pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -57,32 +56,32 @@ class AuthBackendTune(dict):
|
|
57
56
|
return super().get(key, default)
|
58
57
|
|
59
58
|
def __init__(__self__, *,
|
60
|
-
allowed_response_headers: Optional[Sequence[
|
61
|
-
audit_non_hmac_request_keys: Optional[Sequence[
|
62
|
-
audit_non_hmac_response_keys: Optional[Sequence[
|
63
|
-
default_lease_ttl: Optional[
|
64
|
-
listing_visibility: Optional[
|
65
|
-
max_lease_ttl: Optional[
|
66
|
-
passthrough_request_headers: Optional[Sequence[
|
67
|
-
token_type: Optional[
|
68
|
-
"""
|
69
|
-
:param Sequence[
|
59
|
+
allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
|
60
|
+
audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
|
61
|
+
audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
|
62
|
+
default_lease_ttl: Optional[_builtins.str] = None,
|
63
|
+
listing_visibility: Optional[_builtins.str] = None,
|
64
|
+
max_lease_ttl: Optional[_builtins.str] = None,
|
65
|
+
passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
|
66
|
+
token_type: Optional[_builtins.str] = None):
|
67
|
+
"""
|
68
|
+
:param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
70
69
|
a plugin to include them in the response.
|
71
|
-
:param Sequence[
|
70
|
+
:param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
72
71
|
not be HMAC'd by audit devices in the request data object.
|
73
|
-
:param Sequence[
|
72
|
+
:param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
74
73
|
not be HMAC'd by audit devices in the response data object.
|
75
|
-
:param
|
74
|
+
:param _builtins.str default_lease_ttl: Specifies the default time-to-live.
|
76
75
|
If set, this overrides the global default.
|
77
76
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
78
|
-
:param
|
77
|
+
:param _builtins.str listing_visibility: Specifies whether to show this mount in
|
79
78
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
80
|
-
:param
|
79
|
+
:param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
81
80
|
If set, this overrides the global default.
|
82
81
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
83
|
-
:param Sequence[
|
82
|
+
:param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
|
84
83
|
pass from the request to the backend.
|
85
|
-
:param
|
84
|
+
:param _builtins.str token_type: Specifies the type of tokens that should be returned by
|
86
85
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
87
86
|
"""
|
88
87
|
if allowed_response_headers is not None:
|
@@ -102,36 +101,36 @@ class AuthBackendTune(dict):
|
|
102
101
|
if token_type is not None:
|
103
102
|
pulumi.set(__self__, "token_type", token_type)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="allowedResponseHeaders")
|
107
|
-
def allowed_response_headers(self) -> Optional[Sequence[
|
106
|
+
def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
|
108
107
|
"""
|
109
108
|
List of headers to whitelist and allowing
|
110
109
|
a plugin to include them in the response.
|
111
110
|
"""
|
112
111
|
return pulumi.get(self, "allowed_response_headers")
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
116
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[
|
115
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
|
117
116
|
"""
|
118
117
|
Specifies the list of keys that will
|
119
118
|
not be HMAC'd by audit devices in the request data object.
|
120
119
|
"""
|
121
120
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
125
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[
|
124
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
|
126
125
|
"""
|
127
126
|
Specifies the list of keys that will
|
128
127
|
not be HMAC'd by audit devices in the response data object.
|
129
128
|
"""
|
130
129
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter(name="defaultLeaseTtl")
|
134
|
-
def default_lease_ttl(self) -> Optional[
|
133
|
+
def default_lease_ttl(self) -> Optional[_builtins.str]:
|
135
134
|
"""
|
136
135
|
Specifies the default time-to-live.
|
137
136
|
If set, this overrides the global default.
|
@@ -139,18 +138,18 @@ class AuthBackendTune(dict):
|
|
139
138
|
"""
|
140
139
|
return pulumi.get(self, "default_lease_ttl")
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter(name="listingVisibility")
|
144
|
-
def listing_visibility(self) -> Optional[
|
143
|
+
def listing_visibility(self) -> Optional[_builtins.str]:
|
145
144
|
"""
|
146
145
|
Specifies whether to show this mount in
|
147
146
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
148
147
|
"""
|
149
148
|
return pulumi.get(self, "listing_visibility")
|
150
149
|
|
151
|
-
@property
|
150
|
+
@_builtins.property
|
152
151
|
@pulumi.getter(name="maxLeaseTtl")
|
153
|
-
def max_lease_ttl(self) -> Optional[
|
152
|
+
def max_lease_ttl(self) -> Optional[_builtins.str]:
|
154
153
|
"""
|
155
154
|
Specifies the maximum time-to-live.
|
156
155
|
If set, this overrides the global default.
|
@@ -158,18 +157,18 @@ class AuthBackendTune(dict):
|
|
158
157
|
"""
|
159
158
|
return pulumi.get(self, "max_lease_ttl")
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="passthroughRequestHeaders")
|
163
|
-
def passthrough_request_headers(self) -> Optional[Sequence[
|
162
|
+
def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
List of headers to whitelist and
|
166
165
|
pass from the request to the backend.
|
167
166
|
"""
|
168
167
|
return pulumi.get(self, "passthrough_request_headers")
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter(name="tokenType")
|
172
|
-
def token_type(self) -> Optional[
|
171
|
+
def token_type(self) -> Optional[_builtins.str]:
|
173
172
|
"""
|
174
173
|
Specifies the type of tokens that should be returned by
|
175
174
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -180,25 +179,25 @@ class AuthBackendTune(dict):
|
|
180
179
|
@pulumi.output_type
|
181
180
|
class GetPolicyDocumentRuleResult(dict):
|
182
181
|
def __init__(__self__, *,
|
183
|
-
capabilities: Sequence[
|
184
|
-
path:
|
182
|
+
capabilities: Sequence[_builtins.str],
|
183
|
+
path: _builtins.str,
|
185
184
|
allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
|
186
185
|
denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
|
187
|
-
description: Optional[
|
188
|
-
max_wrapping_ttl: Optional[
|
189
|
-
min_wrapping_ttl: Optional[
|
190
|
-
required_parameters: Optional[Sequence[
|
191
|
-
subscribe_event_types: Optional[Sequence[
|
192
|
-
"""
|
193
|
-
:param Sequence[
|
194
|
-
:param
|
186
|
+
description: Optional[_builtins.str] = None,
|
187
|
+
max_wrapping_ttl: Optional[_builtins.str] = None,
|
188
|
+
min_wrapping_ttl: Optional[_builtins.str] = None,
|
189
|
+
required_parameters: Optional[Sequence[_builtins.str]] = None,
|
190
|
+
subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
|
191
|
+
"""
|
192
|
+
:param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
193
|
+
:param _builtins.str path: A path in Vault that this rule applies to.
|
195
194
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
196
195
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
197
|
-
:param
|
198
|
-
:param
|
199
|
-
:param
|
200
|
-
:param Sequence[
|
201
|
-
:param Sequence[
|
196
|
+
:param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
197
|
+
:param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
198
|
+
:param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
199
|
+
:param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
|
200
|
+
:param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
202
201
|
"""
|
203
202
|
pulumi.set(__self__, "capabilities", capabilities)
|
204
203
|
pulumi.set(__self__, "path", path)
|
@@ -217,23 +216,23 @@ class GetPolicyDocumentRuleResult(dict):
|
|
217
216
|
if subscribe_event_types is not None:
|
218
217
|
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter
|
222
|
-
def capabilities(self) -> Sequence[
|
221
|
+
def capabilities(self) -> Sequence[_builtins.str]:
|
223
222
|
"""
|
224
223
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "capabilities")
|
227
226
|
|
228
|
-
@property
|
227
|
+
@_builtins.property
|
229
228
|
@pulumi.getter
|
230
|
-
def path(self) ->
|
229
|
+
def path(self) -> _builtins.str:
|
231
230
|
"""
|
232
231
|
A path in Vault that this rule applies to.
|
233
232
|
"""
|
234
233
|
return pulumi.get(self, "path")
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter(name="allowedParameters")
|
238
237
|
def allowed_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']]:
|
239
238
|
"""
|
@@ -241,7 +240,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
241
240
|
"""
|
242
241
|
return pulumi.get(self, "allowed_parameters")
|
243
242
|
|
244
|
-
@property
|
243
|
+
@_builtins.property
|
245
244
|
@pulumi.getter(name="deniedParameters")
|
246
245
|
def denied_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']]:
|
247
246
|
"""
|
@@ -249,41 +248,41 @@ class GetPolicyDocumentRuleResult(dict):
|
|
249
248
|
"""
|
250
249
|
return pulumi.get(self, "denied_parameters")
|
251
250
|
|
252
|
-
@property
|
251
|
+
@_builtins.property
|
253
252
|
@pulumi.getter
|
254
|
-
def description(self) -> Optional[
|
253
|
+
def description(self) -> Optional[_builtins.str]:
|
255
254
|
"""
|
256
255
|
Description of the rule. Will be added as a comment to rendered rule.
|
257
256
|
"""
|
258
257
|
return pulumi.get(self, "description")
|
259
258
|
|
260
|
-
@property
|
259
|
+
@_builtins.property
|
261
260
|
@pulumi.getter(name="maxWrappingTtl")
|
262
|
-
def max_wrapping_ttl(self) -> Optional[
|
261
|
+
def max_wrapping_ttl(self) -> Optional[_builtins.str]:
|
263
262
|
"""
|
264
263
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
265
264
|
"""
|
266
265
|
return pulumi.get(self, "max_wrapping_ttl")
|
267
266
|
|
268
|
-
@property
|
267
|
+
@_builtins.property
|
269
268
|
@pulumi.getter(name="minWrappingTtl")
|
270
|
-
def min_wrapping_ttl(self) -> Optional[
|
269
|
+
def min_wrapping_ttl(self) -> Optional[_builtins.str]:
|
271
270
|
"""
|
272
271
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
273
272
|
"""
|
274
273
|
return pulumi.get(self, "min_wrapping_ttl")
|
275
274
|
|
276
|
-
@property
|
275
|
+
@_builtins.property
|
277
276
|
@pulumi.getter(name="requiredParameters")
|
278
|
-
def required_parameters(self) -> Optional[Sequence[
|
277
|
+
def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
|
279
278
|
"""
|
280
279
|
A list of parameters that must be specified.
|
281
280
|
"""
|
282
281
|
return pulumi.get(self, "required_parameters")
|
283
282
|
|
284
|
-
@property
|
283
|
+
@_builtins.property
|
285
284
|
@pulumi.getter(name="subscribeEventTypes")
|
286
|
-
def subscribe_event_types(self) -> Optional[Sequence[
|
285
|
+
def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
|
287
286
|
"""
|
288
287
|
A list of event types to subscribe to when using `subscribe` capability.
|
289
288
|
"""
|
@@ -293,26 +292,26 @@ class GetPolicyDocumentRuleResult(dict):
|
|
293
292
|
@pulumi.output_type
|
294
293
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
295
294
|
def __init__(__self__, *,
|
296
|
-
key:
|
297
|
-
values: Sequence[
|
295
|
+
key: _builtins.str,
|
296
|
+
values: Sequence[_builtins.str]):
|
298
297
|
"""
|
299
|
-
:param
|
300
|
-
:param Sequence[
|
298
|
+
:param _builtins.str key: Name of permitted key.
|
299
|
+
:param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
|
301
300
|
"""
|
302
301
|
pulumi.set(__self__, "key", key)
|
303
302
|
pulumi.set(__self__, "values", values)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter
|
307
|
-
def key(self) ->
|
306
|
+
def key(self) -> _builtins.str:
|
308
307
|
"""
|
309
308
|
Name of permitted key.
|
310
309
|
"""
|
311
310
|
return pulumi.get(self, "key")
|
312
311
|
|
313
|
-
@property
|
312
|
+
@_builtins.property
|
314
313
|
@pulumi.getter
|
315
|
-
def values(self) -> Sequence[
|
314
|
+
def values(self) -> Sequence[_builtins.str]:
|
316
315
|
"""
|
317
316
|
A list of values what are permitted by policy rule.
|
318
317
|
"""
|
@@ -322,26 +321,26 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
322
321
|
@pulumi.output_type
|
323
322
|
class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
324
323
|
def __init__(__self__, *,
|
325
|
-
key:
|
326
|
-
values: Sequence[
|
324
|
+
key: _builtins.str,
|
325
|
+
values: Sequence[_builtins.str]):
|
327
326
|
"""
|
328
|
-
:param
|
329
|
-
:param Sequence[
|
327
|
+
:param _builtins.str key: Name of denied key.
|
328
|
+
:param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
|
330
329
|
"""
|
331
330
|
pulumi.set(__self__, "key", key)
|
332
331
|
pulumi.set(__self__, "values", values)
|
333
332
|
|
334
|
-
@property
|
333
|
+
@_builtins.property
|
335
334
|
@pulumi.getter
|
336
|
-
def key(self) ->
|
335
|
+
def key(self) -> _builtins.str:
|
337
336
|
"""
|
338
337
|
Name of denied key.
|
339
338
|
"""
|
340
339
|
return pulumi.get(self, "key")
|
341
340
|
|
342
|
-
@property
|
341
|
+
@_builtins.property
|
343
342
|
@pulumi.getter
|
344
|
-
def values(self) -> Sequence[
|
343
|
+
def values(self) -> Sequence[_builtins.str]:
|
345
344
|
"""
|
346
345
|
A list of values what are denied by policy rule.
|
347
346
|
"""
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -32,7 +31,7 @@ MYPY = False
|
|
32
31
|
|
33
32
|
if not MYPY:
|
34
33
|
class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
|
35
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
34
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
36
35
|
"""
|
37
36
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
38
37
|
"""
|
@@ -42,33 +41,33 @@ elif False:
|
|
42
41
|
@pulumi.input_type
|
43
42
|
class BackendConfigCmpv2AuthenticatorsArgs:
|
44
43
|
def __init__(__self__, *,
|
45
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
44
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
46
45
|
"""
|
47
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
48
47
|
"""
|
49
48
|
if cert is not None:
|
50
49
|
pulumi.set(__self__, "cert", cert)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter
|
54
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
53
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
55
54
|
"""
|
56
55
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "cert")
|
59
58
|
|
60
59
|
@cert.setter
|
61
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
60
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
62
61
|
pulumi.set(self, "cert", value)
|
63
62
|
|
64
63
|
|
65
64
|
if not MYPY:
|
66
65
|
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
67
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
66
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
68
67
|
"""
|
69
68
|
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
70
69
|
"""
|
71
|
-
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
70
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
72
71
|
"""
|
73
72
|
The accessor (required) property for user pass auth backends.
|
74
73
|
"""
|
@@ -78,49 +77,49 @@ elif False:
|
|
78
77
|
@pulumi.input_type
|
79
78
|
class BackendConfigEstAuthenticatorsArgs:
|
80
79
|
def __init__(__self__, *,
|
81
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
82
|
-
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
80
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
81
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
83
82
|
"""
|
84
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
85
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
83
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
|
86
85
|
"""
|
87
86
|
if cert is not None:
|
88
87
|
pulumi.set(__self__, "cert", cert)
|
89
88
|
if userpass is not None:
|
90
89
|
pulumi.set(__self__, "userpass", userpass)
|
91
90
|
|
92
|
-
@property
|
91
|
+
@_builtins.property
|
93
92
|
@pulumi.getter
|
94
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
93
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
95
94
|
"""
|
96
95
|
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
97
96
|
"""
|
98
97
|
return pulumi.get(self, "cert")
|
99
98
|
|
100
99
|
@cert.setter
|
101
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
100
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
102
101
|
pulumi.set(self, "cert", value)
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
105
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
107
106
|
"""
|
108
107
|
The accessor (required) property for user pass auth backends.
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "userpass")
|
111
110
|
|
112
111
|
@userpass.setter
|
113
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
112
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
114
113
|
pulumi.set(self, "userpass", value)
|
115
114
|
|
116
115
|
|
117
116
|
if not MYPY:
|
118
117
|
class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
|
119
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
118
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
120
119
|
"""
|
121
120
|
The accessor and cert_role properties for cert auth backends
|
122
121
|
"""
|
123
|
-
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
122
|
+
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
124
123
|
"""
|
125
124
|
The accessor property for SCEP auth backends
|
126
125
|
"""
|
@@ -130,45 +129,45 @@ elif False:
|
|
130
129
|
@pulumi.input_type
|
131
130
|
class BackendConfigScepAuthenticatorsArgs:
|
132
131
|
def __init__(__self__, *,
|
133
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
134
|
-
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
132
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
133
|
+
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
135
134
|
"""
|
136
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
137
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
135
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
|
136
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] scep: The accessor property for SCEP auth backends
|
138
137
|
"""
|
139
138
|
if cert is not None:
|
140
139
|
pulumi.set(__self__, "cert", cert)
|
141
140
|
if scep is not None:
|
142
141
|
pulumi.set(__self__, "scep", scep)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter
|
146
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
145
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
147
146
|
"""
|
148
147
|
The accessor and cert_role properties for cert auth backends
|
149
148
|
"""
|
150
149
|
return pulumi.get(self, "cert")
|
151
150
|
|
152
151
|
@cert.setter
|
153
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
152
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
154
153
|
pulumi.set(self, "cert", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter
|
158
|
-
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
157
|
+
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
159
158
|
"""
|
160
159
|
The accessor property for SCEP auth backends
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "scep")
|
163
162
|
|
164
163
|
@scep.setter
|
165
|
-
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
164
|
+
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
166
165
|
pulumi.set(self, "scep", value)
|
167
166
|
|
168
167
|
|
169
168
|
if not MYPY:
|
170
169
|
class BackendConfigScepExternalValidationArgsDict(TypedDict):
|
171
|
-
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
170
|
+
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
172
171
|
"""
|
173
172
|
The credentials to enable Microsoft Intune validation of SCEP requests
|
174
173
|
"""
|
@@ -178,37 +177,37 @@ elif False:
|
|
178
177
|
@pulumi.input_type
|
179
178
|
class BackendConfigScepExternalValidationArgs:
|
180
179
|
def __init__(__self__, *,
|
181
|
-
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
180
|
+
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
182
181
|
"""
|
183
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
182
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
184
183
|
"""
|
185
184
|
if intune is not None:
|
186
185
|
pulumi.set(__self__, "intune", intune)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter
|
190
|
-
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
189
|
+
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
191
190
|
"""
|
192
191
|
The credentials to enable Microsoft Intune validation of SCEP requests
|
193
192
|
"""
|
194
193
|
return pulumi.get(self, "intune")
|
195
194
|
|
196
195
|
@intune.setter
|
197
|
-
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
196
|
+
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
198
197
|
pulumi.set(self, "intune", value)
|
199
198
|
|
200
199
|
|
201
200
|
if not MYPY:
|
202
201
|
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
203
|
-
oid: pulumi.Input[
|
202
|
+
oid: pulumi.Input[_builtins.str]
|
204
203
|
"""
|
205
204
|
The OID for the policy identifier
|
206
205
|
"""
|
207
|
-
cps: NotRequired[pulumi.Input[
|
206
|
+
cps: NotRequired[pulumi.Input[_builtins.str]]
|
208
207
|
"""
|
209
208
|
The URL of the CPS for the policy identifier
|
210
209
|
"""
|
211
|
-
notice: NotRequired[pulumi.Input[
|
210
|
+
notice: NotRequired[pulumi.Input[_builtins.str]]
|
212
211
|
"""
|
213
212
|
A notice for the policy identifier
|
214
213
|
"""
|
@@ -218,13 +217,13 @@ elif False:
|
|
218
217
|
@pulumi.input_type
|
219
218
|
class SecretBackendRolePolicyIdentifierArgs:
|
220
219
|
def __init__(__self__, *,
|
221
|
-
oid: pulumi.Input[
|
222
|
-
cps: Optional[pulumi.Input[
|
223
|
-
notice: Optional[pulumi.Input[
|
220
|
+
oid: pulumi.Input[_builtins.str],
|
221
|
+
cps: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
notice: Optional[pulumi.Input[_builtins.str]] = None):
|
224
223
|
"""
|
225
|
-
:param pulumi.Input[
|
226
|
-
:param pulumi.Input[
|
227
|
-
:param pulumi.Input[
|
224
|
+
:param pulumi.Input[_builtins.str] oid: The OID for the policy identifier
|
225
|
+
:param pulumi.Input[_builtins.str] cps: The URL of the CPS for the policy identifier
|
226
|
+
:param pulumi.Input[_builtins.str] notice: A notice for the policy identifier
|
228
227
|
"""
|
229
228
|
pulumi.set(__self__, "oid", oid)
|
230
229
|
if cps is not None:
|
@@ -232,40 +231,40 @@ class SecretBackendRolePolicyIdentifierArgs:
|
|
232
231
|
if notice is not None:
|
233
232
|
pulumi.set(__self__, "notice", notice)
|
234
233
|
|
235
|
-
@property
|
234
|
+
@_builtins.property
|
236
235
|
@pulumi.getter
|
237
|
-
def oid(self) -> pulumi.Input[
|
236
|
+
def oid(self) -> pulumi.Input[_builtins.str]:
|
238
237
|
"""
|
239
238
|
The OID for the policy identifier
|
240
239
|
"""
|
241
240
|
return pulumi.get(self, "oid")
|
242
241
|
|
243
242
|
@oid.setter
|
244
|
-
def oid(self, value: pulumi.Input[
|
243
|
+
def oid(self, value: pulumi.Input[_builtins.str]):
|
245
244
|
pulumi.set(self, "oid", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter
|
249
|
-
def cps(self) -> Optional[pulumi.Input[
|
248
|
+
def cps(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
249
|
"""
|
251
250
|
The URL of the CPS for the policy identifier
|
252
251
|
"""
|
253
252
|
return pulumi.get(self, "cps")
|
254
253
|
|
255
254
|
@cps.setter
|
256
|
-
def cps(self, value: Optional[pulumi.Input[
|
255
|
+
def cps(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
256
|
pulumi.set(self, "cps", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter
|
261
|
-
def notice(self) -> Optional[pulumi.Input[
|
260
|
+
def notice(self) -> Optional[pulumi.Input[_builtins.str]]:
|
262
261
|
"""
|
263
262
|
A notice for the policy identifier
|
264
263
|
"""
|
265
264
|
return pulumi.get(self, "notice")
|
266
265
|
|
267
266
|
@notice.setter
|
268
|
-
def notice(self, value: Optional[pulumi.Input[
|
267
|
+
def notice(self, value: Optional[pulumi.Input[_builtins.str]]):
|
269
268
|
pulumi.set(self, "notice", value)
|
270
269
|
|
271
270
|
|