pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -43,28 +42,28 @@ class GetPolicyDocumentResult:
|
|
43
42
|
raise TypeError("Expected argument 'rules' to be a list")
|
44
43
|
pulumi.set(__self__, "rules", rules)
|
45
44
|
|
46
|
-
@property
|
45
|
+
@_builtins.property
|
47
46
|
@pulumi.getter
|
48
|
-
def hcl(self) ->
|
47
|
+
def hcl(self) -> _builtins.str:
|
49
48
|
"""
|
50
49
|
The above arguments serialized as a standard Vault HCL policy document.
|
51
50
|
"""
|
52
51
|
return pulumi.get(self, "hcl")
|
53
52
|
|
54
|
-
@property
|
53
|
+
@_builtins.property
|
55
54
|
@pulumi.getter
|
56
|
-
def id(self) ->
|
55
|
+
def id(self) -> _builtins.str:
|
57
56
|
"""
|
58
57
|
The provider-assigned unique ID for this managed resource.
|
59
58
|
"""
|
60
59
|
return pulumi.get(self, "id")
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter
|
64
|
-
def namespace(self) -> Optional[
|
63
|
+
def namespace(self) -> Optional[_builtins.str]:
|
65
64
|
return pulumi.get(self, "namespace")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter
|
69
68
|
def rules(self) -> Sequence['outputs.GetPolicyDocumentRuleResult']:
|
70
69
|
return pulumi.get(self, "rules")
|
@@ -82,7 +81,7 @@ class AwaitableGetPolicyDocumentResult(GetPolicyDocumentResult):
|
|
82
81
|
rules=self.rules)
|
83
82
|
|
84
83
|
|
85
|
-
def get_policy_document(namespace: Optional[
|
84
|
+
def get_policy_document(namespace: Optional[_builtins.str] = None,
|
86
85
|
rules: Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]] = None,
|
87
86
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPolicyDocumentResult:
|
88
87
|
"""
|
@@ -121,7 +120,7 @@ def get_policy_document(namespace: Optional[builtins.str] = None,
|
|
121
120
|
id=pulumi.get(__ret__, 'id'),
|
122
121
|
namespace=pulumi.get(__ret__, 'namespace'),
|
123
122
|
rules=pulumi.get(__ret__, 'rules'))
|
124
|
-
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[
|
123
|
+
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
125
124
|
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
126
125
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
127
126
|
"""
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -68,102 +67,102 @@ class GetRaftAutopilotStateResult:
|
|
68
67
|
raise TypeError("Expected argument 'voters' to be a list")
|
69
68
|
pulumi.set(__self__, "voters", voters)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="failureTolerance")
|
73
|
-
def failure_tolerance(self) ->
|
72
|
+
def failure_tolerance(self) -> _builtins.int:
|
74
73
|
"""
|
75
74
|
How many nodes could fail before the cluster becomes unhealthy.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "failure_tolerance")
|
78
77
|
|
79
|
-
@property
|
78
|
+
@_builtins.property
|
80
79
|
@pulumi.getter
|
81
|
-
def healthy(self) ->
|
80
|
+
def healthy(self) -> _builtins.bool:
|
82
81
|
"""
|
83
82
|
Cluster health status.
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "healthy")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def id(self) ->
|
88
|
+
def id(self) -> _builtins.str:
|
90
89
|
"""
|
91
90
|
The provider-assigned unique ID for this managed resource.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "id")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def leader(self) ->
|
96
|
+
def leader(self) -> _builtins.str:
|
98
97
|
"""
|
99
98
|
The current leader of Vault.
|
100
99
|
"""
|
101
100
|
return pulumi.get(self, "leader")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter
|
105
|
-
def namespace(self) -> Optional[
|
104
|
+
def namespace(self) -> Optional[_builtins.str]:
|
106
105
|
return pulumi.get(self, "namespace")
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter(name="optimisticFailureTolerance")
|
110
|
-
def optimistic_failure_tolerance(self) ->
|
109
|
+
def optimistic_failure_tolerance(self) -> _builtins.int:
|
111
110
|
"""
|
112
111
|
The cluster-level optimistic failure tolerance.
|
113
112
|
"""
|
114
113
|
return pulumi.get(self, "optimistic_failure_tolerance")
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="redundancyZones")
|
118
|
-
def redundancy_zones(self) -> Mapping[str,
|
117
|
+
def redundancy_zones(self) -> Mapping[str, _builtins.str]:
|
119
118
|
"""
|
120
119
|
Additional output related to redundancy zones stored as a serialized map of strings.
|
121
120
|
"""
|
122
121
|
return pulumi.get(self, "redundancy_zones")
|
123
122
|
|
124
|
-
@property
|
123
|
+
@_builtins.property
|
125
124
|
@pulumi.getter(name="redundancyZonesJson")
|
126
|
-
def redundancy_zones_json(self) ->
|
125
|
+
def redundancy_zones_json(self) -> _builtins.str:
|
127
126
|
"""
|
128
127
|
Additional output related to redundancy zones.
|
129
128
|
"""
|
130
129
|
return pulumi.get(self, "redundancy_zones_json")
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter
|
134
|
-
def servers(self) -> Mapping[str,
|
133
|
+
def servers(self) -> Mapping[str, _builtins.str]:
|
135
134
|
"""
|
136
135
|
Additionaly output related to servers in the cluster stored as a serialized map of strings.
|
137
136
|
"""
|
138
137
|
return pulumi.get(self, "servers")
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="serversJson")
|
142
|
-
def servers_json(self) ->
|
141
|
+
def servers_json(self) -> _builtins.str:
|
143
142
|
"""
|
144
143
|
Additionaly output related to servers in the cluster.
|
145
144
|
"""
|
146
145
|
return pulumi.get(self, "servers_json")
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="upgradeInfo")
|
150
|
-
def upgrade_info(self) -> Mapping[str,
|
149
|
+
def upgrade_info(self) -> Mapping[str, _builtins.str]:
|
151
150
|
"""
|
152
151
|
Additional output related to upgrade information stored as a serialized map of strings.
|
153
152
|
"""
|
154
153
|
return pulumi.get(self, "upgrade_info")
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter(name="upgradeInfoJson")
|
158
|
-
def upgrade_info_json(self) ->
|
157
|
+
def upgrade_info_json(self) -> _builtins.str:
|
159
158
|
"""
|
160
159
|
Additional output related to upgrade information.
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "upgrade_info_json")
|
163
162
|
|
164
|
-
@property
|
163
|
+
@_builtins.property
|
165
164
|
@pulumi.getter
|
166
|
-
def voters(self) -> Sequence[
|
165
|
+
def voters(self) -> Sequence[_builtins.str]:
|
167
166
|
"""
|
168
167
|
The voters in the Vault cluster.
|
169
168
|
"""
|
@@ -191,7 +190,7 @@ class AwaitableGetRaftAutopilotStateResult(GetRaftAutopilotStateResult):
|
|
191
190
|
voters=self.voters)
|
192
191
|
|
193
192
|
|
194
|
-
def get_raft_autopilot_state(namespace: Optional[
|
193
|
+
def get_raft_autopilot_state(namespace: Optional[_builtins.str] = None,
|
195
194
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRaftAutopilotStateResult:
|
196
195
|
"""
|
197
196
|
## Example Usage
|
@@ -205,7 +204,7 @@ def get_raft_autopilot_state(namespace: Optional[builtins.str] = None,
|
|
205
204
|
```
|
206
205
|
|
207
206
|
|
208
|
-
:param
|
207
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
209
208
|
The value should not contain leading or trailing forward slashes.
|
210
209
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
211
210
|
*Available only for Vault Enterprise*.
|
@@ -229,7 +228,7 @@ def get_raft_autopilot_state(namespace: Optional[builtins.str] = None,
|
|
229
228
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
230
229
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
231
230
|
voters=pulumi.get(__ret__, 'voters'))
|
232
|
-
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[
|
231
|
+
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
233
232
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
234
233
|
"""
|
235
234
|
## Example Usage
|
@@ -243,7 +242,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[bu
|
|
243
242
|
```
|
244
243
|
|
245
244
|
|
246
|
-
:param
|
245
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
247
246
|
The value should not contain leading or trailing forward slashes.
|
248
247
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
249
248
|
*Available only for Vault Enterprise*.
|
pulumi_vault/github/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -24,44 +23,44 @@ MYPY = False
|
|
24
23
|
|
25
24
|
if not MYPY:
|
26
25
|
class AuthBackendTuneArgsDict(TypedDict):
|
27
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
28
27
|
"""
|
29
28
|
List of headers to whitelist and allowing
|
30
29
|
a plugin to include them in the response.
|
31
30
|
"""
|
32
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
33
32
|
"""
|
34
33
|
Specifies the list of keys that will
|
35
34
|
not be HMAC'd by audit devices in the request data object.
|
36
35
|
"""
|
37
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
38
37
|
"""
|
39
38
|
Specifies the list of keys that will
|
40
39
|
not be HMAC'd by audit devices in the response data object.
|
41
40
|
"""
|
42
|
-
default_lease_ttl: NotRequired[pulumi.Input[
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
43
42
|
"""
|
44
43
|
Specifies the default time-to-live.
|
45
44
|
If set, this overrides the global default.
|
46
45
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
47
46
|
"""
|
48
|
-
listing_visibility: NotRequired[pulumi.Input[
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
49
48
|
"""
|
50
49
|
Specifies whether to show this mount in
|
51
50
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
52
51
|
"""
|
53
|
-
max_lease_ttl: NotRequired[pulumi.Input[
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
54
53
|
"""
|
55
54
|
Specifies the maximum time-to-live.
|
56
55
|
If set, this overrides the global default.
|
57
56
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
58
57
|
"""
|
59
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
60
59
|
"""
|
61
60
|
List of headers to whitelist and
|
62
61
|
pass from the request to the backend.
|
63
62
|
"""
|
64
|
-
token_type: NotRequired[pulumi.Input[
|
63
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
65
64
|
"""
|
66
65
|
Specifies the type of tokens that should be returned by
|
67
66
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -72,32 +71,32 @@ elif False:
|
|
72
71
|
@pulumi.input_type
|
73
72
|
class AuthBackendTuneArgs:
|
74
73
|
def __init__(__self__, *,
|
75
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
76
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
77
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
78
|
-
default_lease_ttl: Optional[pulumi.Input[
|
79
|
-
listing_visibility: Optional[pulumi.Input[
|
80
|
-
max_lease_ttl: Optional[pulumi.Input[
|
81
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
82
|
-
token_type: Optional[pulumi.Input[
|
83
|
-
"""
|
84
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
74
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
75
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
76
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
77
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
78
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
79
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
80
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
81
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
82
|
+
"""
|
83
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
85
84
|
a plugin to include them in the response.
|
86
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
85
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
87
86
|
not be HMAC'd by audit devices in the request data object.
|
88
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
89
88
|
not be HMAC'd by audit devices in the response data object.
|
90
|
-
:param pulumi.Input[
|
89
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
91
90
|
If set, this overrides the global default.
|
92
91
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
93
|
-
:param pulumi.Input[
|
92
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
94
93
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
95
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
96
95
|
If set, this overrides the global default.
|
97
96
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
98
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
99
98
|
pass from the request to the backend.
|
100
|
-
:param pulumi.Input[
|
99
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
101
100
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
102
101
|
"""
|
103
102
|
if allowed_response_headers is not None:
|
@@ -117,9 +116,9 @@ class AuthBackendTuneArgs:
|
|
117
116
|
if token_type is not None:
|
118
117
|
pulumi.set(__self__, "token_type", token_type)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter(name="allowedResponseHeaders")
|
122
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
121
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
123
122
|
"""
|
124
123
|
List of headers to whitelist and allowing
|
125
124
|
a plugin to include them in the response.
|
@@ -127,12 +126,12 @@ class AuthBackendTuneArgs:
|
|
127
126
|
return pulumi.get(self, "allowed_response_headers")
|
128
127
|
|
129
128
|
@allowed_response_headers.setter
|
130
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
129
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
131
130
|
pulumi.set(self, "allowed_response_headers", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
135
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
136
135
|
"""
|
137
136
|
Specifies the list of keys that will
|
138
137
|
not be HMAC'd by audit devices in the request data object.
|
@@ -140,12 +139,12 @@ class AuthBackendTuneArgs:
|
|
140
139
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
141
140
|
|
142
141
|
@audit_non_hmac_request_keys.setter
|
143
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
142
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
144
143
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
148
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
147
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
149
148
|
"""
|
150
149
|
Specifies the list of keys that will
|
151
150
|
not be HMAC'd by audit devices in the response data object.
|
@@ -153,12 +152,12 @@ class AuthBackendTuneArgs:
|
|
153
152
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
154
153
|
|
155
154
|
@audit_non_hmac_response_keys.setter
|
156
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
155
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
157
156
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
158
157
|
|
159
|
-
@property
|
158
|
+
@_builtins.property
|
160
159
|
@pulumi.getter(name="defaultLeaseTtl")
|
161
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[
|
160
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
162
161
|
"""
|
163
162
|
Specifies the default time-to-live.
|
164
163
|
If set, this overrides the global default.
|
@@ -167,12 +166,12 @@ class AuthBackendTuneArgs:
|
|
167
166
|
return pulumi.get(self, "default_lease_ttl")
|
168
167
|
|
169
168
|
@default_lease_ttl.setter
|
170
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[
|
169
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "default_lease_ttl", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="listingVisibility")
|
175
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
174
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
176
175
|
"""
|
177
176
|
Specifies whether to show this mount in
|
178
177
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -180,12 +179,12 @@ class AuthBackendTuneArgs:
|
|
180
179
|
return pulumi.get(self, "listing_visibility")
|
181
180
|
|
182
181
|
@listing_visibility.setter
|
183
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
182
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "listing_visibility", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="maxLeaseTtl")
|
188
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[
|
187
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
189
188
|
"""
|
190
189
|
Specifies the maximum time-to-live.
|
191
190
|
If set, this overrides the global default.
|
@@ -194,12 +193,12 @@ class AuthBackendTuneArgs:
|
|
194
193
|
return pulumi.get(self, "max_lease_ttl")
|
195
194
|
|
196
195
|
@max_lease_ttl.setter
|
197
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[
|
196
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
197
|
pulumi.set(self, "max_lease_ttl", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter(name="passthroughRequestHeaders")
|
202
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
201
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
203
202
|
"""
|
204
203
|
List of headers to whitelist and
|
205
204
|
pass from the request to the backend.
|
@@ -207,12 +206,12 @@ class AuthBackendTuneArgs:
|
|
207
206
|
return pulumi.get(self, "passthrough_request_headers")
|
208
207
|
|
209
208
|
@passthrough_request_headers.setter
|
210
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
209
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
211
210
|
pulumi.set(self, "passthrough_request_headers", value)
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter(name="tokenType")
|
215
|
-
def token_type(self) -> Optional[pulumi.Input[
|
214
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
215
|
"""
|
217
216
|
Specifies the type of tokens that should be returned by
|
218
217
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -220,7 +219,7 @@ class AuthBackendTuneArgs:
|
|
220
219
|
return pulumi.get(self, "token_type")
|
221
220
|
|
222
221
|
@token_type.setter
|
223
|
-
def token_type(self, value: Optional[pulumi.Input[
|
222
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
224
223
|
pulumi.set(self, "token_type", value)
|
225
224
|
|
226
225
|
|