pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,23 +21,23 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SecretBackendRoleArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
26
|
-
name: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
tags: Optional[pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
tags: Optional[pulumi.Input[_builtins.str]] = None,
|
29
28
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
|
30
29
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretBackendRole resource.
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
34
33
|
with no leading or trailing `/`s.
|
35
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
36
35
|
Must be unique within the backend.
|
37
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
38
37
|
The value should not contain leading or trailing forward slashes.
|
39
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
40
39
|
*Available only for Vault Enterprise*.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
42
41
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
43
42
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
44
43
|
"""
|
@@ -54,9 +53,9 @@ class SecretBackendRoleArgs:
|
|
54
53
|
if vhosts is not None:
|
55
54
|
pulumi.set(__self__, "vhosts", vhosts)
|
56
55
|
|
57
|
-
@property
|
56
|
+
@_builtins.property
|
58
57
|
@pulumi.getter
|
59
|
-
def backend(self) -> pulumi.Input[
|
58
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
60
59
|
"""
|
61
60
|
The path the RabbitMQ secret backend is mounted at,
|
62
61
|
with no leading or trailing `/`s.
|
@@ -64,12 +63,12 @@ class SecretBackendRoleArgs:
|
|
64
63
|
return pulumi.get(self, "backend")
|
65
64
|
|
66
65
|
@backend.setter
|
67
|
-
def backend(self, value: pulumi.Input[
|
66
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
68
67
|
pulumi.set(self, "backend", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter
|
72
|
-
def name(self) -> Optional[pulumi.Input[
|
71
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
73
72
|
"""
|
74
73
|
The name to identify this role within the backend.
|
75
74
|
Must be unique within the backend.
|
@@ -77,12 +76,12 @@ class SecretBackendRoleArgs:
|
|
77
76
|
return pulumi.get(self, "name")
|
78
77
|
|
79
78
|
@name.setter
|
80
|
-
def name(self, value: Optional[pulumi.Input[
|
79
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
81
80
|
pulumi.set(self, "name", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def namespace(self) -> Optional[pulumi.Input[
|
84
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
86
85
|
"""
|
87
86
|
The namespace to provision the resource in.
|
88
87
|
The value should not contain leading or trailing forward slashes.
|
@@ -92,22 +91,22 @@ class SecretBackendRoleArgs:
|
|
92
91
|
return pulumi.get(self, "namespace")
|
93
92
|
|
94
93
|
@namespace.setter
|
95
|
-
def namespace(self, value: Optional[pulumi.Input[
|
94
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
96
95
|
pulumi.set(self, "namespace", value)
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter
|
100
|
-
def tags(self) -> Optional[pulumi.Input[
|
99
|
+
def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
|
101
100
|
"""
|
102
101
|
Specifies a comma-separated RabbitMQ management tags.
|
103
102
|
"""
|
104
103
|
return pulumi.get(self, "tags")
|
105
104
|
|
106
105
|
@tags.setter
|
107
|
-
def tags(self, value: Optional[pulumi.Input[
|
106
|
+
def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
|
108
107
|
pulumi.set(self, "tags", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter(name="vhostTopics")
|
112
111
|
def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
|
113
112
|
"""
|
@@ -119,7 +118,7 @@ class SecretBackendRoleArgs:
|
|
119
118
|
def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
|
120
119
|
pulumi.set(self, "vhost_topics", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
123
|
def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
|
125
124
|
"""
|
@@ -135,23 +134,23 @@ class SecretBackendRoleArgs:
|
|
135
134
|
@pulumi.input_type
|
136
135
|
class _SecretBackendRoleState:
|
137
136
|
def __init__(__self__, *,
|
138
|
-
backend: Optional[pulumi.Input[
|
139
|
-
name: Optional[pulumi.Input[
|
140
|
-
namespace: Optional[pulumi.Input[
|
141
|
-
tags: Optional[pulumi.Input[
|
137
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
138
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
140
|
+
tags: Optional[pulumi.Input[_builtins.str]] = None,
|
142
141
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
|
143
142
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
|
144
143
|
"""
|
145
144
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
146
|
-
:param pulumi.Input[
|
145
|
+
:param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
147
146
|
with no leading or trailing `/`s.
|
148
|
-
:param pulumi.Input[
|
147
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
149
148
|
Must be unique within the backend.
|
150
|
-
:param pulumi.Input[
|
149
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
151
150
|
The value should not contain leading or trailing forward slashes.
|
152
151
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
152
|
*Available only for Vault Enterprise*.
|
154
|
-
:param pulumi.Input[
|
153
|
+
:param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
155
154
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
156
155
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
157
156
|
"""
|
@@ -168,9 +167,9 @@ class _SecretBackendRoleState:
|
|
168
167
|
if vhosts is not None:
|
169
168
|
pulumi.set(__self__, "vhosts", vhosts)
|
170
169
|
|
171
|
-
@property
|
170
|
+
@_builtins.property
|
172
171
|
@pulumi.getter
|
173
|
-
def backend(self) -> Optional[pulumi.Input[
|
172
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
174
173
|
"""
|
175
174
|
The path the RabbitMQ secret backend is mounted at,
|
176
175
|
with no leading or trailing `/`s.
|
@@ -178,12 +177,12 @@ class _SecretBackendRoleState:
|
|
178
177
|
return pulumi.get(self, "backend")
|
179
178
|
|
180
179
|
@backend.setter
|
181
|
-
def backend(self, value: Optional[pulumi.Input[
|
180
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
182
181
|
pulumi.set(self, "backend", value)
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter
|
186
|
-
def name(self) -> Optional[pulumi.Input[
|
185
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
187
186
|
"""
|
188
187
|
The name to identify this role within the backend.
|
189
188
|
Must be unique within the backend.
|
@@ -191,12 +190,12 @@ class _SecretBackendRoleState:
|
|
191
190
|
return pulumi.get(self, "name")
|
192
191
|
|
193
192
|
@name.setter
|
194
|
-
def name(self, value: Optional[pulumi.Input[
|
193
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
195
194
|
pulumi.set(self, "name", value)
|
196
195
|
|
197
|
-
@property
|
196
|
+
@_builtins.property
|
198
197
|
@pulumi.getter
|
199
|
-
def namespace(self) -> Optional[pulumi.Input[
|
198
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
200
199
|
"""
|
201
200
|
The namespace to provision the resource in.
|
202
201
|
The value should not contain leading or trailing forward slashes.
|
@@ -206,22 +205,22 @@ class _SecretBackendRoleState:
|
|
206
205
|
return pulumi.get(self, "namespace")
|
207
206
|
|
208
207
|
@namespace.setter
|
209
|
-
def namespace(self, value: Optional[pulumi.Input[
|
208
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
210
209
|
pulumi.set(self, "namespace", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter
|
214
|
-
def tags(self) -> Optional[pulumi.Input[
|
213
|
+
def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
|
215
214
|
"""
|
216
215
|
Specifies a comma-separated RabbitMQ management tags.
|
217
216
|
"""
|
218
217
|
return pulumi.get(self, "tags")
|
219
218
|
|
220
219
|
@tags.setter
|
221
|
-
def tags(self, value: Optional[pulumi.Input[
|
220
|
+
def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
|
222
221
|
pulumi.set(self, "tags", value)
|
223
222
|
|
224
|
-
@property
|
223
|
+
@_builtins.property
|
225
224
|
@pulumi.getter(name="vhostTopics")
|
226
225
|
def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
|
227
226
|
"""
|
@@ -233,7 +232,7 @@ class _SecretBackendRoleState:
|
|
233
232
|
def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
|
234
233
|
pulumi.set(self, "vhost_topics", value)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter
|
238
237
|
def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
|
239
238
|
"""
|
@@ -252,10 +251,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
252
251
|
def __init__(__self__,
|
253
252
|
resource_name: str,
|
254
253
|
opts: Optional[pulumi.ResourceOptions] = None,
|
255
|
-
backend: Optional[pulumi.Input[
|
256
|
-
name: Optional[pulumi.Input[
|
257
|
-
namespace: Optional[pulumi.Input[
|
258
|
-
tags: Optional[pulumi.Input[
|
254
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
255
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
256
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
257
|
+
tags: Optional[pulumi.Input[_builtins.str]] = None,
|
259
258
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
260
259
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
261
260
|
__props__=None):
|
@@ -266,11 +265,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
266
265
|
import pulumi
|
267
266
|
import pulumi_vault as vault
|
268
267
|
|
269
|
-
rabbitmq = vault.
|
268
|
+
rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
|
270
269
|
connection_uri="https://.....",
|
271
270
|
username="user",
|
272
271
|
password="password")
|
273
|
-
role = vault.
|
272
|
+
role = vault.rabbitmq.SecretBackendRole("role",
|
274
273
|
backend=rabbitmq.path,
|
275
274
|
name="deploy",
|
276
275
|
tags="tag1,tag2",
|
@@ -300,15 +299,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
300
299
|
|
301
300
|
:param str resource_name: The name of the resource.
|
302
301
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
303
|
-
:param pulumi.Input[
|
302
|
+
:param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
304
303
|
with no leading or trailing `/`s.
|
305
|
-
:param pulumi.Input[
|
304
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
306
305
|
Must be unique within the backend.
|
307
|
-
:param pulumi.Input[
|
306
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
308
307
|
The value should not contain leading or trailing forward slashes.
|
309
308
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
310
309
|
*Available only for Vault Enterprise*.
|
311
|
-
:param pulumi.Input[
|
310
|
+
:param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
312
311
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
313
312
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
314
313
|
"""
|
@@ -325,11 +324,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
325
324
|
import pulumi
|
326
325
|
import pulumi_vault as vault
|
327
326
|
|
328
|
-
rabbitmq = vault.
|
327
|
+
rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
|
329
328
|
connection_uri="https://.....",
|
330
329
|
username="user",
|
331
330
|
password="password")
|
332
|
-
role = vault.
|
331
|
+
role = vault.rabbitmq.SecretBackendRole("role",
|
333
332
|
backend=rabbitmq.path,
|
334
333
|
name="deploy",
|
335
334
|
tags="tag1,tag2",
|
@@ -372,10 +371,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
372
371
|
def _internal_init(__self__,
|
373
372
|
resource_name: str,
|
374
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
375
|
-
backend: Optional[pulumi.Input[
|
376
|
-
name: Optional[pulumi.Input[
|
377
|
-
namespace: Optional[pulumi.Input[
|
378
|
-
tags: Optional[pulumi.Input[
|
374
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
375
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
376
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
377
|
+
tags: Optional[pulumi.Input[_builtins.str]] = None,
|
379
378
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
380
379
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
|
381
380
|
__props__=None):
|
@@ -405,10 +404,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
405
404
|
def get(resource_name: str,
|
406
405
|
id: pulumi.Input[str],
|
407
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
408
|
-
backend: Optional[pulumi.Input[
|
409
|
-
name: Optional[pulumi.Input[
|
410
|
-
namespace: Optional[pulumi.Input[
|
411
|
-
tags: Optional[pulumi.Input[
|
407
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
408
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
409
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
tags: Optional[pulumi.Input[_builtins.str]] = None,
|
412
411
|
vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
|
413
412
|
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
|
414
413
|
"""
|
@@ -418,15 +417,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
418
417
|
:param str resource_name: The unique name of the resulting resource.
|
419
418
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
420
419
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
421
|
-
:param pulumi.Input[
|
420
|
+
:param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
|
422
421
|
with no leading or trailing `/`s.
|
423
|
-
:param pulumi.Input[
|
422
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
|
424
423
|
Must be unique within the backend.
|
425
|
-
:param pulumi.Input[
|
424
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
426
425
|
The value should not contain leading or trailing forward slashes.
|
427
426
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
428
427
|
*Available only for Vault Enterprise*.
|
429
|
-
:param pulumi.Input[
|
428
|
+
:param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
|
430
429
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
|
431
430
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
|
432
431
|
"""
|
@@ -442,27 +441,27 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
442
441
|
__props__.__dict__["vhosts"] = vhosts
|
443
442
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
444
443
|
|
445
|
-
@property
|
444
|
+
@_builtins.property
|
446
445
|
@pulumi.getter
|
447
|
-
def backend(self) -> pulumi.Output[
|
446
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
448
447
|
"""
|
449
448
|
The path the RabbitMQ secret backend is mounted at,
|
450
449
|
with no leading or trailing `/`s.
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "backend")
|
453
452
|
|
454
|
-
@property
|
453
|
+
@_builtins.property
|
455
454
|
@pulumi.getter
|
456
|
-
def name(self) -> pulumi.Output[
|
455
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
457
456
|
"""
|
458
457
|
The name to identify this role within the backend.
|
459
458
|
Must be unique within the backend.
|
460
459
|
"""
|
461
460
|
return pulumi.get(self, "name")
|
462
461
|
|
463
|
-
@property
|
462
|
+
@_builtins.property
|
464
463
|
@pulumi.getter
|
465
|
-
def namespace(self) -> pulumi.Output[Optional[
|
464
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
466
465
|
"""
|
467
466
|
The namespace to provision the resource in.
|
468
467
|
The value should not contain leading or trailing forward slashes.
|
@@ -471,15 +470,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
471
470
|
"""
|
472
471
|
return pulumi.get(self, "namespace")
|
473
472
|
|
474
|
-
@property
|
473
|
+
@_builtins.property
|
475
474
|
@pulumi.getter
|
476
|
-
def tags(self) -> pulumi.Output[Optional[
|
475
|
+
def tags(self) -> pulumi.Output[Optional[_builtins.str]]:
|
477
476
|
"""
|
478
477
|
Specifies a comma-separated RabbitMQ management tags.
|
479
478
|
"""
|
480
479
|
return pulumi.get(self, "tags")
|
481
480
|
|
482
|
-
@property
|
481
|
+
@_builtins.property
|
483
482
|
@pulumi.getter(name="vhostTopics")
|
484
483
|
def vhost_topics(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhostTopic']]]:
|
485
484
|
"""
|
@@ -487,7 +486,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
487
486
|
"""
|
488
487
|
return pulumi.get(self, "vhost_topics")
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter
|
492
491
|
def vhosts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhost']]]:
|
493
492
|
"""
|