ -139,18 +139,18 @@ class AuthBackendTune(dict):
|
|
139
139
|
"""
|
140
140
|
return pulumi.get(self, "default_lease_ttl")
|
141
141
|
|
142
|
-
@property
|
142
|
+
@_builtins.property
|
143
143
|
@pulumi.getter(name="listingVisibility")
|
144
|
-
def listing_visibility(self) -> Optional[
|
144
|
+
def listing_visibility(self) -> Optional[_builtins.str]:
|
145
145
|
"""
|
146
146
|
Specifies whether to show this mount in
|
147
147
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
148
148
|
"""
|
149
149
|
return pulumi.get(self, "listing_visibility")
|
150
150
|
|
151
|
-
@property
|
151
|
+
@_builtins.property
|
152
152
|
@pulumi.getter(name="maxLeaseTtl")
|
153
|
-
def max_lease_ttl(self) -> Optional[
|
153
|
+
def max_lease_ttl(self) -> Optional[_builtins.str]:
|
154
154
|
"""
|
155
155
|
Specifies the maximum time-to-live.
|
156
156
|
If set, this overrides the global default.
|
@@ -158,18 +158,18 @@ class AuthBackendTune(dict):
|
|
158
158
|
"""
|
159
159
|
return pulumi.get(self, "max_lease_ttl")
|
160
160
|
|
161
|
-
@property
|
161
|
+
@_builtins.property
|
162
162
|
@pulumi.getter(name="passthroughRequestHeaders")
|
163
|
-
def passthrough_request_headers(self) -> Optional[Sequence[
|
163
|
+
def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
|
164
164
|
"""
|
165
165
|
List of headers to whitelist and
|
166
166
|
pass from the request to the backend.
|
167
167
|
"""
|
168
168
|
return pulumi.get(self, "passthrough_request_headers")
|
169
169
|
|
170
|
-
@property
|
170
|
+
@_builtins.property
|
171
171
|
@pulumi.getter(name="tokenType")
|
172
|
-
def token_type(self) -> Optional[
|
172
|
+
def token_type(self) -> Optional[_builtins.str]:
|
173
173
|
"""
|
174
174
|
Specifies the type of tokens that should be returned by
|
175
175
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -177,28 +177,180 @@ class AuthBackendTune(dict):
|
|
177
177
|
return pulumi.get(self, "token_type")
|
178
178
|
|
179
179
|
|
180
|
+
@pulumi.output_type
|
181
|
+
class OciAuthBackendTune(dict):
|
182
|
+
@staticmethod
|
183
|
+
def __key_warning(key: str):
|
184
|
+
suggest = None
|
185
|
+
if key == "allowedResponseHeaders":
|
186
|
+
suggest = "allowed_response_headers"
|
187
|
+
elif key == "auditNonHmacRequestKeys":
|
188
|
+
suggest = "audit_non_hmac_request_keys"
|
189
|
+
elif key == "auditNonHmacResponseKeys":
|
190
|
+
suggest = "audit_non_hmac_response_keys"
|
191
|
+
elif key == "defaultLeaseTtl":
|
192
|
+
suggest = "default_lease_ttl"
|
193
|
+
elif key == "listingVisibility":
|
194
|
+
suggest = "listing_visibility"
|
195
|
+
elif key == "maxLeaseTtl":
|
196
|
+
suggest = "max_lease_ttl"
|
197
|
+
elif key == "passthroughRequestHeaders":
|
198
|
+
suggest = "passthrough_request_headers"
|
199
|
+
elif key == "tokenType":
|
200
|
+
suggest = "token_type"
|
201
|
+
|
202
|
+
if suggest:
|
203
|
+
pulumi.log.warn(f"Key '{key}' not found in OciAuthBackendTune. Access the value via the '{suggest}' property getter instead.")
|
204
|
+
|
205
|
+
def __getitem__(self, key: str) -> Any:
|
206
|
+
OciAuthBackendTune.__key_warning(key)
|
207
|
+
return super().__getitem__(key)
|
208
|
+
|
209
|
+
def get(self, key: str, default = None) -> Any:
|
210
|
+
OciAuthBackendTune.__key_warning(key)
|
211
|
+
return super().get(key, default)
|
212
|
+
|
213
|
+
def __init__(__self__, *,
|
214
|
+
allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
|
215
|
+
audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
|
216
|
+
audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
|
217
|
+
default_lease_ttl: Optional[_builtins.str] = None,
|
218
|
+
listing_visibility: Optional[_builtins.str] = None,
|
219
|
+
max_lease_ttl: Optional[_builtins.str] = None,
|
220
|
+
passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
|
221
|
+
token_type: Optional[_builtins.str] = None):
|
222
|
+
"""
|
223
|
+
:param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
224
|
+
a plugin to include them in the response.
|
225
|
+
:param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
226
|
+
not be HMAC'd by audit devices in the request data object.
|
227
|
+
:param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
228
|
+
not be HMAC'd by audit devices in the response data object.
|
229
|
+
:param _builtins.str default_lease_ttl: Specifies the default time-to-live.
|
230
|
+
If set, this overrides the global default.
|
231
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
232
|
+
:param _builtins.str listing_visibility: Specifies whether to show this mount in
|
233
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
234
|
+
:param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
235
|
+
If set, this overrides the global default.
|
236
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
237
|
+
:param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
|
238
|
+
pass from the request to the backend.
|
239
|
+
:param _builtins.str token_type: Specifies the type of tokens that should be returned by the mount.
|
240
|
+
"""
|
241
|
+
if allowed_response_headers is not None:
|
242
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
243
|
+
if audit_non_hmac_request_keys is not None:
|
244
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
245
|
+
if audit_non_hmac_response_keys is not None:
|
246
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
247
|
+
if default_lease_ttl is not None:
|
248
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
249
|
+
if listing_visibility is not None:
|
250
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
251
|
+
if max_lease_ttl is not None:
|
252
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
253
|
+
if passthrough_request_headers is not None:
|
254
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
255
|
+
if token_type is not None:
|
256
|
+
pulumi.set(__self__, "token_type", token_type)
|
257
|
+
|
258
|
+
@_builtins.property
|
259
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
260
|
+
def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
|
261
|
+
"""
|
262
|
+
List of headers to whitelist and allowing
|
263
|
+
a plugin to include them in the response.
|
264
|
+
"""
|
265
|
+
return pulumi.get(self, "allowed_response_headers")
|
266
|
+
|
267
|
+
@_builtins.property
|
268
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
269
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
|
270
|
+
"""
|
271
|
+
Specifies the list of keys that will
|
272
|
+
not be HMAC'd by audit devices in the request data object.
|
273
|
+
"""
|
274
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
275
|
+
|
276
|
+
@_builtins.property
|
277
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
278
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
|
279
|
+
"""
|
280
|
+
Specifies the list of keys that will
|
281
|
+
not be HMAC'd by audit devices in the response data object.
|
282
|
+
"""
|
283
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
284
|
+
|
285
|
+
@_builtins.property
|
286
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
287
|
+
def default_lease_ttl(self) -> Optional[_builtins.str]:
|
288
|
+
"""
|
289
|
+
Specifies the default time-to-live.
|
290
|
+
If set, this overrides the global default.
|
291
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
292
|
+
"""
|
293
|
+
return pulumi.get(self, "default_lease_ttl")
|
294
|
+
|
295
|
+
@_builtins.property
|
296
|
+
@pulumi.getter(name="listingVisibility")
|
297
|
+
def listing_visibility(self) -> Optional[_builtins.str]:
|
298
|
+
"""
|
299
|
+
Specifies whether to show this mount in
|
300
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
301
|
+
"""
|
302
|
+
return pulumi.get(self, "listing_visibility")
|
303
|
+
|
304
|
+
@_builtins.property
|
305
|
+
@pulumi.getter(name="maxLeaseTtl")
|
306
|
+
def max_lease_ttl(self) -> Optional[_builtins.str]:
|
307
|
+
"""
|
308
|
+
Specifies the maximum time-to-live.
|
309
|
+
If set, this overrides the global default.
|
310
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
311
|
+
"""
|
312
|
+
return pulumi.get(self, "max_lease_ttl")
|
313
|
+
|
314
|
+
@_builtins.property
|
315
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
316
|
+
def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
|
317
|
+
"""
|
318
|
+
List of headers to whitelist and
|
319
|
+
pass from the request to the backend.
|
320
|
+
"""
|
321
|
+
return pulumi.get(self, "passthrough_request_headers")
|
322
|
+
|
323
|
+
@_builtins.property
|
324
|
+
@pulumi.getter(name="tokenType")
|
325
|
+
def token_type(self) -> Optional[_builtins.str]:
|
326
|
+
"""
|
327
|
+
Specifies the type of tokens that should be returned by the mount.
|
328
|
+
"""
|
329
|
+
return pulumi.get(self, "token_type")
|
330
|
+
|
331
|
+
|
180
332
|
@pulumi.output_type
|
181
333
|
class GetPolicyDocumentRuleResult(dict):
|
182
334
|
def __init__(__self__, *,
|
183
|
-
capabilities: Sequence[
|
184
|
-
path:
|
335
|
+
capabilities: Sequence[_builtins.str],
|
336
|
+
path: _builtins.str,
|
185
337
|
allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
|
186
338
|
denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
|
187
|
-
description: Optional[
|
188
|
-
max_wrapping_ttl: Optional[
|
189
|
-
min_wrapping_ttl: Optional[
|
190
|
-
required_parameters: Optional[Sequence[
|
191
|
-
subscribe_event_types: Optional[Sequence[
|
192
|
-
"""
|
193
|
-
:param Sequence[
|
194
|
-
:param
|
339
|
+
description: Optional[_builtins.str] = None,
|
340
|
+
max_wrapping_ttl: Optional[_builtins.str] = None,
|
341
|
+
min_wrapping_ttl: Optional[_builtins.str] = None,
|
342
|
+
required_parameters: Optional[Sequence[_builtins.str]] = None,
|
343
|
+
subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
|
344
|
+
"""
|
345
|
+
:param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
346
|
+
:param _builtins.str path: A path in Vault that this rule applies to.
|
195
347
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
196
348
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
197
|
-
:param
|
198
|
-
:param
|
199
|
-
:param
|
200
|
-
:param Sequence[
|
201
|
-
:param Sequence[
|
349
|
+
:param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
350
|
+
:param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
351
|
+
:param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
352
|
+
:param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
|
353
|
+
:param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
202
354
|
"""
|
203
355
|
pulumi.set(__self__, "capabilities", capabilities)
|
204
356
|
pulumi.set(__self__, "path", path)
|
@@ -217,23 +369,23 @@ class GetPolicyDocumentRuleResult(dict):
|
|
217
369
|
if subscribe_event_types is not None:
|
218
370
|
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
219
371
|
|
220
|
-
@property
|
372
|
+
@_builtins.property
|
221
373
|
@pulumi.getter
|
222
|
-
def capabilities(self) -> Sequence[
|
374
|
+
def capabilities(self) -> Sequence[_builtins.str]:
|
223
375
|
"""
|
224
376
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
225
377
|
"""
|
226
378
|
return pulumi.get(self, "capabilities")
|
227
379
|
|
228
|
-
@property
|
380
|
+
@_builtins.property
|
229
381
|
@pulumi.getter
|
230
|
-
def path(self) ->
|
382
|
+
def path(self) -> _builtins.str:
|
231
383
|
"""
|
232
384
|
A path in Vault that this rule applies to.
|
233
385
|
"""
|
234
386
|
return pulumi.get(self, "path")
|
235
387
|
|
236
|
-
@property
|
388
|
+
@_builtins.property
|
237
389
|
@pulumi.getter(name="allowedParameters")
|
238
390
|
def allowed_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']]:
|
239
391
|
"""
|
@@ -241,7 +393,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
241
393
|
"""
|
242
394
|
return pulumi.get(self, "allowed_parameters")
|
243
395
|
|
244
|
-
@property
|
396
|
+
@_builtins.property
|
245
397
|
@pulumi.getter(name="deniedParameters")
|
246
398
|
def denied_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']]:
|
247
399
|
"""
|
@@ -249,41 +401,41 @@ class GetPolicyDocumentRuleResult(dict):
|
|
249
401
|
"""
|
250
402
|
return pulumi.get(self, "denied_parameters")
|
251
403
|
|
252
|
-
@property
|
404
|
+
@_builtins.property
|
253
405
|
@pulumi.getter
|
254
|
-
def description(self) -> Optional[
|
406
|
+
def description(self) -> Optional[_builtins.str]:
|
255
407
|
"""
|
256
408
|
Description of the rule. Will be added as a comment to rendered rule.
|
257
409
|
"""
|
258
410
|
return pulumi.get(self, "description")
|
259
411
|
|
260
|
-
@property
|
412
|
+
@_builtins.property
|
261
413
|
@pulumi.getter(name="maxWrappingTtl")
|
262
|
-
def max_wrapping_ttl(self) -> Optional[
|
414
|
+
def max_wrapping_ttl(self) -> Optional[_builtins.str]:
|
263
415
|
"""
|
264
416
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
265
417
|
"""
|
266
418
|
return pulumi.get(self, "max_wrapping_ttl")
|
267
419
|
|
268
|
-
@property
|
420
|
+
@_builtins.property
|
269
421
|
@pulumi.getter(name="minWrappingTtl")
|
270
|
-
def min_wrapping_ttl(self) -> Optional[
|
422
|
+
def min_wrapping_ttl(self) -> Optional[_builtins.str]:
|
271
423
|
"""
|
272
424
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
273
425
|
"""
|
274
426
|
return pulumi.get(self, "min_wrapping_ttl")
|
275
427
|
|
276
|
-
@property
|
428
|
+
@_builtins.property
|
277
429
|
@pulumi.getter(name="requiredParameters")
|
278
|
-
def required_parameters(self) -> Optional[Sequence[
|
430
|
+
def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
|
279
431
|
"""
|
280
432
|
A list of parameters that must be specified.
|
281
433
|
"""
|
282
434
|
return pulumi.get(self, "required_parameters")
|
283
435
|
|
284
|
-
@property
|
436
|
+
@_builtins.property
|
285
437
|
@pulumi.getter(name="subscribeEventTypes")
|
286
|
-
def subscribe_event_types(self) -> Optional[Sequence[
|
438
|
+
def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
|
287
439
|
"""
|
288
440
|
A list of event types to subscribe to when using `subscribe` capability.
|
289
441
|
"""
|
@@ -293,26 +445,26 @@ class GetPolicyDocumentRuleResult(dict):
|
|
293
445
|
@pulumi.output_type
|
294
446
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
295
447
|
def __init__(__self__, *,
|
296
|
-
key:
|
297
|
-
values: Sequence[
|
448
|
+
key: _builtins.str,
|
449
|
+
values: Sequence[_builtins.str]):
|
298
450
|
"""
|
299
|
-
:param
|
300
|
-
:param Sequence[
|
451
|
+
:param _builtins.str key: Name of permitted key.
|
452
|
+
:param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
|
301
453
|
"""
|
302
454
|
pulumi.set(__self__, "key", key)
|
303
455
|
pulumi.set(__self__, "values", values)
|
304
456
|
|
305
|
-
@property
|
457
|
+
@_builtins.property
|
306
458
|
@pulumi.getter
|
307
|
-
def key(self) ->
|
459
|
+
def key(self) -> _builtins.str:
|
308
460
|
"""
|
309
461
|
Name of permitted key.
|
310
462
|
"""
|
311
463
|
return pulumi.get(self, "key")
|
312
464
|
|
313
|
-
@property
|
465
|
+
@_builtins.property
|
314
466
|
@pulumi.getter
|
315
|
-
def values(self) -> Sequence[
|
467
|
+
def values(self) -> Sequence[_builtins.str]:
|
316
468
|
"""
|
317
469
|
A list of values what are permitted by policy rule.
|
318
470
|
"""
|
@@ -322,26 +474,26 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
322
474
|
@pulumi.output_type
|
323
475
|
class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
324
476
|
def __init__(__self__, *,
|
325
|
-
key:
|
326
|
-
values: Sequence[
|
477
|
+
key: _builtins.str,
|
478
|
+
values: Sequence[_builtins.str]):
|
327
479
|
"""
|
328
|
-
:param
|
329
|
-
:param Sequence[
|
480
|
+
:param _builtins.str key: Name of denied key.
|
481
|
+
:param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
|
330
482
|
"""
|
331
483
|
pulumi.set(__self__, "key", key)
|
332
484
|
pulumi.set(__self__, "values", values)
|
333
485
|
|
334
|
-
@property
|
486
|
+
@_builtins.property
|
335
487
|
@pulumi.getter
|
336
|
-
def key(self) ->
|
488
|
+
def key(self) -> _builtins.str:
|
337
489
|
"""
|
338
490
|
Name of denied key.
|
339
491
|
"""
|
340
492
|
return pulumi.get(self, "key")
|
341
493
|
|
342
|
-
@property
|
494
|
+
@_builtins.property
|
343
495
|
@pulumi.getter
|
344
|
-
def values(self) -> Sequence[
|
496
|
+
def values(self) -> Sequence[_builtins.str]:
|
345
497
|
"""
|
346
498
|
A list of values what are denied by policy rule.
|
347
499
|
"""
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|