pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,399 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['EgpPolicyArgs', 'EgpPolicy']
18
+
19
+ @pulumi.input_type
20
+ class EgpPolicyArgs:
21
+ def __init__(__self__, *,
22
+ enforcement_level: pulumi.Input[_builtins.str],
23
+ paths: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ policy: pulumi.Input[_builtins.str],
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
27
+ """
28
+ The set of arguments for constructing a EgpPolicy resource.
29
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
30
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
31
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
32
+ :param pulumi.Input[_builtins.str] name: The name of the policy
33
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
34
+ The value should not contain leading or trailing forward slashes.
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
+ *Available only for Vault Enterprise*.
37
+ """
38
+ pulumi.set(__self__, "enforcement_level", enforcement_level)
39
+ pulumi.set(__self__, "paths", paths)
40
+ pulumi.set(__self__, "policy", policy)
41
+ if name is not None:
42
+ pulumi.set(__self__, "name", name)
43
+ if namespace is not None:
44
+ pulumi.set(__self__, "namespace", namespace)
45
+
46
+ @_builtins.property
47
+ @pulumi.getter(name="enforcementLevel")
48
+ def enforcement_level(self) -> pulumi.Input[_builtins.str]:
49
+ """
50
+ Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
51
+ """
52
+ return pulumi.get(self, "enforcement_level")
53
+
54
+ @enforcement_level.setter
55
+ def enforcement_level(self, value: pulumi.Input[_builtins.str]):
56
+ pulumi.set(self, "enforcement_level", value)
57
+
58
+ @_builtins.property
59
+ @pulumi.getter
60
+ def paths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
61
+ """
62
+ List of paths to which the policy will be applied to
63
+ """
64
+ return pulumi.get(self, "paths")
65
+
66
+ @paths.setter
67
+ def paths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
68
+ pulumi.set(self, "paths", value)
69
+
70
+ @_builtins.property
71
+ @pulumi.getter
72
+ def policy(self) -> pulumi.Input[_builtins.str]:
73
+ """
74
+ String containing a Sentinel policy
75
+ """
76
+ return pulumi.get(self, "policy")
77
+
78
+ @policy.setter
79
+ def policy(self, value: pulumi.Input[_builtins.str]):
80
+ pulumi.set(self, "policy", value)
81
+
82
+ @_builtins.property
83
+ @pulumi.getter
84
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
85
+ """
86
+ The name of the policy
87
+ """
88
+ return pulumi.get(self, "name")
89
+
90
+ @name.setter
91
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
92
+ pulumi.set(self, "name", value)
93
+
94
+ @_builtins.property
95
+ @pulumi.getter
96
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
97
+ """
98
+ The namespace to provision the resource in.
99
+ The value should not contain leading or trailing forward slashes.
100
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
101
+ *Available only for Vault Enterprise*.
102
+ """
103
+ return pulumi.get(self, "namespace")
104
+
105
+ @namespace.setter
106
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
107
+ pulumi.set(self, "namespace", value)
108
+
109
+
110
+ @pulumi.input_type
111
+ class _EgpPolicyState:
112
+ def __init__(__self__, *,
113
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
114
+ name: Optional[pulumi.Input[_builtins.str]] = None,
115
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
116
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
117
+ policy: Optional[pulumi.Input[_builtins.str]] = None):
118
+ """
119
+ Input properties used for looking up and filtering EgpPolicy resources.
120
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
121
+ :param pulumi.Input[_builtins.str] name: The name of the policy
122
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
123
+ The value should not contain leading or trailing forward slashes.
124
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
125
+ *Available only for Vault Enterprise*.
126
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
127
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
128
+ """
129
+ if enforcement_level is not None:
130
+ pulumi.set(__self__, "enforcement_level", enforcement_level)
131
+ if name is not None:
132
+ pulumi.set(__self__, "name", name)
133
+ if namespace is not None:
134
+ pulumi.set(__self__, "namespace", namespace)
135
+ if paths is not None:
136
+ pulumi.set(__self__, "paths", paths)
137
+ if policy is not None:
138
+ pulumi.set(__self__, "policy", policy)
139
+
140
+ @_builtins.property
141
+ @pulumi.getter(name="enforcementLevel")
142
+ def enforcement_level(self) -> Optional[pulumi.Input[_builtins.str]]:
143
+ """
144
+ Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
145
+ """
146
+ return pulumi.get(self, "enforcement_level")
147
+
148
+ @enforcement_level.setter
149
+ def enforcement_level(self, value: Optional[pulumi.Input[_builtins.str]]):
150
+ pulumi.set(self, "enforcement_level", value)
151
+
152
+ @_builtins.property
153
+ @pulumi.getter
154
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
155
+ """
156
+ The name of the policy
157
+ """
158
+ return pulumi.get(self, "name")
159
+
160
+ @name.setter
161
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
162
+ pulumi.set(self, "name", value)
163
+
164
+ @_builtins.property
165
+ @pulumi.getter
166
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
167
+ """
168
+ The namespace to provision the resource in.
169
+ The value should not contain leading or trailing forward slashes.
170
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
171
+ *Available only for Vault Enterprise*.
172
+ """
173
+ return pulumi.get(self, "namespace")
174
+
175
+ @namespace.setter
176
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
177
+ pulumi.set(self, "namespace", value)
178
+
179
+ @_builtins.property
180
+ @pulumi.getter
181
+ def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
182
+ """
183
+ List of paths to which the policy will be applied to
184
+ """
185
+ return pulumi.get(self, "paths")
186
+
187
+ @paths.setter
188
+ def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
189
+ pulumi.set(self, "paths", value)
190
+
191
+ @_builtins.property
192
+ @pulumi.getter
193
+ def policy(self) -> Optional[pulumi.Input[_builtins.str]]:
194
+ """
195
+ String containing a Sentinel policy
196
+ """
197
+ return pulumi.get(self, "policy")
198
+
199
+ @policy.setter
200
+ def policy(self, value: Optional[pulumi.Input[_builtins.str]]):
201
+ pulumi.set(self, "policy", value)
202
+
203
+
204
+ @pulumi.type_token("vault:index/egpPolicy:EgpPolicy")
205
+ class EgpPolicy(pulumi.CustomResource):
206
+ @overload
207
+ def __init__(__self__,
208
+ resource_name: str,
209
+ opts: Optional[pulumi.ResourceOptions] = None,
210
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
211
+ name: Optional[pulumi.Input[_builtins.str]] = None,
212
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
213
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
215
+ __props__=None):
216
+ """
217
+ Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
218
+
219
+ **Note** this feature is available only with Vault Enterprise.
220
+
221
+ ## Example Usage
222
+
223
+ ```python
224
+ import pulumi
225
+ import pulumi_vault as vault
226
+
227
+ allow_all = vault.EgpPolicy("allow-all",
228
+ name="allow-all",
229
+ paths=["*"],
230
+ enforcement_level="soft-mandatory",
231
+ policy=\"\"\"main = rule {
232
+ true
233
+ }
234
+ \"\"\")
235
+ ```
236
+
237
+ :param str resource_name: The name of the resource.
238
+ :param pulumi.ResourceOptions opts: Options for the resource.
239
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
240
+ :param pulumi.Input[_builtins.str] name: The name of the policy
241
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
242
+ The value should not contain leading or trailing forward slashes.
243
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
244
+ *Available only for Vault Enterprise*.
245
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
246
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
247
+ """
248
+ ...
249
+ @overload
250
+ def __init__(__self__,
251
+ resource_name: str,
252
+ args: EgpPolicyArgs,
253
+ opts: Optional[pulumi.ResourceOptions] = None):
254
+ """
255
+ Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
256
+
257
+ **Note** this feature is available only with Vault Enterprise.
258
+
259
+ ## Example Usage
260
+
261
+ ```python
262
+ import pulumi
263
+ import pulumi_vault as vault
264
+
265
+ allow_all = vault.EgpPolicy("allow-all",
266
+ name="allow-all",
267
+ paths=["*"],
268
+ enforcement_level="soft-mandatory",
269
+ policy=\"\"\"main = rule {
270
+ true
271
+ }
272
+ \"\"\")
273
+ ```
274
+
275
+ :param str resource_name: The name of the resource.
276
+ :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
277
+ :param pulumi.ResourceOptions opts: Options for the resource.
278
+ """
279
+ ...
280
+ def __init__(__self__, resource_name: str, *args, **kwargs):
281
+ resource_args, opts = _utilities.get_resource_args_opts(EgpPolicyArgs, pulumi.ResourceOptions, *args, **kwargs)
282
+ if resource_args is not None:
283
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
284
+ else:
285
+ __self__._internal_init(resource_name, *args, **kwargs)
286
+
287
+ def _internal_init(__self__,
288
+ resource_name: str,
289
+ opts: Optional[pulumi.ResourceOptions] = None,
290
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
291
+ name: Optional[pulumi.Input[_builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
293
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
294
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
295
+ __props__=None):
296
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
297
+ if not isinstance(opts, pulumi.ResourceOptions):
298
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
299
+ if opts.id is None:
300
+ if __props__ is not None:
301
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
302
+ __props__ = EgpPolicyArgs.__new__(EgpPolicyArgs)
303
+
304
+ if enforcement_level is None and not opts.urn:
305
+ raise TypeError("Missing required property 'enforcement_level'")
306
+ __props__.__dict__["enforcement_level"] = enforcement_level
307
+ __props__.__dict__["name"] = name
308
+ __props__.__dict__["namespace"] = namespace
309
+ if paths is None and not opts.urn:
310
+ raise TypeError("Missing required property 'paths'")
311
+ __props__.__dict__["paths"] = paths
312
+ if policy is None and not opts.urn:
313
+ raise TypeError("Missing required property 'policy'")
314
+ __props__.__dict__["policy"] = policy
315
+ super(EgpPolicy, __self__).__init__(
316
+ 'vault:index/egpPolicy:EgpPolicy',
317
+ resource_name,
318
+ __props__,
319
+ opts)
320
+
321
+ @staticmethod
322
+ def get(resource_name: str,
323
+ id: pulumi.Input[str],
324
+ opts: Optional[pulumi.ResourceOptions] = None,
325
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
326
+ name: Optional[pulumi.Input[_builtins.str]] = None,
327
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
328
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
329
+ policy: Optional[pulumi.Input[_builtins.str]] = None) -> 'EgpPolicy':
330
+ """
331
+ Get an existing EgpPolicy resource's state with the given name, id, and optional extra
332
+ properties used to qualify the lookup.
333
+
334
+ :param str resource_name: The unique name of the resulting resource.
335
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
336
+ :param pulumi.ResourceOptions opts: Options for the resource.
337
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
338
+ :param pulumi.Input[_builtins.str] name: The name of the policy
339
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
340
+ The value should not contain leading or trailing forward slashes.
341
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
342
+ *Available only for Vault Enterprise*.
343
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
344
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
345
+ """
346
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
347
+
348
+ __props__ = _EgpPolicyState.__new__(_EgpPolicyState)
349
+
350
+ __props__.__dict__["enforcement_level"] = enforcement_level
351
+ __props__.__dict__["name"] = name
352
+ __props__.__dict__["namespace"] = namespace
353
+ __props__.__dict__["paths"] = paths
354
+ __props__.__dict__["policy"] = policy
355
+ return EgpPolicy(resource_name, opts=opts, __props__=__props__)
356
+
357
+ @_builtins.property
358
+ @pulumi.getter(name="enforcementLevel")
359
+ def enforcement_level(self) -> pulumi.Output[_builtins.str]:
360
+ """
361
+ Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
362
+ """
363
+ return pulumi.get(self, "enforcement_level")
364
+
365
+ @_builtins.property
366
+ @pulumi.getter
367
+ def name(self) -> pulumi.Output[_builtins.str]:
368
+ """
369
+ The name of the policy
370
+ """
371
+ return pulumi.get(self, "name")
372
+
373
+ @_builtins.property
374
+ @pulumi.getter
375
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
376
+ """
377
+ The namespace to provision the resource in.
378
+ The value should not contain leading or trailing forward slashes.
379
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
380
+ *Available only for Vault Enterprise*.
381
+ """
382
+ return pulumi.get(self, "namespace")
383
+
384
+ @_builtins.property
385
+ @pulumi.getter
386
+ def paths(self) -> pulumi.Output[Sequence[_builtins.str]]:
387
+ """
388
+ List of paths to which the policy will be applied to
389
+ """
390
+ return pulumi.get(self, "paths")
391
+
392
+ @_builtins.property
393
+ @pulumi.getter
394
+ def policy(self) -> pulumi.Output[_builtins.str]:
395
+ """
396
+ String containing a Sentinel policy
397
+ """
398
+ return pulumi.get(self, "policy")
399
+
@@ -0,0 +1,17 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .auth_backend import *
10
+ from .auth_backend_role import *
11
+ from .get_auth_backend_role import *
12
+ from .secret_backend import *
13
+ from .secret_impersonated_account import *
14
+ from .secret_roleset import *
15
+ from .secret_static_account import *
16
+ from ._inputs import *
17
+ from . import outputs