pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/egp_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|
@@ -27,7 +32,7 @@ class EgpPolicyArgs:
|
|
27
32
|
:param pulumi.Input[str] name: The name of the policy
|
28
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
34
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
36
|
*Available only for Vault Enterprise*.
|
32
37
|
"""
|
33
38
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -92,7 +97,7 @@ class EgpPolicyArgs:
|
|
92
97
|
"""
|
93
98
|
The namespace to provision the resource in.
|
94
99
|
The value should not contain leading or trailing forward slashes.
|
95
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
100
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
96
101
|
*Available only for Vault Enterprise*.
|
97
102
|
"""
|
98
103
|
return pulumi.get(self, "namespace")
|
@@ -116,7 +121,7 @@ class _EgpPolicyState:
|
|
116
121
|
:param pulumi.Input[str] name: The name of the policy
|
117
122
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
118
123
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
124
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
125
|
*Available only for Vault Enterprise*.
|
121
126
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
122
127
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -162,7 +167,7 @@ class _EgpPolicyState:
|
|
162
167
|
"""
|
163
168
|
The namespace to provision the resource in.
|
164
169
|
The value should not contain leading or trailing forward slashes.
|
165
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
170
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
166
171
|
*Available only for Vault Enterprise*.
|
167
172
|
"""
|
168
173
|
return pulumi.get(self, "namespace")
|
@@ -219,12 +224,12 @@ class EgpPolicy(pulumi.CustomResource):
|
|
219
224
|
import pulumi_vault as vault
|
220
225
|
|
221
226
|
allow_all = vault.EgpPolicy("allow-all",
|
222
|
-
|
227
|
+
name="allow-all",
|
223
228
|
paths=["*"],
|
229
|
+
enforcement_level="soft-mandatory",
|
224
230
|
policy=\"\"\"main = rule {
|
225
231
|
true
|
226
232
|
}
|
227
|
-
|
228
233
|
\"\"\")
|
229
234
|
```
|
230
235
|
|
@@ -234,7 +239,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
234
239
|
:param pulumi.Input[str] name: The name of the policy
|
235
240
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
236
241
|
The value should not contain leading or trailing forward slashes.
|
237
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
242
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
238
243
|
*Available only for Vault Enterprise*.
|
239
244
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
240
245
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -257,12 +262,12 @@ class EgpPolicy(pulumi.CustomResource):
|
|
257
262
|
import pulumi_vault as vault
|
258
263
|
|
259
264
|
allow_all = vault.EgpPolicy("allow-all",
|
260
|
-
|
265
|
+
name="allow-all",
|
261
266
|
paths=["*"],
|
267
|
+
enforcement_level="soft-mandatory",
|
262
268
|
policy=\"\"\"main = rule {
|
263
269
|
true
|
264
270
|
}
|
265
|
-
|
266
271
|
\"\"\")
|
267
272
|
```
|
268
273
|
|
@@ -332,7 +337,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
332
337
|
:param pulumi.Input[str] name: The name of the policy
|
333
338
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
334
339
|
The value should not contain leading or trailing forward slashes.
|
335
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
340
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
336
341
|
*Available only for Vault Enterprise*.
|
337
342
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
|
338
343
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
@@ -370,7 +375,7 @@ class EgpPolicy(pulumi.CustomResource):
|
|
370
375
|
"""
|
371
376
|
The namespace to provision the resource in.
|
372
377
|
The value should not contain leading or trailing forward slashes.
|
373
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
378
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
374
379
|
*Available only for Vault Enterprise*.
|
375
380
|
"""
|
376
381
|
return pulumi.get(self, "namespace")
|
pulumi_vault/gcp/_inputs.py
CHANGED
@@ -4,18 +4,53 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendCustomEndpointArgs',
|
19
|
+
'AuthBackendCustomEndpointArgsDict',
|
14
20
|
'AuthBackendTuneArgs',
|
21
|
+
'AuthBackendTuneArgsDict',
|
15
22
|
'SecretRolesetBindingArgs',
|
23
|
+
'SecretRolesetBindingArgsDict',
|
16
24
|
'SecretStaticAccountBindingArgs',
|
25
|
+
'SecretStaticAccountBindingArgsDict',
|
17
26
|
]
|
18
27
|
|
28
|
+
MYPY = False
|
29
|
+
|
30
|
+
if not MYPY:
|
31
|
+
class AuthBackendCustomEndpointArgsDict(TypedDict):
|
32
|
+
api: NotRequired[pulumi.Input[str]]
|
33
|
+
"""
|
34
|
+
Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
35
|
+
"""
|
36
|
+
compute: NotRequired[pulumi.Input[str]]
|
37
|
+
"""
|
38
|
+
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
39
|
+
|
40
|
+
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
41
|
+
The `scheme://` and `:port` portions of the endpoint value are optional.
|
42
|
+
"""
|
43
|
+
crm: NotRequired[pulumi.Input[str]]
|
44
|
+
"""
|
45
|
+
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
46
|
+
"""
|
47
|
+
iam: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
50
|
+
"""
|
51
|
+
elif False:
|
52
|
+
AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
|
53
|
+
|
19
54
|
@pulumi.input_type
|
20
55
|
class AuthBackendCustomEndpointArgs:
|
21
56
|
def __init__(__self__, *,
|
@@ -93,6 +128,56 @@ class AuthBackendCustomEndpointArgs:
|
|
93
128
|
pulumi.set(self, "iam", value)
|
94
129
|
|
95
130
|
|
131
|
+
if not MYPY:
|
132
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
133
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
134
|
+
"""
|
135
|
+
List of headers to whitelist and allowing
|
136
|
+
a plugin to include them in the response.
|
137
|
+
"""
|
138
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
139
|
+
"""
|
140
|
+
Specifies the list of keys that will
|
141
|
+
not be HMAC'd by audit devices in the request data object.
|
142
|
+
"""
|
143
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
144
|
+
"""
|
145
|
+
Specifies the list of keys that will
|
146
|
+
not be HMAC'd by audit devices in the response data object.
|
147
|
+
"""
|
148
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
149
|
+
"""
|
150
|
+
Specifies the default time-to-live.
|
151
|
+
If set, this overrides the global default.
|
152
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
153
|
+
"""
|
154
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
155
|
+
"""
|
156
|
+
Specifies whether to show this mount in
|
157
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
158
|
+
"""
|
159
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
160
|
+
"""
|
161
|
+
Specifies the maximum time-to-live.
|
162
|
+
If set, this overrides the global default.
|
163
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
164
|
+
"""
|
165
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
166
|
+
"""
|
167
|
+
List of headers to whitelist and
|
168
|
+
pass from the request to the backend.
|
169
|
+
"""
|
170
|
+
token_type: NotRequired[pulumi.Input[str]]
|
171
|
+
"""
|
172
|
+
Specifies the type of tokens that should be returned by
|
173
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
174
|
+
|
175
|
+
|
176
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
177
|
+
"""
|
178
|
+
elif False:
|
179
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
180
|
+
|
96
181
|
@pulumi.input_type
|
97
182
|
class AuthBackendTuneArgs:
|
98
183
|
def __init__(__self__, *,
|
@@ -254,6 +339,19 @@ class AuthBackendTuneArgs:
|
|
254
339
|
pulumi.set(self, "token_type", value)
|
255
340
|
|
256
341
|
|
342
|
+
if not MYPY:
|
343
|
+
class SecretRolesetBindingArgsDict(TypedDict):
|
344
|
+
resource: pulumi.Input[str]
|
345
|
+
"""
|
346
|
+
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
347
|
+
"""
|
348
|
+
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
349
|
+
"""
|
350
|
+
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
351
|
+
"""
|
352
|
+
elif False:
|
353
|
+
SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
|
354
|
+
|
257
355
|
@pulumi.input_type
|
258
356
|
class SecretRolesetBindingArgs:
|
259
357
|
def __init__(__self__, *,
|
@@ -291,6 +389,19 @@ class SecretRolesetBindingArgs:
|
|
291
389
|
pulumi.set(self, "roles", value)
|
292
390
|
|
293
391
|
|
392
|
+
if not MYPY:
|
393
|
+
class SecretStaticAccountBindingArgsDict(TypedDict):
|
394
|
+
resource: pulumi.Input[str]
|
395
|
+
"""
|
396
|
+
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
397
|
+
"""
|
398
|
+
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
399
|
+
"""
|
400
|
+
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
401
|
+
"""
|
402
|
+
elif False:
|
403
|
+
SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
|
404
|
+
|
294
405
|
@pulumi.input_type
|
295
406
|
class SecretStaticAccountBindingArgs:
|
296
407
|
def __init__(__self__, *,
|