pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -46,7 +51,7 @@ class SecretBackendArgs:
|
|
46
51
|
for credentials issued by this backend.
|
47
52
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
53
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
55
|
*Available only for Vault Enterprise*.
|
51
56
|
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
52
57
|
to `consul`.
|
@@ -211,7 +216,7 @@ class SecretBackendArgs:
|
|
211
216
|
"""
|
212
217
|
The namespace to provision the resource in.
|
213
218
|
The value should not contain leading or trailing forward slashes.
|
214
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
219
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
215
220
|
*Available only for Vault Enterprise*.
|
216
221
|
"""
|
217
222
|
return pulumi.get(self, "namespace")
|
@@ -293,7 +298,7 @@ class _SecretBackendState:
|
|
293
298
|
for credentials issued by this backend.
|
294
299
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
295
300
|
The value should not contain leading or trailing forward slashes.
|
296
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
301
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
297
302
|
*Available only for Vault Enterprise*.
|
298
303
|
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
299
304
|
to `consul`.
|
@@ -459,7 +464,7 @@ class _SecretBackendState:
|
|
459
464
|
"""
|
460
465
|
The namespace to provision the resource in.
|
461
466
|
The value should not contain leading or trailing forward slashes.
|
462
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
467
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
463
468
|
*Available only for Vault Enterprise*.
|
464
469
|
"""
|
465
470
|
return pulumi.get(self, "namespace")
|
@@ -530,32 +535,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
530
535
|
## Example Usage
|
531
536
|
|
532
537
|
### Creating a standard backend resource:
|
533
|
-
<!--Start PulumiCodeChooser -->
|
534
538
|
```python
|
535
539
|
import pulumi
|
536
540
|
import pulumi_vault as vault
|
537
541
|
|
538
542
|
test = vault.consul.SecretBackend("test",
|
539
|
-
address="127.0.0.1:8500",
|
540
|
-
description="Manages the Consul backend",
|
541
543
|
path="consul",
|
544
|
+
description="Manages the Consul backend",
|
545
|
+
address="127.0.0.1:8500",
|
542
546
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
543
547
|
```
|
544
|
-
<!--End PulumiCodeChooser -->
|
545
548
|
|
546
549
|
### Creating a backend resource to bootstrap a new Consul instance:
|
547
|
-
<!--Start PulumiCodeChooser -->
|
548
550
|
```python
|
549
551
|
import pulumi
|
550
552
|
import pulumi_vault as vault
|
551
553
|
|
552
554
|
test = vault.consul.SecretBackend("test",
|
553
|
-
|
554
|
-
bootstrap=True,
|
555
|
+
path="consul",
|
555
556
|
description="Bootstrap the Consul backend",
|
556
|
-
|
557
|
+
address="127.0.0.1:8500",
|
558
|
+
bootstrap=True)
|
557
559
|
```
|
558
|
-
<!--End PulumiCodeChooser -->
|
559
560
|
|
560
561
|
## Import
|
561
562
|
|
@@ -583,7 +584,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
583
584
|
for credentials issued by this backend.
|
584
585
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
585
586
|
The value should not contain leading or trailing forward slashes.
|
586
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
587
588
|
*Available only for Vault Enterprise*.
|
588
589
|
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
589
590
|
to `consul`.
|
@@ -600,32 +601,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
600
601
|
## Example Usage
|
601
602
|
|
602
603
|
### Creating a standard backend resource:
|
603
|
-
<!--Start PulumiCodeChooser -->
|
604
604
|
```python
|
605
605
|
import pulumi
|
606
606
|
import pulumi_vault as vault
|
607
607
|
|
608
608
|
test = vault.consul.SecretBackend("test",
|
609
|
-
address="127.0.0.1:8500",
|
610
|
-
description="Manages the Consul backend",
|
611
609
|
path="consul",
|
610
|
+
description="Manages the Consul backend",
|
611
|
+
address="127.0.0.1:8500",
|
612
612
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
613
613
|
```
|
614
|
-
<!--End PulumiCodeChooser -->
|
615
614
|
|
616
615
|
### Creating a backend resource to bootstrap a new Consul instance:
|
617
|
-
<!--Start PulumiCodeChooser -->
|
618
616
|
```python
|
619
617
|
import pulumi
|
620
618
|
import pulumi_vault as vault
|
621
619
|
|
622
620
|
test = vault.consul.SecretBackend("test",
|
623
|
-
|
624
|
-
bootstrap=True,
|
621
|
+
path="consul",
|
625
622
|
description="Bootstrap the Consul backend",
|
626
|
-
|
623
|
+
address="127.0.0.1:8500",
|
624
|
+
bootstrap=True)
|
627
625
|
```
|
628
|
-
<!--End PulumiCodeChooser -->
|
629
626
|
|
630
627
|
## Import
|
631
628
|
|
@@ -738,7 +735,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
738
735
|
for credentials issued by this backend.
|
739
736
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
740
737
|
The value should not contain leading or trailing forward slashes.
|
741
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
738
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
742
739
|
*Available only for Vault Enterprise*.
|
743
740
|
:param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
|
744
741
|
to `consul`.
|
@@ -855,7 +852,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
855
852
|
"""
|
856
853
|
The namespace to provision the resource in.
|
857
854
|
The value should not contain leading or trailing forward slashes.
|
858
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
855
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
859
856
|
*Available only for Vault Enterprise*.
|
860
857
|
"""
|
861
858
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -26,7 +31,6 @@ class SecretBackendRoleArgs:
|
|
26
31
|
partition: Optional[pulumi.Input[str]] = None,
|
27
32
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
33
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
29
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
30
34
|
ttl: Optional[pulumi.Input[int]] = None):
|
31
35
|
"""
|
32
36
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -41,7 +45,7 @@ class SecretBackendRoleArgs:
|
|
41
45
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
42
46
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
43
47
|
The value should not contain leading or trailing forward slashes.
|
44
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
48
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
45
49
|
*Available only for Vault Enterprise*.
|
46
50
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
47
51
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -52,8 +56,6 @@ class SecretBackendRoleArgs:
|
|
52
56
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
53
57
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
54
58
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
55
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
56
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
57
59
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
58
60
|
"""
|
59
61
|
if backend is not None:
|
@@ -80,11 +82,6 @@ class SecretBackendRoleArgs:
|
|
80
82
|
pulumi.set(__self__, "policies", policies)
|
81
83
|
if service_identities is not None:
|
82
84
|
pulumi.set(__self__, "service_identities", service_identities)
|
83
|
-
if token_type is not None:
|
84
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
85
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
86
|
-
if token_type is not None:
|
87
|
-
pulumi.set(__self__, "token_type", token_type)
|
88
85
|
if ttl is not None:
|
89
86
|
pulumi.set(__self__, "ttl", ttl)
|
90
87
|
|
@@ -180,7 +177,7 @@ class SecretBackendRoleArgs:
|
|
180
177
|
"""
|
181
178
|
The namespace to provision the resource in.
|
182
179
|
The value should not contain leading or trailing forward slashes.
|
183
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
180
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
184
181
|
*Available only for Vault Enterprise*.
|
185
182
|
"""
|
186
183
|
return pulumi.get(self, "namespace")
|
@@ -242,22 +239,6 @@ class SecretBackendRoleArgs:
|
|
242
239
|
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
243
240
|
pulumi.set(self, "service_identities", value)
|
244
241
|
|
245
|
-
@property
|
246
|
-
@pulumi.getter(name="tokenType")
|
247
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
248
|
-
"""
|
249
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
250
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
251
|
-
"""
|
252
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
253
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
254
|
-
|
255
|
-
return pulumi.get(self, "token_type")
|
256
|
-
|
257
|
-
@token_type.setter
|
258
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
259
|
-
pulumi.set(self, "token_type", value)
|
260
|
-
|
261
242
|
@property
|
262
243
|
@pulumi.getter
|
263
244
|
def ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -286,7 +267,6 @@ class _SecretBackendRoleState:
|
|
286
267
|
partition: Optional[pulumi.Input[str]] = None,
|
287
268
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
288
269
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
289
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
290
270
|
ttl: Optional[pulumi.Input[int]] = None):
|
291
271
|
"""
|
292
272
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -301,7 +281,7 @@ class _SecretBackendRoleState:
|
|
301
281
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
302
282
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
303
283
|
The value should not contain leading or trailing forward slashes.
|
304
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
284
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
305
285
|
*Available only for Vault Enterprise*.
|
306
286
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
307
287
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -312,8 +292,6 @@ class _SecretBackendRoleState:
|
|
312
292
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
313
293
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
314
294
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
315
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
316
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
317
295
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
318
296
|
"""
|
319
297
|
if backend is not None:
|
@@ -340,11 +318,6 @@ class _SecretBackendRoleState:
|
|
340
318
|
pulumi.set(__self__, "policies", policies)
|
341
319
|
if service_identities is not None:
|
342
320
|
pulumi.set(__self__, "service_identities", service_identities)
|
343
|
-
if token_type is not None:
|
344
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
345
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
346
|
-
if token_type is not None:
|
347
|
-
pulumi.set(__self__, "token_type", token_type)
|
348
321
|
if ttl is not None:
|
349
322
|
pulumi.set(__self__, "ttl", ttl)
|
350
323
|
|
@@ -440,7 +413,7 @@ class _SecretBackendRoleState:
|
|
440
413
|
"""
|
441
414
|
The namespace to provision the resource in.
|
442
415
|
The value should not contain leading or trailing forward slashes.
|
443
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
416
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
444
417
|
*Available only for Vault Enterprise*.
|
445
418
|
"""
|
446
419
|
return pulumi.get(self, "namespace")
|
@@ -502,22 +475,6 @@ class _SecretBackendRoleState:
|
|
502
475
|
def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
503
476
|
pulumi.set(self, "service_identities", value)
|
504
477
|
|
505
|
-
@property
|
506
|
-
@pulumi.getter(name="tokenType")
|
507
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
508
|
-
"""
|
509
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
510
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
511
|
-
"""
|
512
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
513
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
514
|
-
|
515
|
-
return pulumi.get(self, "token_type")
|
516
|
-
|
517
|
-
@token_type.setter
|
518
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
519
|
-
pulumi.set(self, "token_type", value)
|
520
|
-
|
521
478
|
@property
|
522
479
|
@pulumi.getter
|
523
480
|
def ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -548,7 +505,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
548
505
|
partition: Optional[pulumi.Input[str]] = None,
|
549
506
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
550
507
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
551
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
552
508
|
ttl: Optional[pulumi.Input[int]] = None,
|
553
509
|
__props__=None):
|
554
510
|
"""
|
@@ -556,7 +512,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
556
512
|
|
557
513
|
## Example Usage
|
558
514
|
|
559
|
-
<!--Start PulumiCodeChooser -->
|
560
515
|
```python
|
561
516
|
import pulumi
|
562
517
|
import pulumi_vault as vault
|
@@ -567,10 +522,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
567
522
|
address="127.0.0.1:8500",
|
568
523
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
569
524
|
example = vault.consul.SecretBackendRole("example",
|
525
|
+
name="test-role",
|
570
526
|
backend=test.path,
|
571
527
|
consul_policies=["example-policy"])
|
572
528
|
```
|
573
|
-
<!--End PulumiCodeChooser -->
|
574
529
|
|
575
530
|
## Note About Required Arguments
|
576
531
|
|
@@ -599,7 +554,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
599
554
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
600
555
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
601
556
|
The value should not contain leading or trailing forward slashes.
|
602
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
557
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
603
558
|
*Available only for Vault Enterprise*.
|
604
559
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
605
560
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -610,8 +565,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
610
565
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
611
566
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
612
567
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
613
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
614
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
615
568
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
616
569
|
"""
|
617
570
|
...
|
@@ -625,7 +578,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
625
578
|
|
626
579
|
## Example Usage
|
627
580
|
|
628
|
-
<!--Start PulumiCodeChooser -->
|
629
581
|
```python
|
630
582
|
import pulumi
|
631
583
|
import pulumi_vault as vault
|
@@ -636,10 +588,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
636
588
|
address="127.0.0.1:8500",
|
637
589
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
638
590
|
example = vault.consul.SecretBackendRole("example",
|
591
|
+
name="test-role",
|
639
592
|
backend=test.path,
|
640
593
|
consul_policies=["example-policy"])
|
641
594
|
```
|
642
|
-
<!--End PulumiCodeChooser -->
|
643
595
|
|
644
596
|
## Note About Required Arguments
|
645
597
|
|
@@ -682,7 +634,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
682
634
|
partition: Optional[pulumi.Input[str]] = None,
|
683
635
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
684
636
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
685
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
686
637
|
ttl: Optional[pulumi.Input[int]] = None,
|
687
638
|
__props__=None):
|
688
639
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -705,7 +656,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
705
656
|
__props__.__dict__["partition"] = partition
|
706
657
|
__props__.__dict__["policies"] = policies
|
707
658
|
__props__.__dict__["service_identities"] = service_identities
|
708
|
-
__props__.__dict__["token_type"] = token_type
|
709
659
|
__props__.__dict__["ttl"] = ttl
|
710
660
|
super(SecretBackendRole, __self__).__init__(
|
711
661
|
'vault:consul/secretBackendRole:SecretBackendRole',
|
@@ -729,7 +679,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
729
679
|
partition: Optional[pulumi.Input[str]] = None,
|
730
680
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
731
681
|
service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
732
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
733
682
|
ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
|
734
683
|
"""
|
735
684
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -749,7 +698,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
749
698
|
:param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
|
750
699
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
751
700
|
The value should not contain leading or trailing forward slashes.
|
752
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
701
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
753
702
|
*Available only for Vault Enterprise*.
|
754
703
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
755
704
|
identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
@@ -760,8 +709,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
760
709
|
`policies`, remains supported for legacy users, but Vault has deprecated this field.
|
761
710
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
762
711
|
service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
763
|
-
:param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
764
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
765
712
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
766
713
|
"""
|
767
714
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -780,7 +727,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
727
|
__props__.__dict__["partition"] = partition
|
781
728
|
__props__.__dict__["policies"] = policies
|
782
729
|
__props__.__dict__["service_identities"] = service_identities
|
783
|
-
__props__.__dict__["token_type"] = token_type
|
784
730
|
__props__.__dict__["ttl"] = ttl
|
785
731
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
786
732
|
|
@@ -848,7 +794,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
848
794
|
"""
|
849
795
|
The namespace to provision the resource in.
|
850
796
|
The value should not contain leading or trailing forward slashes.
|
851
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
797
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
852
798
|
*Available only for Vault Enterprise*.
|
853
799
|
"""
|
854
800
|
return pulumi.get(self, "namespace")
|
@@ -890,18 +836,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
890
836
|
"""
|
891
837
|
return pulumi.get(self, "service_identities")
|
892
838
|
|
893
|
-
@property
|
894
|
-
@pulumi.getter(name="tokenType")
|
895
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
896
|
-
"""
|
897
|
-
Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
898
|
-
*Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
899
|
-
"""
|
900
|
-
warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
|
901
|
-
pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
|
902
|
-
|
903
|
-
return pulumi.get(self, "token_type")
|
904
|
-
|
905
839
|
@property
|
906
840
|
@pulumi.getter
|
907
841
|
def ttl(self) -> pulumi.Output[Optional[int]]:
|