pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import sys
|
|
7
|
+
from .vars import _ExportableConfig
|
|
8
|
+
|
|
9
|
+
sys.modules[__name__].__class__ = _ExportableConfig
|
|
@@ -0,0 +1,164 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
|
|
18
|
+
addAddressToEnv: Optional[str]
|
|
19
|
+
|
|
20
|
+
address: Optional[str]
|
|
21
|
+
"""
|
|
22
|
+
URL of the root of the target Vault server.
|
|
23
|
+
"""
|
|
24
|
+
|
|
25
|
+
authLogin: Optional[str]
|
|
26
|
+
"""
|
|
27
|
+
Login to vault with an existing auth method using auth/<mount>/login
|
|
28
|
+
"""
|
|
29
|
+
|
|
30
|
+
authLoginAws: Optional[str]
|
|
31
|
+
"""
|
|
32
|
+
Login to vault using the AWS method
|
|
33
|
+
"""
|
|
34
|
+
|
|
35
|
+
authLoginAzure: Optional[str]
|
|
36
|
+
"""
|
|
37
|
+
Login to vault using the azure method
|
|
38
|
+
"""
|
|
39
|
+
|
|
40
|
+
authLoginCert: Optional[str]
|
|
41
|
+
"""
|
|
42
|
+
Login to vault using the cert method
|
|
43
|
+
"""
|
|
44
|
+
|
|
45
|
+
authLoginGcp: Optional[str]
|
|
46
|
+
"""
|
|
47
|
+
Login to vault using the gcp method
|
|
48
|
+
"""
|
|
49
|
+
|
|
50
|
+
authLoginJwt: Optional[str]
|
|
51
|
+
"""
|
|
52
|
+
Login to vault using the jwt method
|
|
53
|
+
"""
|
|
54
|
+
|
|
55
|
+
authLoginKerberos: Optional[str]
|
|
56
|
+
"""
|
|
57
|
+
Login to vault using the kerberos method
|
|
58
|
+
"""
|
|
59
|
+
|
|
60
|
+
authLoginOci: Optional[str]
|
|
61
|
+
"""
|
|
62
|
+
Login to vault using the OCI method
|
|
63
|
+
"""
|
|
64
|
+
|
|
65
|
+
authLoginOidc: Optional[str]
|
|
66
|
+
"""
|
|
67
|
+
Login to vault using the oidc method
|
|
68
|
+
"""
|
|
69
|
+
|
|
70
|
+
authLoginRadius: Optional[str]
|
|
71
|
+
"""
|
|
72
|
+
Login to vault using the radius method
|
|
73
|
+
"""
|
|
74
|
+
|
|
75
|
+
authLoginTokenFile: Optional[str]
|
|
76
|
+
"""
|
|
77
|
+
Login to vault using
|
|
78
|
+
"""
|
|
79
|
+
|
|
80
|
+
authLoginUserpass: Optional[str]
|
|
81
|
+
"""
|
|
82
|
+
Login to vault using the userpass method
|
|
83
|
+
"""
|
|
84
|
+
|
|
85
|
+
caCertDir: Optional[str]
|
|
86
|
+
"""
|
|
87
|
+
Path to directory containing CA certificate files to validate the server's certificate.
|
|
88
|
+
"""
|
|
89
|
+
|
|
90
|
+
caCertFile: Optional[str]
|
|
91
|
+
"""
|
|
92
|
+
Path to a CA certificate file to validate the server's certificate.
|
|
93
|
+
"""
|
|
94
|
+
|
|
95
|
+
clientAuth: Optional[str]
|
|
96
|
+
"""
|
|
97
|
+
Client authentication credentials.
|
|
98
|
+
"""
|
|
99
|
+
|
|
100
|
+
headers: Optional[str]
|
|
101
|
+
"""
|
|
102
|
+
The headers to send with each Vault request.
|
|
103
|
+
"""
|
|
104
|
+
|
|
105
|
+
maxLeaseTtlSeconds: int
|
|
106
|
+
"""
|
|
107
|
+
Maximum TTL for secret leases requested by this provider.
|
|
108
|
+
"""
|
|
109
|
+
|
|
110
|
+
maxRetries: int
|
|
111
|
+
"""
|
|
112
|
+
Maximum number of retries when a 5xx error code is encountered.
|
|
113
|
+
"""
|
|
114
|
+
|
|
115
|
+
maxRetriesCcc: Optional[int]
|
|
116
|
+
"""
|
|
117
|
+
Maximum number of retries for Client Controlled Consistency related operations
|
|
118
|
+
"""
|
|
119
|
+
|
|
120
|
+
namespace: Optional[str]
|
|
121
|
+
"""
|
|
122
|
+
The namespace to use. Available only for Vault Enterprise.
|
|
123
|
+
"""
|
|
124
|
+
|
|
125
|
+
setNamespaceFromToken: Optional[bool]
|
|
126
|
+
"""
|
|
127
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
|
128
|
+
"""
|
|
129
|
+
|
|
130
|
+
skipChildToken: Optional[bool]
|
|
131
|
+
"""
|
|
132
|
+
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
133
|
+
"""
|
|
134
|
+
|
|
135
|
+
skipGetVaultVersion: Optional[bool]
|
|
136
|
+
"""
|
|
137
|
+
Skip the dynamic fetching of the Vault server version.
|
|
138
|
+
"""
|
|
139
|
+
|
|
140
|
+
skipTlsVerify: Optional[bool]
|
|
141
|
+
"""
|
|
142
|
+
Set this to true only if the target Vault server is an insecure development instance.
|
|
143
|
+
"""
|
|
144
|
+
|
|
145
|
+
tlsServerName: Optional[str]
|
|
146
|
+
"""
|
|
147
|
+
Name to use as the SNI host when connecting via TLS.
|
|
148
|
+
"""
|
|
149
|
+
|
|
150
|
+
token: Optional[str]
|
|
151
|
+
"""
|
|
152
|
+
Token to use to authenticate to Vault.
|
|
153
|
+
"""
|
|
154
|
+
|
|
155
|
+
tokenName: Optional[str]
|
|
156
|
+
"""
|
|
157
|
+
Token name to use for creating the Vault child token.
|
|
158
|
+
"""
|
|
159
|
+
|
|
160
|
+
vaultVersionOverride: Optional[str]
|
|
161
|
+
"""
|
|
162
|
+
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
163
|
+
"""
|
|
164
|
+
|
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'UiCustomMessageLinkArgs',
|
|
19
|
+
'UiCustomMessageLinkArgsDict',
|
|
20
|
+
]
|
|
21
|
+
|
|
22
|
+
MYPY = False
|
|
23
|
+
|
|
24
|
+
if not MYPY:
|
|
25
|
+
class UiCustomMessageLinkArgsDict(TypedDict):
|
|
26
|
+
href: pulumi.Input[_builtins.str]
|
|
27
|
+
"""
|
|
28
|
+
The URL of the hyperlink
|
|
29
|
+
"""
|
|
30
|
+
title: pulumi.Input[_builtins.str]
|
|
31
|
+
"""
|
|
32
|
+
The title of the hyperlink
|
|
33
|
+
"""
|
|
34
|
+
elif False:
|
|
35
|
+
UiCustomMessageLinkArgsDict: TypeAlias = Mapping[str, Any]
|
|
36
|
+
|
|
37
|
+
@pulumi.input_type
|
|
38
|
+
class UiCustomMessageLinkArgs:
|
|
39
|
+
def __init__(__self__, *,
|
|
40
|
+
href: pulumi.Input[_builtins.str],
|
|
41
|
+
title: pulumi.Input[_builtins.str]):
|
|
42
|
+
"""
|
|
43
|
+
:param pulumi.Input[_builtins.str] href: The URL of the hyperlink
|
|
44
|
+
:param pulumi.Input[_builtins.str] title: The title of the hyperlink
|
|
45
|
+
"""
|
|
46
|
+
pulumi.set(__self__, "href", href)
|
|
47
|
+
pulumi.set(__self__, "title", title)
|
|
48
|
+
|
|
49
|
+
@_builtins.property
|
|
50
|
+
@pulumi.getter
|
|
51
|
+
def href(self) -> pulumi.Input[_builtins.str]:
|
|
52
|
+
"""
|
|
53
|
+
The URL of the hyperlink
|
|
54
|
+
"""
|
|
55
|
+
return pulumi.get(self, "href")
|
|
56
|
+
|
|
57
|
+
@href.setter
|
|
58
|
+
def href(self, value: pulumi.Input[_builtins.str]):
|
|
59
|
+
pulumi.set(self, "href", value)
|
|
60
|
+
|
|
61
|
+
@_builtins.property
|
|
62
|
+
@pulumi.getter
|
|
63
|
+
def title(self) -> pulumi.Input[_builtins.str]:
|
|
64
|
+
"""
|
|
65
|
+
The title of the hyperlink
|
|
66
|
+
"""
|
|
67
|
+
return pulumi.get(self, "title")
|
|
68
|
+
|
|
69
|
+
@title.setter
|
|
70
|
+
def title(self, value: pulumi.Input[_builtins.str]):
|
|
71
|
+
pulumi.set(self, "title", value)
|
|
72
|
+
|
|
73
|
+
|