pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,496 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
20
+
21
+ @pulumi.input_type
22
+ class SecretBackendRoleArgs:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
28
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
29
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
30
+ """
31
+ The set of arguments for constructing a SecretBackendRole resource.
32
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
33
+ with no leading or trailing `/`s.
34
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
35
+ Must be unique within the backend.
36
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
+ The value should not contain leading or trailing forward slashes.
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
+ *Available only for Vault Enterprise*.
40
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
41
+ :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
42
+ :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
43
+ """
44
+ pulumi.set(__self__, "backend", backend)
45
+ if name is not None:
46
+ pulumi.set(__self__, "name", name)
47
+ if namespace is not None:
48
+ pulumi.set(__self__, "namespace", namespace)
49
+ if tags is not None:
50
+ pulumi.set(__self__, "tags", tags)
51
+ if vhost_topics is not None:
52
+ pulumi.set(__self__, "vhost_topics", vhost_topics)
53
+ if vhosts is not None:
54
+ pulumi.set(__self__, "vhosts", vhosts)
55
+
56
+ @_builtins.property
57
+ @pulumi.getter
58
+ def backend(self) -> pulumi.Input[_builtins.str]:
59
+ """
60
+ The path the RabbitMQ secret backend is mounted at,
61
+ with no leading or trailing `/`s.
62
+ """
63
+ return pulumi.get(self, "backend")
64
+
65
+ @backend.setter
66
+ def backend(self, value: pulumi.Input[_builtins.str]):
67
+ pulumi.set(self, "backend", value)
68
+
69
+ @_builtins.property
70
+ @pulumi.getter
71
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
72
+ """
73
+ The name to identify this role within the backend.
74
+ Must be unique within the backend.
75
+ """
76
+ return pulumi.get(self, "name")
77
+
78
+ @name.setter
79
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
80
+ pulumi.set(self, "name", value)
81
+
82
+ @_builtins.property
83
+ @pulumi.getter
84
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
85
+ """
86
+ The namespace to provision the resource in.
87
+ The value should not contain leading or trailing forward slashes.
88
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
+ *Available only for Vault Enterprise*.
90
+ """
91
+ return pulumi.get(self, "namespace")
92
+
93
+ @namespace.setter
94
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
95
+ pulumi.set(self, "namespace", value)
96
+
97
+ @_builtins.property
98
+ @pulumi.getter
99
+ def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
100
+ """
101
+ Specifies a comma-separated RabbitMQ management tags.
102
+ """
103
+ return pulumi.get(self, "tags")
104
+
105
+ @tags.setter
106
+ def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
107
+ pulumi.set(self, "tags", value)
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="vhostTopics")
111
+ def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
112
+ """
113
+ Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
114
+ """
115
+ return pulumi.get(self, "vhost_topics")
116
+
117
+ @vhost_topics.setter
118
+ def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
119
+ pulumi.set(self, "vhost_topics", value)
120
+
121
+ @_builtins.property
122
+ @pulumi.getter
123
+ def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
124
+ """
125
+ Specifies a map of virtual hosts to permissions.
126
+ """
127
+ return pulumi.get(self, "vhosts")
128
+
129
+ @vhosts.setter
130
+ def vhosts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]):
131
+ pulumi.set(self, "vhosts", value)
132
+
133
+
134
+ @pulumi.input_type
135
+ class _SecretBackendRoleState:
136
+ def __init__(__self__, *,
137
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
138
+ name: Optional[pulumi.Input[_builtins.str]] = None,
139
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
140
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
141
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
142
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
143
+ """
144
+ Input properties used for looking up and filtering SecretBackendRole resources.
145
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
146
+ with no leading or trailing `/`s.
147
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
148
+ Must be unique within the backend.
149
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
150
+ The value should not contain leading or trailing forward slashes.
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
+ *Available only for Vault Enterprise*.
153
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
154
+ :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
155
+ :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
156
+ """
157
+ if backend is not None:
158
+ pulumi.set(__self__, "backend", backend)
159
+ if name is not None:
160
+ pulumi.set(__self__, "name", name)
161
+ if namespace is not None:
162
+ pulumi.set(__self__, "namespace", namespace)
163
+ if tags is not None:
164
+ pulumi.set(__self__, "tags", tags)
165
+ if vhost_topics is not None:
166
+ pulumi.set(__self__, "vhost_topics", vhost_topics)
167
+ if vhosts is not None:
168
+ pulumi.set(__self__, "vhosts", vhosts)
169
+
170
+ @_builtins.property
171
+ @pulumi.getter
172
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
173
+ """
174
+ The path the RabbitMQ secret backend is mounted at,
175
+ with no leading or trailing `/`s.
176
+ """
177
+ return pulumi.get(self, "backend")
178
+
179
+ @backend.setter
180
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
181
+ pulumi.set(self, "backend", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter
185
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
186
+ """
187
+ The name to identify this role within the backend.
188
+ Must be unique within the backend.
189
+ """
190
+ return pulumi.get(self, "name")
191
+
192
+ @name.setter
193
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
194
+ pulumi.set(self, "name", value)
195
+
196
+ @_builtins.property
197
+ @pulumi.getter
198
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
199
+ """
200
+ The namespace to provision the resource in.
201
+ The value should not contain leading or trailing forward slashes.
202
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
203
+ *Available only for Vault Enterprise*.
204
+ """
205
+ return pulumi.get(self, "namespace")
206
+
207
+ @namespace.setter
208
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
209
+ pulumi.set(self, "namespace", value)
210
+
211
+ @_builtins.property
212
+ @pulumi.getter
213
+ def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
214
+ """
215
+ Specifies a comma-separated RabbitMQ management tags.
216
+ """
217
+ return pulumi.get(self, "tags")
218
+
219
+ @tags.setter
220
+ def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
221
+ pulumi.set(self, "tags", value)
222
+
223
+ @_builtins.property
224
+ @pulumi.getter(name="vhostTopics")
225
+ def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
226
+ """
227
+ Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
228
+ """
229
+ return pulumi.get(self, "vhost_topics")
230
+
231
+ @vhost_topics.setter
232
+ def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
233
+ pulumi.set(self, "vhost_topics", value)
234
+
235
+ @_builtins.property
236
+ @pulumi.getter
237
+ def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
238
+ """
239
+ Specifies a map of virtual hosts to permissions.
240
+ """
241
+ return pulumi.get(self, "vhosts")
242
+
243
+ @vhosts.setter
244
+ def vhosts(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]):
245
+ pulumi.set(self, "vhosts", value)
246
+
247
+
248
+ @pulumi.type_token("vault:rabbitMq/secretBackendRole:SecretBackendRole")
249
+ class SecretBackendRole(pulumi.CustomResource):
250
+ @overload
251
+ def __init__(__self__,
252
+ resource_name: str,
253
+ opts: Optional[pulumi.ResourceOptions] = None,
254
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
255
+ name: Optional[pulumi.Input[_builtins.str]] = None,
256
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
257
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
258
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
259
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
260
+ __props__=None):
261
+ """
262
+ ## Example Usage
263
+
264
+ ```python
265
+ import pulumi
266
+ import pulumi_vault as vault
267
+
268
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
269
+ connection_uri="https://.....",
270
+ username="user",
271
+ password="password")
272
+ role = vault.rabbitmq.SecretBackendRole("role",
273
+ backend=rabbitmq.path,
274
+ name="deploy",
275
+ tags="tag1,tag2",
276
+ vhosts=[{
277
+ "host": "/",
278
+ "configure": "",
279
+ "read": ".*",
280
+ "write": "",
281
+ }],
282
+ vhost_topics=[{
283
+ "vhosts": [{
284
+ "topic": "amq.topic",
285
+ "read": ".*",
286
+ "write": "",
287
+ }],
288
+ "host": "/",
289
+ }])
290
+ ```
291
+
292
+ ## Import
293
+
294
+ RabbitMQ secret backend roles can be imported using the `path`, e.g.
295
+
296
+ ```sh
297
+ $ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy
298
+ ```
299
+
300
+ :param str resource_name: The name of the resource.
301
+ :param pulumi.ResourceOptions opts: Options for the resource.
302
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
303
+ with no leading or trailing `/`s.
304
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
305
+ Must be unique within the backend.
306
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
307
+ The value should not contain leading or trailing forward slashes.
308
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
309
+ *Available only for Vault Enterprise*.
310
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
311
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
312
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
313
+ """
314
+ ...
315
+ @overload
316
+ def __init__(__self__,
317
+ resource_name: str,
318
+ args: SecretBackendRoleArgs,
319
+ opts: Optional[pulumi.ResourceOptions] = None):
320
+ """
321
+ ## Example Usage
322
+
323
+ ```python
324
+ import pulumi
325
+ import pulumi_vault as vault
326
+
327
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
328
+ connection_uri="https://.....",
329
+ username="user",
330
+ password="password")
331
+ role = vault.rabbitmq.SecretBackendRole("role",
332
+ backend=rabbitmq.path,
333
+ name="deploy",
334
+ tags="tag1,tag2",
335
+ vhosts=[{
336
+ "host": "/",
337
+ "configure": "",
338
+ "read": ".*",
339
+ "write": "",
340
+ }],
341
+ vhost_topics=[{
342
+ "vhosts": [{
343
+ "topic": "amq.topic",
344
+ "read": ".*",
345
+ "write": "",
346
+ }],
347
+ "host": "/",
348
+ }])
349
+ ```
350
+
351
+ ## Import
352
+
353
+ RabbitMQ secret backend roles can be imported using the `path`, e.g.
354
+
355
+ ```sh
356
+ $ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy
357
+ ```
358
+
359
+ :param str resource_name: The name of the resource.
360
+ :param SecretBackendRoleArgs args: The arguments to use to populate this resource's properties.
361
+ :param pulumi.ResourceOptions opts: Options for the resource.
362
+ """
363
+ ...
364
+ def __init__(__self__, resource_name: str, *args, **kwargs):
365
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
366
+ if resource_args is not None:
367
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
368
+ else:
369
+ __self__._internal_init(resource_name, *args, **kwargs)
370
+
371
+ def _internal_init(__self__,
372
+ resource_name: str,
373
+ opts: Optional[pulumi.ResourceOptions] = None,
374
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
375
+ name: Optional[pulumi.Input[_builtins.str]] = None,
376
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
377
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
378
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
379
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
380
+ __props__=None):
381
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
382
+ if not isinstance(opts, pulumi.ResourceOptions):
383
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
384
+ if opts.id is None:
385
+ if __props__ is not None:
386
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
387
+ __props__ = SecretBackendRoleArgs.__new__(SecretBackendRoleArgs)
388
+
389
+ if backend is None and not opts.urn:
390
+ raise TypeError("Missing required property 'backend'")
391
+ __props__.__dict__["backend"] = backend
392
+ __props__.__dict__["name"] = name
393
+ __props__.__dict__["namespace"] = namespace
394
+ __props__.__dict__["tags"] = tags
395
+ __props__.__dict__["vhost_topics"] = vhost_topics
396
+ __props__.__dict__["vhosts"] = vhosts
397
+ super(SecretBackendRole, __self__).__init__(
398
+ 'vault:rabbitMq/secretBackendRole:SecretBackendRole',
399
+ resource_name,
400
+ __props__,
401
+ opts)
402
+
403
+ @staticmethod
404
+ def get(resource_name: str,
405
+ id: pulumi.Input[str],
406
+ opts: Optional[pulumi.ResourceOptions] = None,
407
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
408
+ name: Optional[pulumi.Input[_builtins.str]] = None,
409
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
410
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
411
+ vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
412
+ vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
413
+ """
414
+ Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
415
+ properties used to qualify the lookup.
416
+
417
+ :param str resource_name: The unique name of the resulting resource.
418
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
419
+ :param pulumi.ResourceOptions opts: Options for the resource.
420
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
421
+ with no leading or trailing `/`s.
422
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
423
+ Must be unique within the backend.
424
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
425
+ The value should not contain leading or trailing forward slashes.
426
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
427
+ *Available only for Vault Enterprise*.
428
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
429
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
430
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
431
+ """
432
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
433
+
434
+ __props__ = _SecretBackendRoleState.__new__(_SecretBackendRoleState)
435
+
436
+ __props__.__dict__["backend"] = backend
437
+ __props__.__dict__["name"] = name
438
+ __props__.__dict__["namespace"] = namespace
439
+ __props__.__dict__["tags"] = tags
440
+ __props__.__dict__["vhost_topics"] = vhost_topics
441
+ __props__.__dict__["vhosts"] = vhosts
442
+ return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
443
+
444
+ @_builtins.property
445
+ @pulumi.getter
446
+ def backend(self) -> pulumi.Output[_builtins.str]:
447
+ """
448
+ The path the RabbitMQ secret backend is mounted at,
449
+ with no leading or trailing `/`s.
450
+ """
451
+ return pulumi.get(self, "backend")
452
+
453
+ @_builtins.property
454
+ @pulumi.getter
455
+ def name(self) -> pulumi.Output[_builtins.str]:
456
+ """
457
+ The name to identify this role within the backend.
458
+ Must be unique within the backend.
459
+ """
460
+ return pulumi.get(self, "name")
461
+
462
+ @_builtins.property
463
+ @pulumi.getter
464
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
465
+ """
466
+ The namespace to provision the resource in.
467
+ The value should not contain leading or trailing forward slashes.
468
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
469
+ *Available only for Vault Enterprise*.
470
+ """
471
+ return pulumi.get(self, "namespace")
472
+
473
+ @_builtins.property
474
+ @pulumi.getter
475
+ def tags(self) -> pulumi.Output[Optional[_builtins.str]]:
476
+ """
477
+ Specifies a comma-separated RabbitMQ management tags.
478
+ """
479
+ return pulumi.get(self, "tags")
480
+
481
+ @_builtins.property
482
+ @pulumi.getter(name="vhostTopics")
483
+ def vhost_topics(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhostTopic']]]:
484
+ """
485
+ Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
486
+ """
487
+ return pulumi.get(self, "vhost_topics")
488
+
489
+ @_builtins.property
490
+ @pulumi.getter
491
+ def vhosts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhost']]]:
492
+ """
493
+ Specifies a map of virtual hosts to permissions.
494
+ """
495
+ return pulumi.get(self, "vhosts")
496
+