pulumi-vault 5.16.0a1697145324__tar.gz → 5.16.0a1697217180__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/PKG-INFO +1 -1
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_login.py +3 -1
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend.py +47 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/_inputs.py +112 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/outputs.py +98 -2
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_static_role.py +153 -21
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/nomad_secret_role.py +7 -14
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_role.py +21 -7
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/secret_backend_role.py +54 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/secret_backend_key.py +61 -14
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/setup.py +2 -2
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/README.md +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/pulumi-plugin.json +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/token.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/not-zip-safe +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/setup.cfg +0 -0
@@ -400,7 +400,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
400
400
|
if role_id is None and not opts.urn:
|
401
401
|
raise TypeError("Missing required property 'role_id'")
|
402
402
|
__props__.__dict__["role_id"] = role_id
|
403
|
-
__props__.__dict__["secret_id"] = secret_id
|
403
|
+
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
404
404
|
__props__.__dict__["accessor"] = None
|
405
405
|
__props__.__dict__["client_token"] = None
|
406
406
|
__props__.__dict__["lease_duration"] = None
|
@@ -408,6 +408,8 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
408
408
|
__props__.__dict__["metadata"] = None
|
409
409
|
__props__.__dict__["policies"] = None
|
410
410
|
__props__.__dict__["renewable"] = None
|
411
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientToken", "secretId"])
|
412
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
411
413
|
super(AuthBackendLogin, __self__).__init__(
|
412
414
|
'vault:appRole/authBackendLogin:AuthBackendLogin',
|
413
415
|
resource_name,
|
{pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/aws/secret_backend.py
RENAMED
@@ -19,6 +19,7 @@ class SecretBackendArgs:
|
|
19
19
|
description: Optional[pulumi.Input[str]] = None,
|
20
20
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
21
21
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
22
|
+
local: Optional[pulumi.Input[bool]] = None,
|
22
23
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
23
24
|
namespace: Optional[pulumi.Input[str]] = None,
|
24
25
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -36,6 +37,7 @@ class SecretBackendArgs:
|
|
36
37
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
37
38
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
38
39
|
:param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
40
|
+
:param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
39
41
|
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
40
42
|
for credentials issued by this backend.
|
41
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -60,6 +62,8 @@ class SecretBackendArgs:
|
|
60
62
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
61
63
|
if iam_endpoint is not None:
|
62
64
|
pulumi.set(__self__, "iam_endpoint", iam_endpoint)
|
65
|
+
if local is not None:
|
66
|
+
pulumi.set(__self__, "local", local)
|
63
67
|
if max_lease_ttl_seconds is not None:
|
64
68
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
65
69
|
if namespace is not None:
|
@@ -138,6 +142,18 @@ class SecretBackendArgs:
|
|
138
142
|
def iam_endpoint(self, value: Optional[pulumi.Input[str]]):
|
139
143
|
pulumi.set(self, "iam_endpoint", value)
|
140
144
|
|
145
|
+
@property
|
146
|
+
@pulumi.getter
|
147
|
+
def local(self) -> Optional[pulumi.Input[bool]]:
|
148
|
+
"""
|
149
|
+
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
150
|
+
"""
|
151
|
+
return pulumi.get(self, "local")
|
152
|
+
|
153
|
+
@local.setter
|
154
|
+
def local(self, value: Optional[pulumi.Input[bool]]):
|
155
|
+
pulumi.set(self, "local", value)
|
156
|
+
|
141
157
|
@property
|
142
158
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
143
159
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
@@ -237,6 +253,7 @@ class _SecretBackendState:
|
|
237
253
|
description: Optional[pulumi.Input[str]] = None,
|
238
254
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
239
255
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
256
|
+
local: Optional[pulumi.Input[bool]] = None,
|
240
257
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
241
258
|
namespace: Optional[pulumi.Input[str]] = None,
|
242
259
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -254,6 +271,7 @@ class _SecretBackendState:
|
|
254
271
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
255
272
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
256
273
|
:param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
274
|
+
:param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
257
275
|
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
258
276
|
for credentials issued by this backend.
|
259
277
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -278,6 +296,8 @@ class _SecretBackendState:
|
|
278
296
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
279
297
|
if iam_endpoint is not None:
|
280
298
|
pulumi.set(__self__, "iam_endpoint", iam_endpoint)
|
299
|
+
if local is not None:
|
300
|
+
pulumi.set(__self__, "local", local)
|
281
301
|
if max_lease_ttl_seconds is not None:
|
282
302
|
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
283
303
|
if namespace is not None:
|
@@ -356,6 +376,18 @@ class _SecretBackendState:
|
|
356
376
|
def iam_endpoint(self, value: Optional[pulumi.Input[str]]):
|
357
377
|
pulumi.set(self, "iam_endpoint", value)
|
358
378
|
|
379
|
+
@property
|
380
|
+
@pulumi.getter
|
381
|
+
def local(self) -> Optional[pulumi.Input[bool]]:
|
382
|
+
"""
|
383
|
+
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
384
|
+
"""
|
385
|
+
return pulumi.get(self, "local")
|
386
|
+
|
387
|
+
@local.setter
|
388
|
+
def local(self, value: Optional[pulumi.Input[bool]]):
|
389
|
+
pulumi.set(self, "local", value)
|
390
|
+
|
359
391
|
@property
|
360
392
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
361
393
|
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
@@ -457,6 +489,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
457
489
|
description: Optional[pulumi.Input[str]] = None,
|
458
490
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
459
491
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
492
|
+
local: Optional[pulumi.Input[bool]] = None,
|
460
493
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
461
494
|
namespace: Optional[pulumi.Input[str]] = None,
|
462
495
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -484,6 +517,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
484
517
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
485
518
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
486
519
|
:param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
520
|
+
:param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
487
521
|
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
488
522
|
for credentials issued by this backend.
|
489
523
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -533,6 +567,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
533
567
|
description: Optional[pulumi.Input[str]] = None,
|
534
568
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
535
569
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
570
|
+
local: Optional[pulumi.Input[bool]] = None,
|
536
571
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
537
572
|
namespace: Optional[pulumi.Input[str]] = None,
|
538
573
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -554,6 +589,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
554
589
|
__props__.__dict__["description"] = description
|
555
590
|
__props__.__dict__["disable_remount"] = disable_remount
|
556
591
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
592
|
+
__props__.__dict__["local"] = local
|
557
593
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
558
594
|
__props__.__dict__["namespace"] = namespace
|
559
595
|
__props__.__dict__["path"] = path
|
@@ -578,6 +614,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
578
614
|
description: Optional[pulumi.Input[str]] = None,
|
579
615
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
580
616
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
617
|
+
local: Optional[pulumi.Input[bool]] = None,
|
581
618
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
582
619
|
namespace: Optional[pulumi.Input[str]] = None,
|
583
620
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -600,6 +637,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
600
637
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
601
638
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
602
639
|
:param pulumi.Input[str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
|
640
|
+
:param pulumi.Input[bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
603
641
|
:param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
|
604
642
|
for credentials issued by this backend.
|
605
643
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -623,6 +661,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
623
661
|
__props__.__dict__["description"] = description
|
624
662
|
__props__.__dict__["disable_remount"] = disable_remount
|
625
663
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
664
|
+
__props__.__dict__["local"] = local
|
626
665
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
627
666
|
__props__.__dict__["namespace"] = namespace
|
628
667
|
__props__.__dict__["path"] = path
|
@@ -675,6 +714,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
675
714
|
"""
|
676
715
|
return pulumi.get(self, "iam_endpoint")
|
677
716
|
|
717
|
+
@property
|
718
|
+
@pulumi.getter
|
719
|
+
def local(self) -> pulumi.Output[Optional[bool]]:
|
720
|
+
"""
|
721
|
+
Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
|
722
|
+
"""
|
723
|
+
return pulumi.get(self, "local")
|
724
|
+
|
678
725
|
@property
|
679
726
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
680
727
|
def max_lease_ttl_seconds(self) -> pulumi.Output[int]:
|
{pulumi_vault-5.16.0a1697145324 → pulumi_vault-5.16.0a1697217180}/pulumi_vault/database/_inputs.py
RENAMED
@@ -1175,16 +1175,19 @@ class SecretBackendConnectionMssqlArgs:
|
|
1175
1175
|
@pulumi.input_type
|
1176
1176
|
class SecretBackendConnectionMysqlArgs:
|
1177
1177
|
def __init__(__self__, *,
|
1178
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1178
1179
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1179
1180
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1180
1181
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1181
1182
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1182
1183
|
password: Optional[pulumi.Input[str]] = None,
|
1184
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1183
1185
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
1184
1186
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
1185
1187
|
username: Optional[pulumi.Input[str]] = None,
|
1186
1188
|
username_template: Optional[pulumi.Input[str]] = None):
|
1187
1189
|
"""
|
1190
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1188
1191
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN. See
|
1189
1192
|
the [Vault
|
1190
1193
|
docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
@@ -1195,11 +1198,14 @@ class SecretBackendConnectionMysqlArgs:
|
|
1195
1198
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1196
1199
|
the database.
|
1197
1200
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
1201
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1198
1202
|
:param pulumi.Input[str] tls_ca: x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded.
|
1199
1203
|
:param pulumi.Input[str] tls_certificate_key: x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined.
|
1200
1204
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
1201
1205
|
:param pulumi.Input[str] username_template: - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
1202
1206
|
"""
|
1207
|
+
if auth_type is not None:
|
1208
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
1203
1209
|
if connection_url is not None:
|
1204
1210
|
pulumi.set(__self__, "connection_url", connection_url)
|
1205
1211
|
if max_connection_lifetime is not None:
|
@@ -1210,6 +1216,8 @@ class SecretBackendConnectionMysqlArgs:
|
|
1210
1216
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1211
1217
|
if password is not None:
|
1212
1218
|
pulumi.set(__self__, "password", password)
|
1219
|
+
if service_account_json is not None:
|
1220
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
1213
1221
|
if tls_ca is not None:
|
1214
1222
|
pulumi.set(__self__, "tls_ca", tls_ca)
|
1215
1223
|
if tls_certificate_key is not None:
|
@@ -1219,6 +1227,18 @@ class SecretBackendConnectionMysqlArgs:
|
|
1219
1227
|
if username_template is not None:
|
1220
1228
|
pulumi.set(__self__, "username_template", username_template)
|
1221
1229
|
|
1230
|
+
@property
|
1231
|
+
@pulumi.getter(name="authType")
|
1232
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1233
|
+
"""
|
1234
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1235
|
+
"""
|
1236
|
+
return pulumi.get(self, "auth_type")
|
1237
|
+
|
1238
|
+
@auth_type.setter
|
1239
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
1240
|
+
pulumi.set(self, "auth_type", value)
|
1241
|
+
|
1222
1242
|
@property
|
1223
1243
|
@pulumi.getter(name="connectionUrl")
|
1224
1244
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -1284,6 +1304,18 @@ class SecretBackendConnectionMysqlArgs:
|
|
1284
1304
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1285
1305
|
pulumi.set(self, "password", value)
|
1286
1306
|
|
1307
|
+
@property
|
1308
|
+
@pulumi.getter(name="serviceAccountJson")
|
1309
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
1310
|
+
"""
|
1311
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1312
|
+
"""
|
1313
|
+
return pulumi.get(self, "service_account_json")
|
1314
|
+
|
1315
|
+
@service_account_json.setter
|
1316
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
1317
|
+
pulumi.set(self, "service_account_json", value)
|
1318
|
+
|
1287
1319
|
@property
|
1288
1320
|
@pulumi.getter(name="tlsCa")
|
1289
1321
|
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
@@ -1852,15 +1884,18 @@ class SecretBackendConnectionOracleArgs:
|
|
1852
1884
|
@pulumi.input_type
|
1853
1885
|
class SecretBackendConnectionPostgresqlArgs:
|
1854
1886
|
def __init__(__self__, *,
|
1887
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
1855
1888
|
connection_url: Optional[pulumi.Input[str]] = None,
|
1856
1889
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
1857
1890
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
1858
1891
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
1859
1892
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
1860
1893
|
password: Optional[pulumi.Input[str]] = None,
|
1894
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
1861
1895
|
username: Optional[pulumi.Input[str]] = None,
|
1862
1896
|
username_template: Optional[pulumi.Input[str]] = None):
|
1863
1897
|
"""
|
1898
|
+
:param pulumi.Input[str] auth_type: Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1864
1899
|
:param pulumi.Input[str] connection_url: Specifies the Redshift DSN. See
|
1865
1900
|
the [Vault
|
1866
1901
|
docs](https://www.vaultproject.io/api-docs/secret/databases/redshift#sample-payload)
|
@@ -1872,9 +1907,12 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
1872
1907
|
:param pulumi.Input[int] max_open_connections: The maximum number of open connections to
|
1873
1908
|
the database.
|
1874
1909
|
:param pulumi.Input[str] password: The root credential password used in the connection URL.
|
1910
|
+
:param pulumi.Input[str] service_account_json: JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
1875
1911
|
:param pulumi.Input[str] username: The root credential username used in the connection URL.
|
1876
1912
|
:param pulumi.Input[str] username_template: - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
1877
1913
|
"""
|
1914
|
+
if auth_type is not None:
|
1915
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
1878
1916
|
if connection_url is not None:
|
1879
1917
|
pulumi.set(__self__, "connection_url", connection_url)
|
1880
1918
|
if disable_escaping is not None:
|
@@ -1887,11 +1925,25 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
1887
1925
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1888
1926
|
if password is not None:
|
1889
1927
|
pulumi.set(__self__, "password", password)
|
1928
|
+
if service_account_json is not None:
|
1929
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
1890
1930
|
if username is not None:
|
1891
1931
|
pulumi.set(__self__, "username", username)
|
1892
1932
|
if username_template is not None:
|
1893
1933
|
pulumi.set(__self__, "username_template", username_template)
|
1894
1934
|
|
1935
|
+
@property
|
1936
|
+
@pulumi.getter(name="authType")
|
1937
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
1938
|
+
"""
|
1939
|
+
Enable IAM authentication to a Google Cloud instance when set to `gcp_iam`
|
1940
|
+
"""
|
1941
|
+
return pulumi.get(self, "auth_type")
|
1942
|
+
|
1943
|
+
@auth_type.setter
|
1944
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
1945
|
+
pulumi.set(self, "auth_type", value)
|
1946
|
+
|
1895
1947
|
@property
|
1896
1948
|
@pulumi.getter(name="connectionUrl")
|
1897
1949
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -1969,6 +2021,18 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
1969
2021
|
def password(self, value: Optional[pulumi.Input[str]]):
|
1970
2022
|
pulumi.set(self, "password", value)
|
1971
2023
|
|
2024
|
+
@property
|
2025
|
+
@pulumi.getter(name="serviceAccountJson")
|
2026
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
2027
|
+
"""
|
2028
|
+
JSON encoding of an IAM access key. Requires `auth_type` to be `gcp_iam`.
|
2029
|
+
"""
|
2030
|
+
return pulumi.get(self, "service_account_json")
|
2031
|
+
|
2032
|
+
@service_account_json.setter
|
2033
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
2034
|
+
pulumi.set(self, "service_account_json", value)
|
2035
|
+
|
1972
2036
|
@property
|
1973
2037
|
@pulumi.getter
|
1974
2038
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -4339,6 +4403,7 @@ class SecretsMountMysqlArgs:
|
|
4339
4403
|
def __init__(__self__, *,
|
4340
4404
|
name: pulumi.Input[str],
|
4341
4405
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4406
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
4342
4407
|
connection_url: Optional[pulumi.Input[str]] = None,
|
4343
4408
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
4344
4409
|
max_connection_lifetime: Optional[pulumi.Input[int]] = None,
|
@@ -4347,6 +4412,7 @@ class SecretsMountMysqlArgs:
|
|
4347
4412
|
password: Optional[pulumi.Input[str]] = None,
|
4348
4413
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
4349
4414
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
4415
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
4350
4416
|
tls_ca: Optional[pulumi.Input[str]] = None,
|
4351
4417
|
tls_certificate_key: Optional[pulumi.Input[str]] = None,
|
4352
4418
|
username: Optional[pulumi.Input[str]] = None,
|
@@ -4377,6 +4443,8 @@ class SecretsMountMysqlArgs:
|
|
4377
4443
|
pulumi.set(__self__, "name", name)
|
4378
4444
|
if allowed_roles is not None:
|
4379
4445
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
4446
|
+
if auth_type is not None:
|
4447
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
4380
4448
|
if connection_url is not None:
|
4381
4449
|
pulumi.set(__self__, "connection_url", connection_url)
|
4382
4450
|
if data is not None:
|
@@ -4393,6 +4461,8 @@ class SecretsMountMysqlArgs:
|
|
4393
4461
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
4394
4462
|
if root_rotation_statements is not None:
|
4395
4463
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
4464
|
+
if service_account_json is not None:
|
4465
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
4396
4466
|
if tls_ca is not None:
|
4397
4467
|
pulumi.set(__self__, "tls_ca", tls_ca)
|
4398
4468
|
if tls_certificate_key is not None:
|
@@ -4426,6 +4496,15 @@ class SecretsMountMysqlArgs:
|
|
4426
4496
|
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4427
4497
|
pulumi.set(self, "allowed_roles", value)
|
4428
4498
|
|
4499
|
+
@property
|
4500
|
+
@pulumi.getter(name="authType")
|
4501
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
4502
|
+
return pulumi.get(self, "auth_type")
|
4503
|
+
|
4504
|
+
@auth_type.setter
|
4505
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
4506
|
+
pulumi.set(self, "auth_type", value)
|
4507
|
+
|
4429
4508
|
@property
|
4430
4509
|
@pulumi.getter(name="connectionUrl")
|
4431
4510
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -4526,6 +4605,15 @@ class SecretsMountMysqlArgs:
|
|
4526
4605
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
4527
4606
|
pulumi.set(self, "root_rotation_statements", value)
|
4528
4607
|
|
4608
|
+
@property
|
4609
|
+
@pulumi.getter(name="serviceAccountJson")
|
4610
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
4611
|
+
return pulumi.get(self, "service_account_json")
|
4612
|
+
|
4613
|
+
@service_account_json.setter
|
4614
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
4615
|
+
pulumi.set(self, "service_account_json", value)
|
4616
|
+
|
4529
4617
|
@property
|
4530
4618
|
@pulumi.getter(name="tlsCa")
|
4531
4619
|
def tls_ca(self) -> Optional[pulumi.Input[str]]:
|
@@ -5481,6 +5569,7 @@ class SecretsMountPostgresqlArgs:
|
|
5481
5569
|
def __init__(__self__, *,
|
5482
5570
|
name: pulumi.Input[str],
|
5483
5571
|
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5572
|
+
auth_type: Optional[pulumi.Input[str]] = None,
|
5484
5573
|
connection_url: Optional[pulumi.Input[str]] = None,
|
5485
5574
|
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
5486
5575
|
disable_escaping: Optional[pulumi.Input[bool]] = None,
|
@@ -5490,6 +5579,7 @@ class SecretsMountPostgresqlArgs:
|
|
5490
5579
|
password: Optional[pulumi.Input[str]] = None,
|
5491
5580
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
5492
5581
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
5582
|
+
service_account_json: Optional[pulumi.Input[str]] = None,
|
5493
5583
|
username: Optional[pulumi.Input[str]] = None,
|
5494
5584
|
username_template: Optional[pulumi.Input[str]] = None,
|
5495
5585
|
verify_connection: Optional[pulumi.Input[bool]] = None):
|
@@ -5517,6 +5607,8 @@ class SecretsMountPostgresqlArgs:
|
|
5517
5607
|
pulumi.set(__self__, "name", name)
|
5518
5608
|
if allowed_roles is not None:
|
5519
5609
|
pulumi.set(__self__, "allowed_roles", allowed_roles)
|
5610
|
+
if auth_type is not None:
|
5611
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
5520
5612
|
if connection_url is not None:
|
5521
5613
|
pulumi.set(__self__, "connection_url", connection_url)
|
5522
5614
|
if data is not None:
|
@@ -5535,6 +5627,8 @@ class SecretsMountPostgresqlArgs:
|
|
5535
5627
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5536
5628
|
if root_rotation_statements is not None:
|
5537
5629
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
5630
|
+
if service_account_json is not None:
|
5631
|
+
pulumi.set(__self__, "service_account_json", service_account_json)
|
5538
5632
|
if username is not None:
|
5539
5633
|
pulumi.set(__self__, "username", username)
|
5540
5634
|
if username_template is not None:
|
@@ -5564,6 +5658,15 @@ class SecretsMountPostgresqlArgs:
|
|
5564
5658
|
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5565
5659
|
pulumi.set(self, "allowed_roles", value)
|
5566
5660
|
|
5661
|
+
@property
|
5662
|
+
@pulumi.getter(name="authType")
|
5663
|
+
def auth_type(self) -> Optional[pulumi.Input[str]]:
|
5664
|
+
return pulumi.get(self, "auth_type")
|
5665
|
+
|
5666
|
+
@auth_type.setter
|
5667
|
+
def auth_type(self, value: Optional[pulumi.Input[str]]):
|
5668
|
+
pulumi.set(self, "auth_type", value)
|
5669
|
+
|
5567
5670
|
@property
|
5568
5671
|
@pulumi.getter(name="connectionUrl")
|
5569
5672
|
def connection_url(self) -> Optional[pulumi.Input[str]]:
|
@@ -5676,6 +5779,15 @@ class SecretsMountPostgresqlArgs:
|
|
5676
5779
|
def root_rotation_statements(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
5677
5780
|
pulumi.set(self, "root_rotation_statements", value)
|
5678
5781
|
|
5782
|
+
@property
|
5783
|
+
@pulumi.getter(name="serviceAccountJson")
|
5784
|
+
def service_account_json(self) -> Optional[pulumi.Input[str]]:
|
5785
|
+
return pulumi.get(self, "service_account_json")
|
5786
|
+
|
5787
|
+
@service_account_json.setter
|
5788
|
+
def service_account_json(self, value: Optional[pulumi.Input[str]]):
|
5789
|
+
pulumi.set(self, "service_account_json", value)
|
5790
|
+
|
5679
5791
|
@property
|
5680
5792
|
@pulumi.getter
|
5681
5793
|
def username(self) -> Optional[pulumi.Input[str]]:
|