pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/config/vars.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,158 +21,158 @@ __config__ = pulumi.Config('vault')
|
|
22
21
|
|
23
22
|
|
24
23
|
class _ExportableConfig(types.ModuleType):
|
25
|
-
@property
|
24
|
+
@_builtins.property
|
26
25
|
def add_address_to_env(self) -> Optional[str]:
|
27
26
|
return __config__.get('addAddressToEnv')
|
28
27
|
|
29
|
-
@property
|
28
|
+
@_builtins.property
|
30
29
|
def address(self) -> Optional[str]:
|
31
30
|
"""
|
32
31
|
URL of the root of the target Vault server.
|
33
32
|
"""
|
34
33
|
return __config__.get('address')
|
35
34
|
|
36
|
-
@property
|
35
|
+
@_builtins.property
|
37
36
|
def auth_login(self) -> Optional[str]:
|
38
37
|
"""
|
39
38
|
Login to vault with an existing auth method using auth/<mount>/login
|
40
39
|
"""
|
41
40
|
return __config__.get('authLogin')
|
42
41
|
|
43
|
-
@property
|
42
|
+
@_builtins.property
|
44
43
|
def auth_login_aws(self) -> Optional[str]:
|
45
44
|
"""
|
46
45
|
Login to vault using the AWS method
|
47
46
|
"""
|
48
47
|
return __config__.get('authLoginAws')
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
def auth_login_azure(self) -> Optional[str]:
|
52
51
|
"""
|
53
52
|
Login to vault using the azure method
|
54
53
|
"""
|
55
54
|
return __config__.get('authLoginAzure')
|
56
55
|
|
57
|
-
@property
|
56
|
+
@_builtins.property
|
58
57
|
def auth_login_cert(self) -> Optional[str]:
|
59
58
|
"""
|
60
59
|
Login to vault using the cert method
|
61
60
|
"""
|
62
61
|
return __config__.get('authLoginCert')
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
def auth_login_gcp(self) -> Optional[str]:
|
66
65
|
"""
|
67
66
|
Login to vault using the gcp method
|
68
67
|
"""
|
69
68
|
return __config__.get('authLoginGcp')
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
def auth_login_jwt(self) -> Optional[str]:
|
73
72
|
"""
|
74
73
|
Login to vault using the jwt method
|
75
74
|
"""
|
76
75
|
return __config__.get('authLoginJwt')
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
def auth_login_kerberos(self) -> Optional[str]:
|
80
79
|
"""
|
81
80
|
Login to vault using the kerberos method
|
82
81
|
"""
|
83
82
|
return __config__.get('authLoginKerberos')
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
def auth_login_oci(self) -> Optional[str]:
|
87
86
|
"""
|
88
87
|
Login to vault using the OCI method
|
89
88
|
"""
|
90
89
|
return __config__.get('authLoginOci')
|
91
90
|
|
92
|
-
@property
|
91
|
+
@_builtins.property
|
93
92
|
def auth_login_oidc(self) -> Optional[str]:
|
94
93
|
"""
|
95
94
|
Login to vault using the oidc method
|
96
95
|
"""
|
97
96
|
return __config__.get('authLoginOidc')
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
def auth_login_radius(self) -> Optional[str]:
|
101
100
|
"""
|
102
101
|
Login to vault using the radius method
|
103
102
|
"""
|
104
103
|
return __config__.get('authLoginRadius')
|
105
104
|
|
106
|
-
@property
|
105
|
+
@_builtins.property
|
107
106
|
def auth_login_token_file(self) -> Optional[str]:
|
108
107
|
"""
|
109
108
|
Login to vault using
|
110
109
|
"""
|
111
110
|
return __config__.get('authLoginTokenFile')
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
def auth_login_userpass(self) -> Optional[str]:
|
115
114
|
"""
|
116
115
|
Login to vault using the userpass method
|
117
116
|
"""
|
118
117
|
return __config__.get('authLoginUserpass')
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
def ca_cert_dir(self) -> Optional[str]:
|
122
121
|
"""
|
123
122
|
Path to directory containing CA certificate files to validate the server's certificate.
|
124
123
|
"""
|
125
124
|
return __config__.get('caCertDir')
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
def ca_cert_file(self) -> Optional[str]:
|
129
128
|
"""
|
130
129
|
Path to a CA certificate file to validate the server's certificate.
|
131
130
|
"""
|
132
131
|
return __config__.get('caCertFile')
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
def client_auth(self) -> Optional[str]:
|
136
135
|
"""
|
137
136
|
Client authentication credentials.
|
138
137
|
"""
|
139
138
|
return __config__.get('clientAuth')
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
def headers(self) -> Optional[str]:
|
143
142
|
"""
|
144
143
|
The headers to send with each Vault request.
|
145
144
|
"""
|
146
145
|
return __config__.get('headers')
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
def max_lease_ttl_seconds(self) -> int:
|
150
149
|
"""
|
151
150
|
Maximum TTL for secret leases requested by this provider.
|
152
151
|
"""
|
153
152
|
return __config__.get_int('maxLeaseTtlSeconds') or (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
def max_retries(self) -> int:
|
157
156
|
"""
|
158
157
|
Maximum number of retries when a 5xx error code is encountered.
|
159
158
|
"""
|
160
159
|
return __config__.get_int('maxRetries') or (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
def max_retries_ccc(self) -> Optional[int]:
|
164
163
|
"""
|
165
164
|
Maximum number of retries for Client Controlled Consistency related operations
|
166
165
|
"""
|
167
166
|
return __config__.get_int('maxRetriesCcc')
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
def namespace(self) -> Optional[str]:
|
171
170
|
"""
|
172
171
|
The namespace to use. Available only for Vault Enterprise.
|
173
172
|
"""
|
174
173
|
return __config__.get('namespace')
|
175
174
|
|
176
|
-
@property
|
175
|
+
@_builtins.property
|
177
176
|
def set_namespace_from_token(self) -> Optional[bool]:
|
178
177
|
"""
|
179
178
|
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
@@ -181,49 +180,49 @@ class _ExportableConfig(types.ModuleType):
|
|
181
180
|
"""
|
182
181
|
return __config__.get_bool('setNamespaceFromToken')
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
def skip_child_token(self) -> Optional[bool]:
|
186
185
|
"""
|
187
186
|
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
188
187
|
"""
|
189
188
|
return __config__.get_bool('skipChildToken')
|
190
189
|
|
191
|
-
@property
|
190
|
+
@_builtins.property
|
192
191
|
def skip_get_vault_version(self) -> Optional[bool]:
|
193
192
|
"""
|
194
193
|
Skip the dynamic fetching of the Vault server version.
|
195
194
|
"""
|
196
195
|
return __config__.get_bool('skipGetVaultVersion')
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
def skip_tls_verify(self) -> Optional[bool]:
|
200
199
|
"""
|
201
200
|
Set this to true only if the target Vault server is an insecure development instance.
|
202
201
|
"""
|
203
202
|
return __config__.get_bool('skipTlsVerify') or _utilities.get_env_bool('VAULT_SKIP_VERIFY')
|
204
203
|
|
205
|
-
@property
|
204
|
+
@_builtins.property
|
206
205
|
def tls_server_name(self) -> Optional[str]:
|
207
206
|
"""
|
208
207
|
Name to use as the SNI host when connecting via TLS.
|
209
208
|
"""
|
210
209
|
return __config__.get('tlsServerName')
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
def token(self) -> Optional[str]:
|
214
213
|
"""
|
215
214
|
Token to use to authenticate to Vault.
|
216
215
|
"""
|
217
216
|
return __config__.get('token')
|
218
217
|
|
219
|
-
@property
|
218
|
+
@_builtins.property
|
220
219
|
def token_name(self) -> Optional[str]:
|
221
220
|
"""
|
222
221
|
Token name to use for creating the Vault child token.
|
223
222
|
"""
|
224
223
|
return __config__.get('tokenName')
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
def vault_version_override(self) -> Optional[str]:
|
228
227
|
"""
|
229
228
|
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
pulumi_vault/consul/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|