pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -16,7 +21,6 @@ class SecretBackendKeyArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
19
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
20
24
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
21
25
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
22
26
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
@@ -33,8 +37,6 @@ class SecretBackendKeyArgs:
|
|
33
37
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
34
38
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
35
39
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
36
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
37
|
-
key.
|
38
40
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
39
41
|
A value of 0 disables automatic rotation for the key.
|
40
42
|
:param pulumi.Input[bool] convergent_encryption: Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`.
|
@@ -47,7 +49,7 @@ class SecretBackendKeyArgs:
|
|
47
49
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
48
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
49
51
|
The value should not contain leading or trailing forward slashes.
|
50
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
53
|
*Available only for Vault Enterprise*.
|
52
54
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
53
55
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
@@ -55,11 +57,6 @@ class SecretBackendKeyArgs:
|
|
55
57
|
pulumi.set(__self__, "backend", backend)
|
56
58
|
if allow_plaintext_backup is not None:
|
57
59
|
pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
|
58
|
-
if auto_rotate_interval is not None:
|
59
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
60
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
61
|
-
if auto_rotate_interval is not None:
|
62
|
-
pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
|
63
60
|
if auto_rotate_period is not None:
|
64
61
|
pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
|
65
62
|
if convergent_encryption is not None:
|
@@ -108,22 +105,6 @@ class SecretBackendKeyArgs:
|
|
108
105
|
def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
|
109
106
|
pulumi.set(self, "allow_plaintext_backup", value)
|
110
107
|
|
111
|
-
@property
|
112
|
-
@pulumi.getter(name="autoRotateInterval")
|
113
|
-
def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
|
114
|
-
"""
|
115
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
116
|
-
key.
|
117
|
-
"""
|
118
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
119
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
120
|
-
|
121
|
-
return pulumi.get(self, "auto_rotate_interval")
|
122
|
-
|
123
|
-
@auto_rotate_interval.setter
|
124
|
-
def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
|
125
|
-
pulumi.set(self, "auto_rotate_interval", value)
|
126
|
-
|
127
108
|
@property
|
128
109
|
@pulumi.getter(name="autoRotatePeriod")
|
129
110
|
def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
|
@@ -239,7 +220,7 @@ class SecretBackendKeyArgs:
|
|
239
220
|
"""
|
240
221
|
The namespace to provision the resource in.
|
241
222
|
The value should not contain leading or trailing forward slashes.
|
242
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
223
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
243
224
|
*Available only for Vault Enterprise*.
|
244
225
|
"""
|
245
226
|
return pulumi.get(self, "namespace")
|
@@ -266,7 +247,6 @@ class SecretBackendKeyArgs:
|
|
266
247
|
class _SecretBackendKeyState:
|
267
248
|
def __init__(__self__, *,
|
268
249
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
269
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
270
250
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
271
251
|
backend: Optional[pulumi.Input[str]] = None,
|
272
252
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -274,7 +254,7 @@ class _SecretBackendKeyState:
|
|
274
254
|
derived: Optional[pulumi.Input[bool]] = None,
|
275
255
|
exportable: Optional[pulumi.Input[bool]] = None,
|
276
256
|
key_size: Optional[pulumi.Input[int]] = None,
|
277
|
-
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
257
|
+
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
278
258
|
latest_version: Optional[pulumi.Input[int]] = None,
|
279
259
|
min_available_version: Optional[pulumi.Input[int]] = None,
|
280
260
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
@@ -290,8 +270,6 @@ class _SecretBackendKeyState:
|
|
290
270
|
Input properties used for looking up and filtering SecretBackendKey resources.
|
291
271
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
292
272
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
293
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
294
|
-
key.
|
295
273
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
296
274
|
A value of 0 disables automatic rotation for the key.
|
297
275
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -300,7 +278,7 @@ class _SecretBackendKeyState:
|
|
300
278
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
301
279
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
302
280
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
303
|
-
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
281
|
+
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
304
282
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
305
283
|
* for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
|
306
284
|
:param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
|
@@ -310,7 +288,7 @@ class _SecretBackendKeyState:
|
|
310
288
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
311
289
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
312
290
|
The value should not contain leading or trailing forward slashes.
|
313
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
291
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
314
292
|
*Available only for Vault Enterprise*.
|
315
293
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
316
294
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
@@ -321,11 +299,6 @@ class _SecretBackendKeyState:
|
|
321
299
|
"""
|
322
300
|
if allow_plaintext_backup is not None:
|
323
301
|
pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
|
324
|
-
if auto_rotate_interval is not None:
|
325
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
326
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
327
|
-
if auto_rotate_interval is not None:
|
328
|
-
pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
|
329
302
|
if auto_rotate_period is not None:
|
330
303
|
pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
|
331
304
|
if backend is not None:
|
@@ -378,22 +351,6 @@ class _SecretBackendKeyState:
|
|
378
351
|
def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
|
379
352
|
pulumi.set(self, "allow_plaintext_backup", value)
|
380
353
|
|
381
|
-
@property
|
382
|
-
@pulumi.getter(name="autoRotateInterval")
|
383
|
-
def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
|
384
|
-
"""
|
385
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
386
|
-
key.
|
387
|
-
"""
|
388
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
389
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
390
|
-
|
391
|
-
return pulumi.get(self, "auto_rotate_interval")
|
392
|
-
|
393
|
-
@auto_rotate_interval.setter
|
394
|
-
def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
|
395
|
-
pulumi.set(self, "auto_rotate_interval", value)
|
396
|
-
|
397
354
|
@property
|
398
355
|
@pulumi.getter(name="autoRotatePeriod")
|
399
356
|
def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
|
@@ -481,7 +438,7 @@ class _SecretBackendKeyState:
|
|
481
438
|
|
482
439
|
@property
|
483
440
|
@pulumi.getter
|
484
|
-
def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
441
|
+
def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]:
|
485
442
|
"""
|
486
443
|
List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
487
444
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -490,7 +447,7 @@ class _SecretBackendKeyState:
|
|
490
447
|
return pulumi.get(self, "keys")
|
491
448
|
|
492
449
|
@keys.setter
|
493
|
-
def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
450
|
+
def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]):
|
494
451
|
pulumi.set(self, "keys", value)
|
495
452
|
|
496
453
|
@property
|
@@ -559,7 +516,7 @@ class _SecretBackendKeyState:
|
|
559
516
|
"""
|
560
517
|
The namespace to provision the resource in.
|
561
518
|
The value should not contain leading or trailing forward slashes.
|
562
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
519
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
563
520
|
*Available only for Vault Enterprise*.
|
564
521
|
"""
|
565
522
|
return pulumi.get(self, "namespace")
|
@@ -636,7 +593,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
636
593
|
resource_name: str,
|
637
594
|
opts: Optional[pulumi.ResourceOptions] = None,
|
638
595
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
639
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
640
596
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
641
597
|
backend: Optional[pulumi.Input[str]] = None,
|
642
598
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -665,26 +621,23 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
665
621
|
description="Example description",
|
666
622
|
default_lease_ttl_seconds=3600,
|
667
623
|
max_lease_ttl_seconds=86400)
|
668
|
-
key = vault.transit.SecretBackendKey("key",
|
624
|
+
key = vault.transit.SecretBackendKey("key",
|
625
|
+
backend=transit.path,
|
626
|
+
name="my_key")
|
669
627
|
```
|
670
|
-
## Deprecations
|
671
|
-
|
672
|
-
* `auto_rotate_interval` - Replaced by `auto_rotate_period`.
|
673
628
|
|
674
629
|
## Import
|
675
630
|
|
676
631
|
Transit secret backend keys can be imported using the `path`, e.g.
|
677
632
|
|
678
633
|
```sh
|
679
|
-
|
634
|
+
$ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
|
680
635
|
```
|
681
636
|
|
682
637
|
:param str resource_name: The name of the resource.
|
683
638
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
684
639
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
685
640
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
686
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
687
|
-
key.
|
688
641
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
689
642
|
A value of 0 disables automatic rotation for the key.
|
690
643
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -698,7 +651,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
698
651
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
699
652
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
700
653
|
The value should not contain leading or trailing forward slashes.
|
701
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
654
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
702
655
|
*Available only for Vault Enterprise*.
|
703
656
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
704
657
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
@@ -724,18 +677,17 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
724
677
|
description="Example description",
|
725
678
|
default_lease_ttl_seconds=3600,
|
726
679
|
max_lease_ttl_seconds=86400)
|
727
|
-
key = vault.transit.SecretBackendKey("key",
|
680
|
+
key = vault.transit.SecretBackendKey("key",
|
681
|
+
backend=transit.path,
|
682
|
+
name="my_key")
|
728
683
|
```
|
729
|
-
## Deprecations
|
730
|
-
|
731
|
-
* `auto_rotate_interval` - Replaced by `auto_rotate_period`.
|
732
684
|
|
733
685
|
## Import
|
734
686
|
|
735
687
|
Transit secret backend keys can be imported using the `path`, e.g.
|
736
688
|
|
737
689
|
```sh
|
738
|
-
|
690
|
+
$ pulumi import vault:transit/secretBackendKey:SecretBackendKey key transit/keys/my_key
|
739
691
|
```
|
740
692
|
|
741
693
|
:param str resource_name: The name of the resource.
|
@@ -754,7 +706,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
754
706
|
resource_name: str,
|
755
707
|
opts: Optional[pulumi.ResourceOptions] = None,
|
756
708
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
757
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
758
709
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
759
710
|
backend: Optional[pulumi.Input[str]] = None,
|
760
711
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -777,7 +728,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
777
728
|
__props__ = SecretBackendKeyArgs.__new__(SecretBackendKeyArgs)
|
778
729
|
|
779
730
|
__props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
|
780
|
-
__props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
|
781
731
|
__props__.__dict__["auto_rotate_period"] = auto_rotate_period
|
782
732
|
if backend is None and not opts.urn:
|
783
733
|
raise TypeError("Missing required property 'backend'")
|
@@ -810,7 +760,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
810
760
|
id: pulumi.Input[str],
|
811
761
|
opts: Optional[pulumi.ResourceOptions] = None,
|
812
762
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
813
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
814
763
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
815
764
|
backend: Optional[pulumi.Input[str]] = None,
|
816
765
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -818,7 +767,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
818
767
|
derived: Optional[pulumi.Input[bool]] = None,
|
819
768
|
exportable: Optional[pulumi.Input[bool]] = None,
|
820
769
|
key_size: Optional[pulumi.Input[int]] = None,
|
821
|
-
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
770
|
+
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
822
771
|
latest_version: Optional[pulumi.Input[int]] = None,
|
823
772
|
min_available_version: Optional[pulumi.Input[int]] = None,
|
824
773
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
@@ -839,8 +788,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
839
788
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
840
789
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
841
790
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
842
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
843
|
-
key.
|
844
791
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
845
792
|
A value of 0 disables automatic rotation for the key.
|
846
793
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -849,7 +796,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
849
796
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
850
797
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
851
798
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
852
|
-
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
799
|
+
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
853
800
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
854
801
|
* for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
|
855
802
|
:param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
|
@@ -859,7 +806,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
859
806
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
860
807
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
861
808
|
The value should not contain leading or trailing forward slashes.
|
862
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
809
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
863
810
|
*Available only for Vault Enterprise*.
|
864
811
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
865
812
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
@@ -873,7 +820,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
873
820
|
__props__ = _SecretBackendKeyState.__new__(_SecretBackendKeyState)
|
874
821
|
|
875
822
|
__props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
|
876
|
-
__props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
|
877
823
|
__props__.__dict__["auto_rotate_period"] = auto_rotate_period
|
878
824
|
__props__.__dict__["backend"] = backend
|
879
825
|
__props__.__dict__["convergent_encryption"] = convergent_encryption
|
@@ -904,18 +850,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
904
850
|
"""
|
905
851
|
return pulumi.get(self, "allow_plaintext_backup")
|
906
852
|
|
907
|
-
@property
|
908
|
-
@pulumi.getter(name="autoRotateInterval")
|
909
|
-
def auto_rotate_interval(self) -> pulumi.Output[int]:
|
910
|
-
"""
|
911
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
912
|
-
key.
|
913
|
-
"""
|
914
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
915
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
916
|
-
|
917
|
-
return pulumi.get(self, "auto_rotate_interval")
|
918
|
-
|
919
853
|
@property
|
920
854
|
@pulumi.getter(name="autoRotatePeriod")
|
921
855
|
def auto_rotate_period(self) -> pulumi.Output[int]:
|
@@ -975,7 +909,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
975
909
|
|
976
910
|
@property
|
977
911
|
@pulumi.getter
|
978
|
-
def keys(self) -> pulumi.Output[Sequence[Mapping[str,
|
912
|
+
def keys(self) -> pulumi.Output[Sequence[Mapping[str, str]]]:
|
979
913
|
"""
|
980
914
|
List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
981
915
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -1029,7 +963,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
1029
963
|
"""
|
1030
964
|
The namespace to provision the resource in.
|
1031
965
|
The value should not contain leading or trailing forward slashes.
|
1032
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
966
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1033
967
|
*Available only for Vault Enterprise*.
|
1034
968
|
"""
|
1035
969
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
|
@@ -23,7 +28,7 @@ class SecretCacheConfigArgs:
|
|
23
28
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretCacheConfigArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretCacheConfigState:
|
|
82
87
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretCacheConfigState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -167,7 +172,7 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
167
172
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
168
173
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
169
174
|
The value should not contain leading or trailing forward slashes.
|
170
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
175
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
171
176
|
*Available only for Vault Enterprise*.
|
172
177
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
173
178
|
"""
|
@@ -254,7 +259,7 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
254
259
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
255
260
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
256
261
|
The value should not contain leading or trailing forward slashes.
|
257
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
262
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
258
263
|
*Available only for Vault Enterprise*.
|
259
264
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
260
265
|
"""
|
@@ -281,7 +286,7 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
281
286
|
"""
|
282
287
|
The namespace to provision the resource in.
|
283
288
|
The value should not contain leading or trailing forward slashes.
|
284
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
289
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
285
290
|
*Available only for Vault Enterprise*.
|
286
291
|
"""
|
287
292
|
return pulumi.get(self, "namespace")
|
{pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA
RENAMED
@@ -1,16 +1,17 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.2
|
2
2
|
Name: pulumi_vault
|
3
|
-
Version: 5.
|
3
|
+
Version: 6.5.0a1736836139
|
4
4
|
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-vault
|
8
8
|
Keywords: pulumi,vault
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.9
|
10
10
|
Description-Content-Type: text/markdown
|
11
|
-
Requires-Dist: parver
|
12
|
-
Requires-Dist: pulumi
|
13
|
-
Requires-Dist: semver
|
11
|
+
Requires-Dist: parver>=0.2.1
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: semver>=2.8.1
|
14
|
+
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
14
15
|
|
15
16
|
[](https://travis-ci.com/pulumi/pulumi-vault)
|
16
17
|
|
@@ -43,7 +44,7 @@ To use from Python, install using `pip`:
|
|
43
44
|
|
44
45
|
To use from Go, use `go get` to grab the latest version of the library
|
45
46
|
|
46
|
-
$ go get github.com/pulumi/pulumi-vault/sdk/
|
47
|
+
$ go get github.com/pulumi/pulumi-vault/sdk/v6
|
47
48
|
|
48
49
|
### .NET
|
49
50
|
|