pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -16,7 +21,6 @@ class SecretBackendKeyArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
19
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
20
24
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
21
25
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
22
26
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
@@ -33,8 +37,6 @@ class SecretBackendKeyArgs:
|
|
33
37
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
34
38
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
35
39
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
36
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
37
|
-
key.
|
38
40
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
39
41
|
A value of 0 disables automatic rotation for the key.
|
40
42
|
:param pulumi.Input[bool] convergent_encryption: Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires `derived` to be set to `true`.
|
@@ -47,7 +49,7 @@ class SecretBackendKeyArgs:
|
|
47
49
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
48
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
49
51
|
The value should not contain leading or trailing forward slashes.
|
50
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
53
|
*Available only for Vault Enterprise*.
|
52
54
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
53
55
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
@@ -55,11 +57,6 @@ class SecretBackendKeyArgs:
|
|
55
57
|
pulumi.set(__self__, "backend", backend)
|
56
58
|
if allow_plaintext_backup is not None:
|
57
59
|
pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
|
58
|
-
if auto_rotate_interval is not None:
|
59
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
60
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
61
|
-
if auto_rotate_interval is not None:
|
62
|
-
pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
|
63
60
|
if auto_rotate_period is not None:
|
64
61
|
pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
|
65
62
|
if convergent_encryption is not None:
|
@@ -108,22 +105,6 @@ class SecretBackendKeyArgs:
|
|
108
105
|
def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
|
109
106
|
pulumi.set(self, "allow_plaintext_backup", value)
|
110
107
|
|
111
|
-
@property
|
112
|
-
@pulumi.getter(name="autoRotateInterval")
|
113
|
-
def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
|
114
|
-
"""
|
115
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
116
|
-
key.
|
117
|
-
"""
|
118
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
119
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
120
|
-
|
121
|
-
return pulumi.get(self, "auto_rotate_interval")
|
122
|
-
|
123
|
-
@auto_rotate_interval.setter
|
124
|
-
def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
|
125
|
-
pulumi.set(self, "auto_rotate_interval", value)
|
126
|
-
|
127
108
|
@property
|
128
109
|
@pulumi.getter(name="autoRotatePeriod")
|
129
110
|
def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
|
@@ -239,7 +220,7 @@ class SecretBackendKeyArgs:
|
|
239
220
|
"""
|
240
221
|
The namespace to provision the resource in.
|
241
222
|
The value should not contain leading or trailing forward slashes.
|
242
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
223
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
243
224
|
*Available only for Vault Enterprise*.
|
244
225
|
"""
|
245
226
|
return pulumi.get(self, "namespace")
|
@@ -266,7 +247,6 @@ class SecretBackendKeyArgs:
|
|
266
247
|
class _SecretBackendKeyState:
|
267
248
|
def __init__(__self__, *,
|
268
249
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
269
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
270
250
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
271
251
|
backend: Optional[pulumi.Input[str]] = None,
|
272
252
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -274,7 +254,7 @@ class _SecretBackendKeyState:
|
|
274
254
|
derived: Optional[pulumi.Input[bool]] = None,
|
275
255
|
exportable: Optional[pulumi.Input[bool]] = None,
|
276
256
|
key_size: Optional[pulumi.Input[int]] = None,
|
277
|
-
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
257
|
+
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
278
258
|
latest_version: Optional[pulumi.Input[int]] = None,
|
279
259
|
min_available_version: Optional[pulumi.Input[int]] = None,
|
280
260
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
@@ -290,8 +270,6 @@ class _SecretBackendKeyState:
|
|
290
270
|
Input properties used for looking up and filtering SecretBackendKey resources.
|
291
271
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
292
272
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
293
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
294
|
-
key.
|
295
273
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
296
274
|
A value of 0 disables automatic rotation for the key.
|
297
275
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -300,7 +278,7 @@ class _SecretBackendKeyState:
|
|
300
278
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
301
279
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
302
280
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
303
|
-
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
281
|
+
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
304
282
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
305
283
|
* for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
|
306
284
|
:param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
|
@@ -310,7 +288,7 @@ class _SecretBackendKeyState:
|
|
310
288
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
311
289
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
312
290
|
The value should not contain leading or trailing forward slashes.
|
313
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
291
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
314
292
|
*Available only for Vault Enterprise*.
|
315
293
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
316
294
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
@@ -321,11 +299,6 @@ class _SecretBackendKeyState:
|
|
321
299
|
"""
|
322
300
|
if allow_plaintext_backup is not None:
|
323
301
|
pulumi.set(__self__, "allow_plaintext_backup", allow_plaintext_backup)
|
324
|
-
if auto_rotate_interval is not None:
|
325
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
326
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
327
|
-
if auto_rotate_interval is not None:
|
328
|
-
pulumi.set(__self__, "auto_rotate_interval", auto_rotate_interval)
|
329
302
|
if auto_rotate_period is not None:
|
330
303
|
pulumi.set(__self__, "auto_rotate_period", auto_rotate_period)
|
331
304
|
if backend is not None:
|
@@ -378,22 +351,6 @@ class _SecretBackendKeyState:
|
|
378
351
|
def allow_plaintext_backup(self, value: Optional[pulumi.Input[bool]]):
|
379
352
|
pulumi.set(self, "allow_plaintext_backup", value)
|
380
353
|
|
381
|
-
@property
|
382
|
-
@pulumi.getter(name="autoRotateInterval")
|
383
|
-
def auto_rotate_interval(self) -> Optional[pulumi.Input[int]]:
|
384
|
-
"""
|
385
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
386
|
-
key.
|
387
|
-
"""
|
388
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
389
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
390
|
-
|
391
|
-
return pulumi.get(self, "auto_rotate_interval")
|
392
|
-
|
393
|
-
@auto_rotate_interval.setter
|
394
|
-
def auto_rotate_interval(self, value: Optional[pulumi.Input[int]]):
|
395
|
-
pulumi.set(self, "auto_rotate_interval", value)
|
396
|
-
|
397
354
|
@property
|
398
355
|
@pulumi.getter(name="autoRotatePeriod")
|
399
356
|
def auto_rotate_period(self) -> Optional[pulumi.Input[int]]:
|
@@ -481,7 +438,7 @@ class _SecretBackendKeyState:
|
|
481
438
|
|
482
439
|
@property
|
483
440
|
@pulumi.getter
|
484
|
-
def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
441
|
+
def keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]:
|
485
442
|
"""
|
486
443
|
List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
487
444
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -490,7 +447,7 @@ class _SecretBackendKeyState:
|
|
490
447
|
return pulumi.get(self, "keys")
|
491
448
|
|
492
449
|
@keys.setter
|
493
|
-
def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
450
|
+
def keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]]):
|
494
451
|
pulumi.set(self, "keys", value)
|
495
452
|
|
496
453
|
@property
|
@@ -559,7 +516,7 @@ class _SecretBackendKeyState:
|
|
559
516
|
"""
|
560
517
|
The namespace to provision the resource in.
|
561
518
|
The value should not contain leading or trailing forward slashes.
|
562
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
519
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
563
520
|
*Available only for Vault Enterprise*.
|
564
521
|
"""
|
565
522
|
return pulumi.get(self, "namespace")
|
@@ -636,7 +593,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
636
593
|
resource_name: str,
|
637
594
|
opts: Optional[pulumi.ResourceOptions] = None,
|
638
595
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
639
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
640
596
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
641
597
|
backend: Optional[pulumi.Input[str]] = None,
|
642
598
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -655,7 +611,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
655
611
|
|
656
612
|
## Example Usage
|
657
613
|
|
658
|
-
<!--Start PulumiCodeChooser -->
|
659
614
|
```python
|
660
615
|
import pulumi
|
661
616
|
import pulumi_vault as vault
|
@@ -666,13 +621,10 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
666
621
|
description="Example description",
|
667
622
|
default_lease_ttl_seconds=3600,
|
668
623
|
max_lease_ttl_seconds=86400)
|
669
|
-
key = vault.transit.SecretBackendKey("key",
|
624
|
+
key = vault.transit.SecretBackendKey("key",
|
625
|
+
backend=transit.path,
|
626
|
+
name="my_key")
|
670
627
|
```
|
671
|
-
<!--End PulumiCodeChooser -->
|
672
|
-
|
673
|
-
## Deprecations
|
674
|
-
|
675
|
-
* `auto_rotate_interval` - Replaced by `auto_rotate_period`.
|
676
628
|
|
677
629
|
## Import
|
678
630
|
|
@@ -686,8 +638,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
686
638
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
687
639
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
688
640
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
689
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
690
|
-
key.
|
691
641
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
692
642
|
A value of 0 disables automatic rotation for the key.
|
693
643
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -701,7 +651,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
701
651
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
702
652
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
703
653
|
The value should not contain leading or trailing forward slashes.
|
704
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
654
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
705
655
|
*Available only for Vault Enterprise*.
|
706
656
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
707
657
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
@@ -717,7 +667,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
717
667
|
|
718
668
|
## Example Usage
|
719
669
|
|
720
|
-
<!--Start PulumiCodeChooser -->
|
721
670
|
```python
|
722
671
|
import pulumi
|
723
672
|
import pulumi_vault as vault
|
@@ -728,13 +677,10 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
728
677
|
description="Example description",
|
729
678
|
default_lease_ttl_seconds=3600,
|
730
679
|
max_lease_ttl_seconds=86400)
|
731
|
-
key = vault.transit.SecretBackendKey("key",
|
680
|
+
key = vault.transit.SecretBackendKey("key",
|
681
|
+
backend=transit.path,
|
682
|
+
name="my_key")
|
732
683
|
```
|
733
|
-
<!--End PulumiCodeChooser -->
|
734
|
-
|
735
|
-
## Deprecations
|
736
|
-
|
737
|
-
* `auto_rotate_interval` - Replaced by `auto_rotate_period`.
|
738
684
|
|
739
685
|
## Import
|
740
686
|
|
@@ -760,7 +706,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
760
706
|
resource_name: str,
|
761
707
|
opts: Optional[pulumi.ResourceOptions] = None,
|
762
708
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
763
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
764
709
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
765
710
|
backend: Optional[pulumi.Input[str]] = None,
|
766
711
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -783,7 +728,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
783
728
|
__props__ = SecretBackendKeyArgs.__new__(SecretBackendKeyArgs)
|
784
729
|
|
785
730
|
__props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
|
786
|
-
__props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
|
787
731
|
__props__.__dict__["auto_rotate_period"] = auto_rotate_period
|
788
732
|
if backend is None and not opts.urn:
|
789
733
|
raise TypeError("Missing required property 'backend'")
|
@@ -816,7 +760,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
816
760
|
id: pulumi.Input[str],
|
817
761
|
opts: Optional[pulumi.ResourceOptions] = None,
|
818
762
|
allow_plaintext_backup: Optional[pulumi.Input[bool]] = None,
|
819
|
-
auto_rotate_interval: Optional[pulumi.Input[int]] = None,
|
820
763
|
auto_rotate_period: Optional[pulumi.Input[int]] = None,
|
821
764
|
backend: Optional[pulumi.Input[str]] = None,
|
822
765
|
convergent_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -824,7 +767,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
824
767
|
derived: Optional[pulumi.Input[bool]] = None,
|
825
768
|
exportable: Optional[pulumi.Input[bool]] = None,
|
826
769
|
key_size: Optional[pulumi.Input[int]] = None,
|
827
|
-
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
770
|
+
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
828
771
|
latest_version: Optional[pulumi.Input[int]] = None,
|
829
772
|
min_available_version: Optional[pulumi.Input[int]] = None,
|
830
773
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
@@ -845,8 +788,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
845
788
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
846
789
|
:param pulumi.Input[bool] allow_plaintext_backup: Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
|
847
790
|
* Refer to Vault API documentation on key backups for more information: [Backup Key](https://www.vaultproject.io/api-docs/secret/transit#backup-key)
|
848
|
-
:param pulumi.Input[int] auto_rotate_interval: Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
849
|
-
key.
|
850
791
|
:param pulumi.Input[int] auto_rotate_period: Amount of seconds the key should live before being automatically rotated.
|
851
792
|
A value of 0 disables automatic rotation for the key.
|
852
793
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
@@ -855,7 +796,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
855
796
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
856
797
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
857
798
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
858
|
-
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str,
|
799
|
+
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
859
800
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
860
801
|
* for key types `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `rsa-2048`, `rsa-3072` and `rsa-4096`, each key version will be a map of the following:
|
861
802
|
:param pulumi.Input[int] latest_version: Latest key version available. This value is 1-indexed, so if `latest_version` is `1`, then the key's information can be referenced from `keys` by selecting element `0`
|
@@ -865,7 +806,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
865
806
|
:param pulumi.Input[str] name: The name to identify this key within the backend. Must be unique within the backend.
|
866
807
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
867
808
|
The value should not contain leading or trailing forward slashes.
|
868
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
809
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
869
810
|
*Available only for Vault Enterprise*.
|
870
811
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
871
812
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
@@ -879,7 +820,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
879
820
|
__props__ = _SecretBackendKeyState.__new__(_SecretBackendKeyState)
|
880
821
|
|
881
822
|
__props__.__dict__["allow_plaintext_backup"] = allow_plaintext_backup
|
882
|
-
__props__.__dict__["auto_rotate_interval"] = auto_rotate_interval
|
883
823
|
__props__.__dict__["auto_rotate_period"] = auto_rotate_period
|
884
824
|
__props__.__dict__["backend"] = backend
|
885
825
|
__props__.__dict__["convergent_encryption"] = convergent_encryption
|
@@ -910,18 +850,6 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
910
850
|
"""
|
911
851
|
return pulumi.get(self, "allow_plaintext_backup")
|
912
852
|
|
913
|
-
@property
|
914
|
-
@pulumi.getter(name="autoRotateInterval")
|
915
|
-
def auto_rotate_interval(self) -> pulumi.Output[int]:
|
916
|
-
"""
|
917
|
-
Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the
|
918
|
-
key.
|
919
|
-
"""
|
920
|
-
warnings.warn("""Use auto_rotate_period instead""", DeprecationWarning)
|
921
|
-
pulumi.log.warn("""auto_rotate_interval is deprecated: Use auto_rotate_period instead""")
|
922
|
-
|
923
|
-
return pulumi.get(self, "auto_rotate_interval")
|
924
|
-
|
925
853
|
@property
|
926
854
|
@pulumi.getter(name="autoRotatePeriod")
|
927
855
|
def auto_rotate_period(self) -> pulumi.Output[int]:
|
@@ -981,7 +909,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
981
909
|
|
982
910
|
@property
|
983
911
|
@pulumi.getter
|
984
|
-
def keys(self) -> pulumi.Output[Sequence[Mapping[str,
|
912
|
+
def keys(self) -> pulumi.Output[Sequence[Mapping[str, str]]]:
|
985
913
|
"""
|
986
914
|
List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
987
915
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -1035,7 +963,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
1035
963
|
"""
|
1036
964
|
The namespace to provision the resource in.
|
1037
965
|
The value should not contain leading or trailing forward slashes.
|
1038
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
966
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1039
967
|
*Available only for Vault Enterprise*.
|
1040
968
|
"""
|
1041
969
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
|
@@ -23,7 +28,7 @@ class SecretCacheConfigArgs:
|
|
23
28
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretCacheConfigArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretCacheConfigState:
|
|
82
87
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretCacheConfigState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -147,7 +152,6 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
147
152
|
|
148
153
|
## Example Usage
|
149
154
|
|
150
|
-
<!--Start PulumiCodeChooser -->
|
151
155
|
```python
|
152
156
|
import pulumi
|
153
157
|
import pulumi_vault as vault
|
@@ -162,14 +166,13 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
162
166
|
backend=transit.path,
|
163
167
|
size=500)
|
164
168
|
```
|
165
|
-
<!--End PulumiCodeChooser -->
|
166
169
|
|
167
170
|
:param str resource_name: The name of the resource.
|
168
171
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
169
172
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
170
173
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
171
174
|
The value should not contain leading or trailing forward slashes.
|
172
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
175
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
173
176
|
*Available only for Vault Enterprise*.
|
174
177
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
175
178
|
"""
|
@@ -184,7 +187,6 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
184
187
|
|
185
188
|
## Example Usage
|
186
189
|
|
187
|
-
<!--Start PulumiCodeChooser -->
|
188
190
|
```python
|
189
191
|
import pulumi
|
190
192
|
import pulumi_vault as vault
|
@@ -199,7 +201,6 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
199
201
|
backend=transit.path,
|
200
202
|
size=500)
|
201
203
|
```
|
202
|
-
<!--End PulumiCodeChooser -->
|
203
204
|
|
204
205
|
:param str resource_name: The name of the resource.
|
205
206
|
:param SecretCacheConfigArgs args: The arguments to use to populate this resource's properties.
|
@@ -258,7 +259,7 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
258
259
|
:param pulumi.Input[str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
|
259
260
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
260
261
|
The value should not contain leading or trailing forward slashes.
|
261
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
262
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
263
|
*Available only for Vault Enterprise*.
|
263
264
|
:param pulumi.Input[int] size: The number of cache entries. 0 means unlimited.
|
264
265
|
"""
|
@@ -285,7 +286,7 @@ class SecretCacheConfig(pulumi.CustomResource):
|
|
285
286
|
"""
|
286
287
|
The namespace to provision the resource in.
|
287
288
|
The value should not contain leading or trailing forward slashes.
|
288
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
289
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
289
290
|
*Available only for Vault Enterprise*.
|
290
291
|
"""
|
291
292
|
return pulumi.get(self, "namespace")
|
{pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA
RENAMED
@@ -1,16 +1,17 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.2
|
2
2
|
Name: pulumi_vault
|
3
|
-
Version: 5.
|
3
|
+
Version: 6.5.0a1736836139
|
4
4
|
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-vault
|
8
8
|
Keywords: pulumi,vault
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.9
|
10
10
|
Description-Content-Type: text/markdown
|
11
|
-
Requires-Dist: parver
|
12
|
-
Requires-Dist: pulumi
|
13
|
-
Requires-Dist: semver
|
11
|
+
Requires-Dist: parver>=0.2.1
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: semver>=2.8.1
|
14
|
+
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
14
15
|
|
15
16
|
[](https://travis-ci.com/pulumi/pulumi-vault)
|
16
17
|
|
@@ -43,7 +44,7 @@ To use from Python, install using `pip`:
|
|
43
44
|
|
44
45
|
To use from Go, use `go get` to grab the latest version of the library
|
45
46
|
|
46
|
-
$ go get github.com/pulumi/pulumi-vault/sdk/
|
47
|
+
$ go get github.com/pulumi/pulumi-vault/sdk/v6
|
47
48
|
|
48
49
|
### .NET
|
49
50
|
|