pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,14 +19,14 @@ __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuditRequestHeaderArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
hmac: Optional[pulumi.Input[
|
24
|
-
name: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
hmac: Optional[pulumi.Input[_builtins.bool]] = None,
|
23
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
26
25
|
"""
|
27
26
|
The set of arguments for constructing a AuditRequestHeader resource.
|
28
|
-
:param pulumi.Input[
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
27
|
+
:param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
28
|
+
:param pulumi.Input[_builtins.str] name: The name of the request header to audit.
|
29
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
31
30
|
"""
|
32
31
|
if hmac is not None:
|
33
32
|
pulumi.set(__self__, "hmac", hmac)
|
@@ -36,54 +35,54 @@ class AuditRequestHeaderArgs:
|
|
36
35
|
if namespace is not None:
|
37
36
|
pulumi.set(__self__, "namespace", namespace)
|
38
37
|
|
39
|
-
@property
|
38
|
+
@_builtins.property
|
40
39
|
@pulumi.getter
|
41
|
-
def hmac(self) -> Optional[pulumi.Input[
|
40
|
+
def hmac(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
42
41
|
"""
|
43
42
|
Whether this header's value should be HMAC'd in the audit logs.
|
44
43
|
"""
|
45
44
|
return pulumi.get(self, "hmac")
|
46
45
|
|
47
46
|
@hmac.setter
|
48
|
-
def hmac(self, value: Optional[pulumi.Input[
|
47
|
+
def hmac(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
49
48
|
pulumi.set(self, "hmac", value)
|
50
49
|
|
51
|
-
@property
|
50
|
+
@_builtins.property
|
52
51
|
@pulumi.getter
|
53
|
-
def name(self) -> Optional[pulumi.Input[
|
52
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
54
53
|
"""
|
55
54
|
The name of the request header to audit.
|
56
55
|
"""
|
57
56
|
return pulumi.get(self, "name")
|
58
57
|
|
59
58
|
@name.setter
|
60
|
-
def name(self, value: Optional[pulumi.Input[
|
59
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
61
60
|
pulumi.set(self, "name", value)
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter
|
65
|
-
def namespace(self) -> Optional[pulumi.Input[
|
64
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
66
65
|
"""
|
67
66
|
Target namespace. (requires Enterprise)
|
68
67
|
"""
|
69
68
|
return pulumi.get(self, "namespace")
|
70
69
|
|
71
70
|
@namespace.setter
|
72
|
-
def namespace(self, value: Optional[pulumi.Input[
|
71
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
73
72
|
pulumi.set(self, "namespace", value)
|
74
73
|
|
75
74
|
|
76
75
|
@pulumi.input_type
|
77
76
|
class _AuditRequestHeaderState:
|
78
77
|
def __init__(__self__, *,
|
79
|
-
hmac: Optional[pulumi.Input[
|
80
|
-
name: Optional[pulumi.Input[
|
81
|
-
namespace: Optional[pulumi.Input[
|
78
|
+
hmac: Optional[pulumi.Input[_builtins.bool]] = None,
|
79
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
80
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
82
81
|
"""
|
83
82
|
Input properties used for looking up and filtering AuditRequestHeader resources.
|
84
|
-
:param pulumi.Input[
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
83
|
+
:param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
84
|
+
:param pulumi.Input[_builtins.str] name: The name of the request header to audit.
|
85
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
87
86
|
"""
|
88
87
|
if hmac is not None:
|
89
88
|
pulumi.set(__self__, "hmac", hmac)
|
@@ -92,40 +91,40 @@ class _AuditRequestHeaderState:
|
|
92
91
|
if namespace is not None:
|
93
92
|
pulumi.set(__self__, "namespace", namespace)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def hmac(self) -> Optional[pulumi.Input[
|
96
|
+
def hmac(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
98
97
|
"""
|
99
98
|
Whether this header's value should be HMAC'd in the audit logs.
|
100
99
|
"""
|
101
100
|
return pulumi.get(self, "hmac")
|
102
101
|
|
103
102
|
@hmac.setter
|
104
|
-
def hmac(self, value: Optional[pulumi.Input[
|
103
|
+
def hmac(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
105
104
|
pulumi.set(self, "hmac", value)
|
106
105
|
|
107
|
-
@property
|
106
|
+
@_builtins.property
|
108
107
|
@pulumi.getter
|
109
|
-
def name(self) -> Optional[pulumi.Input[
|
108
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
110
109
|
"""
|
111
110
|
The name of the request header to audit.
|
112
111
|
"""
|
113
112
|
return pulumi.get(self, "name")
|
114
113
|
|
115
114
|
@name.setter
|
116
|
-
def name(self, value: Optional[pulumi.Input[
|
115
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
117
116
|
pulumi.set(self, "name", value)
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter
|
121
|
-
def namespace(self) -> Optional[pulumi.Input[
|
120
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
122
121
|
"""
|
123
122
|
Target namespace. (requires Enterprise)
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "namespace")
|
126
125
|
|
127
126
|
@namespace.setter
|
128
|
-
def namespace(self, value: Optional[pulumi.Input[
|
127
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
129
128
|
pulumi.set(self, "namespace", value)
|
130
129
|
|
131
130
|
|
@@ -135,9 +134,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
135
134
|
def __init__(__self__,
|
136
135
|
resource_name: str,
|
137
136
|
opts: Optional[pulumi.ResourceOptions] = None,
|
138
|
-
hmac: Optional[pulumi.Input[
|
139
|
-
name: Optional[pulumi.Input[
|
140
|
-
namespace: Optional[pulumi.Input[
|
137
|
+
hmac: Optional[pulumi.Input[_builtins.bool]] = None,
|
138
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
141
140
|
__props__=None):
|
142
141
|
"""
|
143
142
|
Manages additional request headers that appear in audited requests.
|
@@ -160,9 +159,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
160
159
|
|
161
160
|
:param str resource_name: The name of the resource.
|
162
161
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
163
|
-
:param pulumi.Input[
|
164
|
-
:param pulumi.Input[
|
165
|
-
:param pulumi.Input[
|
162
|
+
:param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
163
|
+
:param pulumi.Input[_builtins.str] name: The name of the request header to audit.
|
164
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
166
165
|
"""
|
167
166
|
...
|
168
167
|
@overload
|
@@ -204,9 +203,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
204
203
|
def _internal_init(__self__,
|
205
204
|
resource_name: str,
|
206
205
|
opts: Optional[pulumi.ResourceOptions] = None,
|
207
|
-
hmac: Optional[pulumi.Input[
|
208
|
-
name: Optional[pulumi.Input[
|
209
|
-
namespace: Optional[pulumi.Input[
|
206
|
+
hmac: Optional[pulumi.Input[_builtins.bool]] = None,
|
207
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
208
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
210
209
|
__props__=None):
|
211
210
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
212
211
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -229,9 +228,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
229
228
|
def get(resource_name: str,
|
230
229
|
id: pulumi.Input[str],
|
231
230
|
opts: Optional[pulumi.ResourceOptions] = None,
|
232
|
-
hmac: Optional[pulumi.Input[
|
233
|
-
name: Optional[pulumi.Input[
|
234
|
-
namespace: Optional[pulumi.Input[
|
231
|
+
hmac: Optional[pulumi.Input[_builtins.bool]] = None,
|
232
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
233
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuditRequestHeader':
|
235
234
|
"""
|
236
235
|
Get an existing AuditRequestHeader resource's state with the given name, id, and optional extra
|
237
236
|
properties used to qualify the lookup.
|
@@ -239,9 +238,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
239
238
|
:param str resource_name: The unique name of the resulting resource.
|
240
239
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
241
240
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
242
|
-
:param pulumi.Input[
|
243
|
-
:param pulumi.Input[
|
244
|
-
:param pulumi.Input[
|
241
|
+
:param pulumi.Input[_builtins.bool] hmac: Whether this header's value should be HMAC'd in the audit logs.
|
242
|
+
:param pulumi.Input[_builtins.str] name: The name of the request header to audit.
|
243
|
+
:param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
|
245
244
|
"""
|
246
245
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
247
246
|
|
@@ -252,25 +251,25 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
252
251
|
__props__.__dict__["namespace"] = namespace
|
253
252
|
return AuditRequestHeader(resource_name, opts=opts, __props__=__props__)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter
|
257
|
-
def hmac(self) -> pulumi.Output[Optional[
|
256
|
+
def hmac(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
258
257
|
"""
|
259
258
|
Whether this header's value should be HMAC'd in the audit logs.
|
260
259
|
"""
|
261
260
|
return pulumi.get(self, "hmac")
|
262
261
|
|
263
|
-
@property
|
262
|
+
@_builtins.property
|
264
263
|
@pulumi.getter
|
265
|
-
def name(self) -> pulumi.Output[
|
264
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
266
265
|
"""
|
267
266
|
The name of the request header to audit.
|
268
267
|
"""
|
269
268
|
return pulumi.get(self, "name")
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter
|
273
|
-
def namespace(self) -> pulumi.Output[Optional[
|
272
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
274
273
|
"""
|
275
274
|
Target namespace. (requires Enterprise)
|
276
275
|
"""
|