pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendIdentityWhitelistArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
safety_buffer: Optional[pulumi.Input[
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendIdentityWhitelist resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
|
29
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
31
30
|
tidying of the identity-whitelist entries.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
|
37
36
|
have passed beyond the roletag expiration, before it is removed from the
|
38
37
|
backend storage.
|
39
38
|
"""
|
@@ -46,21 +45,21 @@ class AuthBackendIdentityWhitelistArgs:
|
|
46
45
|
if safety_buffer is not None:
|
47
46
|
pulumi.set(__self__, "safety_buffer", safety_buffer)
|
48
47
|
|
49
|
-
@property
|
48
|
+
@_builtins.property
|
50
49
|
@pulumi.getter
|
51
|
-
def backend(self) -> Optional[pulumi.Input[
|
50
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
52
51
|
"""
|
53
52
|
The path of the AWS backend being configured.
|
54
53
|
"""
|
55
54
|
return pulumi.get(self, "backend")
|
56
55
|
|
57
56
|
@backend.setter
|
58
|
-
def backend(self, value: Optional[pulumi.Input[
|
57
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
59
58
|
pulumi.set(self, "backend", value)
|
60
59
|
|
61
|
-
@property
|
60
|
+
@_builtins.property
|
62
61
|
@pulumi.getter(name="disablePeriodicTidy")
|
63
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[
|
62
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
64
63
|
"""
|
65
64
|
If set to true, disables the periodic
|
66
65
|
tidying of the identity-whitelist entries.
|
@@ -68,12 +67,12 @@ class AuthBackendIdentityWhitelistArgs:
|
|
68
67
|
return pulumi.get(self, "disable_periodic_tidy")
|
69
68
|
|
70
69
|
@disable_periodic_tidy.setter
|
71
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[
|
70
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
72
71
|
pulumi.set(self, "disable_periodic_tidy", value)
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter
|
76
|
-
def namespace(self) -> Optional[pulumi.Input[
|
75
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
77
76
|
"""
|
78
77
|
The namespace to provision the resource in.
|
79
78
|
The value should not contain leading or trailing forward slashes.
|
@@ -83,12 +82,12 @@ class AuthBackendIdentityWhitelistArgs:
|
|
83
82
|
return pulumi.get(self, "namespace")
|
84
83
|
|
85
84
|
@namespace.setter
|
86
|
-
def namespace(self, value: Optional[pulumi.Input[
|
85
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
87
86
|
pulumi.set(self, "namespace", value)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter(name="safetyBuffer")
|
91
|
-
def safety_buffer(self) -> Optional[pulumi.Input[
|
90
|
+
def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
|
92
91
|
"""
|
93
92
|
The amount of extra time, in minutes, that must
|
94
93
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -97,27 +96,27 @@ class AuthBackendIdentityWhitelistArgs:
|
|
97
96
|
return pulumi.get(self, "safety_buffer")
|
98
97
|
|
99
98
|
@safety_buffer.setter
|
100
|
-
def safety_buffer(self, value: Optional[pulumi.Input[
|
99
|
+
def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
|
101
100
|
pulumi.set(self, "safety_buffer", value)
|
102
101
|
|
103
102
|
|
104
103
|
@pulumi.input_type
|
105
104
|
class _AuthBackendIdentityWhitelistState:
|
106
105
|
def __init__(__self__, *,
|
107
|
-
backend: Optional[pulumi.Input[
|
108
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
109
|
-
namespace: Optional[pulumi.Input[
|
110
|
-
safety_buffer: Optional[pulumi.Input[
|
106
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
107
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
108
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
109
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
|
111
110
|
"""
|
112
111
|
Input properties used for looking up and filtering AuthBackendIdentityWhitelist resources.
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
112
|
+
:param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
|
113
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
115
114
|
tidying of the identity-whitelist entries.
|
116
|
-
:param pulumi.Input[
|
115
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
117
116
|
The value should not contain leading or trailing forward slashes.
|
118
117
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
119
118
|
*Available only for Vault Enterprise*.
|
120
|
-
:param pulumi.Input[
|
119
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
|
121
120
|
have passed beyond the roletag expiration, before it is removed from the
|
122
121
|
backend storage.
|
123
122
|
"""
|
@@ -130,21 +129,21 @@ class _AuthBackendIdentityWhitelistState:
|
|
130
129
|
if safety_buffer is not None:
|
131
130
|
pulumi.set(__self__, "safety_buffer", safety_buffer)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter
|
135
|
-
def backend(self) -> Optional[pulumi.Input[
|
134
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
136
135
|
"""
|
137
136
|
The path of the AWS backend being configured.
|
138
137
|
"""
|
139
138
|
return pulumi.get(self, "backend")
|
140
139
|
|
141
140
|
@backend.setter
|
142
|
-
def backend(self, value: Optional[pulumi.Input[
|
141
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
142
|
pulumi.set(self, "backend", value)
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter(name="disablePeriodicTidy")
|
147
|
-
def disable_periodic_tidy(self) -> Optional[pulumi.Input[
|
146
|
+
def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
148
147
|
"""
|
149
148
|
If set to true, disables the periodic
|
150
149
|
tidying of the identity-whitelist entries.
|
@@ -152,12 +151,12 @@ class _AuthBackendIdentityWhitelistState:
|
|
152
151
|
return pulumi.get(self, "disable_periodic_tidy")
|
153
152
|
|
154
153
|
@disable_periodic_tidy.setter
|
155
|
-
def disable_periodic_tidy(self, value: Optional[pulumi.Input[
|
154
|
+
def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
156
155
|
pulumi.set(self, "disable_periodic_tidy", value)
|
157
156
|
|
158
|
-
@property
|
157
|
+
@_builtins.property
|
159
158
|
@pulumi.getter
|
160
|
-
def namespace(self) -> Optional[pulumi.Input[
|
159
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
161
160
|
"""
|
162
161
|
The namespace to provision the resource in.
|
163
162
|
The value should not contain leading or trailing forward slashes.
|
@@ -167,12 +166,12 @@ class _AuthBackendIdentityWhitelistState:
|
|
167
166
|
return pulumi.get(self, "namespace")
|
168
167
|
|
169
168
|
@namespace.setter
|
170
|
-
def namespace(self, value: Optional[pulumi.Input[
|
169
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "namespace", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="safetyBuffer")
|
175
|
-
def safety_buffer(self) -> Optional[pulumi.Input[
|
174
|
+
def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
|
176
175
|
"""
|
177
176
|
The amount of extra time, in minutes, that must
|
178
177
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -181,7 +180,7 @@ class _AuthBackendIdentityWhitelistState:
|
|
181
180
|
return pulumi.get(self, "safety_buffer")
|
182
181
|
|
183
182
|
@safety_buffer.setter
|
184
|
-
def safety_buffer(self, value: Optional[pulumi.Input[
|
183
|
+
def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
|
185
184
|
pulumi.set(self, "safety_buffer", value)
|
186
185
|
|
187
186
|
|
@@ -191,10 +190,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
191
190
|
def __init__(__self__,
|
192
191
|
resource_name: str,
|
193
192
|
opts: Optional[pulumi.ResourceOptions] = None,
|
194
|
-
backend: Optional[pulumi.Input[
|
195
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
196
|
-
namespace: Optional[pulumi.Input[
|
197
|
-
safety_buffer: Optional[pulumi.Input[
|
193
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
194
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
195
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
196
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
|
198
197
|
__props__=None):
|
199
198
|
"""
|
200
199
|
Configures the periodic tidying operation of the whitelisted identity entries.
|
@@ -224,14 +223,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
224
223
|
|
225
224
|
:param str resource_name: The name of the resource.
|
226
225
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
227
|
-
:param pulumi.Input[
|
228
|
-
:param pulumi.Input[
|
226
|
+
:param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
|
227
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
229
228
|
tidying of the identity-whitelist entries.
|
230
|
-
:param pulumi.Input[
|
229
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
231
230
|
The value should not contain leading or trailing forward slashes.
|
232
231
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
232
|
*Available only for Vault Enterprise*.
|
234
|
-
:param pulumi.Input[
|
233
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
|
235
234
|
have passed beyond the roletag expiration, before it is removed from the
|
236
235
|
backend storage.
|
237
236
|
"""
|
@@ -282,10 +281,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
282
281
|
def _internal_init(__self__,
|
283
282
|
resource_name: str,
|
284
283
|
opts: Optional[pulumi.ResourceOptions] = None,
|
285
|
-
backend: Optional[pulumi.Input[
|
286
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
287
|
-
namespace: Optional[pulumi.Input[
|
288
|
-
safety_buffer: Optional[pulumi.Input[
|
284
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
285
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
286
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
287
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
|
289
288
|
__props__=None):
|
290
289
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
291
290
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -309,10 +308,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
309
308
|
def get(resource_name: str,
|
310
309
|
id: pulumi.Input[str],
|
311
310
|
opts: Optional[pulumi.ResourceOptions] = None,
|
312
|
-
backend: Optional[pulumi.Input[
|
313
|
-
disable_periodic_tidy: Optional[pulumi.Input[
|
314
|
-
namespace: Optional[pulumi.Input[
|
315
|
-
safety_buffer: Optional[pulumi.Input[
|
311
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
312
|
+
disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
|
313
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
314
|
+
safety_buffer: Optional[pulumi.Input[_builtins.int]] = None) -> 'AuthBackendIdentityWhitelist':
|
316
315
|
"""
|
317
316
|
Get an existing AuthBackendIdentityWhitelist resource's state with the given name, id, and optional extra
|
318
317
|
properties used to qualify the lookup.
|
@@ -320,14 +319,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
320
319
|
:param str resource_name: The unique name of the resulting resource.
|
321
320
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
322
321
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
323
|
-
:param pulumi.Input[
|
324
|
-
:param pulumi.Input[
|
322
|
+
:param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
|
323
|
+
:param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
|
325
324
|
tidying of the identity-whitelist entries.
|
326
|
-
:param pulumi.Input[
|
325
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
327
326
|
The value should not contain leading or trailing forward slashes.
|
328
327
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
329
328
|
*Available only for Vault Enterprise*.
|
330
|
-
:param pulumi.Input[
|
329
|
+
:param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
|
331
330
|
have passed beyond the roletag expiration, before it is removed from the
|
332
331
|
backend storage.
|
333
332
|
"""
|
@@ -341,26 +340,26 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
341
340
|
__props__.__dict__["safety_buffer"] = safety_buffer
|
342
341
|
return AuthBackendIdentityWhitelist(resource_name, opts=opts, __props__=__props__)
|
343
342
|
|
344
|
-
@property
|
343
|
+
@_builtins.property
|
345
344
|
@pulumi.getter
|
346
|
-
def backend(self) -> pulumi.Output[Optional[
|
345
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
347
346
|
"""
|
348
347
|
The path of the AWS backend being configured.
|
349
348
|
"""
|
350
349
|
return pulumi.get(self, "backend")
|
351
350
|
|
352
|
-
@property
|
351
|
+
@_builtins.property
|
353
352
|
@pulumi.getter(name="disablePeriodicTidy")
|
354
|
-
def disable_periodic_tidy(self) -> pulumi.Output[Optional[
|
353
|
+
def disable_periodic_tidy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
355
354
|
"""
|
356
355
|
If set to true, disables the periodic
|
357
356
|
tidying of the identity-whitelist entries.
|
358
357
|
"""
|
359
358
|
return pulumi.get(self, "disable_periodic_tidy")
|
360
359
|
|
361
|
-
@property
|
360
|
+
@_builtins.property
|
362
361
|
@pulumi.getter
|
363
|
-
def namespace(self) -> pulumi.Output[Optional[
|
362
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
364
363
|
"""
|
365
364
|
The namespace to provision the resource in.
|
366
365
|
The value should not contain leading or trailing forward slashes.
|
@@ -369,9 +368,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
369
368
|
"""
|
370
369
|
return pulumi.get(self, "namespace")
|
371
370
|
|
372
|
-
@property
|
371
|
+
@_builtins.property
|
373
372
|
@pulumi.getter(name="safetyBuffer")
|
374
|
-
def safety_buffer(self) -> pulumi.Output[Optional[
|
373
|
+
def safety_buffer(self) -> pulumi.Output[Optional[_builtins.int]]:
|
375
374
|
"""
|
376
375
|
The amount of extra time, in minutes, that must
|
377
376
|
have passed beyond the roletag expiration, before it is removed from the
|