pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,16 +19,16 @@ __all__ = ['RgpPolicyArgs', 'RgpPolicy']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class RgpPolicyArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
enforcement_level: pulumi.Input[
|
24
|
-
policy: pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
enforcement_level: pulumi.Input[_builtins.str],
|
23
|
+
policy: pulumi.Input[_builtins.str],
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a RgpPolicy resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
29
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
30
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
@@ -41,45 +40,45 @@ class RgpPolicyArgs:
|
|
41
40
|
if namespace is not None:
|
42
41
|
pulumi.set(__self__, "namespace", namespace)
|
43
42
|
|
44
|
-
@property
|
43
|
+
@_builtins.property
|
45
44
|
@pulumi.getter(name="enforcementLevel")
|
46
|
-
def enforcement_level(self) -> pulumi.Input[
|
45
|
+
def enforcement_level(self) -> pulumi.Input[_builtins.str]:
|
47
46
|
"""
|
48
47
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
49
48
|
"""
|
50
49
|
return pulumi.get(self, "enforcement_level")
|
51
50
|
|
52
51
|
@enforcement_level.setter
|
53
|
-
def enforcement_level(self, value: pulumi.Input[
|
52
|
+
def enforcement_level(self, value: pulumi.Input[_builtins.str]):
|
54
53
|
pulumi.set(self, "enforcement_level", value)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def policy(self) -> pulumi.Input[
|
57
|
+
def policy(self) -> pulumi.Input[_builtins.str]:
|
59
58
|
"""
|
60
59
|
String containing a Sentinel policy
|
61
60
|
"""
|
62
61
|
return pulumi.get(self, "policy")
|
63
62
|
|
64
63
|
@policy.setter
|
65
|
-
def policy(self, value: pulumi.Input[
|
64
|
+
def policy(self, value: pulumi.Input[_builtins.str]):
|
66
65
|
pulumi.set(self, "policy", value)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
|
-
def name(self) -> Optional[pulumi.Input[
|
69
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
71
70
|
"""
|
72
71
|
The name of the policy
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "name")
|
75
74
|
|
76
75
|
@name.setter
|
77
|
-
def name(self, value: Optional[pulumi.Input[
|
76
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
78
77
|
pulumi.set(self, "name", value)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def namespace(self) -> Optional[pulumi.Input[
|
81
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
83
82
|
"""
|
84
83
|
The namespace to provision the resource in.
|
85
84
|
The value should not contain leading or trailing forward slashes.
|
@@ -89,26 +88,26 @@ class RgpPolicyArgs:
|
|
89
88
|
return pulumi.get(self, "namespace")
|
90
89
|
|
91
90
|
@namespace.setter
|
92
|
-
def namespace(self, value: Optional[pulumi.Input[
|
91
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
93
92
|
pulumi.set(self, "namespace", value)
|
94
93
|
|
95
94
|
|
96
95
|
@pulumi.input_type
|
97
96
|
class _RgpPolicyState:
|
98
97
|
def __init__(__self__, *,
|
99
|
-
enforcement_level: Optional[pulumi.Input[
|
100
|
-
name: Optional[pulumi.Input[
|
101
|
-
namespace: Optional[pulumi.Input[
|
102
|
-
policy: Optional[pulumi.Input[
|
98
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
99
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
100
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
101
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None):
|
103
102
|
"""
|
104
103
|
Input properties used for looking up and filtering RgpPolicy resources.
|
105
|
-
:param pulumi.Input[
|
106
|
-
:param pulumi.Input[
|
107
|
-
:param pulumi.Input[
|
104
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
105
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
106
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
108
107
|
The value should not contain leading or trailing forward slashes.
|
109
108
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
110
109
|
*Available only for Vault Enterprise*.
|
111
|
-
:param pulumi.Input[
|
110
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
112
111
|
"""
|
113
112
|
if enforcement_level is not None:
|
114
113
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -119,33 +118,33 @@ class _RgpPolicyState:
|
|
119
118
|
if policy is not None:
|
120
119
|
pulumi.set(__self__, "policy", policy)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="enforcementLevel")
|
124
|
-
def enforcement_level(self) -> Optional[pulumi.Input[
|
123
|
+
def enforcement_level(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
127
126
|
"""
|
128
127
|
return pulumi.get(self, "enforcement_level")
|
129
128
|
|
130
129
|
@enforcement_level.setter
|
131
|
-
def enforcement_level(self, value: Optional[pulumi.Input[
|
130
|
+
def enforcement_level(self, value: Optional[pulumi.Input[_builtins.str]]):
|
132
131
|
pulumi.set(self, "enforcement_level", value)
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
@pulumi.getter
|
136
|
-
def name(self) -> Optional[pulumi.Input[
|
135
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
137
136
|
"""
|
138
137
|
The name of the policy
|
139
138
|
"""
|
140
139
|
return pulumi.get(self, "name")
|
141
140
|
|
142
141
|
@name.setter
|
143
|
-
def name(self, value: Optional[pulumi.Input[
|
142
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
144
143
|
pulumi.set(self, "name", value)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter
|
148
|
-
def namespace(self) -> Optional[pulumi.Input[
|
147
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
149
148
|
"""
|
150
149
|
The namespace to provision the resource in.
|
151
150
|
The value should not contain leading or trailing forward slashes.
|
@@ -155,19 +154,19 @@ class _RgpPolicyState:
|
|
155
154
|
return pulumi.get(self, "namespace")
|
156
155
|
|
157
156
|
@namespace.setter
|
158
|
-
def namespace(self, value: Optional[pulumi.Input[
|
157
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "namespace", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter
|
163
|
-
def policy(self) -> Optional[pulumi.Input[
|
162
|
+
def policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
String containing a Sentinel policy
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "policy")
|
168
167
|
|
169
168
|
@policy.setter
|
170
|
-
def policy(self, value: Optional[pulumi.Input[
|
169
|
+
def policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "policy", value)
|
172
171
|
|
173
172
|
|
@@ -177,10 +176,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
177
176
|
def __init__(__self__,
|
178
177
|
resource_name: str,
|
179
178
|
opts: Optional[pulumi.ResourceOptions] = None,
|
180
|
-
enforcement_level: Optional[pulumi.Input[
|
181
|
-
name: Optional[pulumi.Input[
|
182
|
-
namespace: Optional[pulumi.Input[
|
183
|
-
policy: Optional[pulumi.Input[
|
179
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
180
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
181
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
182
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None,
|
184
183
|
__props__=None):
|
185
184
|
"""
|
186
185
|
Provides a resource to manage Role Governing Policy (RGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
|
@@ -204,13 +203,13 @@ class RgpPolicy(pulumi.CustomResource):
|
|
204
203
|
|
205
204
|
:param str resource_name: The name of the resource.
|
206
205
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
207
|
-
:param pulumi.Input[
|
208
|
-
:param pulumi.Input[
|
209
|
-
:param pulumi.Input[
|
206
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
207
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
208
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
210
209
|
The value should not contain leading or trailing forward slashes.
|
211
210
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
212
211
|
*Available only for Vault Enterprise*.
|
213
|
-
:param pulumi.Input[
|
212
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
214
213
|
"""
|
215
214
|
...
|
216
215
|
@overload
|
@@ -253,10 +252,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
253
252
|
def _internal_init(__self__,
|
254
253
|
resource_name: str,
|
255
254
|
opts: Optional[pulumi.ResourceOptions] = None,
|
256
|
-
enforcement_level: Optional[pulumi.Input[
|
257
|
-
name: Optional[pulumi.Input[
|
258
|
-
namespace: Optional[pulumi.Input[
|
259
|
-
policy: Optional[pulumi.Input[
|
255
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
256
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
257
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
258
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None,
|
260
259
|
__props__=None):
|
261
260
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
262
261
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -284,10 +283,10 @@ class RgpPolicy(pulumi.CustomResource):
|
|
284
283
|
def get(resource_name: str,
|
285
284
|
id: pulumi.Input[str],
|
286
285
|
opts: Optional[pulumi.ResourceOptions] = None,
|
287
|
-
enforcement_level: Optional[pulumi.Input[
|
288
|
-
name: Optional[pulumi.Input[
|
289
|
-
namespace: Optional[pulumi.Input[
|
290
|
-
policy: Optional[pulumi.Input[
|
286
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
287
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
288
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
289
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None) -> 'RgpPolicy':
|
291
290
|
"""
|
292
291
|
Get an existing RgpPolicy resource's state with the given name, id, and optional extra
|
293
292
|
properties used to qualify the lookup.
|
@@ -295,13 +294,13 @@ class RgpPolicy(pulumi.CustomResource):
|
|
295
294
|
:param str resource_name: The unique name of the resulting resource.
|
296
295
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
297
296
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
298
|
-
:param pulumi.Input[
|
299
|
-
:param pulumi.Input[
|
300
|
-
:param pulumi.Input[
|
297
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
298
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
299
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
301
300
|
The value should not contain leading or trailing forward slashes.
|
302
301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
303
302
|
*Available only for Vault Enterprise*.
|
304
|
-
:param pulumi.Input[
|
303
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
305
304
|
"""
|
306
305
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
307
306
|
|
@@ -313,25 +312,25 @@ class RgpPolicy(pulumi.CustomResource):
|
|
313
312
|
__props__.__dict__["policy"] = policy
|
314
313
|
return RgpPolicy(resource_name, opts=opts, __props__=__props__)
|
315
314
|
|
316
|
-
@property
|
315
|
+
@_builtins.property
|
317
316
|
@pulumi.getter(name="enforcementLevel")
|
318
|
-
def enforcement_level(self) -> pulumi.Output[
|
317
|
+
def enforcement_level(self) -> pulumi.Output[_builtins.str]:
|
319
318
|
"""
|
320
319
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
321
320
|
"""
|
322
321
|
return pulumi.get(self, "enforcement_level")
|
323
322
|
|
324
|
-
@property
|
323
|
+
@_builtins.property
|
325
324
|
@pulumi.getter
|
326
|
-
def name(self) -> pulumi.Output[
|
325
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
327
326
|
"""
|
328
327
|
The name of the policy
|
329
328
|
"""
|
330
329
|
return pulumi.get(self, "name")
|
331
330
|
|
332
|
-
@property
|
331
|
+
@_builtins.property
|
333
332
|
@pulumi.getter
|
334
|
-
def namespace(self) -> pulumi.Output[Optional[
|
333
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
335
334
|
"""
|
336
335
|
The namespace to provision the resource in.
|
337
336
|
The value should not contain leading or trailing forward slashes.
|
@@ -340,9 +339,9 @@ class RgpPolicy(pulumi.CustomResource):
|
|
340
339
|
"""
|
341
340
|
return pulumi.get(self, "namespace")
|
342
341
|
|
343
|
-
@property
|
342
|
+
@_builtins.property
|
344
343
|
@pulumi.getter
|
345
|
-
def policy(self) -> pulumi.Output[
|
344
|
+
def policy(self) -> pulumi.Output[_builtins.str]:
|
346
345
|
"""
|
347
346
|
String containing a Sentinel policy
|
348
347
|
"""
|
pulumi_vault/saml/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|