pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/egp_policy.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,18 +19,18 @@ __all__ = ['EgpPolicyArgs', 'EgpPolicy']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class EgpPolicyArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
enforcement_level: pulumi.Input[
|
24
|
-
paths: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
policy: pulumi.Input[
|
26
|
-
name: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
enforcement_level: pulumi.Input[_builtins.str],
|
23
|
+
paths: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
policy: pulumi.Input[_builtins.str],
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a EgpPolicy resource.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
30
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
|
31
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
32
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
33
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
35
34
|
The value should not contain leading or trailing forward slashes.
|
36
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
36
|
*Available only for Vault Enterprise*.
|
@@ -44,57 +43,57 @@ class EgpPolicyArgs:
|
|
44
43
|
if namespace is not None:
|
45
44
|
pulumi.set(__self__, "namespace", namespace)
|
46
45
|
|
47
|
-
@property
|
46
|
+
@_builtins.property
|
48
47
|
@pulumi.getter(name="enforcementLevel")
|
49
|
-
def enforcement_level(self) -> pulumi.Input[
|
48
|
+
def enforcement_level(self) -> pulumi.Input[_builtins.str]:
|
50
49
|
"""
|
51
50
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
52
51
|
"""
|
53
52
|
return pulumi.get(self, "enforcement_level")
|
54
53
|
|
55
54
|
@enforcement_level.setter
|
56
|
-
def enforcement_level(self, value: pulumi.Input[
|
55
|
+
def enforcement_level(self, value: pulumi.Input[_builtins.str]):
|
57
56
|
pulumi.set(self, "enforcement_level", value)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter
|
61
|
-
def paths(self) -> pulumi.Input[Sequence[pulumi.Input[
|
60
|
+
def paths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
62
61
|
"""
|
63
62
|
List of paths to which the policy will be applied to
|
64
63
|
"""
|
65
64
|
return pulumi.get(self, "paths")
|
66
65
|
|
67
66
|
@paths.setter
|
68
|
-
def paths(self, value: pulumi.Input[Sequence[pulumi.Input[
|
67
|
+
def paths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
69
68
|
pulumi.set(self, "paths", value)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def policy(self) -> pulumi.Input[
|
72
|
+
def policy(self) -> pulumi.Input[_builtins.str]:
|
74
73
|
"""
|
75
74
|
String containing a Sentinel policy
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "policy")
|
78
77
|
|
79
78
|
@policy.setter
|
80
|
-
def policy(self, value: pulumi.Input[
|
79
|
+
def policy(self, value: pulumi.Input[_builtins.str]):
|
81
80
|
pulumi.set(self, "policy", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def name(self) -> Optional[pulumi.Input[
|
84
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
86
85
|
"""
|
87
86
|
The name of the policy
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "name")
|
90
89
|
|
91
90
|
@name.setter
|
92
|
-
def name(self, value: Optional[pulumi.Input[
|
91
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
93
92
|
pulumi.set(self, "name", value)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[pulumi.Input[
|
96
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
98
97
|
"""
|
99
98
|
The namespace to provision the resource in.
|
100
99
|
The value should not contain leading or trailing forward slashes.
|
@@ -104,28 +103,28 @@ class EgpPolicyArgs:
|
|
104
103
|
return pulumi.get(self, "namespace")
|
105
104
|
|
106
105
|
@namespace.setter
|
107
|
-
def namespace(self, value: Optional[pulumi.Input[
|
106
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
108
107
|
pulumi.set(self, "namespace", value)
|
109
108
|
|
110
109
|
|
111
110
|
@pulumi.input_type
|
112
111
|
class _EgpPolicyState:
|
113
112
|
def __init__(__self__, *,
|
114
|
-
enforcement_level: Optional[pulumi.Input[
|
115
|
-
name: Optional[pulumi.Input[
|
116
|
-
namespace: Optional[pulumi.Input[
|
117
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[
|
118
|
-
policy: Optional[pulumi.Input[
|
113
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
114
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
115
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
116
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
117
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None):
|
119
118
|
"""
|
120
119
|
Input properties used for looking up and filtering EgpPolicy resources.
|
121
|
-
:param pulumi.Input[
|
122
|
-
:param pulumi.Input[
|
123
|
-
:param pulumi.Input[
|
120
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
121
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
122
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
124
123
|
The value should not contain leading or trailing forward slashes.
|
125
124
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
126
125
|
*Available only for Vault Enterprise*.
|
127
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
128
|
-
:param pulumi.Input[
|
126
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
|
127
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
129
128
|
"""
|
130
129
|
if enforcement_level is not None:
|
131
130
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -138,33 +137,33 @@ class _EgpPolicyState:
|
|
138
137
|
if policy is not None:
|
139
138
|
pulumi.set(__self__, "policy", policy)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter(name="enforcementLevel")
|
143
|
-
def enforcement_level(self) -> Optional[pulumi.Input[
|
142
|
+
def enforcement_level(self) -> Optional[pulumi.Input[_builtins.str]]:
|
144
143
|
"""
|
145
144
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
146
145
|
"""
|
147
146
|
return pulumi.get(self, "enforcement_level")
|
148
147
|
|
149
148
|
@enforcement_level.setter
|
150
|
-
def enforcement_level(self, value: Optional[pulumi.Input[
|
149
|
+
def enforcement_level(self, value: Optional[pulumi.Input[_builtins.str]]):
|
151
150
|
pulumi.set(self, "enforcement_level", value)
|
152
151
|
|
153
|
-
@property
|
152
|
+
@_builtins.property
|
154
153
|
@pulumi.getter
|
155
|
-
def name(self) -> Optional[pulumi.Input[
|
154
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
156
155
|
"""
|
157
156
|
The name of the policy
|
158
157
|
"""
|
159
158
|
return pulumi.get(self, "name")
|
160
159
|
|
161
160
|
@name.setter
|
162
|
-
def name(self, value: Optional[pulumi.Input[
|
161
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
162
|
pulumi.set(self, "name", value)
|
164
163
|
|
165
|
-
@property
|
164
|
+
@_builtins.property
|
166
165
|
@pulumi.getter
|
167
|
-
def namespace(self) -> Optional[pulumi.Input[
|
166
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
168
167
|
"""
|
169
168
|
The namespace to provision the resource in.
|
170
169
|
The value should not contain leading or trailing forward slashes.
|
@@ -174,31 +173,31 @@ class _EgpPolicyState:
|
|
174
173
|
return pulumi.get(self, "namespace")
|
175
174
|
|
176
175
|
@namespace.setter
|
177
|
-
def namespace(self, value: Optional[pulumi.Input[
|
176
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
178
177
|
pulumi.set(self, "namespace", value)
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter
|
182
|
-
def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
181
|
+
def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
183
182
|
"""
|
184
183
|
List of paths to which the policy will be applied to
|
185
184
|
"""
|
186
185
|
return pulumi.get(self, "paths")
|
187
186
|
|
188
187
|
@paths.setter
|
189
|
-
def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
188
|
+
def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
190
189
|
pulumi.set(self, "paths", value)
|
191
190
|
|
192
|
-
@property
|
191
|
+
@_builtins.property
|
193
192
|
@pulumi.getter
|
194
|
-
def policy(self) -> Optional[pulumi.Input[
|
193
|
+
def policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
195
194
|
"""
|
196
195
|
String containing a Sentinel policy
|
197
196
|
"""
|
198
197
|
return pulumi.get(self, "policy")
|
199
198
|
|
200
199
|
@policy.setter
|
201
|
-
def policy(self, value: Optional[pulumi.Input[
|
200
|
+
def policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
202
201
|
pulumi.set(self, "policy", value)
|
203
202
|
|
204
203
|
|
@@ -208,11 +207,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
208
207
|
def __init__(__self__,
|
209
208
|
resource_name: str,
|
210
209
|
opts: Optional[pulumi.ResourceOptions] = None,
|
211
|
-
enforcement_level: Optional[pulumi.Input[
|
212
|
-
name: Optional[pulumi.Input[
|
213
|
-
namespace: Optional[pulumi.Input[
|
214
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[
|
215
|
-
policy: Optional[pulumi.Input[
|
210
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
211
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
213
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
214
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None,
|
216
215
|
__props__=None):
|
217
216
|
"""
|
218
217
|
Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
|
@@ -237,14 +236,14 @@ class EgpPolicy(pulumi.CustomResource):
|
|
237
236
|
|
238
237
|
:param str resource_name: The name of the resource.
|
239
238
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
240
|
-
:param pulumi.Input[
|
241
|
-
:param pulumi.Input[
|
242
|
-
:param pulumi.Input[
|
239
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
240
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
241
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
243
242
|
The value should not contain leading or trailing forward slashes.
|
244
243
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
245
244
|
*Available only for Vault Enterprise*.
|
246
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
247
|
-
:param pulumi.Input[
|
245
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
|
246
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
248
247
|
"""
|
249
248
|
...
|
250
249
|
@overload
|
@@ -288,11 +287,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
288
287
|
def _internal_init(__self__,
|
289
288
|
resource_name: str,
|
290
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
291
|
-
enforcement_level: Optional[pulumi.Input[
|
292
|
-
name: Optional[pulumi.Input[
|
293
|
-
namespace: Optional[pulumi.Input[
|
294
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[
|
295
|
-
policy: Optional[pulumi.Input[
|
290
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
291
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
293
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
294
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None,
|
296
295
|
__props__=None):
|
297
296
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
298
297
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -323,11 +322,11 @@ class EgpPolicy(pulumi.CustomResource):
|
|
323
322
|
def get(resource_name: str,
|
324
323
|
id: pulumi.Input[str],
|
325
324
|
opts: Optional[pulumi.ResourceOptions] = None,
|
326
|
-
enforcement_level: Optional[pulumi.Input[
|
327
|
-
name: Optional[pulumi.Input[
|
328
|
-
namespace: Optional[pulumi.Input[
|
329
|
-
paths: Optional[pulumi.Input[Sequence[pulumi.Input[
|
330
|
-
policy: Optional[pulumi.Input[
|
325
|
+
enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
|
326
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
327
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
328
|
+
paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
329
|
+
policy: Optional[pulumi.Input[_builtins.str]] = None) -> 'EgpPolicy':
|
331
330
|
"""
|
332
331
|
Get an existing EgpPolicy resource's state with the given name, id, and optional extra
|
333
332
|
properties used to qualify the lookup.
|
@@ -335,14 +334,14 @@ class EgpPolicy(pulumi.CustomResource):
|
|
335
334
|
:param str resource_name: The unique name of the resulting resource.
|
336
335
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
337
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
340
|
-
:param pulumi.Input[
|
337
|
+
:param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
338
|
+
:param pulumi.Input[_builtins.str] name: The name of the policy
|
339
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
341
340
|
The value should not contain leading or trailing forward slashes.
|
342
341
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
343
342
|
*Available only for Vault Enterprise*.
|
344
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
345
|
-
:param pulumi.Input[
|
343
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
|
344
|
+
:param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
|
346
345
|
"""
|
347
346
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
348
347
|
|
@@ -355,25 +354,25 @@ class EgpPolicy(pulumi.CustomResource):
|
|
355
354
|
__props__.__dict__["policy"] = policy
|
356
355
|
return EgpPolicy(resource_name, opts=opts, __props__=__props__)
|
357
356
|
|
358
|
-
@property
|
357
|
+
@_builtins.property
|
359
358
|
@pulumi.getter(name="enforcementLevel")
|
360
|
-
def enforcement_level(self) -> pulumi.Output[
|
359
|
+
def enforcement_level(self) -> pulumi.Output[_builtins.str]:
|
361
360
|
"""
|
362
361
|
Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
363
362
|
"""
|
364
363
|
return pulumi.get(self, "enforcement_level")
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter
|
368
|
-
def name(self) -> pulumi.Output[
|
367
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
369
368
|
"""
|
370
369
|
The name of the policy
|
371
370
|
"""
|
372
371
|
return pulumi.get(self, "name")
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter
|
376
|
-
def namespace(self) -> pulumi.Output[Optional[
|
375
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
377
376
|
"""
|
378
377
|
The namespace to provision the resource in.
|
379
378
|
The value should not contain leading or trailing forward slashes.
|
@@ -382,17 +381,17 @@ class EgpPolicy(pulumi.CustomResource):
|
|
382
381
|
"""
|
383
382
|
return pulumi.get(self, "namespace")
|
384
383
|
|
385
|
-
@property
|
384
|
+
@_builtins.property
|
386
385
|
@pulumi.getter
|
387
|
-
def paths(self) -> pulumi.Output[Sequence[
|
386
|
+
def paths(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
388
387
|
"""
|
389
388
|
List of paths to which the policy will be applied to
|
390
389
|
"""
|
391
390
|
return pulumi.get(self, "paths")
|
392
391
|
|
393
|
-
@property
|
392
|
+
@_builtins.property
|
394
393
|
@pulumi.getter
|
395
|
-
def policy(self) -> pulumi.Output[
|
394
|
+
def policy(self) -> pulumi.Output[_builtins.str]:
|
396
395
|
"""
|
397
396
|
String containing a Sentinel policy
|
398
397
|
"""
|
pulumi_vault/gcp/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|