pulumi-vault 5.15.0a1693982937__tar.gz → 5.16.0a1694757730__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/PKG-INFO +1 -1
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_client.py +78 -3
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_role.py +7 -7
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/backend_role.py +61 -7
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/auth_backend.py +28 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mount.py +8 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_role.py +7 -7
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/setup.py +2 -2
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/README.md +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/pulumi-plugin.json +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/token.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/not-zip-safe +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/setup.cfg +0 -0
@@ -22,7 +22,8 @@ class AuthBackendClientArgs:
|
|
22
22
|
namespace: Optional[pulumi.Input[str]] = None,
|
23
23
|
secret_key: Optional[pulumi.Input[str]] = None,
|
24
24
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
25
|
-
sts_region: Optional[pulumi.Input[str]] = None
|
25
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
26
|
+
use_sts_region_from_client: Optional[pulumi.Input[bool]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a AuthBackendClient resource.
|
28
29
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
@@ -46,6 +47,11 @@ class AuthBackendClientArgs:
|
|
46
47
|
calls.
|
47
48
|
:param pulumi.Input[str] sts_region: Override the default region when making STS API
|
48
49
|
calls. The `sts_endpoint` argument must be set when using `sts_region`.
|
50
|
+
:param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
|
51
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
52
|
+
specified in the client request headers for IAM-based authentication.
|
53
|
+
This can be useful when you have client requests coming from different
|
54
|
+
regions and want flexibility in which regional STS API is used.
|
49
55
|
"""
|
50
56
|
if access_key is not None:
|
51
57
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -65,6 +71,8 @@ class AuthBackendClientArgs:
|
|
65
71
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
66
72
|
if sts_region is not None:
|
67
73
|
pulumi.set(__self__, "sts_region", sts_region)
|
74
|
+
if use_sts_region_from_client is not None:
|
75
|
+
pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
|
68
76
|
|
69
77
|
@property
|
70
78
|
@pulumi.getter(name="accessKey")
|
@@ -186,6 +194,22 @@ class AuthBackendClientArgs:
|
|
186
194
|
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
187
195
|
pulumi.set(self, "sts_region", value)
|
188
196
|
|
197
|
+
@property
|
198
|
+
@pulumi.getter(name="useStsRegionFromClient")
|
199
|
+
def use_sts_region_from_client(self) -> Optional[pulumi.Input[bool]]:
|
200
|
+
"""
|
201
|
+
Available in Vault v1.15+. If set,
|
202
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
203
|
+
specified in the client request headers for IAM-based authentication.
|
204
|
+
This can be useful when you have client requests coming from different
|
205
|
+
regions and want flexibility in which regional STS API is used.
|
206
|
+
"""
|
207
|
+
return pulumi.get(self, "use_sts_region_from_client")
|
208
|
+
|
209
|
+
@use_sts_region_from_client.setter
|
210
|
+
def use_sts_region_from_client(self, value: Optional[pulumi.Input[bool]]):
|
211
|
+
pulumi.set(self, "use_sts_region_from_client", value)
|
212
|
+
|
189
213
|
|
190
214
|
@pulumi.input_type
|
191
215
|
class _AuthBackendClientState:
|
@@ -198,7 +222,8 @@ class _AuthBackendClientState:
|
|
198
222
|
namespace: Optional[pulumi.Input[str]] = None,
|
199
223
|
secret_key: Optional[pulumi.Input[str]] = None,
|
200
224
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
201
|
-
sts_region: Optional[pulumi.Input[str]] = None
|
225
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
226
|
+
use_sts_region_from_client: Optional[pulumi.Input[bool]] = None):
|
202
227
|
"""
|
203
228
|
Input properties used for looking up and filtering AuthBackendClient resources.
|
204
229
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
@@ -222,6 +247,11 @@ class _AuthBackendClientState:
|
|
222
247
|
calls.
|
223
248
|
:param pulumi.Input[str] sts_region: Override the default region when making STS API
|
224
249
|
calls. The `sts_endpoint` argument must be set when using `sts_region`.
|
250
|
+
:param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
|
251
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
252
|
+
specified in the client request headers for IAM-based authentication.
|
253
|
+
This can be useful when you have client requests coming from different
|
254
|
+
regions and want flexibility in which regional STS API is used.
|
225
255
|
"""
|
226
256
|
if access_key is not None:
|
227
257
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -241,6 +271,8 @@ class _AuthBackendClientState:
|
|
241
271
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
242
272
|
if sts_region is not None:
|
243
273
|
pulumi.set(__self__, "sts_region", sts_region)
|
274
|
+
if use_sts_region_from_client is not None:
|
275
|
+
pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
|
244
276
|
|
245
277
|
@property
|
246
278
|
@pulumi.getter(name="accessKey")
|
@@ -362,6 +394,22 @@ class _AuthBackendClientState:
|
|
362
394
|
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
363
395
|
pulumi.set(self, "sts_region", value)
|
364
396
|
|
397
|
+
@property
|
398
|
+
@pulumi.getter(name="useStsRegionFromClient")
|
399
|
+
def use_sts_region_from_client(self) -> Optional[pulumi.Input[bool]]:
|
400
|
+
"""
|
401
|
+
Available in Vault v1.15+. If set,
|
402
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
403
|
+
specified in the client request headers for IAM-based authentication.
|
404
|
+
This can be useful when you have client requests coming from different
|
405
|
+
regions and want flexibility in which regional STS API is used.
|
406
|
+
"""
|
407
|
+
return pulumi.get(self, "use_sts_region_from_client")
|
408
|
+
|
409
|
+
@use_sts_region_from_client.setter
|
410
|
+
def use_sts_region_from_client(self, value: Optional[pulumi.Input[bool]]):
|
411
|
+
pulumi.set(self, "use_sts_region_from_client", value)
|
412
|
+
|
365
413
|
|
366
414
|
class AuthBackendClient(pulumi.CustomResource):
|
367
415
|
@overload
|
@@ -377,6 +425,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
377
425
|
secret_key: Optional[pulumi.Input[str]] = None,
|
378
426
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
379
427
|
sts_region: Optional[pulumi.Input[str]] = None,
|
428
|
+
use_sts_region_from_client: Optional[pulumi.Input[bool]] = None,
|
380
429
|
__props__=None):
|
381
430
|
"""
|
382
431
|
## Example Usage
|
@@ -423,6 +472,11 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
423
472
|
calls.
|
424
473
|
:param pulumi.Input[str] sts_region: Override the default region when making STS API
|
425
474
|
calls. The `sts_endpoint` argument must be set when using `sts_region`.
|
475
|
+
:param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
|
476
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
477
|
+
specified in the client request headers for IAM-based authentication.
|
478
|
+
This can be useful when you have client requests coming from different
|
479
|
+
regions and want flexibility in which regional STS API is used.
|
426
480
|
"""
|
427
481
|
...
|
428
482
|
@overload
|
@@ -476,6 +530,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
476
530
|
secret_key: Optional[pulumi.Input[str]] = None,
|
477
531
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
478
532
|
sts_region: Optional[pulumi.Input[str]] = None,
|
533
|
+
use_sts_region_from_client: Optional[pulumi.Input[bool]] = None,
|
479
534
|
__props__=None):
|
480
535
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
481
536
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -494,6 +549,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
494
549
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
495
550
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
496
551
|
__props__.__dict__["sts_region"] = sts_region
|
552
|
+
__props__.__dict__["use_sts_region_from_client"] = use_sts_region_from_client
|
497
553
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
|
498
554
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
499
555
|
super(AuthBackendClient, __self__).__init__(
|
@@ -514,7 +570,8 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
514
570
|
namespace: Optional[pulumi.Input[str]] = None,
|
515
571
|
secret_key: Optional[pulumi.Input[str]] = None,
|
516
572
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
517
|
-
sts_region: Optional[pulumi.Input[str]] = None
|
573
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
574
|
+
use_sts_region_from_client: Optional[pulumi.Input[bool]] = None) -> 'AuthBackendClient':
|
518
575
|
"""
|
519
576
|
Get an existing AuthBackendClient resource's state with the given name, id, and optional extra
|
520
577
|
properties used to qualify the lookup.
|
@@ -543,6 +600,11 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
543
600
|
calls.
|
544
601
|
:param pulumi.Input[str] sts_region: Override the default region when making STS API
|
545
602
|
calls. The `sts_endpoint` argument must be set when using `sts_region`.
|
603
|
+
:param pulumi.Input[bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
|
604
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
605
|
+
specified in the client request headers for IAM-based authentication.
|
606
|
+
This can be useful when you have client requests coming from different
|
607
|
+
regions and want flexibility in which regional STS API is used.
|
546
608
|
"""
|
547
609
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
548
610
|
|
@@ -557,6 +619,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
557
619
|
__props__.__dict__["secret_key"] = secret_key
|
558
620
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
559
621
|
__props__.__dict__["sts_region"] = sts_region
|
622
|
+
__props__.__dict__["use_sts_region_from_client"] = use_sts_region_from_client
|
560
623
|
return AuthBackendClient(resource_name, opts=opts, __props__=__props__)
|
561
624
|
|
562
625
|
@property
|
@@ -643,3 +706,15 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
643
706
|
"""
|
644
707
|
return pulumi.get(self, "sts_region")
|
645
708
|
|
709
|
+
@property
|
710
|
+
@pulumi.getter(name="useStsRegionFromClient")
|
711
|
+
def use_sts_region_from_client(self) -> pulumi.Output[bool]:
|
712
|
+
"""
|
713
|
+
Available in Vault v1.15+. If set,
|
714
|
+
overrides both `sts_endpoint` and `sts_region` to instead use the region
|
715
|
+
specified in the client request headers for IAM-based authentication.
|
716
|
+
This can be useful when you have client requests coming from different
|
717
|
+
regions and want flexibility in which regional STS API is used.
|
718
|
+
"""
|
719
|
+
return pulumi.get(self, "use_sts_region_from_client")
|
720
|
+
|
@@ -49,7 +49,7 @@ class AuthBackendRoleArgs:
|
|
49
49
|
the underlying instance where the client resides.
|
50
50
|
:param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
|
51
51
|
are `ec2` and `iam`. Defaults to `iam`.
|
52
|
-
:param pulumi.Input[str] backend:
|
52
|
+
:param pulumi.Input[str] backend: Path to the mounted aws auth backend.
|
53
53
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
|
54
54
|
instances that can perform the login operation that they should be using the
|
55
55
|
account ID specified by this field. `auth_type` must be set to `ec2` or
|
@@ -242,7 +242,7 @@ class AuthBackendRoleArgs:
|
|
242
242
|
@pulumi.getter
|
243
243
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
244
244
|
"""
|
245
|
-
|
245
|
+
Path to the mounted aws auth backend.
|
246
246
|
"""
|
247
247
|
return pulumi.get(self, "backend")
|
248
248
|
|
@@ -646,7 +646,7 @@ class _AuthBackendRoleState:
|
|
646
646
|
the underlying instance where the client resides.
|
647
647
|
:param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
|
648
648
|
are `ec2` and `iam`. Defaults to `iam`.
|
649
|
-
:param pulumi.Input[str] backend:
|
649
|
+
:param pulumi.Input[str] backend: Path to the mounted aws auth backend.
|
650
650
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
|
651
651
|
instances that can perform the login operation that they should be using the
|
652
652
|
account ID specified by this field. `auth_type` must be set to `ec2` or
|
@@ -832,7 +832,7 @@ class _AuthBackendRoleState:
|
|
832
832
|
@pulumi.getter
|
833
833
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
834
834
|
"""
|
835
|
-
|
835
|
+
Path to the mounted aws auth backend.
|
836
836
|
"""
|
837
837
|
return pulumi.get(self, "backend")
|
838
838
|
|
@@ -1305,7 +1305,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1305
1305
|
the underlying instance where the client resides.
|
1306
1306
|
:param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
|
1307
1307
|
are `ec2` and `iam`. Defaults to `iam`.
|
1308
|
-
:param pulumi.Input[str] backend:
|
1308
|
+
:param pulumi.Input[str] backend: Path to the mounted aws auth backend.
|
1309
1309
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
|
1310
1310
|
instances that can perform the login operation that they should be using the
|
1311
1311
|
account ID specified by this field. `auth_type` must be set to `ec2` or
|
@@ -1583,7 +1583,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1583
1583
|
the underlying instance where the client resides.
|
1584
1584
|
:param pulumi.Input[str] auth_type: The auth type permitted for this role. Valid choices
|
1585
1585
|
are `ec2` and `iam`. Defaults to `iam`.
|
1586
|
-
:param pulumi.Input[str] backend:
|
1586
|
+
:param pulumi.Input[str] backend: Path to the mounted aws auth backend.
|
1587
1587
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_account_ids: If set, defines a constraint on the EC2
|
1588
1588
|
instances that can perform the login operation that they should be using the
|
1589
1589
|
account ID specified by this field. `auth_type` must be set to `ec2` or
|
@@ -1737,7 +1737,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1737
1737
|
@pulumi.getter
|
1738
1738
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
1739
1739
|
"""
|
1740
|
-
|
1740
|
+
Path to the mounted aws auth backend.
|
1741
1741
|
"""
|
1742
1742
|
return pulumi.get(self, "backend")
|
1743
1743
|
|
{pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/azure/backend_role.py
RENAMED
@@ -24,12 +24,13 @@ class BackendRoleArgs:
|
|
24
24
|
description: Optional[pulumi.Input[str]] = None,
|
25
25
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
26
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
+
permanently_delete: Optional[pulumi.Input[bool]] = None,
|
27
28
|
ttl: Optional[pulumi.Input[str]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a BackendRole resource.
|
30
31
|
:param pulumi.Input[str] role: Name of the Azure role
|
31
32
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
32
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
33
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
33
34
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureGroupArgs']]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
34
35
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
35
36
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
@@ -40,6 +41,8 @@ class BackendRoleArgs:
|
|
40
41
|
The value should not contain leading or trailing forward slashes.
|
41
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
43
|
*Available only for Vault Enterprise*.
|
44
|
+
:param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
|
45
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
43
46
|
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
44
47
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
45
48
|
"""
|
@@ -58,6 +61,8 @@ class BackendRoleArgs:
|
|
58
61
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
59
62
|
if namespace is not None:
|
60
63
|
pulumi.set(__self__, "namespace", namespace)
|
64
|
+
if permanently_delete is not None:
|
65
|
+
pulumi.set(__self__, "permanently_delete", permanently_delete)
|
61
66
|
if ttl is not None:
|
62
67
|
pulumi.set(__self__, "ttl", ttl)
|
63
68
|
|
@@ -78,7 +83,7 @@ class BackendRoleArgs:
|
|
78
83
|
def application_object_id(self) -> Optional[pulumi.Input[str]]:
|
79
84
|
"""
|
80
85
|
Application Object ID for an existing service principal that will
|
81
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
86
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
82
87
|
"""
|
83
88
|
return pulumi.get(self, "application_object_id")
|
84
89
|
|
@@ -162,6 +167,19 @@ class BackendRoleArgs:
|
|
162
167
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
163
168
|
pulumi.set(self, "namespace", value)
|
164
169
|
|
170
|
+
@property
|
171
|
+
@pulumi.getter(name="permanentlyDelete")
|
172
|
+
def permanently_delete(self) -> Optional[pulumi.Input[bool]]:
|
173
|
+
"""
|
174
|
+
Indicates whether the applications and service principals created by Vault will be permanently
|
175
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
176
|
+
"""
|
177
|
+
return pulumi.get(self, "permanently_delete")
|
178
|
+
|
179
|
+
@permanently_delete.setter
|
180
|
+
def permanently_delete(self, value: Optional[pulumi.Input[bool]]):
|
181
|
+
pulumi.set(self, "permanently_delete", value)
|
182
|
+
|
165
183
|
@property
|
166
184
|
@pulumi.getter
|
167
185
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
@@ -186,12 +204,13 @@ class _BackendRoleState:
|
|
186
204
|
description: Optional[pulumi.Input[str]] = None,
|
187
205
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
188
206
|
namespace: Optional[pulumi.Input[str]] = None,
|
207
|
+
permanently_delete: Optional[pulumi.Input[bool]] = None,
|
189
208
|
role: Optional[pulumi.Input[str]] = None,
|
190
209
|
ttl: Optional[pulumi.Input[str]] = None):
|
191
210
|
"""
|
192
211
|
Input properties used for looking up and filtering BackendRole resources.
|
193
212
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
194
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
213
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
195
214
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureGroupArgs']]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
196
215
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
197
216
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
@@ -202,6 +221,8 @@ class _BackendRoleState:
|
|
202
221
|
The value should not contain leading or trailing forward slashes.
|
203
222
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
204
223
|
*Available only for Vault Enterprise*.
|
224
|
+
:param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
|
225
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
205
226
|
:param pulumi.Input[str] role: Name of the Azure role
|
206
227
|
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
207
228
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -220,6 +241,8 @@ class _BackendRoleState:
|
|
220
241
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
221
242
|
if namespace is not None:
|
222
243
|
pulumi.set(__self__, "namespace", namespace)
|
244
|
+
if permanently_delete is not None:
|
245
|
+
pulumi.set(__self__, "permanently_delete", permanently_delete)
|
223
246
|
if role is not None:
|
224
247
|
pulumi.set(__self__, "role", role)
|
225
248
|
if ttl is not None:
|
@@ -230,7 +253,7 @@ class _BackendRoleState:
|
|
230
253
|
def application_object_id(self) -> Optional[pulumi.Input[str]]:
|
231
254
|
"""
|
232
255
|
Application Object ID for an existing service principal that will
|
233
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
256
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
234
257
|
"""
|
235
258
|
return pulumi.get(self, "application_object_id")
|
236
259
|
|
@@ -314,6 +337,19 @@ class _BackendRoleState:
|
|
314
337
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
315
338
|
pulumi.set(self, "namespace", value)
|
316
339
|
|
340
|
+
@property
|
341
|
+
@pulumi.getter(name="permanentlyDelete")
|
342
|
+
def permanently_delete(self) -> Optional[pulumi.Input[bool]]:
|
343
|
+
"""
|
344
|
+
Indicates whether the applications and service principals created by Vault will be permanently
|
345
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
346
|
+
"""
|
347
|
+
return pulumi.get(self, "permanently_delete")
|
348
|
+
|
349
|
+
@permanently_delete.setter
|
350
|
+
def permanently_delete(self, value: Optional[pulumi.Input[bool]]):
|
351
|
+
pulumi.set(self, "permanently_delete", value)
|
352
|
+
|
317
353
|
@property
|
318
354
|
@pulumi.getter
|
319
355
|
def role(self) -> Optional[pulumi.Input[str]]:
|
@@ -352,6 +388,7 @@ class BackendRole(pulumi.CustomResource):
|
|
352
388
|
description: Optional[pulumi.Input[str]] = None,
|
353
389
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
354
390
|
namespace: Optional[pulumi.Input[str]] = None,
|
391
|
+
permanently_delete: Optional[pulumi.Input[bool]] = None,
|
355
392
|
role: Optional[pulumi.Input[str]] = None,
|
356
393
|
ttl: Optional[pulumi.Input[str]] = None,
|
357
394
|
__props__=None):
|
@@ -387,7 +424,7 @@ class BackendRole(pulumi.CustomResource):
|
|
387
424
|
:param str resource_name: The name of the resource.
|
388
425
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
389
426
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
390
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
427
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
391
428
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
392
429
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
393
430
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
@@ -398,6 +435,8 @@ class BackendRole(pulumi.CustomResource):
|
|
398
435
|
The value should not contain leading or trailing forward slashes.
|
399
436
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
400
437
|
*Available only for Vault Enterprise*.
|
438
|
+
:param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
|
439
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
401
440
|
:param pulumi.Input[str] role: Name of the Azure role
|
402
441
|
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
403
442
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -459,6 +498,7 @@ class BackendRole(pulumi.CustomResource):
|
|
459
498
|
description: Optional[pulumi.Input[str]] = None,
|
460
499
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
461
500
|
namespace: Optional[pulumi.Input[str]] = None,
|
501
|
+
permanently_delete: Optional[pulumi.Input[bool]] = None,
|
462
502
|
role: Optional[pulumi.Input[str]] = None,
|
463
503
|
ttl: Optional[pulumi.Input[str]] = None,
|
464
504
|
__props__=None):
|
@@ -477,6 +517,7 @@ class BackendRole(pulumi.CustomResource):
|
|
477
517
|
__props__.__dict__["description"] = description
|
478
518
|
__props__.__dict__["max_ttl"] = max_ttl
|
479
519
|
__props__.__dict__["namespace"] = namespace
|
520
|
+
__props__.__dict__["permanently_delete"] = permanently_delete
|
480
521
|
if role is None and not opts.urn:
|
481
522
|
raise TypeError("Missing required property 'role'")
|
482
523
|
__props__.__dict__["role"] = role
|
@@ -498,6 +539,7 @@ class BackendRole(pulumi.CustomResource):
|
|
498
539
|
description: Optional[pulumi.Input[str]] = None,
|
499
540
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
500
541
|
namespace: Optional[pulumi.Input[str]] = None,
|
542
|
+
permanently_delete: Optional[pulumi.Input[bool]] = None,
|
501
543
|
role: Optional[pulumi.Input[str]] = None,
|
502
544
|
ttl: Optional[pulumi.Input[str]] = None) -> 'BackendRole':
|
503
545
|
"""
|
@@ -508,7 +550,7 @@ class BackendRole(pulumi.CustomResource):
|
|
508
550
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
509
551
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
510
552
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
511
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
553
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
512
554
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureGroupArgs']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
513
555
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['BackendRoleAzureRoleArgs']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
514
556
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
@@ -519,6 +561,8 @@ class BackendRole(pulumi.CustomResource):
|
|
519
561
|
The value should not contain leading or trailing forward slashes.
|
520
562
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
521
563
|
*Available only for Vault Enterprise*.
|
564
|
+
:param pulumi.Input[bool] permanently_delete: Indicates whether the applications and service principals created by Vault will be permanently
|
565
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
522
566
|
:param pulumi.Input[str] role: Name of the Azure role
|
523
567
|
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
524
568
|
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
@@ -534,6 +578,7 @@ class BackendRole(pulumi.CustomResource):
|
|
534
578
|
__props__.__dict__["description"] = description
|
535
579
|
__props__.__dict__["max_ttl"] = max_ttl
|
536
580
|
__props__.__dict__["namespace"] = namespace
|
581
|
+
__props__.__dict__["permanently_delete"] = permanently_delete
|
537
582
|
__props__.__dict__["role"] = role
|
538
583
|
__props__.__dict__["ttl"] = ttl
|
539
584
|
return BackendRole(resource_name, opts=opts, __props__=__props__)
|
@@ -543,7 +588,7 @@ class BackendRole(pulumi.CustomResource):
|
|
543
588
|
def application_object_id(self) -> pulumi.Output[Optional[str]]:
|
544
589
|
"""
|
545
590
|
Application Object ID for an existing service principal that will
|
546
|
-
be used instead of creating dynamic service principals. If present, `azure_roles` will be ignored.
|
591
|
+
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
547
592
|
"""
|
548
593
|
return pulumi.get(self, "application_object_id")
|
549
594
|
|
@@ -599,6 +644,15 @@ class BackendRole(pulumi.CustomResource):
|
|
599
644
|
"""
|
600
645
|
return pulumi.get(self, "namespace")
|
601
646
|
|
647
|
+
@property
|
648
|
+
@pulumi.getter(name="permanentlyDelete")
|
649
|
+
def permanently_delete(self) -> pulumi.Output[bool]:
|
650
|
+
"""
|
651
|
+
Indicates whether the applications and service principals created by Vault will be permanently
|
652
|
+
deleted when the corresponding leases expire. Defaults to `false`. For Vault v1.12+.
|
653
|
+
"""
|
654
|
+
return pulumi.get(self, "permanently_delete")
|
655
|
+
|
602
656
|
@property
|
603
657
|
@pulumi.getter
|
604
658
|
def role(self) -> pulumi.Output[str]:
|
{pulumi_vault-5.15.0a1693982937 → pulumi_vault-5.16.0a1694757730}/pulumi_vault/gcp/auth_backend.py
RENAMED
@@ -216,6 +216,7 @@ class AuthBackendArgs:
|
|
216
216
|
@pulumi.input_type
|
217
217
|
class _AuthBackendState:
|
218
218
|
def __init__(__self__, *,
|
219
|
+
accessor: Optional[pulumi.Input[str]] = None,
|
219
220
|
client_email: Optional[pulumi.Input[str]] = None,
|
220
221
|
client_id: Optional[pulumi.Input[str]] = None,
|
221
222
|
credentials: Optional[pulumi.Input[str]] = None,
|
@@ -229,6 +230,7 @@ class _AuthBackendState:
|
|
229
230
|
project_id: Optional[pulumi.Input[str]] = None):
|
230
231
|
"""
|
231
232
|
Input properties used for looking up and filtering AuthBackend resources.
|
233
|
+
:param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
232
234
|
:param pulumi.Input[str] client_email: The clients email associated with the credentials
|
233
235
|
:param pulumi.Input[str] client_id: The Client ID of the credentials
|
234
236
|
:param pulumi.Input[str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
@@ -249,6 +251,8 @@ class _AuthBackendState:
|
|
249
251
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
250
252
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
251
253
|
"""
|
254
|
+
if accessor is not None:
|
255
|
+
pulumi.set(__self__, "accessor", accessor)
|
252
256
|
if client_email is not None:
|
253
257
|
pulumi.set(__self__, "client_email", client_email)
|
254
258
|
if client_id is not None:
|
@@ -272,6 +276,18 @@ class _AuthBackendState:
|
|
272
276
|
if project_id is not None:
|
273
277
|
pulumi.set(__self__, "project_id", project_id)
|
274
278
|
|
279
|
+
@property
|
280
|
+
@pulumi.getter
|
281
|
+
def accessor(self) -> Optional[pulumi.Input[str]]:
|
282
|
+
"""
|
283
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
284
|
+
"""
|
285
|
+
return pulumi.get(self, "accessor")
|
286
|
+
|
287
|
+
@accessor.setter
|
288
|
+
def accessor(self, value: Optional[pulumi.Input[str]]):
|
289
|
+
pulumi.set(self, "accessor", value)
|
290
|
+
|
275
291
|
@property
|
276
292
|
@pulumi.getter(name="clientEmail")
|
277
293
|
def client_email(self) -> Optional[pulumi.Input[str]]:
|
@@ -558,6 +574,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
558
574
|
__props__.__dict__["path"] = path
|
559
575
|
__props__.__dict__["private_key_id"] = private_key_id
|
560
576
|
__props__.__dict__["project_id"] = project_id
|
577
|
+
__props__.__dict__["accessor"] = None
|
561
578
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
|
562
579
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
563
580
|
super(AuthBackend, __self__).__init__(
|
@@ -570,6 +587,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
570
587
|
def get(resource_name: str,
|
571
588
|
id: pulumi.Input[str],
|
572
589
|
opts: Optional[pulumi.ResourceOptions] = None,
|
590
|
+
accessor: Optional[pulumi.Input[str]] = None,
|
573
591
|
client_email: Optional[pulumi.Input[str]] = None,
|
574
592
|
client_id: Optional[pulumi.Input[str]] = None,
|
575
593
|
credentials: Optional[pulumi.Input[str]] = None,
|
@@ -588,6 +606,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
588
606
|
:param str resource_name: The unique name of the resulting resource.
|
589
607
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
590
608
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
609
|
+
:param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
591
610
|
:param pulumi.Input[str] client_email: The clients email associated with the credentials
|
592
611
|
:param pulumi.Input[str] client_id: The Client ID of the credentials
|
593
612
|
:param pulumi.Input[str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
@@ -612,6 +631,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
612
631
|
|
613
632
|
__props__ = _AuthBackendState.__new__(_AuthBackendState)
|
614
633
|
|
634
|
+
__props__.__dict__["accessor"] = accessor
|
615
635
|
__props__.__dict__["client_email"] = client_email
|
616
636
|
__props__.__dict__["client_id"] = client_id
|
617
637
|
__props__.__dict__["credentials"] = credentials
|
@@ -625,6 +645,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
625
645
|
__props__.__dict__["project_id"] = project_id
|
626
646
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
627
647
|
|
648
|
+
@property
|
649
|
+
@pulumi.getter
|
650
|
+
def accessor(self) -> pulumi.Output[str]:
|
651
|
+
"""
|
652
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
653
|
+
"""
|
654
|
+
return pulumi.get(self, "accessor")
|
655
|
+
|
628
656
|
@property
|
629
657
|
@pulumi.getter(name="clientEmail")
|
630
658
|
def client_email(self) -> pulumi.Output[str]:
|
@@ -507,6 +507,10 @@ class Mount(pulumi.CustomResource):
|
|
507
507
|
|
508
508
|
kvv2_example = vault.Mount("kvv2-example",
|
509
509
|
description="This is an example KV Version 2 secret engine mount",
|
510
|
+
options={
|
511
|
+
"type": "kv-v2",
|
512
|
+
"version": "2",
|
513
|
+
},
|
510
514
|
path="version2-example",
|
511
515
|
type="kv-v2")
|
512
516
|
```
|
@@ -588,6 +592,10 @@ class Mount(pulumi.CustomResource):
|
|
588
592
|
|
589
593
|
kvv2_example = vault.Mount("kvv2-example",
|
590
594
|
description="This is an example KV Version 2 secret engine mount",
|
595
|
+
options={
|
596
|
+
"type": "kv-v2",
|
597
|
+
"version": "2",
|
598
|
+
},
|
591
599
|
path="version2-example",
|
592
600
|
type="kv-v2")
|
593
601
|
```
|
@@ -99,7 +99,7 @@ class SecretBackendRoleArgs:
|
|
99
99
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
100
100
|
*Available only for Vault Enterprise*.
|
101
101
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
102
|
-
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
102
|
+
:param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
103
103
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
104
104
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
105
105
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
@@ -595,7 +595,7 @@ class SecretBackendRoleArgs:
|
|
595
595
|
@pulumi.getter(name="notBeforeDuration")
|
596
596
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
597
597
|
"""
|
598
|
-
Specifies the duration by which to backdate the NotBefore property.
|
598
|
+
Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
599
599
|
"""
|
600
600
|
return pulumi.get(self, "not_before_duration")
|
601
601
|
|
@@ -824,7 +824,7 @@ class _SecretBackendRoleState:
|
|
824
824
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
825
825
|
*Available only for Vault Enterprise*.
|
826
826
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
827
|
-
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
827
|
+
:param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
828
828
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
829
829
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
830
830
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
@@ -1321,7 +1321,7 @@ class _SecretBackendRoleState:
|
|
1321
1321
|
@pulumi.getter(name="notBeforeDuration")
|
1322
1322
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
1323
1323
|
"""
|
1324
|
-
Specifies the duration by which to backdate the NotBefore property.
|
1324
|
+
Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
1325
1325
|
"""
|
1326
1326
|
return pulumi.get(self, "not_before_duration")
|
1327
1327
|
|
@@ -1588,7 +1588,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1588
1588
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1589
1589
|
*Available only for Vault Enterprise*.
|
1590
1590
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1591
|
-
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1591
|
+
:param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
1592
1592
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1593
1593
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1594
1594
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
@@ -1856,7 +1856,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1856
1856
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1857
1857
|
*Available only for Vault Enterprise*.
|
1858
1858
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1859
|
-
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1859
|
+
:param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
1860
1860
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1861
1861
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1862
1862
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
@@ -2186,7 +2186,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2186
2186
|
@pulumi.getter(name="notBeforeDuration")
|
2187
2187
|
def not_before_duration(self) -> pulumi.Output[str]:
|
2188
2188
|
"""
|
2189
|
-
Specifies the duration by which to backdate the NotBefore property.
|
2189
|
+
Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
|
2190
2190
|
"""
|
2191
2191
|
return pulumi.get(self, "not_before_duration")
|
2192
2192
|
|