pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,17 +19,17 @@ __all__ = ['SecretScopeArgs', 'SecretScope']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretScopeArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
scope: pulumi.Input[
|
25
|
-
force: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
scope: pulumi.Input[_builtins.str],
|
24
|
+
force: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a SecretScope resource.
|
29
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
30
29
|
not begin or end with a `/`. Defaults to `kmip`.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
31
|
+
:param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
32
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
34
33
|
The value should not contain leading or trailing forward slashes.
|
35
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
35
|
*Available only for Vault Enterprise*.
|
@@ -42,9 +41,9 @@ class SecretScopeArgs:
|
|
42
41
|
if namespace is not None:
|
43
42
|
pulumi.set(__self__, "namespace", namespace)
|
44
43
|
|
45
|
-
@property
|
44
|
+
@_builtins.property
|
46
45
|
@pulumi.getter
|
47
|
-
def path(self) -> pulumi.Input[
|
46
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
48
47
|
"""
|
49
48
|
The unique path this backend should be mounted at. Must
|
50
49
|
not begin or end with a `/`. Defaults to `kmip`.
|
@@ -52,36 +51,36 @@ class SecretScopeArgs:
|
|
52
51
|
return pulumi.get(self, "path")
|
53
52
|
|
54
53
|
@path.setter
|
55
|
-
def path(self, value: pulumi.Input[
|
54
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
56
55
|
pulumi.set(self, "path", value)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def scope(self) -> pulumi.Input[
|
59
|
+
def scope(self) -> pulumi.Input[_builtins.str]:
|
61
60
|
"""
|
62
61
|
Name of the scope.
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "scope")
|
65
64
|
|
66
65
|
@scope.setter
|
67
|
-
def scope(self, value: pulumi.Input[
|
66
|
+
def scope(self, value: pulumi.Input[_builtins.str]):
|
68
67
|
pulumi.set(self, "scope", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter
|
72
|
-
def force(self) -> Optional[pulumi.Input[
|
71
|
+
def force(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
73
72
|
"""
|
74
73
|
Boolean field to force deletion even if there are managed objects in the scope.
|
75
74
|
"""
|
76
75
|
return pulumi.get(self, "force")
|
77
76
|
|
78
77
|
@force.setter
|
79
|
-
def force(self, value: Optional[pulumi.Input[
|
78
|
+
def force(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
80
79
|
pulumi.set(self, "force", value)
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter
|
84
|
-
def namespace(self) -> Optional[pulumi.Input[
|
83
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
85
84
|
"""
|
86
85
|
The namespace to provision the resource in.
|
87
86
|
The value should not contain leading or trailing forward slashes.
|
@@ -91,27 +90,27 @@ class SecretScopeArgs:
|
|
91
90
|
return pulumi.get(self, "namespace")
|
92
91
|
|
93
92
|
@namespace.setter
|
94
|
-
def namespace(self, value: Optional[pulumi.Input[
|
93
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
95
94
|
pulumi.set(self, "namespace", value)
|
96
95
|
|
97
96
|
|
98
97
|
@pulumi.input_type
|
99
98
|
class _SecretScopeState:
|
100
99
|
def __init__(__self__, *,
|
101
|
-
force: Optional[pulumi.Input[
|
102
|
-
namespace: Optional[pulumi.Input[
|
103
|
-
path: Optional[pulumi.Input[
|
104
|
-
scope: Optional[pulumi.Input[
|
100
|
+
force: Optional[pulumi.Input[_builtins.bool]] = None,
|
101
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
102
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
103
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None):
|
105
104
|
"""
|
106
105
|
Input properties used for looking up and filtering SecretScope resources.
|
107
|
-
:param pulumi.Input[
|
108
|
-
:param pulumi.Input[
|
106
|
+
:param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
107
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
109
108
|
The value should not contain leading or trailing forward slashes.
|
110
109
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
111
110
|
*Available only for Vault Enterprise*.
|
112
|
-
:param pulumi.Input[
|
111
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
113
112
|
not begin or end with a `/`. Defaults to `kmip`.
|
114
|
-
:param pulumi.Input[
|
113
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
115
114
|
"""
|
116
115
|
if force is not None:
|
117
116
|
pulumi.set(__self__, "force", force)
|
@@ -122,21 +121,21 @@ class _SecretScopeState:
|
|
122
121
|
if scope is not None:
|
123
122
|
pulumi.set(__self__, "scope", scope)
|
124
123
|
|
125
|
-
@property
|
124
|
+
@_builtins.property
|
126
125
|
@pulumi.getter
|
127
|
-
def force(self) -> Optional[pulumi.Input[
|
126
|
+
def force(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
128
127
|
"""
|
129
128
|
Boolean field to force deletion even if there are managed objects in the scope.
|
130
129
|
"""
|
131
130
|
return pulumi.get(self, "force")
|
132
131
|
|
133
132
|
@force.setter
|
134
|
-
def force(self, value: Optional[pulumi.Input[
|
133
|
+
def force(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
135
134
|
pulumi.set(self, "force", value)
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter
|
139
|
-
def namespace(self) -> Optional[pulumi.Input[
|
138
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
140
139
|
"""
|
141
140
|
The namespace to provision the resource in.
|
142
141
|
The value should not contain leading or trailing forward slashes.
|
@@ -146,12 +145,12 @@ class _SecretScopeState:
|
|
146
145
|
return pulumi.get(self, "namespace")
|
147
146
|
|
148
147
|
@namespace.setter
|
149
|
-
def namespace(self, value: Optional[pulumi.Input[
|
148
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
149
|
pulumi.set(self, "namespace", value)
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter
|
154
|
-
def path(self) -> Optional[pulumi.Input[
|
153
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
155
154
|
"""
|
156
155
|
The unique path this backend should be mounted at. Must
|
157
156
|
not begin or end with a `/`. Defaults to `kmip`.
|
@@ -159,19 +158,19 @@ class _SecretScopeState:
|
|
159
158
|
return pulumi.get(self, "path")
|
160
159
|
|
161
160
|
@path.setter
|
162
|
-
def path(self, value: Optional[pulumi.Input[
|
161
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
162
|
pulumi.set(self, "path", value)
|
164
163
|
|
165
|
-
@property
|
164
|
+
@_builtins.property
|
166
165
|
@pulumi.getter
|
167
|
-
def scope(self) -> Optional[pulumi.Input[
|
166
|
+
def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
|
168
167
|
"""
|
169
168
|
Name of the scope.
|
170
169
|
"""
|
171
170
|
return pulumi.get(self, "scope")
|
172
171
|
|
173
172
|
@scope.setter
|
174
|
-
def scope(self, value: Optional[pulumi.Input[
|
173
|
+
def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
|
175
174
|
pulumi.set(self, "scope", value)
|
176
175
|
|
177
176
|
|
@@ -181,10 +180,10 @@ class SecretScope(pulumi.CustomResource):
|
|
181
180
|
def __init__(__self__,
|
182
181
|
resource_name: str,
|
183
182
|
opts: Optional[pulumi.ResourceOptions] = None,
|
184
|
-
force: Optional[pulumi.Input[
|
185
|
-
namespace: Optional[pulumi.Input[
|
186
|
-
path: Optional[pulumi.Input[
|
187
|
-
scope: Optional[pulumi.Input[
|
183
|
+
force: Optional[pulumi.Input[_builtins.bool]] = None,
|
184
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
185
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
186
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
188
187
|
__props__=None):
|
189
188
|
"""
|
190
189
|
Manages KMIP Secret Scopes in a Vault server. This feature requires
|
@@ -216,14 +215,14 @@ class SecretScope(pulumi.CustomResource):
|
|
216
215
|
|
217
216
|
:param str resource_name: The name of the resource.
|
218
217
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
219
|
-
:param pulumi.Input[
|
220
|
-
:param pulumi.Input[
|
218
|
+
:param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
219
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
221
220
|
The value should not contain leading or trailing forward slashes.
|
222
221
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
223
222
|
*Available only for Vault Enterprise*.
|
224
|
-
:param pulumi.Input[
|
223
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
225
224
|
not begin or end with a `/`. Defaults to `kmip`.
|
226
|
-
:param pulumi.Input[
|
225
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
227
226
|
"""
|
228
227
|
...
|
229
228
|
@overload
|
@@ -274,10 +273,10 @@ class SecretScope(pulumi.CustomResource):
|
|
274
273
|
def _internal_init(__self__,
|
275
274
|
resource_name: str,
|
276
275
|
opts: Optional[pulumi.ResourceOptions] = None,
|
277
|
-
force: Optional[pulumi.Input[
|
278
|
-
namespace: Optional[pulumi.Input[
|
279
|
-
path: Optional[pulumi.Input[
|
280
|
-
scope: Optional[pulumi.Input[
|
276
|
+
force: Optional[pulumi.Input[_builtins.bool]] = None,
|
277
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
278
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
279
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
281
280
|
__props__=None):
|
282
281
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
283
282
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -305,10 +304,10 @@ class SecretScope(pulumi.CustomResource):
|
|
305
304
|
def get(resource_name: str,
|
306
305
|
id: pulumi.Input[str],
|
307
306
|
opts: Optional[pulumi.ResourceOptions] = None,
|
308
|
-
force: Optional[pulumi.Input[
|
309
|
-
namespace: Optional[pulumi.Input[
|
310
|
-
path: Optional[pulumi.Input[
|
311
|
-
scope: Optional[pulumi.Input[
|
307
|
+
force: Optional[pulumi.Input[_builtins.bool]] = None,
|
308
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
309
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
310
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretScope':
|
312
311
|
"""
|
313
312
|
Get an existing SecretScope resource's state with the given name, id, and optional extra
|
314
313
|
properties used to qualify the lookup.
|
@@ -316,14 +315,14 @@ class SecretScope(pulumi.CustomResource):
|
|
316
315
|
:param str resource_name: The unique name of the resulting resource.
|
317
316
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
318
317
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
319
|
-
:param pulumi.Input[
|
320
|
-
:param pulumi.Input[
|
318
|
+
:param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
|
319
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
321
320
|
The value should not contain leading or trailing forward slashes.
|
322
321
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
323
322
|
*Available only for Vault Enterprise*.
|
324
|
-
:param pulumi.Input[
|
323
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
325
324
|
not begin or end with a `/`. Defaults to `kmip`.
|
326
|
-
:param pulumi.Input[
|
325
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
327
326
|
"""
|
328
327
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
329
328
|
|
@@ -335,17 +334,17 @@ class SecretScope(pulumi.CustomResource):
|
|
335
334
|
__props__.__dict__["scope"] = scope
|
336
335
|
return SecretScope(resource_name, opts=opts, __props__=__props__)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter
|
340
|
-
def force(self) -> pulumi.Output[Optional[
|
339
|
+
def force(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
341
340
|
"""
|
342
341
|
Boolean field to force deletion even if there are managed objects in the scope.
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "force")
|
345
344
|
|
346
|
-
@property
|
345
|
+
@_builtins.property
|
347
346
|
@pulumi.getter
|
348
|
-
def namespace(self) -> pulumi.Output[Optional[
|
347
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
349
348
|
"""
|
350
349
|
The namespace to provision the resource in.
|
351
350
|
The value should not contain leading or trailing forward slashes.
|
@@ -354,18 +353,18 @@ class SecretScope(pulumi.CustomResource):
|
|
354
353
|
"""
|
355
354
|
return pulumi.get(self, "namespace")
|
356
355
|
|
357
|
-
@property
|
356
|
+
@_builtins.property
|
358
357
|
@pulumi.getter
|
359
|
-
def path(self) -> pulumi.Output[
|
358
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
360
359
|
"""
|
361
360
|
The unique path this backend should be mounted at. Must
|
362
361
|
not begin or end with a `/`. Defaults to `kmip`.
|
363
362
|
"""
|
364
363
|
return pulumi.get(self, "path")
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter
|
368
|
-
def scope(self) -> pulumi.Output[
|
367
|
+
def scope(self) -> pulumi.Output[_builtins.str]:
|
369
368
|
"""
|
370
369
|
Name of the scope.
|
371
370
|
"""
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|