pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
from .. import _utilities
|
|
7
|
+
import typing
|
|
8
|
+
# Export this package's modules as members:
|
|
9
|
+
from .secret_backend import *
|
|
10
|
+
from .secret_backend_role import *
|
|
11
|
+
from ._inputs import *
|
|
12
|
+
from . import outputs
|
|
@@ -0,0 +1,235 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'SecretBackendRoleVhostArgs',
|
|
19
|
+
'SecretBackendRoleVhostArgsDict',
|
|
20
|
+
'SecretBackendRoleVhostTopicArgs',
|
|
21
|
+
'SecretBackendRoleVhostTopicArgsDict',
|
|
22
|
+
'SecretBackendRoleVhostTopicVhostArgs',
|
|
23
|
+
'SecretBackendRoleVhostTopicVhostArgsDict',
|
|
24
|
+
]
|
|
25
|
+
|
|
26
|
+
MYPY = False
|
|
27
|
+
|
|
28
|
+
if not MYPY:
|
|
29
|
+
class SecretBackendRoleVhostArgsDict(TypedDict):
|
|
30
|
+
configure: pulumi.Input[_builtins.str]
|
|
31
|
+
"""
|
|
32
|
+
The configure permissions for this vhost.
|
|
33
|
+
"""
|
|
34
|
+
host: pulumi.Input[_builtins.str]
|
|
35
|
+
"""
|
|
36
|
+
The vhost to set permissions for.
|
|
37
|
+
"""
|
|
38
|
+
read: pulumi.Input[_builtins.str]
|
|
39
|
+
"""
|
|
40
|
+
The read permissions for this vhost.
|
|
41
|
+
"""
|
|
42
|
+
write: pulumi.Input[_builtins.str]
|
|
43
|
+
"""
|
|
44
|
+
The write permissions for this vhost.
|
|
45
|
+
"""
|
|
46
|
+
elif False:
|
|
47
|
+
SecretBackendRoleVhostArgsDict: TypeAlias = Mapping[str, Any]
|
|
48
|
+
|
|
49
|
+
@pulumi.input_type
|
|
50
|
+
class SecretBackendRoleVhostArgs:
|
|
51
|
+
def __init__(__self__, *,
|
|
52
|
+
configure: pulumi.Input[_builtins.str],
|
|
53
|
+
host: pulumi.Input[_builtins.str],
|
|
54
|
+
read: pulumi.Input[_builtins.str],
|
|
55
|
+
write: pulumi.Input[_builtins.str]):
|
|
56
|
+
"""
|
|
57
|
+
:param pulumi.Input[_builtins.str] configure: The configure permissions for this vhost.
|
|
58
|
+
:param pulumi.Input[_builtins.str] host: The vhost to set permissions for.
|
|
59
|
+
:param pulumi.Input[_builtins.str] read: The read permissions for this vhost.
|
|
60
|
+
:param pulumi.Input[_builtins.str] write: The write permissions for this vhost.
|
|
61
|
+
"""
|
|
62
|
+
pulumi.set(__self__, "configure", configure)
|
|
63
|
+
pulumi.set(__self__, "host", host)
|
|
64
|
+
pulumi.set(__self__, "read", read)
|
|
65
|
+
pulumi.set(__self__, "write", write)
|
|
66
|
+
|
|
67
|
+
@_builtins.property
|
|
68
|
+
@pulumi.getter
|
|
69
|
+
def configure(self) -> pulumi.Input[_builtins.str]:
|
|
70
|
+
"""
|
|
71
|
+
The configure permissions for this vhost.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "configure")
|
|
74
|
+
|
|
75
|
+
@configure.setter
|
|
76
|
+
def configure(self, value: pulumi.Input[_builtins.str]):
|
|
77
|
+
pulumi.set(self, "configure", value)
|
|
78
|
+
|
|
79
|
+
@_builtins.property
|
|
80
|
+
@pulumi.getter
|
|
81
|
+
def host(self) -> pulumi.Input[_builtins.str]:
|
|
82
|
+
"""
|
|
83
|
+
The vhost to set permissions for.
|
|
84
|
+
"""
|
|
85
|
+
return pulumi.get(self, "host")
|
|
86
|
+
|
|
87
|
+
@host.setter
|
|
88
|
+
def host(self, value: pulumi.Input[_builtins.str]):
|
|
89
|
+
pulumi.set(self, "host", value)
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter
|
|
93
|
+
def read(self) -> pulumi.Input[_builtins.str]:
|
|
94
|
+
"""
|
|
95
|
+
The read permissions for this vhost.
|
|
96
|
+
"""
|
|
97
|
+
return pulumi.get(self, "read")
|
|
98
|
+
|
|
99
|
+
@read.setter
|
|
100
|
+
def read(self, value: pulumi.Input[_builtins.str]):
|
|
101
|
+
pulumi.set(self, "read", value)
|
|
102
|
+
|
|
103
|
+
@_builtins.property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def write(self) -> pulumi.Input[_builtins.str]:
|
|
106
|
+
"""
|
|
107
|
+
The write permissions for this vhost.
|
|
108
|
+
"""
|
|
109
|
+
return pulumi.get(self, "write")
|
|
110
|
+
|
|
111
|
+
@write.setter
|
|
112
|
+
def write(self, value: pulumi.Input[_builtins.str]):
|
|
113
|
+
pulumi.set(self, "write", value)
|
|
114
|
+
|
|
115
|
+
|
|
116
|
+
if not MYPY:
|
|
117
|
+
class SecretBackendRoleVhostTopicArgsDict(TypedDict):
|
|
118
|
+
host: pulumi.Input[_builtins.str]
|
|
119
|
+
"""
|
|
120
|
+
The vhost to set permissions for.
|
|
121
|
+
"""
|
|
122
|
+
vhosts: NotRequired[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgsDict']]]]
|
|
123
|
+
"""
|
|
124
|
+
Specifies a map of virtual hosts to permissions.
|
|
125
|
+
"""
|
|
126
|
+
elif False:
|
|
127
|
+
SecretBackendRoleVhostTopicArgsDict: TypeAlias = Mapping[str, Any]
|
|
128
|
+
|
|
129
|
+
@pulumi.input_type
|
|
130
|
+
class SecretBackendRoleVhostTopicArgs:
|
|
131
|
+
def __init__(__self__, *,
|
|
132
|
+
host: pulumi.Input[_builtins.str],
|
|
133
|
+
vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]] = None):
|
|
134
|
+
"""
|
|
135
|
+
:param pulumi.Input[_builtins.str] host: The vhost to set permissions for.
|
|
136
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
|
|
137
|
+
"""
|
|
138
|
+
pulumi.set(__self__, "host", host)
|
|
139
|
+
if vhosts is not None:
|
|
140
|
+
pulumi.set(__self__, "vhosts", vhosts)
|
|
141
|
+
|
|
142
|
+
@_builtins.property
|
|
143
|
+
@pulumi.getter
|
|
144
|
+
def host(self) -> pulumi.Input[_builtins.str]:
|
|
145
|
+
"""
|
|
146
|
+
The vhost to set permissions for.
|
|
147
|
+
"""
|
|
148
|
+
return pulumi.get(self, "host")
|
|
149
|
+
|
|
150
|
+
@host.setter
|
|
151
|
+
def host(self, value: pulumi.Input[_builtins.str]):
|
|
152
|
+
pulumi.set(self, "host", value)
|
|
153
|
+
|
|
154
|
+
@_builtins.property
|
|
155
|
+
@pulumi.getter
|
|
156
|
+
def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]]:
|
|
157
|
+
"""
|
|
158
|
+
Specifies a map of virtual hosts to permissions.
|
|
159
|
+
"""
|
|
160
|
+
return pulumi.get(self, "vhosts")
|
|
161
|
+
|
|
162
|
+
@vhosts.setter
|
|
163
|
+
def vhosts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicVhostArgs']]]]):
|
|
164
|
+
pulumi.set(self, "vhosts", value)
|
|
165
|
+
|
|
166
|
+
|
|
167
|
+
if not MYPY:
|
|
168
|
+
class SecretBackendRoleVhostTopicVhostArgsDict(TypedDict):
|
|
169
|
+
read: pulumi.Input[_builtins.str]
|
|
170
|
+
"""
|
|
171
|
+
The read permissions for this vhost.
|
|
172
|
+
"""
|
|
173
|
+
topic: pulumi.Input[_builtins.str]
|
|
174
|
+
"""
|
|
175
|
+
The vhost to set permissions for.
|
|
176
|
+
"""
|
|
177
|
+
write: pulumi.Input[_builtins.str]
|
|
178
|
+
"""
|
|
179
|
+
The write permissions for this vhost.
|
|
180
|
+
"""
|
|
181
|
+
elif False:
|
|
182
|
+
SecretBackendRoleVhostTopicVhostArgsDict: TypeAlias = Mapping[str, Any]
|
|
183
|
+
|
|
184
|
+
@pulumi.input_type
|
|
185
|
+
class SecretBackendRoleVhostTopicVhostArgs:
|
|
186
|
+
def __init__(__self__, *,
|
|
187
|
+
read: pulumi.Input[_builtins.str],
|
|
188
|
+
topic: pulumi.Input[_builtins.str],
|
|
189
|
+
write: pulumi.Input[_builtins.str]):
|
|
190
|
+
"""
|
|
191
|
+
:param pulumi.Input[_builtins.str] read: The read permissions for this vhost.
|
|
192
|
+
:param pulumi.Input[_builtins.str] topic: The vhost to set permissions for.
|
|
193
|
+
:param pulumi.Input[_builtins.str] write: The write permissions for this vhost.
|
|
194
|
+
"""
|
|
195
|
+
pulumi.set(__self__, "read", read)
|
|
196
|
+
pulumi.set(__self__, "topic", topic)
|
|
197
|
+
pulumi.set(__self__, "write", write)
|
|
198
|
+
|
|
199
|
+
@_builtins.property
|
|
200
|
+
@pulumi.getter
|
|
201
|
+
def read(self) -> pulumi.Input[_builtins.str]:
|
|
202
|
+
"""
|
|
203
|
+
The read permissions for this vhost.
|
|
204
|
+
"""
|
|
205
|
+
return pulumi.get(self, "read")
|
|
206
|
+
|
|
207
|
+
@read.setter
|
|
208
|
+
def read(self, value: pulumi.Input[_builtins.str]):
|
|
209
|
+
pulumi.set(self, "read", value)
|
|
210
|
+
|
|
211
|
+
@_builtins.property
|
|
212
|
+
@pulumi.getter
|
|
213
|
+
def topic(self) -> pulumi.Input[_builtins.str]:
|
|
214
|
+
"""
|
|
215
|
+
The vhost to set permissions for.
|
|
216
|
+
"""
|
|
217
|
+
return pulumi.get(self, "topic")
|
|
218
|
+
|
|
219
|
+
@topic.setter
|
|
220
|
+
def topic(self, value: pulumi.Input[_builtins.str]):
|
|
221
|
+
pulumi.set(self, "topic", value)
|
|
222
|
+
|
|
223
|
+
@_builtins.property
|
|
224
|
+
@pulumi.getter
|
|
225
|
+
def write(self) -> pulumi.Input[_builtins.str]:
|
|
226
|
+
"""
|
|
227
|
+
The write permissions for this vhost.
|
|
228
|
+
"""
|
|
229
|
+
return pulumi.get(self, "write")
|
|
230
|
+
|
|
231
|
+
@write.setter
|
|
232
|
+
def write(self, value: pulumi.Input[_builtins.str]):
|
|
233
|
+
pulumi.set(self, "write", value)
|
|
234
|
+
|
|
235
|
+
|
|
@@ -0,0 +1,144 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
|
|
18
|
+
__all__ = [
|
|
19
|
+
'SecretBackendRoleVhost',
|
|
20
|
+
'SecretBackendRoleVhostTopic',
|
|
21
|
+
'SecretBackendRoleVhostTopicVhost',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class SecretBackendRoleVhost(dict):
|
|
26
|
+
def __init__(__self__, *,
|
|
27
|
+
configure: _builtins.str,
|
|
28
|
+
host: _builtins.str,
|
|
29
|
+
read: _builtins.str,
|
|
30
|
+
write: _builtins.str):
|
|
31
|
+
"""
|
|
32
|
+
:param _builtins.str configure: The configure permissions for this vhost.
|
|
33
|
+
:param _builtins.str host: The vhost to set permissions for.
|
|
34
|
+
:param _builtins.str read: The read permissions for this vhost.
|
|
35
|
+
:param _builtins.str write: The write permissions for this vhost.
|
|
36
|
+
"""
|
|
37
|
+
pulumi.set(__self__, "configure", configure)
|
|
38
|
+
pulumi.set(__self__, "host", host)
|
|
39
|
+
pulumi.set(__self__, "read", read)
|
|
40
|
+
pulumi.set(__self__, "write", write)
|
|
41
|
+
|
|
42
|
+
@_builtins.property
|
|
43
|
+
@pulumi.getter
|
|
44
|
+
def configure(self) -> _builtins.str:
|
|
45
|
+
"""
|
|
46
|
+
The configure permissions for this vhost.
|
|
47
|
+
"""
|
|
48
|
+
return pulumi.get(self, "configure")
|
|
49
|
+
|
|
50
|
+
@_builtins.property
|
|
51
|
+
@pulumi.getter
|
|
52
|
+
def host(self) -> _builtins.str:
|
|
53
|
+
"""
|
|
54
|
+
The vhost to set permissions for.
|
|
55
|
+
"""
|
|
56
|
+
return pulumi.get(self, "host")
|
|
57
|
+
|
|
58
|
+
@_builtins.property
|
|
59
|
+
@pulumi.getter
|
|
60
|
+
def read(self) -> _builtins.str:
|
|
61
|
+
"""
|
|
62
|
+
The read permissions for this vhost.
|
|
63
|
+
"""
|
|
64
|
+
return pulumi.get(self, "read")
|
|
65
|
+
|
|
66
|
+
@_builtins.property
|
|
67
|
+
@pulumi.getter
|
|
68
|
+
def write(self) -> _builtins.str:
|
|
69
|
+
"""
|
|
70
|
+
The write permissions for this vhost.
|
|
71
|
+
"""
|
|
72
|
+
return pulumi.get(self, "write")
|
|
73
|
+
|
|
74
|
+
|
|
75
|
+
@pulumi.output_type
|
|
76
|
+
class SecretBackendRoleVhostTopic(dict):
|
|
77
|
+
def __init__(__self__, *,
|
|
78
|
+
host: _builtins.str,
|
|
79
|
+
vhosts: Optional[Sequence['outputs.SecretBackendRoleVhostTopicVhost']] = None):
|
|
80
|
+
"""
|
|
81
|
+
:param _builtins.str host: The vhost to set permissions for.
|
|
82
|
+
:param Sequence['SecretBackendRoleVhostTopicVhostArgs'] vhosts: Specifies a map of virtual hosts to permissions.
|
|
83
|
+
"""
|
|
84
|
+
pulumi.set(__self__, "host", host)
|
|
85
|
+
if vhosts is not None:
|
|
86
|
+
pulumi.set(__self__, "vhosts", vhosts)
|
|
87
|
+
|
|
88
|
+
@_builtins.property
|
|
89
|
+
@pulumi.getter
|
|
90
|
+
def host(self) -> _builtins.str:
|
|
91
|
+
"""
|
|
92
|
+
The vhost to set permissions for.
|
|
93
|
+
"""
|
|
94
|
+
return pulumi.get(self, "host")
|
|
95
|
+
|
|
96
|
+
@_builtins.property
|
|
97
|
+
@pulumi.getter
|
|
98
|
+
def vhosts(self) -> Optional[Sequence['outputs.SecretBackendRoleVhostTopicVhost']]:
|
|
99
|
+
"""
|
|
100
|
+
Specifies a map of virtual hosts to permissions.
|
|
101
|
+
"""
|
|
102
|
+
return pulumi.get(self, "vhosts")
|
|
103
|
+
|
|
104
|
+
|
|
105
|
+
@pulumi.output_type
|
|
106
|
+
class SecretBackendRoleVhostTopicVhost(dict):
|
|
107
|
+
def __init__(__self__, *,
|
|
108
|
+
read: _builtins.str,
|
|
109
|
+
topic: _builtins.str,
|
|
110
|
+
write: _builtins.str):
|
|
111
|
+
"""
|
|
112
|
+
:param _builtins.str read: The read permissions for this vhost.
|
|
113
|
+
:param _builtins.str topic: The vhost to set permissions for.
|
|
114
|
+
:param _builtins.str write: The write permissions for this vhost.
|
|
115
|
+
"""
|
|
116
|
+
pulumi.set(__self__, "read", read)
|
|
117
|
+
pulumi.set(__self__, "topic", topic)
|
|
118
|
+
pulumi.set(__self__, "write", write)
|
|
119
|
+
|
|
120
|
+
@_builtins.property
|
|
121
|
+
@pulumi.getter
|
|
122
|
+
def read(self) -> _builtins.str:
|
|
123
|
+
"""
|
|
124
|
+
The read permissions for this vhost.
|
|
125
|
+
"""
|
|
126
|
+
return pulumi.get(self, "read")
|
|
127
|
+
|
|
128
|
+
@_builtins.property
|
|
129
|
+
@pulumi.getter
|
|
130
|
+
def topic(self) -> _builtins.str:
|
|
131
|
+
"""
|
|
132
|
+
The vhost to set permissions for.
|
|
133
|
+
"""
|
|
134
|
+
return pulumi.get(self, "topic")
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter
|
|
138
|
+
def write(self) -> _builtins.str:
|
|
139
|
+
"""
|
|
140
|
+
The write permissions for this vhost.
|
|
141
|
+
"""
|
|
142
|
+
return pulumi.get(self, "write")
|
|
143
|
+
|
|
144
|
+
|