pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,169 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetAuthBackendRoleIdResult',
|
|
19
|
+
'AwaitableGetAuthBackendRoleIdResult',
|
|
20
|
+
'get_auth_backend_role_id',
|
|
21
|
+
'get_auth_backend_role_id_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetAuthBackendRoleIdResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getAuthBackendRoleId.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, id=None, namespace=None, role_id=None, role_name=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if id and not isinstance(id, str):
|
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
35
|
+
pulumi.set(__self__, "id", id)
|
|
36
|
+
if namespace and not isinstance(namespace, str):
|
|
37
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
38
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
39
|
+
if role_id and not isinstance(role_id, str):
|
|
40
|
+
raise TypeError("Expected argument 'role_id' to be a str")
|
|
41
|
+
pulumi.set(__self__, "role_id", role_id)
|
|
42
|
+
if role_name and not isinstance(role_name, str):
|
|
43
|
+
raise TypeError("Expected argument 'role_name' to be a str")
|
|
44
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
45
|
+
|
|
46
|
+
@_builtins.property
|
|
47
|
+
@pulumi.getter
|
|
48
|
+
def backend(self) -> Optional[_builtins.str]:
|
|
49
|
+
return pulumi.get(self, "backend")
|
|
50
|
+
|
|
51
|
+
@_builtins.property
|
|
52
|
+
@pulumi.getter
|
|
53
|
+
def id(self) -> _builtins.str:
|
|
54
|
+
"""
|
|
55
|
+
The provider-assigned unique ID for this managed resource.
|
|
56
|
+
"""
|
|
57
|
+
return pulumi.get(self, "id")
|
|
58
|
+
|
|
59
|
+
@_builtins.property
|
|
60
|
+
@pulumi.getter
|
|
61
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
62
|
+
return pulumi.get(self, "namespace")
|
|
63
|
+
|
|
64
|
+
@_builtins.property
|
|
65
|
+
@pulumi.getter(name="roleId")
|
|
66
|
+
def role_id(self) -> _builtins.str:
|
|
67
|
+
"""
|
|
68
|
+
The RoleID of the role.
|
|
69
|
+
"""
|
|
70
|
+
return pulumi.get(self, "role_id")
|
|
71
|
+
|
|
72
|
+
@_builtins.property
|
|
73
|
+
@pulumi.getter(name="roleName")
|
|
74
|
+
def role_name(self) -> _builtins.str:
|
|
75
|
+
return pulumi.get(self, "role_name")
|
|
76
|
+
|
|
77
|
+
|
|
78
|
+
class AwaitableGetAuthBackendRoleIdResult(GetAuthBackendRoleIdResult):
|
|
79
|
+
# pylint: disable=using-constant-test
|
|
80
|
+
def __await__(self):
|
|
81
|
+
if False:
|
|
82
|
+
yield self
|
|
83
|
+
return GetAuthBackendRoleIdResult(
|
|
84
|
+
backend=self.backend,
|
|
85
|
+
id=self.id,
|
|
86
|
+
namespace=self.namespace,
|
|
87
|
+
role_id=self.role_id,
|
|
88
|
+
role_name=self.role_name)
|
|
89
|
+
|
|
90
|
+
|
|
91
|
+
def get_auth_backend_role_id(backend: Optional[_builtins.str] = None,
|
|
92
|
+
namespace: Optional[_builtins.str] = None,
|
|
93
|
+
role_name: Optional[_builtins.str] = None,
|
|
94
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleIdResult:
|
|
95
|
+
"""
|
|
96
|
+
Reads the Role ID of an AppRole from a Vault server.
|
|
97
|
+
|
|
98
|
+
## Example Usage
|
|
99
|
+
|
|
100
|
+
```python
|
|
101
|
+
import pulumi
|
|
102
|
+
import pulumi_vault as vault
|
|
103
|
+
|
|
104
|
+
role = vault.appRole.get_auth_backend_role_id(backend="my-approle-backend",
|
|
105
|
+
role_name="my-role")
|
|
106
|
+
pulumi.export("role-id", role.role_id)
|
|
107
|
+
```
|
|
108
|
+
|
|
109
|
+
|
|
110
|
+
:param _builtins.str backend: The unique name for the AppRole backend the role to
|
|
111
|
+
retrieve a RoleID for resides in. Defaults to "approle".
|
|
112
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
113
|
+
The value should not contain leading or trailing forward slashes.
|
|
114
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
115
|
+
*Available only for Vault Enterprise*.
|
|
116
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
|
117
|
+
"""
|
|
118
|
+
__args__ = dict()
|
|
119
|
+
__args__['backend'] = backend
|
|
120
|
+
__args__['namespace'] = namespace
|
|
121
|
+
__args__['roleName'] = role_name
|
|
122
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
123
|
+
__ret__ = pulumi.runtime.invoke('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult).value
|
|
124
|
+
|
|
125
|
+
return AwaitableGetAuthBackendRoleIdResult(
|
|
126
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
127
|
+
id=pulumi.get(__ret__, 'id'),
|
|
128
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
129
|
+
role_id=pulumi.get(__ret__, 'role_id'),
|
|
130
|
+
role_name=pulumi.get(__ret__, 'role_name'))
|
|
131
|
+
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
132
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
133
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
134
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
|
135
|
+
"""
|
|
136
|
+
Reads the Role ID of an AppRole from a Vault server.
|
|
137
|
+
|
|
138
|
+
## Example Usage
|
|
139
|
+
|
|
140
|
+
```python
|
|
141
|
+
import pulumi
|
|
142
|
+
import pulumi_vault as vault
|
|
143
|
+
|
|
144
|
+
role = vault.appRole.get_auth_backend_role_id(backend="my-approle-backend",
|
|
145
|
+
role_name="my-role")
|
|
146
|
+
pulumi.export("role-id", role.role_id)
|
|
147
|
+
```
|
|
148
|
+
|
|
149
|
+
|
|
150
|
+
:param _builtins.str backend: The unique name for the AppRole backend the role to
|
|
151
|
+
retrieve a RoleID for resides in. Defaults to "approle".
|
|
152
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
153
|
+
The value should not contain leading or trailing forward slashes.
|
|
154
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
155
|
+
*Available only for Vault Enterprise*.
|
|
156
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
|
157
|
+
"""
|
|
158
|
+
__args__ = dict()
|
|
159
|
+
__args__['backend'] = backend
|
|
160
|
+
__args__['namespace'] = namespace
|
|
161
|
+
__args__['roleName'] = role_name
|
|
162
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
163
|
+
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
|
164
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
|
165
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
166
|
+
id=pulumi.get(__response__, 'id'),
|
|
167
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
168
|
+
role_id=pulumi.get(__response__, 'role_id'),
|
|
169
|
+
role_name=pulumi.get(__response__, 'role_name')))
|
pulumi_vault/audit.py
ADDED
|
@@ -0,0 +1,499 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from . import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['AuditArgs', 'Audit']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class AuditArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
options: pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]],
|
|
23
|
+
type: pulumi.Input[_builtins.str],
|
|
24
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
path: Optional[pulumi.Input[_builtins.str]] = None):
|
|
28
|
+
"""
|
|
29
|
+
The set of arguments for constructing a Audit resource.
|
|
30
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
|
|
31
|
+
|
|
32
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
33
|
+
:param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
|
|
34
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
|
|
35
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
36
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
37
|
+
The value should not contain leading or trailing forward slashes.
|
|
38
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
39
|
+
*Available only for Vault Enterprise*.
|
|
40
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
|
|
41
|
+
"""
|
|
42
|
+
pulumi.set(__self__, "options", options)
|
|
43
|
+
pulumi.set(__self__, "type", type)
|
|
44
|
+
if description is not None:
|
|
45
|
+
pulumi.set(__self__, "description", description)
|
|
46
|
+
if local is not None:
|
|
47
|
+
pulumi.set(__self__, "local", local)
|
|
48
|
+
if namespace is not None:
|
|
49
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
50
|
+
if path is not None:
|
|
51
|
+
pulumi.set(__self__, "path", path)
|
|
52
|
+
|
|
53
|
+
@_builtins.property
|
|
54
|
+
@pulumi.getter
|
|
55
|
+
def options(self) -> pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]:
|
|
56
|
+
"""
|
|
57
|
+
Configuration options to pass to the audit device itself.
|
|
58
|
+
|
|
59
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
60
|
+
"""
|
|
61
|
+
return pulumi.get(self, "options")
|
|
62
|
+
|
|
63
|
+
@options.setter
|
|
64
|
+
def options(self, value: pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]):
|
|
65
|
+
pulumi.set(self, "options", value)
|
|
66
|
+
|
|
67
|
+
@_builtins.property
|
|
68
|
+
@pulumi.getter
|
|
69
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
|
70
|
+
"""
|
|
71
|
+
Type of the audit device, such as 'file'.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "type")
|
|
74
|
+
|
|
75
|
+
@type.setter
|
|
76
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
|
77
|
+
pulumi.set(self, "type", value)
|
|
78
|
+
|
|
79
|
+
@_builtins.property
|
|
80
|
+
@pulumi.getter
|
|
81
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
82
|
+
"""
|
|
83
|
+
Human-friendly description of the audit device.
|
|
84
|
+
"""
|
|
85
|
+
return pulumi.get(self, "description")
|
|
86
|
+
|
|
87
|
+
@description.setter
|
|
88
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
89
|
+
pulumi.set(self, "description", value)
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter
|
|
93
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
94
|
+
"""
|
|
95
|
+
Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
96
|
+
"""
|
|
97
|
+
return pulumi.get(self, "local")
|
|
98
|
+
|
|
99
|
+
@local.setter
|
|
100
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
101
|
+
pulumi.set(self, "local", value)
|
|
102
|
+
|
|
103
|
+
@_builtins.property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
106
|
+
"""
|
|
107
|
+
The namespace to provision the resource in.
|
|
108
|
+
The value should not contain leading or trailing forward slashes.
|
|
109
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
110
|
+
*Available only for Vault Enterprise*.
|
|
111
|
+
"""
|
|
112
|
+
return pulumi.get(self, "namespace")
|
|
113
|
+
|
|
114
|
+
@namespace.setter
|
|
115
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
116
|
+
pulumi.set(self, "namespace", value)
|
|
117
|
+
|
|
118
|
+
@_builtins.property
|
|
119
|
+
@pulumi.getter
|
|
120
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
121
|
+
"""
|
|
122
|
+
The path to mount the audit device. This defaults to the type.
|
|
123
|
+
"""
|
|
124
|
+
return pulumi.get(self, "path")
|
|
125
|
+
|
|
126
|
+
@path.setter
|
|
127
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
128
|
+
pulumi.set(self, "path", value)
|
|
129
|
+
|
|
130
|
+
|
|
131
|
+
@pulumi.input_type
|
|
132
|
+
class _AuditState:
|
|
133
|
+
def __init__(__self__, *,
|
|
134
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
135
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
136
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
137
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
138
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
139
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
140
|
+
"""
|
|
141
|
+
Input properties used for looking up and filtering Audit resources.
|
|
142
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
|
|
143
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
144
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
145
|
+
The value should not contain leading or trailing forward slashes.
|
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
147
|
+
*Available only for Vault Enterprise*.
|
|
148
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
|
|
149
|
+
|
|
150
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
151
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
|
|
152
|
+
:param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
|
|
153
|
+
"""
|
|
154
|
+
if description is not None:
|
|
155
|
+
pulumi.set(__self__, "description", description)
|
|
156
|
+
if local is not None:
|
|
157
|
+
pulumi.set(__self__, "local", local)
|
|
158
|
+
if namespace is not None:
|
|
159
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
160
|
+
if options is not None:
|
|
161
|
+
pulumi.set(__self__, "options", options)
|
|
162
|
+
if path is not None:
|
|
163
|
+
pulumi.set(__self__, "path", path)
|
|
164
|
+
if type is not None:
|
|
165
|
+
pulumi.set(__self__, "type", type)
|
|
166
|
+
|
|
167
|
+
@_builtins.property
|
|
168
|
+
@pulumi.getter
|
|
169
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
170
|
+
"""
|
|
171
|
+
Human-friendly description of the audit device.
|
|
172
|
+
"""
|
|
173
|
+
return pulumi.get(self, "description")
|
|
174
|
+
|
|
175
|
+
@description.setter
|
|
176
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
177
|
+
pulumi.set(self, "description", value)
|
|
178
|
+
|
|
179
|
+
@_builtins.property
|
|
180
|
+
@pulumi.getter
|
|
181
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
182
|
+
"""
|
|
183
|
+
Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
184
|
+
"""
|
|
185
|
+
return pulumi.get(self, "local")
|
|
186
|
+
|
|
187
|
+
@local.setter
|
|
188
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
189
|
+
pulumi.set(self, "local", value)
|
|
190
|
+
|
|
191
|
+
@_builtins.property
|
|
192
|
+
@pulumi.getter
|
|
193
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
194
|
+
"""
|
|
195
|
+
The namespace to provision the resource in.
|
|
196
|
+
The value should not contain leading or trailing forward slashes.
|
|
197
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
198
|
+
*Available only for Vault Enterprise*.
|
|
199
|
+
"""
|
|
200
|
+
return pulumi.get(self, "namespace")
|
|
201
|
+
|
|
202
|
+
@namespace.setter
|
|
203
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
204
|
+
pulumi.set(self, "namespace", value)
|
|
205
|
+
|
|
206
|
+
@_builtins.property
|
|
207
|
+
@pulumi.getter
|
|
208
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
209
|
+
"""
|
|
210
|
+
Configuration options to pass to the audit device itself.
|
|
211
|
+
|
|
212
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
213
|
+
"""
|
|
214
|
+
return pulumi.get(self, "options")
|
|
215
|
+
|
|
216
|
+
@options.setter
|
|
217
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
218
|
+
pulumi.set(self, "options", value)
|
|
219
|
+
|
|
220
|
+
@_builtins.property
|
|
221
|
+
@pulumi.getter
|
|
222
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
223
|
+
"""
|
|
224
|
+
The path to mount the audit device. This defaults to the type.
|
|
225
|
+
"""
|
|
226
|
+
return pulumi.get(self, "path")
|
|
227
|
+
|
|
228
|
+
@path.setter
|
|
229
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
230
|
+
pulumi.set(self, "path", value)
|
|
231
|
+
|
|
232
|
+
@_builtins.property
|
|
233
|
+
@pulumi.getter
|
|
234
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
235
|
+
"""
|
|
236
|
+
Type of the audit device, such as 'file'.
|
|
237
|
+
"""
|
|
238
|
+
return pulumi.get(self, "type")
|
|
239
|
+
|
|
240
|
+
@type.setter
|
|
241
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
242
|
+
pulumi.set(self, "type", value)
|
|
243
|
+
|
|
244
|
+
|
|
245
|
+
@pulumi.type_token("vault:index/audit:Audit")
|
|
246
|
+
class Audit(pulumi.CustomResource):
|
|
247
|
+
@overload
|
|
248
|
+
def __init__(__self__,
|
|
249
|
+
resource_name: str,
|
|
250
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
251
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
252
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
253
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
254
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
255
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
256
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
257
|
+
__props__=None):
|
|
258
|
+
"""
|
|
259
|
+
## Example Usage
|
|
260
|
+
|
|
261
|
+
### File Audit Device)
|
|
262
|
+
|
|
263
|
+
```python
|
|
264
|
+
import pulumi
|
|
265
|
+
import pulumi_vault as vault
|
|
266
|
+
|
|
267
|
+
test = vault.Audit("test",
|
|
268
|
+
type="file",
|
|
269
|
+
options={
|
|
270
|
+
"file_path": "C:/temp/audit.txt",
|
|
271
|
+
})
|
|
272
|
+
```
|
|
273
|
+
|
|
274
|
+
### Socket Audit Device)
|
|
275
|
+
|
|
276
|
+
```python
|
|
277
|
+
import pulumi
|
|
278
|
+
import pulumi_vault as vault
|
|
279
|
+
|
|
280
|
+
test = vault.Audit("test",
|
|
281
|
+
type="socket",
|
|
282
|
+
path="app_socket",
|
|
283
|
+
local=False,
|
|
284
|
+
options={
|
|
285
|
+
"address": "127.0.0.1:8000",
|
|
286
|
+
"socket_type": "tcp",
|
|
287
|
+
"description": "application x socket",
|
|
288
|
+
})
|
|
289
|
+
```
|
|
290
|
+
|
|
291
|
+
## Import
|
|
292
|
+
|
|
293
|
+
Audit devices can be imported using the `path`, e.g.
|
|
294
|
+
|
|
295
|
+
```sh
|
|
296
|
+
$ pulumi import vault:index/audit:Audit test syslog
|
|
297
|
+
```
|
|
298
|
+
|
|
299
|
+
:param str resource_name: The name of the resource.
|
|
300
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
301
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
|
|
302
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
303
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
304
|
+
The value should not contain leading or trailing forward slashes.
|
|
305
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
306
|
+
*Available only for Vault Enterprise*.
|
|
307
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
|
|
308
|
+
|
|
309
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
310
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
|
|
311
|
+
:param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
|
|
312
|
+
"""
|
|
313
|
+
...
|
|
314
|
+
@overload
|
|
315
|
+
def __init__(__self__,
|
|
316
|
+
resource_name: str,
|
|
317
|
+
args: AuditArgs,
|
|
318
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
319
|
+
"""
|
|
320
|
+
## Example Usage
|
|
321
|
+
|
|
322
|
+
### File Audit Device)
|
|
323
|
+
|
|
324
|
+
```python
|
|
325
|
+
import pulumi
|
|
326
|
+
import pulumi_vault as vault
|
|
327
|
+
|
|
328
|
+
test = vault.Audit("test",
|
|
329
|
+
type="file",
|
|
330
|
+
options={
|
|
331
|
+
"file_path": "C:/temp/audit.txt",
|
|
332
|
+
})
|
|
333
|
+
```
|
|
334
|
+
|
|
335
|
+
### Socket Audit Device)
|
|
336
|
+
|
|
337
|
+
```python
|
|
338
|
+
import pulumi
|
|
339
|
+
import pulumi_vault as vault
|
|
340
|
+
|
|
341
|
+
test = vault.Audit("test",
|
|
342
|
+
type="socket",
|
|
343
|
+
path="app_socket",
|
|
344
|
+
local=False,
|
|
345
|
+
options={
|
|
346
|
+
"address": "127.0.0.1:8000",
|
|
347
|
+
"socket_type": "tcp",
|
|
348
|
+
"description": "application x socket",
|
|
349
|
+
})
|
|
350
|
+
```
|
|
351
|
+
|
|
352
|
+
## Import
|
|
353
|
+
|
|
354
|
+
Audit devices can be imported using the `path`, e.g.
|
|
355
|
+
|
|
356
|
+
```sh
|
|
357
|
+
$ pulumi import vault:index/audit:Audit test syslog
|
|
358
|
+
```
|
|
359
|
+
|
|
360
|
+
:param str resource_name: The name of the resource.
|
|
361
|
+
:param AuditArgs args: The arguments to use to populate this resource's properties.
|
|
362
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
363
|
+
"""
|
|
364
|
+
...
|
|
365
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
366
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuditArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
367
|
+
if resource_args is not None:
|
|
368
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
369
|
+
else:
|
|
370
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
371
|
+
|
|
372
|
+
def _internal_init(__self__,
|
|
373
|
+
resource_name: str,
|
|
374
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
375
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
376
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
377
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
378
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
379
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
380
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
381
|
+
__props__=None):
|
|
382
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
383
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
384
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
385
|
+
if opts.id is None:
|
|
386
|
+
if __props__ is not None:
|
|
387
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
388
|
+
__props__ = AuditArgs.__new__(AuditArgs)
|
|
389
|
+
|
|
390
|
+
__props__.__dict__["description"] = description
|
|
391
|
+
__props__.__dict__["local"] = local
|
|
392
|
+
__props__.__dict__["namespace"] = namespace
|
|
393
|
+
if options is None and not opts.urn:
|
|
394
|
+
raise TypeError("Missing required property 'options'")
|
|
395
|
+
__props__.__dict__["options"] = options
|
|
396
|
+
__props__.__dict__["path"] = path
|
|
397
|
+
if type is None and not opts.urn:
|
|
398
|
+
raise TypeError("Missing required property 'type'")
|
|
399
|
+
__props__.__dict__["type"] = type
|
|
400
|
+
super(Audit, __self__).__init__(
|
|
401
|
+
'vault:index/audit:Audit',
|
|
402
|
+
resource_name,
|
|
403
|
+
__props__,
|
|
404
|
+
opts)
|
|
405
|
+
|
|
406
|
+
@staticmethod
|
|
407
|
+
def get(resource_name: str,
|
|
408
|
+
id: pulumi.Input[str],
|
|
409
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
410
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
411
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
412
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
413
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
414
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
415
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Audit':
|
|
416
|
+
"""
|
|
417
|
+
Get an existing Audit resource's state with the given name, id, and optional extra
|
|
418
|
+
properties used to qualify the lookup.
|
|
419
|
+
|
|
420
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
421
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
422
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
423
|
+
:param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
|
|
424
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
425
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
426
|
+
The value should not contain leading or trailing forward slashes.
|
|
427
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
428
|
+
*Available only for Vault Enterprise*.
|
|
429
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
|
|
430
|
+
|
|
431
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
432
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
|
|
433
|
+
:param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
|
|
434
|
+
"""
|
|
435
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
436
|
+
|
|
437
|
+
__props__ = _AuditState.__new__(_AuditState)
|
|
438
|
+
|
|
439
|
+
__props__.__dict__["description"] = description
|
|
440
|
+
__props__.__dict__["local"] = local
|
|
441
|
+
__props__.__dict__["namespace"] = namespace
|
|
442
|
+
__props__.__dict__["options"] = options
|
|
443
|
+
__props__.__dict__["path"] = path
|
|
444
|
+
__props__.__dict__["type"] = type
|
|
445
|
+
return Audit(resource_name, opts=opts, __props__=__props__)
|
|
446
|
+
|
|
447
|
+
@_builtins.property
|
|
448
|
+
@pulumi.getter
|
|
449
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
450
|
+
"""
|
|
451
|
+
Human-friendly description of the audit device.
|
|
452
|
+
"""
|
|
453
|
+
return pulumi.get(self, "description")
|
|
454
|
+
|
|
455
|
+
@_builtins.property
|
|
456
|
+
@pulumi.getter
|
|
457
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
458
|
+
"""
|
|
459
|
+
Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
|
|
460
|
+
"""
|
|
461
|
+
return pulumi.get(self, "local")
|
|
462
|
+
|
|
463
|
+
@_builtins.property
|
|
464
|
+
@pulumi.getter
|
|
465
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
466
|
+
"""
|
|
467
|
+
The namespace to provision the resource in.
|
|
468
|
+
The value should not contain leading or trailing forward slashes.
|
|
469
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
470
|
+
*Available only for Vault Enterprise*.
|
|
471
|
+
"""
|
|
472
|
+
return pulumi.get(self, "namespace")
|
|
473
|
+
|
|
474
|
+
@_builtins.property
|
|
475
|
+
@pulumi.getter
|
|
476
|
+
def options(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
|
477
|
+
"""
|
|
478
|
+
Configuration options to pass to the audit device itself.
|
|
479
|
+
|
|
480
|
+
For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
|
|
481
|
+
"""
|
|
482
|
+
return pulumi.get(self, "options")
|
|
483
|
+
|
|
484
|
+
@_builtins.property
|
|
485
|
+
@pulumi.getter
|
|
486
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
|
487
|
+
"""
|
|
488
|
+
The path to mount the audit device. This defaults to the type.
|
|
489
|
+
"""
|
|
490
|
+
return pulumi.get(self, "path")
|
|
491
|
+
|
|
492
|
+
@_builtins.property
|
|
493
|
+
@pulumi.getter
|
|
494
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
|
495
|
+
"""
|
|
496
|
+
Type of the audit device, such as 'file'.
|
|
497
|
+
"""
|
|
498
|
+
return pulumi.get(self, "type")
|
|
499
|
+
|