pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -24,44 +23,44 @@ MYPY = False
|
|
24
23
|
|
25
24
|
if not MYPY:
|
26
25
|
class AuthBackendTuneArgsDict(TypedDict):
|
27
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
28
27
|
"""
|
29
28
|
List of headers to whitelist and allowing
|
30
29
|
a plugin to include them in the response.
|
31
30
|
"""
|
32
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
33
32
|
"""
|
34
33
|
Specifies the list of keys that will
|
35
34
|
not be HMAC'd by audit devices in the request data object.
|
36
35
|
"""
|
37
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
38
37
|
"""
|
39
38
|
Specifies the list of keys that will
|
40
39
|
not be HMAC'd by audit devices in the response data object.
|
41
40
|
"""
|
42
|
-
default_lease_ttl: NotRequired[pulumi.Input[
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
43
42
|
"""
|
44
43
|
Specifies the default time-to-live.
|
45
44
|
If set, this overrides the global default.
|
46
45
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
47
46
|
"""
|
48
|
-
listing_visibility: NotRequired[pulumi.Input[
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
49
48
|
"""
|
50
49
|
Specifies whether to show this mount in
|
51
50
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
52
51
|
"""
|
53
|
-
max_lease_ttl: NotRequired[pulumi.Input[
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
54
53
|
"""
|
55
54
|
Specifies the maximum time-to-live.
|
56
55
|
If set, this overrides the global default.
|
57
56
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
58
57
|
"""
|
59
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
60
59
|
"""
|
61
60
|
List of headers to whitelist and
|
62
61
|
pass from the request to the backend.
|
63
62
|
"""
|
64
|
-
token_type: NotRequired[pulumi.Input[
|
63
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
65
64
|
"""
|
66
65
|
Specifies the type of tokens that should be returned by
|
67
66
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -72,32 +71,32 @@ elif False:
|
|
72
71
|
@pulumi.input_type
|
73
72
|
class AuthBackendTuneArgs:
|
74
73
|
def __init__(__self__, *,
|
75
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
76
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
77
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
78
|
-
default_lease_ttl: Optional[pulumi.Input[
|
79
|
-
listing_visibility: Optional[pulumi.Input[
|
80
|
-
max_lease_ttl: Optional[pulumi.Input[
|
81
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
82
|
-
token_type: Optional[pulumi.Input[
|
83
|
-
"""
|
84
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
74
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
75
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
76
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
77
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
78
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
79
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
80
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
81
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
82
|
+
"""
|
83
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
85
84
|
a plugin to include them in the response.
|
86
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
85
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
87
86
|
not be HMAC'd by audit devices in the request data object.
|
88
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
89
88
|
not be HMAC'd by audit devices in the response data object.
|
90
|
-
:param pulumi.Input[
|
89
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
91
90
|
If set, this overrides the global default.
|
92
91
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
93
|
-
:param pulumi.Input[
|
92
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
94
93
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
95
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
96
95
|
If set, this overrides the global default.
|
97
96
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
98
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
99
98
|
pass from the request to the backend.
|
100
|
-
:param pulumi.Input[
|
99
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
101
100
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
102
101
|
"""
|
103
102
|
if allowed_response_headers is not None:
|
@@ -117,9 +116,9 @@ class AuthBackendTuneArgs:
|
|
117
116
|
if token_type is not None:
|
118
117
|
pulumi.set(__self__, "token_type", token_type)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter(name="allowedResponseHeaders")
|
122
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
121
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
123
122
|
"""
|
124
123
|
List of headers to whitelist and allowing
|
125
124
|
a plugin to include them in the response.
|
@@ -127,12 +126,12 @@ class AuthBackendTuneArgs:
|
|
127
126
|
return pulumi.get(self, "allowed_response_headers")
|
128
127
|
|
129
128
|
@allowed_response_headers.setter
|
130
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
129
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
131
130
|
pulumi.set(self, "allowed_response_headers", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
135
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
136
135
|
"""
|
137
136
|
Specifies the list of keys that will
|
138
137
|
not be HMAC'd by audit devices in the request data object.
|
@@ -140,12 +139,12 @@ class AuthBackendTuneArgs:
|
|
140
139
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
141
140
|
|
142
141
|
@audit_non_hmac_request_keys.setter
|
143
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
142
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
144
143
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
148
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
147
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
149
148
|
"""
|
150
149
|
Specifies the list of keys that will
|
151
150
|
not be HMAC'd by audit devices in the response data object.
|
@@ -153,12 +152,12 @@ class AuthBackendTuneArgs:
|
|
153
152
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
154
153
|
|
155
154
|
@audit_non_hmac_response_keys.setter
|
156
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
155
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
157
156
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
158
157
|
|
159
|
-
@property
|
158
|
+
@_builtins.property
|
160
159
|
@pulumi.getter(name="defaultLeaseTtl")
|
161
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[
|
160
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
162
161
|
"""
|
163
162
|
Specifies the default time-to-live.
|
164
163
|
If set, this overrides the global default.
|
@@ -167,12 +166,12 @@ class AuthBackendTuneArgs:
|
|
167
166
|
return pulumi.get(self, "default_lease_ttl")
|
168
167
|
|
169
168
|
@default_lease_ttl.setter
|
170
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[
|
169
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "default_lease_ttl", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="listingVisibility")
|
175
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
174
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
176
175
|
"""
|
177
176
|
Specifies whether to show this mount in
|
178
177
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -180,12 +179,12 @@ class AuthBackendTuneArgs:
|
|
180
179
|
return pulumi.get(self, "listing_visibility")
|
181
180
|
|
182
181
|
@listing_visibility.setter
|
183
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
182
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "listing_visibility", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="maxLeaseTtl")
|
188
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[
|
187
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
189
188
|
"""
|
190
189
|
Specifies the maximum time-to-live.
|
191
190
|
If set, this overrides the global default.
|
@@ -194,12 +193,12 @@ class AuthBackendTuneArgs:
|
|
194
193
|
return pulumi.get(self, "max_lease_ttl")
|
195
194
|
|
196
195
|
@max_lease_ttl.setter
|
197
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[
|
196
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
198
197
|
pulumi.set(self, "max_lease_ttl", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter(name="passthroughRequestHeaders")
|
202
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
201
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
203
202
|
"""
|
204
203
|
List of headers to whitelist and
|
205
204
|
pass from the request to the backend.
|
@@ -207,12 +206,12 @@ class AuthBackendTuneArgs:
|
|
207
206
|
return pulumi.get(self, "passthrough_request_headers")
|
208
207
|
|
209
208
|
@passthrough_request_headers.setter
|
210
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
209
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
211
210
|
pulumi.set(self, "passthrough_request_headers", value)
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter(name="tokenType")
|
215
|
-
def token_type(self) -> Optional[pulumi.Input[
|
214
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
215
|
"""
|
217
216
|
Specifies the type of tokens that should be returned by
|
218
217
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -220,7 +219,7 @@ class AuthBackendTuneArgs:
|
|
220
219
|
return pulumi.get(self, "token_type")
|
221
220
|
|
222
221
|
@token_type.setter
|
223
|
-
def token_type(self, value: Optional[pulumi.Input[
|
222
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
224
223
|
pulumi.set(self, "token_type", value)
|
225
224
|
|
226
225
|
|