pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/github/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -53,32 +52,32 @@ class AuthBackendTune(dict):
|
|
53
52
|
return super().get(key, default)
|
54
53
|
|
55
54
|
def __init__(__self__, *,
|
56
|
-
allowed_response_headers: Optional[Sequence[
|
57
|
-
audit_non_hmac_request_keys: Optional[Sequence[
|
58
|
-
audit_non_hmac_response_keys: Optional[Sequence[
|
59
|
-
default_lease_ttl: Optional[
|
60
|
-
listing_visibility: Optional[
|
61
|
-
max_lease_ttl: Optional[
|
62
|
-
passthrough_request_headers: Optional[Sequence[
|
63
|
-
token_type: Optional[
|
64
|
-
"""
|
65
|
-
:param Sequence[
|
55
|
+
allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
|
56
|
+
audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
|
57
|
+
audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
|
58
|
+
default_lease_ttl: Optional[_builtins.str] = None,
|
59
|
+
listing_visibility: Optional[_builtins.str] = None,
|
60
|
+
max_lease_ttl: Optional[_builtins.str] = None,
|
61
|
+
passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
|
62
|
+
token_type: Optional[_builtins.str] = None):
|
63
|
+
"""
|
64
|
+
:param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
|
66
65
|
a plugin to include them in the response.
|
67
|
-
:param Sequence[
|
66
|
+
:param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
68
67
|
not be HMAC'd by audit devices in the request data object.
|
69
|
-
:param Sequence[
|
68
|
+
:param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
70
69
|
not be HMAC'd by audit devices in the response data object.
|
71
|
-
:param
|
70
|
+
:param _builtins.str default_lease_ttl: Specifies the default time-to-live.
|
72
71
|
If set, this overrides the global default.
|
73
72
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
74
|
-
:param
|
73
|
+
:param _builtins.str listing_visibility: Specifies whether to show this mount in
|
75
74
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
76
|
-
:param
|
75
|
+
:param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
|
77
76
|
If set, this overrides the global default.
|
78
77
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
79
|
-
:param Sequence[
|
78
|
+
:param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
|
80
79
|
pass from the request to the backend.
|
81
|
-
:param
|
80
|
+
:param _builtins.str token_type: Specifies the type of tokens that should be returned by
|
82
81
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
83
82
|
"""
|
84
83
|
if allowed_response_headers is not None:
|
@@ -98,36 +97,36 @@ class AuthBackendTune(dict):
|
|
98
97
|
if token_type is not None:
|
99
98
|
pulumi.set(__self__, "token_type", token_type)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="allowedResponseHeaders")
|
103
|
-
def allowed_response_headers(self) -> Optional[Sequence[
|
102
|
+
def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
|
104
103
|
"""
|
105
104
|
List of headers to whitelist and allowing
|
106
105
|
a plugin to include them in the response.
|
107
106
|
"""
|
108
107
|
return pulumi.get(self, "allowed_response_headers")
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
112
|
-
def audit_non_hmac_request_keys(self) -> Optional[Sequence[
|
111
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
|
113
112
|
"""
|
114
113
|
Specifies the list of keys that will
|
115
114
|
not be HMAC'd by audit devices in the request data object.
|
116
115
|
"""
|
117
116
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
121
|
-
def audit_non_hmac_response_keys(self) -> Optional[Sequence[
|
120
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
|
122
121
|
"""
|
123
122
|
Specifies the list of keys that will
|
124
123
|
not be HMAC'd by audit devices in the response data object.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter(name="defaultLeaseTtl")
|
130
|
-
def default_lease_ttl(self) -> Optional[
|
129
|
+
def default_lease_ttl(self) -> Optional[_builtins.str]:
|
131
130
|
"""
|
132
131
|
Specifies the default time-to-live.
|
133
132
|
If set, this overrides the global default.
|
@@ -135,18 +134,18 @@ class AuthBackendTune(dict):
|
|
135
134
|
"""
|
136
135
|
return pulumi.get(self, "default_lease_ttl")
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter(name="listingVisibility")
|
140
|
-
def listing_visibility(self) -> Optional[
|
139
|
+
def listing_visibility(self) -> Optional[_builtins.str]:
|
141
140
|
"""
|
142
141
|
Specifies whether to show this mount in
|
143
142
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
144
143
|
"""
|
145
144
|
return pulumi.get(self, "listing_visibility")
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter(name="maxLeaseTtl")
|
149
|
-
def max_lease_ttl(self) -> Optional[
|
148
|
+
def max_lease_ttl(self) -> Optional[_builtins.str]:
|
150
149
|
"""
|
151
150
|
Specifies the maximum time-to-live.
|
152
151
|
If set, this overrides the global default.
|
@@ -154,18 +153,18 @@ class AuthBackendTune(dict):
|
|
154
153
|
"""
|
155
154
|
return pulumi.get(self, "max_lease_ttl")
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter(name="passthroughRequestHeaders")
|
159
|
-
def passthrough_request_headers(self) -> Optional[Sequence[
|
158
|
+
def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
|
160
159
|
"""
|
161
160
|
List of headers to whitelist and
|
162
161
|
pass from the request to the backend.
|
163
162
|
"""
|
164
163
|
return pulumi.get(self, "passthrough_request_headers")
|
165
164
|
|
166
|
-
@property
|
165
|
+
@_builtins.property
|
167
166
|
@pulumi.getter(name="tokenType")
|
168
|
-
def token_type(self) -> Optional[
|
167
|
+
def token_type(self) -> Optional[_builtins.str]:
|
169
168
|
"""
|
170
169
|
Specifies the type of tokens that should be returned by
|
171
170
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
pulumi_vault/github/team.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['TeamArgs', 'Team']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class TeamArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
team: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
team: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a Team resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
|
29
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
31
30
|
if not specified.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
37
36
|
issued using this role.
|
38
37
|
"""
|
39
38
|
pulumi.set(__self__, "team", team)
|
@@ -44,21 +43,21 @@ class TeamArgs:
|
|
44
43
|
if policies is not None:
|
45
44
|
pulumi.set(__self__, "policies", policies)
|
46
45
|
|
47
|
-
@property
|
46
|
+
@_builtins.property
|
48
47
|
@pulumi.getter
|
49
|
-
def team(self) -> pulumi.Input[
|
48
|
+
def team(self) -> pulumi.Input[_builtins.str]:
|
50
49
|
"""
|
51
50
|
GitHub team name in "slugified" format.
|
52
51
|
"""
|
53
52
|
return pulumi.get(self, "team")
|
54
53
|
|
55
54
|
@team.setter
|
56
|
-
def team(self, value: pulumi.Input[
|
55
|
+
def team(self, value: pulumi.Input[_builtins.str]):
|
57
56
|
pulumi.set(self, "team", value)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter
|
61
|
-
def backend(self) -> Optional[pulumi.Input[
|
60
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
62
61
|
"""
|
63
62
|
Path where the github auth backend is mounted. Defaults to `github`
|
64
63
|
if not specified.
|
@@ -66,12 +65,12 @@ class TeamArgs:
|
|
66
65
|
return pulumi.get(self, "backend")
|
67
66
|
|
68
67
|
@backend.setter
|
69
|
-
def backend(self, value: Optional[pulumi.Input[
|
68
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
70
69
|
pulumi.set(self, "backend", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter
|
74
|
-
def namespace(self) -> Optional[pulumi.Input[
|
73
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
75
74
|
"""
|
76
75
|
The namespace to provision the resource in.
|
77
76
|
The value should not contain leading or trailing forward slashes.
|
@@ -81,12 +80,12 @@ class TeamArgs:
|
|
81
80
|
return pulumi.get(self, "namespace")
|
82
81
|
|
83
82
|
@namespace.setter
|
84
|
-
def namespace(self, value: Optional[pulumi.Input[
|
83
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
85
84
|
pulumi.set(self, "namespace", value)
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
88
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
90
89
|
"""
|
91
90
|
An array of strings specifying the policies to be set on tokens
|
92
91
|
issued using this role.
|
@@ -94,28 +93,28 @@ class TeamArgs:
|
|
94
93
|
return pulumi.get(self, "policies")
|
95
94
|
|
96
95
|
@policies.setter
|
97
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
96
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
98
97
|
pulumi.set(self, "policies", value)
|
99
98
|
|
100
99
|
|
101
100
|
@pulumi.input_type
|
102
101
|
class _TeamState:
|
103
102
|
def __init__(__self__, *,
|
104
|
-
backend: Optional[pulumi.Input[
|
105
|
-
namespace: Optional[pulumi.Input[
|
106
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
107
|
-
team: Optional[pulumi.Input[
|
103
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
104
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
105
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
106
|
+
team: Optional[pulumi.Input[_builtins.str]] = None):
|
108
107
|
"""
|
109
108
|
Input properties used for looking up and filtering Team resources.
|
110
|
-
:param pulumi.Input[
|
109
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
111
110
|
if not specified.
|
112
|
-
:param pulumi.Input[
|
111
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
113
112
|
The value should not contain leading or trailing forward slashes.
|
114
113
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
114
|
*Available only for Vault Enterprise*.
|
116
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
115
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
117
116
|
issued using this role.
|
118
|
-
:param pulumi.Input[
|
117
|
+
:param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
|
119
118
|
"""
|
120
119
|
if backend is not None:
|
121
120
|
pulumi.set(__self__, "backend", backend)
|
@@ -126,9 +125,9 @@ class _TeamState:
|
|
126
125
|
if team is not None:
|
127
126
|
pulumi.set(__self__, "team", team)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter
|
131
|
-
def backend(self) -> Optional[pulumi.Input[
|
130
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
Path where the github auth backend is mounted. Defaults to `github`
|
134
133
|
if not specified.
|
@@ -136,12 +135,12 @@ class _TeamState:
|
|
136
135
|
return pulumi.get(self, "backend")
|
137
136
|
|
138
137
|
@backend.setter
|
139
|
-
def backend(self, value: Optional[pulumi.Input[
|
138
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
140
139
|
pulumi.set(self, "backend", value)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter
|
144
|
-
def namespace(self) -> Optional[pulumi.Input[
|
143
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
145
144
|
"""
|
146
145
|
The namespace to provision the resource in.
|
147
146
|
The value should not contain leading or trailing forward slashes.
|
@@ -151,12 +150,12 @@ class _TeamState:
|
|
151
150
|
return pulumi.get(self, "namespace")
|
152
151
|
|
153
152
|
@namespace.setter
|
154
|
-
def namespace(self, value: Optional[pulumi.Input[
|
153
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "namespace", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter
|
159
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
158
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
160
159
|
"""
|
161
160
|
An array of strings specifying the policies to be set on tokens
|
162
161
|
issued using this role.
|
@@ -164,19 +163,19 @@ class _TeamState:
|
|
164
163
|
return pulumi.get(self, "policies")
|
165
164
|
|
166
165
|
@policies.setter
|
167
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
168
167
|
pulumi.set(self, "policies", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter
|
172
|
-
def team(self) -> Optional[pulumi.Input[
|
171
|
+
def team(self) -> Optional[pulumi.Input[_builtins.str]]:
|
173
172
|
"""
|
174
173
|
GitHub team name in "slugified" format.
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "team")
|
177
176
|
|
178
177
|
@team.setter
|
179
|
-
def team(self, value: Optional[pulumi.Input[
|
178
|
+
def team(self, value: Optional[pulumi.Input[_builtins.str]]):
|
180
179
|
pulumi.set(self, "team", value)
|
181
180
|
|
182
181
|
|
@@ -186,10 +185,10 @@ class Team(pulumi.CustomResource):
|
|
186
185
|
def __init__(__self__,
|
187
186
|
resource_name: str,
|
188
187
|
opts: Optional[pulumi.ResourceOptions] = None,
|
189
|
-
backend: Optional[pulumi.Input[
|
190
|
-
namespace: Optional[pulumi.Input[
|
191
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
192
|
-
team: Optional[pulumi.Input[
|
188
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
189
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
190
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
191
|
+
team: Optional[pulumi.Input[_builtins.str]] = None,
|
193
192
|
__props__=None):
|
194
193
|
"""
|
195
194
|
Manages policy mappings for Github Teams authenticated via Github. See the [Vault
|
@@ -222,15 +221,15 @@ class Team(pulumi.CustomResource):
|
|
222
221
|
|
223
222
|
:param str resource_name: The name of the resource.
|
224
223
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
225
|
-
:param pulumi.Input[
|
224
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
226
225
|
if not specified.
|
227
|
-
:param pulumi.Input[
|
226
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
228
227
|
The value should not contain leading or trailing forward slashes.
|
229
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
230
229
|
*Available only for Vault Enterprise*.
|
231
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
232
231
|
issued using this role.
|
233
|
-
:param pulumi.Input[
|
232
|
+
:param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
|
234
233
|
"""
|
235
234
|
...
|
236
235
|
@overload
|
@@ -282,10 +281,10 @@ class Team(pulumi.CustomResource):
|
|
282
281
|
def _internal_init(__self__,
|
283
282
|
resource_name: str,
|
284
283
|
opts: Optional[pulumi.ResourceOptions] = None,
|
285
|
-
backend: Optional[pulumi.Input[
|
286
|
-
namespace: Optional[pulumi.Input[
|
287
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
288
|
-
team: Optional[pulumi.Input[
|
284
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
285
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
286
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
287
|
+
team: Optional[pulumi.Input[_builtins.str]] = None,
|
289
288
|
__props__=None):
|
290
289
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
291
290
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -311,10 +310,10 @@ class Team(pulumi.CustomResource):
|
|
311
310
|
def get(resource_name: str,
|
312
311
|
id: pulumi.Input[str],
|
313
312
|
opts: Optional[pulumi.ResourceOptions] = None,
|
314
|
-
backend: Optional[pulumi.Input[
|
315
|
-
namespace: Optional[pulumi.Input[
|
316
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
317
|
-
team: Optional[pulumi.Input[
|
313
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
314
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
315
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
316
|
+
team: Optional[pulumi.Input[_builtins.str]] = None) -> 'Team':
|
318
317
|
"""
|
319
318
|
Get an existing Team resource's state with the given name, id, and optional extra
|
320
319
|
properties used to qualify the lookup.
|
@@ -322,15 +321,15 @@ class Team(pulumi.CustomResource):
|
|
322
321
|
:param str resource_name: The unique name of the resulting resource.
|
323
322
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
324
323
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
325
|
-
:param pulumi.Input[
|
324
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
326
325
|
if not specified.
|
327
|
-
:param pulumi.Input[
|
326
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
328
327
|
The value should not contain leading or trailing forward slashes.
|
329
328
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
330
329
|
*Available only for Vault Enterprise*.
|
331
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
330
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
|
332
331
|
issued using this role.
|
333
|
-
:param pulumi.Input[
|
332
|
+
:param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
|
334
333
|
"""
|
335
334
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
336
335
|
|
@@ -342,18 +341,18 @@ class Team(pulumi.CustomResource):
|
|
342
341
|
__props__.__dict__["team"] = team
|
343
342
|
return Team(resource_name, opts=opts, __props__=__props__)
|
344
343
|
|
345
|
-
@property
|
344
|
+
@_builtins.property
|
346
345
|
@pulumi.getter
|
347
|
-
def backend(self) -> pulumi.Output[Optional[
|
346
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
348
347
|
"""
|
349
348
|
Path where the github auth backend is mounted. Defaults to `github`
|
350
349
|
if not specified.
|
351
350
|
"""
|
352
351
|
return pulumi.get(self, "backend")
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter
|
356
|
-
def namespace(self) -> pulumi.Output[Optional[
|
355
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
357
356
|
"""
|
358
357
|
The namespace to provision the resource in.
|
359
358
|
The value should not contain leading or trailing forward slashes.
|
@@ -362,18 +361,18 @@ class Team(pulumi.CustomResource):
|
|
362
361
|
"""
|
363
362
|
return pulumi.get(self, "namespace")
|
364
363
|
|
365
|
-
@property
|
364
|
+
@_builtins.property
|
366
365
|
@pulumi.getter
|
367
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
366
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
368
367
|
"""
|
369
368
|
An array of strings specifying the policies to be set on tokens
|
370
369
|
issued using this role.
|
371
370
|
"""
|
372
371
|
return pulumi.get(self, "policies")
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter
|
376
|
-
def team(self) -> pulumi.Output[
|
375
|
+
def team(self) -> pulumi.Output[_builtins.str]:
|
377
376
|
"""
|
378
377
|
GitHub team name in "slugified" format.
|
379
378
|
"""
|