pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,169 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetAuthBackendRoleIdResult',
19
+ 'AwaitableGetAuthBackendRoleIdResult',
20
+ 'get_auth_backend_role_id',
21
+ 'get_auth_backend_role_id_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetAuthBackendRoleIdResult:
26
+ """
27
+ A collection of values returned by getAuthBackendRoleId.
28
+ """
29
+ def __init__(__self__, backend=None, id=None, namespace=None, role_id=None, role_name=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if namespace and not isinstance(namespace, str):
37
+ raise TypeError("Expected argument 'namespace' to be a str")
38
+ pulumi.set(__self__, "namespace", namespace)
39
+ if role_id and not isinstance(role_id, str):
40
+ raise TypeError("Expected argument 'role_id' to be a str")
41
+ pulumi.set(__self__, "role_id", role_id)
42
+ if role_name and not isinstance(role_name, str):
43
+ raise TypeError("Expected argument 'role_name' to be a str")
44
+ pulumi.set(__self__, "role_name", role_name)
45
+
46
+ @_builtins.property
47
+ @pulumi.getter
48
+ def backend(self) -> Optional[_builtins.str]:
49
+ return pulumi.get(self, "backend")
50
+
51
+ @_builtins.property
52
+ @pulumi.getter
53
+ def id(self) -> _builtins.str:
54
+ """
55
+ The provider-assigned unique ID for this managed resource.
56
+ """
57
+ return pulumi.get(self, "id")
58
+
59
+ @_builtins.property
60
+ @pulumi.getter
61
+ def namespace(self) -> Optional[_builtins.str]:
62
+ return pulumi.get(self, "namespace")
63
+
64
+ @_builtins.property
65
+ @pulumi.getter(name="roleId")
66
+ def role_id(self) -> _builtins.str:
67
+ """
68
+ The RoleID of the role.
69
+ """
70
+ return pulumi.get(self, "role_id")
71
+
72
+ @_builtins.property
73
+ @pulumi.getter(name="roleName")
74
+ def role_name(self) -> _builtins.str:
75
+ return pulumi.get(self, "role_name")
76
+
77
+
78
+ class AwaitableGetAuthBackendRoleIdResult(GetAuthBackendRoleIdResult):
79
+ # pylint: disable=using-constant-test
80
+ def __await__(self):
81
+ if False:
82
+ yield self
83
+ return GetAuthBackendRoleIdResult(
84
+ backend=self.backend,
85
+ id=self.id,
86
+ namespace=self.namespace,
87
+ role_id=self.role_id,
88
+ role_name=self.role_name)
89
+
90
+
91
+ def get_auth_backend_role_id(backend: Optional[_builtins.str] = None,
92
+ namespace: Optional[_builtins.str] = None,
93
+ role_name: Optional[_builtins.str] = None,
94
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleIdResult:
95
+ """
96
+ Reads the Role ID of an AppRole from a Vault server.
97
+
98
+ ## Example Usage
99
+
100
+ ```python
101
+ import pulumi
102
+ import pulumi_vault as vault
103
+
104
+ role = vault.appRole.get_auth_backend_role_id(backend="my-approle-backend",
105
+ role_name="my-role")
106
+ pulumi.export("role-id", role.role_id)
107
+ ```
108
+
109
+
110
+ :param _builtins.str backend: The unique name for the AppRole backend the role to
111
+ retrieve a RoleID for resides in. Defaults to "approle".
112
+ :param _builtins.str namespace: The namespace of the target resource.
113
+ The value should not contain leading or trailing forward slashes.
114
+ The `namespace` is always relative to the provider's configured namespace.
115
+ *Available only for Vault Enterprise*.
116
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
117
+ """
118
+ __args__ = dict()
119
+ __args__['backend'] = backend
120
+ __args__['namespace'] = namespace
121
+ __args__['roleName'] = role_name
122
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
123
+ __ret__ = pulumi.runtime.invoke('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult).value
124
+
125
+ return AwaitableGetAuthBackendRoleIdResult(
126
+ backend=pulumi.get(__ret__, 'backend'),
127
+ id=pulumi.get(__ret__, 'id'),
128
+ namespace=pulumi.get(__ret__, 'namespace'),
129
+ role_id=pulumi.get(__ret__, 'role_id'),
130
+ role_name=pulumi.get(__ret__, 'role_name'))
131
+ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
132
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
133
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
134
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
135
+ """
136
+ Reads the Role ID of an AppRole from a Vault server.
137
+
138
+ ## Example Usage
139
+
140
+ ```python
141
+ import pulumi
142
+ import pulumi_vault as vault
143
+
144
+ role = vault.appRole.get_auth_backend_role_id(backend="my-approle-backend",
145
+ role_name="my-role")
146
+ pulumi.export("role-id", role.role_id)
147
+ ```
148
+
149
+
150
+ :param _builtins.str backend: The unique name for the AppRole backend the role to
151
+ retrieve a RoleID for resides in. Defaults to "approle".
152
+ :param _builtins.str namespace: The namespace of the target resource.
153
+ The value should not contain leading or trailing forward slashes.
154
+ The `namespace` is always relative to the provider's configured namespace.
155
+ *Available only for Vault Enterprise*.
156
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
157
+ """
158
+ __args__ = dict()
159
+ __args__['backend'] = backend
160
+ __args__['namespace'] = namespace
161
+ __args__['roleName'] = role_name
162
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
+ __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
+ backend=pulumi.get(__response__, 'backend'),
166
+ id=pulumi.get(__response__, 'id'),
167
+ namespace=pulumi.get(__response__, 'namespace'),
168
+ role_id=pulumi.get(__response__, 'role_id'),
169
+ role_name=pulumi.get(__response__, 'role_name')))
pulumi_vault/audit.py ADDED
@@ -0,0 +1,499 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['AuditArgs', 'Audit']
18
+
19
+ @pulumi.input_type
20
+ class AuditArgs:
21
+ def __init__(__self__, *,
22
+ options: pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]],
23
+ type: pulumi.Input[_builtins.str],
24
+ description: Optional[pulumi.Input[_builtins.str]] = None,
25
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ path: Optional[pulumi.Input[_builtins.str]] = None):
28
+ """
29
+ The set of arguments for constructing a Audit resource.
30
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
31
+
32
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
33
+ :param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
34
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
35
+ :param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
36
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
+ The value should not contain leading or trailing forward slashes.
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
+ *Available only for Vault Enterprise*.
40
+ :param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
41
+ """
42
+ pulumi.set(__self__, "options", options)
43
+ pulumi.set(__self__, "type", type)
44
+ if description is not None:
45
+ pulumi.set(__self__, "description", description)
46
+ if local is not None:
47
+ pulumi.set(__self__, "local", local)
48
+ if namespace is not None:
49
+ pulumi.set(__self__, "namespace", namespace)
50
+ if path is not None:
51
+ pulumi.set(__self__, "path", path)
52
+
53
+ @_builtins.property
54
+ @pulumi.getter
55
+ def options(self) -> pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]:
56
+ """
57
+ Configuration options to pass to the audit device itself.
58
+
59
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
60
+ """
61
+ return pulumi.get(self, "options")
62
+
63
+ @options.setter
64
+ def options(self, value: pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]):
65
+ pulumi.set(self, "options", value)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter
69
+ def type(self) -> pulumi.Input[_builtins.str]:
70
+ """
71
+ Type of the audit device, such as 'file'.
72
+ """
73
+ return pulumi.get(self, "type")
74
+
75
+ @type.setter
76
+ def type(self, value: pulumi.Input[_builtins.str]):
77
+ pulumi.set(self, "type", value)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter
81
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
82
+ """
83
+ Human-friendly description of the audit device.
84
+ """
85
+ return pulumi.get(self, "description")
86
+
87
+ @description.setter
88
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
89
+ pulumi.set(self, "description", value)
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
94
+ """
95
+ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
96
+ """
97
+ return pulumi.get(self, "local")
98
+
99
+ @local.setter
100
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
101
+ pulumi.set(self, "local", value)
102
+
103
+ @_builtins.property
104
+ @pulumi.getter
105
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
106
+ """
107
+ The namespace to provision the resource in.
108
+ The value should not contain leading or trailing forward slashes.
109
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
+ *Available only for Vault Enterprise*.
111
+ """
112
+ return pulumi.get(self, "namespace")
113
+
114
+ @namespace.setter
115
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
116
+ pulumi.set(self, "namespace", value)
117
+
118
+ @_builtins.property
119
+ @pulumi.getter
120
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
121
+ """
122
+ The path to mount the audit device. This defaults to the type.
123
+ """
124
+ return pulumi.get(self, "path")
125
+
126
+ @path.setter
127
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
128
+ pulumi.set(self, "path", value)
129
+
130
+
131
+ @pulumi.input_type
132
+ class _AuditState:
133
+ def __init__(__self__, *,
134
+ description: Optional[pulumi.Input[_builtins.str]] = None,
135
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
136
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
137
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
138
+ path: Optional[pulumi.Input[_builtins.str]] = None,
139
+ type: Optional[pulumi.Input[_builtins.str]] = None):
140
+ """
141
+ Input properties used for looking up and filtering Audit resources.
142
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
143
+ :param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
144
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
145
+ The value should not contain leading or trailing forward slashes.
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
+ *Available only for Vault Enterprise*.
148
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
149
+
150
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
151
+ :param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
152
+ :param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
153
+ """
154
+ if description is not None:
155
+ pulumi.set(__self__, "description", description)
156
+ if local is not None:
157
+ pulumi.set(__self__, "local", local)
158
+ if namespace is not None:
159
+ pulumi.set(__self__, "namespace", namespace)
160
+ if options is not None:
161
+ pulumi.set(__self__, "options", options)
162
+ if path is not None:
163
+ pulumi.set(__self__, "path", path)
164
+ if type is not None:
165
+ pulumi.set(__self__, "type", type)
166
+
167
+ @_builtins.property
168
+ @pulumi.getter
169
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
170
+ """
171
+ Human-friendly description of the audit device.
172
+ """
173
+ return pulumi.get(self, "description")
174
+
175
+ @description.setter
176
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
177
+ pulumi.set(self, "description", value)
178
+
179
+ @_builtins.property
180
+ @pulumi.getter
181
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
182
+ """
183
+ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
184
+ """
185
+ return pulumi.get(self, "local")
186
+
187
+ @local.setter
188
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
189
+ pulumi.set(self, "local", value)
190
+
191
+ @_builtins.property
192
+ @pulumi.getter
193
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
194
+ """
195
+ The namespace to provision the resource in.
196
+ The value should not contain leading or trailing forward slashes.
197
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
+ *Available only for Vault Enterprise*.
199
+ """
200
+ return pulumi.get(self, "namespace")
201
+
202
+ @namespace.setter
203
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
204
+ pulumi.set(self, "namespace", value)
205
+
206
+ @_builtins.property
207
+ @pulumi.getter
208
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
209
+ """
210
+ Configuration options to pass to the audit device itself.
211
+
212
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
213
+ """
214
+ return pulumi.get(self, "options")
215
+
216
+ @options.setter
217
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
218
+ pulumi.set(self, "options", value)
219
+
220
+ @_builtins.property
221
+ @pulumi.getter
222
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
223
+ """
224
+ The path to mount the audit device. This defaults to the type.
225
+ """
226
+ return pulumi.get(self, "path")
227
+
228
+ @path.setter
229
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
230
+ pulumi.set(self, "path", value)
231
+
232
+ @_builtins.property
233
+ @pulumi.getter
234
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
235
+ """
236
+ Type of the audit device, such as 'file'.
237
+ """
238
+ return pulumi.get(self, "type")
239
+
240
+ @type.setter
241
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
242
+ pulumi.set(self, "type", value)
243
+
244
+
245
+ @pulumi.type_token("vault:index/audit:Audit")
246
+ class Audit(pulumi.CustomResource):
247
+ @overload
248
+ def __init__(__self__,
249
+ resource_name: str,
250
+ opts: Optional[pulumi.ResourceOptions] = None,
251
+ description: Optional[pulumi.Input[_builtins.str]] = None,
252
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
253
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
254
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
255
+ path: Optional[pulumi.Input[_builtins.str]] = None,
256
+ type: Optional[pulumi.Input[_builtins.str]] = None,
257
+ __props__=None):
258
+ """
259
+ ## Example Usage
260
+
261
+ ### File Audit Device)
262
+
263
+ ```python
264
+ import pulumi
265
+ import pulumi_vault as vault
266
+
267
+ test = vault.Audit("test",
268
+ type="file",
269
+ options={
270
+ "file_path": "C:/temp/audit.txt",
271
+ })
272
+ ```
273
+
274
+ ### Socket Audit Device)
275
+
276
+ ```python
277
+ import pulumi
278
+ import pulumi_vault as vault
279
+
280
+ test = vault.Audit("test",
281
+ type="socket",
282
+ path="app_socket",
283
+ local=False,
284
+ options={
285
+ "address": "127.0.0.1:8000",
286
+ "socket_type": "tcp",
287
+ "description": "application x socket",
288
+ })
289
+ ```
290
+
291
+ ## Import
292
+
293
+ Audit devices can be imported using the `path`, e.g.
294
+
295
+ ```sh
296
+ $ pulumi import vault:index/audit:Audit test syslog
297
+ ```
298
+
299
+ :param str resource_name: The name of the resource.
300
+ :param pulumi.ResourceOptions opts: Options for the resource.
301
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
302
+ :param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
303
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
304
+ The value should not contain leading or trailing forward slashes.
305
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
306
+ *Available only for Vault Enterprise*.
307
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
308
+
309
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
310
+ :param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
311
+ :param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
312
+ """
313
+ ...
314
+ @overload
315
+ def __init__(__self__,
316
+ resource_name: str,
317
+ args: AuditArgs,
318
+ opts: Optional[pulumi.ResourceOptions] = None):
319
+ """
320
+ ## Example Usage
321
+
322
+ ### File Audit Device)
323
+
324
+ ```python
325
+ import pulumi
326
+ import pulumi_vault as vault
327
+
328
+ test = vault.Audit("test",
329
+ type="file",
330
+ options={
331
+ "file_path": "C:/temp/audit.txt",
332
+ })
333
+ ```
334
+
335
+ ### Socket Audit Device)
336
+
337
+ ```python
338
+ import pulumi
339
+ import pulumi_vault as vault
340
+
341
+ test = vault.Audit("test",
342
+ type="socket",
343
+ path="app_socket",
344
+ local=False,
345
+ options={
346
+ "address": "127.0.0.1:8000",
347
+ "socket_type": "tcp",
348
+ "description": "application x socket",
349
+ })
350
+ ```
351
+
352
+ ## Import
353
+
354
+ Audit devices can be imported using the `path`, e.g.
355
+
356
+ ```sh
357
+ $ pulumi import vault:index/audit:Audit test syslog
358
+ ```
359
+
360
+ :param str resource_name: The name of the resource.
361
+ :param AuditArgs args: The arguments to use to populate this resource's properties.
362
+ :param pulumi.ResourceOptions opts: Options for the resource.
363
+ """
364
+ ...
365
+ def __init__(__self__, resource_name: str, *args, **kwargs):
366
+ resource_args, opts = _utilities.get_resource_args_opts(AuditArgs, pulumi.ResourceOptions, *args, **kwargs)
367
+ if resource_args is not None:
368
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
369
+ else:
370
+ __self__._internal_init(resource_name, *args, **kwargs)
371
+
372
+ def _internal_init(__self__,
373
+ resource_name: str,
374
+ opts: Optional[pulumi.ResourceOptions] = None,
375
+ description: Optional[pulumi.Input[_builtins.str]] = None,
376
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
378
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
379
+ path: Optional[pulumi.Input[_builtins.str]] = None,
380
+ type: Optional[pulumi.Input[_builtins.str]] = None,
381
+ __props__=None):
382
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
383
+ if not isinstance(opts, pulumi.ResourceOptions):
384
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
385
+ if opts.id is None:
386
+ if __props__ is not None:
387
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
388
+ __props__ = AuditArgs.__new__(AuditArgs)
389
+
390
+ __props__.__dict__["description"] = description
391
+ __props__.__dict__["local"] = local
392
+ __props__.__dict__["namespace"] = namespace
393
+ if options is None and not opts.urn:
394
+ raise TypeError("Missing required property 'options'")
395
+ __props__.__dict__["options"] = options
396
+ __props__.__dict__["path"] = path
397
+ if type is None and not opts.urn:
398
+ raise TypeError("Missing required property 'type'")
399
+ __props__.__dict__["type"] = type
400
+ super(Audit, __self__).__init__(
401
+ 'vault:index/audit:Audit',
402
+ resource_name,
403
+ __props__,
404
+ opts)
405
+
406
+ @staticmethod
407
+ def get(resource_name: str,
408
+ id: pulumi.Input[str],
409
+ opts: Optional[pulumi.ResourceOptions] = None,
410
+ description: Optional[pulumi.Input[_builtins.str]] = None,
411
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
412
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
413
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
414
+ path: Optional[pulumi.Input[_builtins.str]] = None,
415
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Audit':
416
+ """
417
+ Get an existing Audit resource's state with the given name, id, and optional extra
418
+ properties used to qualify the lookup.
419
+
420
+ :param str resource_name: The unique name of the resulting resource.
421
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
422
+ :param pulumi.ResourceOptions opts: Options for the resource.
423
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the audit device.
424
+ :param pulumi.Input[_builtins.bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
425
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
426
+ The value should not contain leading or trailing forward slashes.
427
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
428
+ *Available only for Vault Enterprise*.
429
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: Configuration options to pass to the audit device itself.
430
+
431
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
432
+ :param pulumi.Input[_builtins.str] path: The path to mount the audit device. This defaults to the type.
433
+ :param pulumi.Input[_builtins.str] type: Type of the audit device, such as 'file'.
434
+ """
435
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
436
+
437
+ __props__ = _AuditState.__new__(_AuditState)
438
+
439
+ __props__.__dict__["description"] = description
440
+ __props__.__dict__["local"] = local
441
+ __props__.__dict__["namespace"] = namespace
442
+ __props__.__dict__["options"] = options
443
+ __props__.__dict__["path"] = path
444
+ __props__.__dict__["type"] = type
445
+ return Audit(resource_name, opts=opts, __props__=__props__)
446
+
447
+ @_builtins.property
448
+ @pulumi.getter
449
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
450
+ """
451
+ Human-friendly description of the audit device.
452
+ """
453
+ return pulumi.get(self, "description")
454
+
455
+ @_builtins.property
456
+ @pulumi.getter
457
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
458
+ """
459
+ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
460
+ """
461
+ return pulumi.get(self, "local")
462
+
463
+ @_builtins.property
464
+ @pulumi.getter
465
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
466
+ """
467
+ The namespace to provision the resource in.
468
+ The value should not contain leading or trailing forward slashes.
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
470
+ *Available only for Vault Enterprise*.
471
+ """
472
+ return pulumi.get(self, "namespace")
473
+
474
+ @_builtins.property
475
+ @pulumi.getter
476
+ def options(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
477
+ """
478
+ Configuration options to pass to the audit device itself.
479
+
480
+ For a reference of the device types and their options, consult the [Vault documentation.](https://www.vaultproject.io/docs/audit/index.html)
481
+ """
482
+ return pulumi.get(self, "options")
483
+
484
+ @_builtins.property
485
+ @pulumi.getter
486
+ def path(self) -> pulumi.Output[_builtins.str]:
487
+ """
488
+ The path to mount the audit device. This defaults to the type.
489
+ """
490
+ return pulumi.get(self, "path")
491
+
492
+ @_builtins.property
493
+ @pulumi.getter
494
+ def type(self) -> pulumi.Output[_builtins.str]:
495
+ """
496
+ Type of the audit device, such as 'file'.
497
+ """
498
+ return pulumi.get(self, "type")
499
+