pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/outputs.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -18,6 +17,7 @@ from . import outputs
18
17
 
19
18
  __all__ = [
20
19
  'AuthBackendTune',
20
+ 'OciAuthBackendTune',
21
21
  'GetPolicyDocumentRuleResult',
22
22
  'GetPolicyDocumentRuleAllowedParameterResult',
23
23
  'GetPolicyDocumentRuleDeniedParameterResult',
@@ -57,32 +57,32 @@ class AuthBackendTune(dict):
57
57
  return super().get(key, default)
58
58
 
59
59
  def __init__(__self__, *,
60
- allowed_response_headers: Optional[Sequence[builtins.str]] = None,
61
- audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
62
- audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
63
- default_lease_ttl: Optional[builtins.str] = None,
64
- listing_visibility: Optional[builtins.str] = None,
65
- max_lease_ttl: Optional[builtins.str] = None,
66
- passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
67
- token_type: Optional[builtins.str] = None):
68
- """
69
- :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
60
+ allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
61
+ audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
62
+ audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
63
+ default_lease_ttl: Optional[_builtins.str] = None,
64
+ listing_visibility: Optional[_builtins.str] = None,
65
+ max_lease_ttl: Optional[_builtins.str] = None,
66
+ passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
67
+ token_type: Optional[_builtins.str] = None):
68
+ """
69
+ :param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
70
70
  a plugin to include them in the response.
71
- :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
71
+ :param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
72
72
  not be HMAC'd by audit devices in the request data object.
73
- :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
73
+ :param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
74
74
  not be HMAC'd by audit devices in the response data object.
75
- :param builtins.str default_lease_ttl: Specifies the default time-to-live.
75
+ :param _builtins.str default_lease_ttl: Specifies the default time-to-live.
76
76
  If set, this overrides the global default.
77
77
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
78
- :param builtins.str listing_visibility: Specifies whether to show this mount in
78
+ :param _builtins.str listing_visibility: Specifies whether to show this mount in
79
79
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
80
- :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
80
+ :param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
81
81
  If set, this overrides the global default.
82
82
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
83
- :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
83
+ :param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
84
84
  pass from the request to the backend.
85
- :param builtins.str token_type: Specifies the type of tokens that should be returned by
85
+ :param _builtins.str token_type: Specifies the type of tokens that should be returned by
86
86
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
87
87
  """
88
88
  if allowed_response_headers is not None:
@@ -102,36 +102,36 @@ class AuthBackendTune(dict):
102
102
  if token_type is not None:
103
103
  pulumi.set(__self__, "token_type", token_type)
104
104
 
105
- @property
105
+ @_builtins.property
106
106
  @pulumi.getter(name="allowedResponseHeaders")
107
- def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
107
+ def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
108
108
  """
109
109
  List of headers to whitelist and allowing
110
110
  a plugin to include them in the response.
111
111
  """
112
112
  return pulumi.get(self, "allowed_response_headers")
113
113
 
114
- @property
114
+ @_builtins.property
115
115
  @pulumi.getter(name="auditNonHmacRequestKeys")
116
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
116
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
117
117
  """
118
118
  Specifies the list of keys that will
119
119
  not be HMAC'd by audit devices in the request data object.
120
120
  """
121
121
  return pulumi.get(self, "audit_non_hmac_request_keys")
122
122
 
123
- @property
123
+ @_builtins.property
124
124
  @pulumi.getter(name="auditNonHmacResponseKeys")
125
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
125
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
126
126
  """
127
127
  Specifies the list of keys that will
128
128
  not be HMAC'd by audit devices in the response data object.
129
129
  """
130
130
  return pulumi.get(self, "audit_non_hmac_response_keys")
131
131
 
132
- @property
132
+ @_builtins.property
133
133
  @pulumi.getter(name="defaultLeaseTtl")
134
- def default_lease_ttl(self) -> Optional[builtins.str]:
134
+ def default_lease_ttl(self) -> Optional[_builtins.str]:
135
135
  """
136
136
  Specifies the default time-to-live.
137
137
  If set, this overrides the global default.
@@ -139,18 +139,18 @@ class AuthBackendTune(dict):
139
139
  """
140
140
  return pulumi.get(self, "default_lease_ttl")
141
141
 
142
- @property
142
+ @_builtins.property
143
143
  @pulumi.getter(name="listingVisibility")
144
- def listing_visibility(self) -> Optional[builtins.str]:
144
+ def listing_visibility(self) -> Optional[_builtins.str]:
145
145
  """
146
146
  Specifies whether to show this mount in
147
147
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
148
148
  """
149
149
  return pulumi.get(self, "listing_visibility")
150
150
 
151
- @property
151
+ @_builtins.property
152
152
  @pulumi.getter(name="maxLeaseTtl")
153
- def max_lease_ttl(self) -> Optional[builtins.str]:
153
+ def max_lease_ttl(self) -> Optional[_builtins.str]:
154
154
  """
155
155
  Specifies the maximum time-to-live.
156
156
  If set, this overrides the global default.
@@ -158,18 +158,18 @@ class AuthBackendTune(dict):
158
158
  """
159
159
  return pulumi.get(self, "max_lease_ttl")
160
160
 
161
- @property
161
+ @_builtins.property
162
162
  @pulumi.getter(name="passthroughRequestHeaders")
163
- def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
163
+ def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
164
164
  """
165
165
  List of headers to whitelist and
166
166
  pass from the request to the backend.
167
167
  """
168
168
  return pulumi.get(self, "passthrough_request_headers")
169
169
 
170
- @property
170
+ @_builtins.property
171
171
  @pulumi.getter(name="tokenType")
172
- def token_type(self) -> Optional[builtins.str]:
172
+ def token_type(self) -> Optional[_builtins.str]:
173
173
  """
174
174
  Specifies the type of tokens that should be returned by
175
175
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -177,28 +177,180 @@ class AuthBackendTune(dict):
177
177
  return pulumi.get(self, "token_type")
178
178
 
179
179
 
180
+ @pulumi.output_type
181
+ class OciAuthBackendTune(dict):
182
+ @staticmethod
183
+ def __key_warning(key: str):
184
+ suggest = None
185
+ if key == "allowedResponseHeaders":
186
+ suggest = "allowed_response_headers"
187
+ elif key == "auditNonHmacRequestKeys":
188
+ suggest = "audit_non_hmac_request_keys"
189
+ elif key == "auditNonHmacResponseKeys":
190
+ suggest = "audit_non_hmac_response_keys"
191
+ elif key == "defaultLeaseTtl":
192
+ suggest = "default_lease_ttl"
193
+ elif key == "listingVisibility":
194
+ suggest = "listing_visibility"
195
+ elif key == "maxLeaseTtl":
196
+ suggest = "max_lease_ttl"
197
+ elif key == "passthroughRequestHeaders":
198
+ suggest = "passthrough_request_headers"
199
+ elif key == "tokenType":
200
+ suggest = "token_type"
201
+
202
+ if suggest:
203
+ pulumi.log.warn(f"Key '{key}' not found in OciAuthBackendTune. Access the value via the '{suggest}' property getter instead.")
204
+
205
+ def __getitem__(self, key: str) -> Any:
206
+ OciAuthBackendTune.__key_warning(key)
207
+ return super().__getitem__(key)
208
+
209
+ def get(self, key: str, default = None) -> Any:
210
+ OciAuthBackendTune.__key_warning(key)
211
+ return super().get(key, default)
212
+
213
+ def __init__(__self__, *,
214
+ allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
215
+ audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
216
+ audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
217
+ default_lease_ttl: Optional[_builtins.str] = None,
218
+ listing_visibility: Optional[_builtins.str] = None,
219
+ max_lease_ttl: Optional[_builtins.str] = None,
220
+ passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
221
+ token_type: Optional[_builtins.str] = None):
222
+ """
223
+ :param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
224
+ a plugin to include them in the response.
225
+ :param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
226
+ not be HMAC'd by audit devices in the request data object.
227
+ :param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
228
+ not be HMAC'd by audit devices in the response data object.
229
+ :param _builtins.str default_lease_ttl: Specifies the default time-to-live.
230
+ If set, this overrides the global default.
231
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
232
+ :param _builtins.str listing_visibility: Specifies whether to show this mount in
233
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
234
+ :param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
235
+ If set, this overrides the global default.
236
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
237
+ :param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
238
+ pass from the request to the backend.
239
+ :param _builtins.str token_type: Specifies the type of tokens that should be returned by the mount.
240
+ """
241
+ if allowed_response_headers is not None:
242
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
243
+ if audit_non_hmac_request_keys is not None:
244
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
245
+ if audit_non_hmac_response_keys is not None:
246
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
247
+ if default_lease_ttl is not None:
248
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
249
+ if listing_visibility is not None:
250
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
251
+ if max_lease_ttl is not None:
252
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
253
+ if passthrough_request_headers is not None:
254
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
255
+ if token_type is not None:
256
+ pulumi.set(__self__, "token_type", token_type)
257
+
258
+ @_builtins.property
259
+ @pulumi.getter(name="allowedResponseHeaders")
260
+ def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
261
+ """
262
+ List of headers to whitelist and allowing
263
+ a plugin to include them in the response.
264
+ """
265
+ return pulumi.get(self, "allowed_response_headers")
266
+
267
+ @_builtins.property
268
+ @pulumi.getter(name="auditNonHmacRequestKeys")
269
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
270
+ """
271
+ Specifies the list of keys that will
272
+ not be HMAC'd by audit devices in the request data object.
273
+ """
274
+ return pulumi.get(self, "audit_non_hmac_request_keys")
275
+
276
+ @_builtins.property
277
+ @pulumi.getter(name="auditNonHmacResponseKeys")
278
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
279
+ """
280
+ Specifies the list of keys that will
281
+ not be HMAC'd by audit devices in the response data object.
282
+ """
283
+ return pulumi.get(self, "audit_non_hmac_response_keys")
284
+
285
+ @_builtins.property
286
+ @pulumi.getter(name="defaultLeaseTtl")
287
+ def default_lease_ttl(self) -> Optional[_builtins.str]:
288
+ """
289
+ Specifies the default time-to-live.
290
+ If set, this overrides the global default.
291
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
292
+ """
293
+ return pulumi.get(self, "default_lease_ttl")
294
+
295
+ @_builtins.property
296
+ @pulumi.getter(name="listingVisibility")
297
+ def listing_visibility(self) -> Optional[_builtins.str]:
298
+ """
299
+ Specifies whether to show this mount in
300
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
301
+ """
302
+ return pulumi.get(self, "listing_visibility")
303
+
304
+ @_builtins.property
305
+ @pulumi.getter(name="maxLeaseTtl")
306
+ def max_lease_ttl(self) -> Optional[_builtins.str]:
307
+ """
308
+ Specifies the maximum time-to-live.
309
+ If set, this overrides the global default.
310
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
311
+ """
312
+ return pulumi.get(self, "max_lease_ttl")
313
+
314
+ @_builtins.property
315
+ @pulumi.getter(name="passthroughRequestHeaders")
316
+ def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
317
+ """
318
+ List of headers to whitelist and
319
+ pass from the request to the backend.
320
+ """
321
+ return pulumi.get(self, "passthrough_request_headers")
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="tokenType")
325
+ def token_type(self) -> Optional[_builtins.str]:
326
+ """
327
+ Specifies the type of tokens that should be returned by the mount.
328
+ """
329
+ return pulumi.get(self, "token_type")
330
+
331
+
180
332
  @pulumi.output_type
181
333
  class GetPolicyDocumentRuleResult(dict):
182
334
  def __init__(__self__, *,
183
- capabilities: Sequence[builtins.str],
184
- path: builtins.str,
335
+ capabilities: Sequence[_builtins.str],
336
+ path: _builtins.str,
185
337
  allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
186
338
  denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
187
- description: Optional[builtins.str] = None,
188
- max_wrapping_ttl: Optional[builtins.str] = None,
189
- min_wrapping_ttl: Optional[builtins.str] = None,
190
- required_parameters: Optional[Sequence[builtins.str]] = None,
191
- subscribe_event_types: Optional[Sequence[builtins.str]] = None):
192
- """
193
- :param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
194
- :param builtins.str path: A path in Vault that this rule applies to.
339
+ description: Optional[_builtins.str] = None,
340
+ max_wrapping_ttl: Optional[_builtins.str] = None,
341
+ min_wrapping_ttl: Optional[_builtins.str] = None,
342
+ required_parameters: Optional[Sequence[_builtins.str]] = None,
343
+ subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
344
+ """
345
+ :param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
346
+ :param _builtins.str path: A path in Vault that this rule applies to.
195
347
  :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
196
348
  :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
197
- :param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
198
- :param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
199
- :param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
200
- :param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
201
- :param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
349
+ :param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
350
+ :param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
351
+ :param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
352
+ :param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
353
+ :param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
202
354
  """
203
355
  pulumi.set(__self__, "capabilities", capabilities)
204
356
  pulumi.set(__self__, "path", path)
@@ -217,23 +369,23 @@ class GetPolicyDocumentRuleResult(dict):
217
369
  if subscribe_event_types is not None:
218
370
  pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
219
371
 
220
- @property
372
+ @_builtins.property
221
373
  @pulumi.getter
222
- def capabilities(self) -> Sequence[builtins.str]:
374
+ def capabilities(self) -> Sequence[_builtins.str]:
223
375
  """
224
376
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
225
377
  """
226
378
  return pulumi.get(self, "capabilities")
227
379
 
228
- @property
380
+ @_builtins.property
229
381
  @pulumi.getter
230
- def path(self) -> builtins.str:
382
+ def path(self) -> _builtins.str:
231
383
  """
232
384
  A path in Vault that this rule applies to.
233
385
  """
234
386
  return pulumi.get(self, "path")
235
387
 
236
- @property
388
+ @_builtins.property
237
389
  @pulumi.getter(name="allowedParameters")
238
390
  def allowed_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']]:
239
391
  """
@@ -241,7 +393,7 @@ class GetPolicyDocumentRuleResult(dict):
241
393
  """
242
394
  return pulumi.get(self, "allowed_parameters")
243
395
 
244
- @property
396
+ @_builtins.property
245
397
  @pulumi.getter(name="deniedParameters")
246
398
  def denied_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']]:
247
399
  """
@@ -249,41 +401,41 @@ class GetPolicyDocumentRuleResult(dict):
249
401
  """
250
402
  return pulumi.get(self, "denied_parameters")
251
403
 
252
- @property
404
+ @_builtins.property
253
405
  @pulumi.getter
254
- def description(self) -> Optional[builtins.str]:
406
+ def description(self) -> Optional[_builtins.str]:
255
407
  """
256
408
  Description of the rule. Will be added as a comment to rendered rule.
257
409
  """
258
410
  return pulumi.get(self, "description")
259
411
 
260
- @property
412
+ @_builtins.property
261
413
  @pulumi.getter(name="maxWrappingTtl")
262
- def max_wrapping_ttl(self) -> Optional[builtins.str]:
414
+ def max_wrapping_ttl(self) -> Optional[_builtins.str]:
263
415
  """
264
416
  The maximum allowed TTL that clients can specify for a wrapped response.
265
417
  """
266
418
  return pulumi.get(self, "max_wrapping_ttl")
267
419
 
268
- @property
420
+ @_builtins.property
269
421
  @pulumi.getter(name="minWrappingTtl")
270
- def min_wrapping_ttl(self) -> Optional[builtins.str]:
422
+ def min_wrapping_ttl(self) -> Optional[_builtins.str]:
271
423
  """
272
424
  The minimum allowed TTL that clients can specify for a wrapped response.
273
425
  """
274
426
  return pulumi.get(self, "min_wrapping_ttl")
275
427
 
276
- @property
428
+ @_builtins.property
277
429
  @pulumi.getter(name="requiredParameters")
278
- def required_parameters(self) -> Optional[Sequence[builtins.str]]:
430
+ def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
279
431
  """
280
432
  A list of parameters that must be specified.
281
433
  """
282
434
  return pulumi.get(self, "required_parameters")
283
435
 
284
- @property
436
+ @_builtins.property
285
437
  @pulumi.getter(name="subscribeEventTypes")
286
- def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
438
+ def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
287
439
  """
288
440
  A list of event types to subscribe to when using `subscribe` capability.
289
441
  """
@@ -293,26 +445,26 @@ class GetPolicyDocumentRuleResult(dict):
293
445
  @pulumi.output_type
294
446
  class GetPolicyDocumentRuleAllowedParameterResult(dict):
295
447
  def __init__(__self__, *,
296
- key: builtins.str,
297
- values: Sequence[builtins.str]):
448
+ key: _builtins.str,
449
+ values: Sequence[_builtins.str]):
298
450
  """
299
- :param builtins.str key: Name of permitted key.
300
- :param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
451
+ :param _builtins.str key: Name of permitted key.
452
+ :param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
301
453
  """
302
454
  pulumi.set(__self__, "key", key)
303
455
  pulumi.set(__self__, "values", values)
304
456
 
305
- @property
457
+ @_builtins.property
306
458
  @pulumi.getter
307
- def key(self) -> builtins.str:
459
+ def key(self) -> _builtins.str:
308
460
  """
309
461
  Name of permitted key.
310
462
  """
311
463
  return pulumi.get(self, "key")
312
464
 
313
- @property
465
+ @_builtins.property
314
466
  @pulumi.getter
315
- def values(self) -> Sequence[builtins.str]:
467
+ def values(self) -> Sequence[_builtins.str]:
316
468
  """
317
469
  A list of values what are permitted by policy rule.
318
470
  """
@@ -322,26 +474,26 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
322
474
  @pulumi.output_type
323
475
  class GetPolicyDocumentRuleDeniedParameterResult(dict):
324
476
  def __init__(__self__, *,
325
- key: builtins.str,
326
- values: Sequence[builtins.str]):
477
+ key: _builtins.str,
478
+ values: Sequence[_builtins.str]):
327
479
  """
328
- :param builtins.str key: Name of denied key.
329
- :param Sequence[builtins.str] values: A list of values what are denied by policy rule.
480
+ :param _builtins.str key: Name of denied key.
481
+ :param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
330
482
  """
331
483
  pulumi.set(__self__, "key", key)
332
484
  pulumi.set(__self__, "values", values)
333
485
 
334
- @property
486
+ @_builtins.property
335
487
  @pulumi.getter
336
- def key(self) -> builtins.str:
488
+ def key(self) -> _builtins.str:
337
489
  """
338
490
  Name of denied key.
339
491
  """
340
492
  return pulumi.get(self, "key")
341
493
 
342
- @property
494
+ @_builtins.property
343
495
  @pulumi.getter
344
- def values(self) -> Sequence[builtins.str]:
496
+ def values(self) -> Sequence[_builtins.str]:
345
497
  """
346
498
  A list of values what are denied by policy rule.
347
499
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: