pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendRoletagBlacklistArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
safety_buffer: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendRoletagBlacklist resource.
|
29
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
30
29
|
mounted at.
|
31
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
32
31
|
tidying of the roletag blacklist entries. Defaults to false.
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
34
33
|
The value should not contain leading or trailing forward slashes.
|
35
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
35
|
*Available only for Vault Enterprise*.
|
37
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
|
38
37
|
beyond the roletag expiration, before it is removed from the backend storage.
|
39
38
|
Defaults to 259,200 seconds, or 72 hours.
|
40
39
|
"""
|
@@ -46,9 +45,9 @@ class AuthBackendRoletagBlacklistArgs:
|
|
46
45
|
if safety_buffer is not None:
|
47
46
|
pulumi.set(__self__, "safety_buffer", safety_buffer)
|
48
47
|
|
49
|
-
@property
|
48
|
+
@_builtins.property
|
50
49
|
@pulumi.getter
|
51
|
-
def backend(self) -> pulumi.Input[
|
50
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
52
51
|
"""
|
53
52
|
The path the AWS auth backend being configured was
|
54
53
|
mounted at.
|
@@ -56,12 +55,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
56
55
|
return pulumi.get(self, "backend")
|
57
56
|
|
58
57
|
@backend.setter
|
59
|
-
def backend(self, value: pulumi.Input[
|
58
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
60
59
|
pulumi.set(self, "backend", value)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter(name="disablePeriodicTidy")
|
64
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[
|
63
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
65
64
|
"""
|
66
65
|
If set to true, disables the periodic
|
67
66
|
tidying of the roletag blacklist entries. Defaults to false.
|
@@ -69,12 +68,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
69
68
|
return pulumi.get(self, "disable_periodic_tidy")
|
70
69
|
|
71
70
|
@disable_periodic_tidy.setter
|
72
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[
|
71
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
73
72
|
pulumi.set(self, "disable_periodic_tidy", value)
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter
|
77
|
-
def namespace(self) -> Optional[pulumi.Input[
|
76
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
78
77
|
"""
|
79
78
|
The namespace to provision the resource in.
|
80
79
|
The value should not contain leading or trailing forward slashes.
|
@@ -84,12 +83,12 @@ class AuthBackendRoletagBlacklistArgs:
|
|
84
83
|
return pulumi.get(self, "namespace")
|
85
84
|
|
86
85
|
@namespace.setter
|
87
|
-
def namespace(self, value: Optional[pulumi.Input[
|
86
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
88
87
|
pulumi.set(self, "namespace", value)
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter(name="safetyBuffer")
|
92
|
-
def safety_buffer(self) -> Optional[pulumi.Input[
|
91
|
+
def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
|
93
92
|
"""
|
94
93
|
The amount of extra time that must have passed
|
95
94
|
beyond the roletag expiration, before it is removed from the backend storage.
|
@@ -98,28 +97,28 @@ class AuthBackendRoletagBlacklistArgs:
|
|
98
97
|
return pulumi.get(self, "safety_buffer")
|
99
98
|
|
100
99
|
@safety_buffer.setter
|
101
|
-
def safety_buffer(self, value: Optional[pulumi.Input[
|
100
|
+
def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
|
102
101
|
pulumi.set(self, "safety_buffer", value)
|
103
102
|
|
104
103
|
|
105
104
|
@pulumi.input_type
|
106
105
|
class _AuthBackendRoletagBlacklistState:
|
107
106
|
def __init__(__self__, *,
|
108
|
-
backend: Optional[pulumi.Input[
|
109
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
110
|
-
namespace: Optional[pulumi.Input[
|
111
|
-
safety_buffer: Optional[pulumi.Input[
|
107
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
108
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
109
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
110
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
|
112
111
|
"""
|
113
112
|
Input properties used for looking up and filtering AuthBackendRoletagBlacklist resources.
|
114
|
-
:param pulumi.Input[
|
113
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
115
114
|
mounted at.
|
116
|
-
:param pulumi.Input[
|
115
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
117
116
|
tidying of the roletag blacklist entries. Defaults to false.
|
118
|
-
:param pulumi.Input[
|
117
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
119
118
|
The value should not contain leading or trailing forward slashes.
|
120
119
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
121
120
|
*Available only for Vault Enterprise*.
|
122
|
-
:param pulumi.Input[
|
121
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
|
123
122
|
beyond the roletag expiration, before it is removed from the backend storage.
|
124
123
|
Defaults to 259,200 seconds, or 72 hours.
|
125
124
|
"""
|
@@ -132,9 +131,9 @@ class _AuthBackendRoletagBlacklistState:
|
|
132
131
|
if safety_buffer is not None:
|
133
132
|
pulumi.set(__self__, "safety_buffer", safety_buffer)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter
|
137
|
-
def backend(self) -> Optional[pulumi.Input[
|
136
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
138
137
|
"""
|
139
138
|
The path the AWS auth backend being configured was
|
140
139
|
mounted at.
|
@@ -142,12 +141,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
142
141
|
return pulumi.get(self, "backend")
|
143
142
|
|
144
143
|
@backend.setter
|
145
|
-
def backend(self, value: Optional[pulumi.Input[
|
144
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
146
145
|
pulumi.set(self, "backend", value)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="disablePeriodicTidy")
|
150
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[
|
149
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
151
150
|
"""
|
152
151
|
If set to true, disables the periodic
|
153
152
|
tidying of the roletag blacklist entries. Defaults to false.
|
@@ -155,12 +154,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
155
154
|
return pulumi.get(self, "disable_periodic_tidy")
|
156
155
|
|
157
156
|
@disable_periodic_tidy.setter
|
158
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[
|
157
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
159
158
|
pulumi.set(self, "disable_periodic_tidy", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter
|
163
|
-
def namespace(self) -> Optional[pulumi.Input[
|
162
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
The namespace to provision the resource in.
|
166
165
|
The value should not contain leading or trailing forward slashes.
|
@@ -170,12 +169,12 @@ class _AuthBackendRoletagBlacklistState:
|
|
170
169
|
return pulumi.get(self, "namespace")
|
171
170
|
|
172
171
|
@namespace.setter
|
173
|
-
def namespace(self, value: Optional[pulumi.Input[
|
172
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
174
173
|
pulumi.set(self, "namespace", value)
|
175
174
|
|
176
|
-
@property
|
175
|
+
@_builtins.property
|
177
176
|
@pulumi.getter(name="safetyBuffer")
|
178
|
-
def safety_buffer(self) -> Optional[pulumi.Input[
|
177
|
+
def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
|
179
178
|
"""
|
180
179
|
The amount of extra time that must have passed
|
181
180
|
beyond the roletag expiration, before it is removed from the backend storage.
|
@@ -184,7 +183,7 @@ class _AuthBackendRoletagBlacklistState:
|
|
184
183
|
return pulumi.get(self, "safety_buffer")
|
185
184
|
|
186
185
|
@safety_buffer.setter
|
187
|
-
def safety_buffer(self, value: Optional[pulumi.Input[
|
186
|
+
def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
|
188
187
|
pulumi.set(self, "safety_buffer", value)
|
189
188
|
|
190
189
|
|
@@ -194,10 +193,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
194
193
|
def __init__(__self__,
|
195
194
|
resource_name: str,
|
196
195
|
opts: Optional[pulumi.ResourceOptions] = None,
|
197
|
-
backend: Optional[pulumi.Input[
|
198
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
199
|
-
namespace: Optional[pulumi.Input[
|
200
|
-
safety_buffer: Optional[pulumi.Input[
|
196
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
197
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
198
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
199
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
|
201
200
|
__props__=None):
|
202
201
|
"""
|
203
202
|
Configures the periodic tidying operation of the blacklisted role tag entries.
|
@@ -216,15 +215,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
216
215
|
|
217
216
|
:param str resource_name: The name of the resource.
|
218
217
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
219
|
-
:param pulumi.Input[
|
218
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
220
219
|
mounted at.
|
221
|
-
:param pulumi.Input[
|
220
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
222
221
|
tidying of the roletag blacklist entries. Defaults to false.
|
223
|
-
:param pulumi.Input[
|
222
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
224
223
|
The value should not contain leading or trailing forward slashes.
|
225
224
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
226
225
|
*Available only for Vault Enterprise*.
|
227
|
-
:param pulumi.Input[
|
226
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
|
228
227
|
beyond the roletag expiration, before it is removed from the backend storage.
|
229
228
|
Defaults to 259,200 seconds, or 72 hours.
|
230
229
|
"""
|
@@ -264,10 +263,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
264
263
|
def _internal_init(__self__,
|
265
264
|
resource_name: str,
|
266
265
|
opts: Optional[pulumi.ResourceOptions] = None,
|
267
|
-
backend: Optional[pulumi.Input[
|
268
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
269
|
-
namespace: Optional[pulumi.Input[
|
270
|
-
safety_buffer: Optional[pulumi.Input[
|
266
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
267
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
268
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
269
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
|
271
270
|
__props__=None):
|
272
271
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
273
272
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -293,10 +292,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
293
292
|
def get(resource_name: str,
|
294
293
|
id: pulumi.Input[str],
|
295
294
|
opts: Optional[pulumi.ResourceOptions] = None,
|
296
|
-
backend: Optional[pulumi.Input[
|
297
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
298
|
-
namespace: Optional[pulumi.Input[
|
299
|
-
safety_buffer: Optional[pulumi.Input[
|
295
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
296
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
297
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
298
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
|
300
299
|
"""
|
301
300
|
Get an existing AuthBackendRoletagBlacklist resource's state with the given name, id, and optional extra
|
302
301
|
properties used to qualify the lookup.
|
@@ -304,15 +303,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
304
303
|
:param str resource_name: The unique name of the resulting resource.
|
305
304
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
306
305
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
307
|
-
:param pulumi.Input[
|
306
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
308
307
|
mounted at.
|
309
|
-
:param pulumi.Input[
|
308
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
310
309
|
tidying of the roletag blacklist entries. Defaults to false.
|
311
|
-
:param pulumi.Input[
|
310
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
312
311
|
The value should not contain leading or trailing forward slashes.
|
313
312
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
314
313
|
*Available only for Vault Enterprise*.
|
315
|
-
:param pulumi.Input[
|
314
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
|
316
315
|
beyond the roletag expiration, before it is removed from the backend storage.
|
317
316
|
Defaults to 259,200 seconds, or 72 hours.
|
318
317
|
"""
|
@@ -326,27 +325,27 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
326
325
|
__props__.__dict__["safety_buffer"] = safety_buffer
|
327
326
|
return AuthBackendRoletagBlacklist(resource_name, opts=opts, __props__=__props__)
|
328
327
|
|
329
|
-
@property
|
328
|
+
@_builtins.property
|
330
329
|
@pulumi.getter
|
331
|
-
def backend(self) -> pulumi.Output[
|
330
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
332
331
|
"""
|
333
332
|
The path the AWS auth backend being configured was
|
334
333
|
mounted at.
|
335
334
|
"""
|
336
335
|
return pulumi.get(self, "backend")
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="disablePeriodicTidy")
|
340
|
-
def disable_periodic_tidy(self) -> pulumi.Output[Optional[
|
339
|
+
def disable_periodic_tidy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
341
340
|
"""
|
342
341
|
If set to true, disables the periodic
|
343
342
|
tidying of the roletag blacklist entries. Defaults to false.
|
344
343
|
"""
|
345
344
|
return pulumi.get(self, "disable_periodic_tidy")
|
346
345
|
|
347
|
-
@property
|
346
|
+
@_builtins.property
|
348
347
|
@pulumi.getter
|
349
|
-
def namespace(self) -> pulumi.Output[Optional[
|
348
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
350
349
|
"""
|
351
350
|
The namespace to provision the resource in.
|
352
351
|
The value should not contain leading or trailing forward slashes.
|
@@ -355,9 +354,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "namespace")
|
357
356
|
|
358
|
-
@property
|
357
|
+
@_builtins.property
|
359
358
|
@pulumi.getter(name="safetyBuffer")
|
360
|
-
def safety_buffer(self) -> pulumi.Output[Optional[
|
359
|
+
def safety_buffer(self) -> pulumi.Output[Optional[_builtins.int]]:
|
361
360
|
"""
|
362
361
|
The amount of extra time that must have passed
|
363
362
|
beyond the roletag expiration, before it is removed from the backend storage.
|