pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -46,7 +51,7 @@ class SecretBackendDynamicRoleArgs:
|
|
46
51
|
not begin or end with a `/`. Defaults to `ldap`.
|
47
52
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
48
53
|
The value should not contain leading or trailing forward slashes.
|
49
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
55
|
*Available only for Vault Enterprise*.
|
51
56
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
52
57
|
rollback any changes in the event that execution of the `creation_ldif` results
|
@@ -165,7 +170,7 @@ class SecretBackendDynamicRoleArgs:
|
|
165
170
|
"""
|
166
171
|
The namespace to provision the resource in.
|
167
172
|
The value should not contain leading or trailing forward slashes.
|
168
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
173
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
169
174
|
*Available only for Vault Enterprise*.
|
170
175
|
"""
|
171
176
|
return pulumi.get(self, "namespace")
|
@@ -240,7 +245,7 @@ class _SecretBackendDynamicRoleState:
|
|
240
245
|
not begin or end with a `/`. Defaults to `ldap`.
|
241
246
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
242
247
|
The value should not contain leading or trailing forward slashes.
|
243
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
248
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
244
249
|
*Available only for Vault Enterprise*.
|
245
250
|
:param pulumi.Input[str] role_name: Name of the role.
|
246
251
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -351,7 +356,7 @@ class _SecretBackendDynamicRoleState:
|
|
351
356
|
"""
|
352
357
|
The namespace to provision the resource in.
|
353
358
|
The value should not contain leading or trailing forward slashes.
|
354
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
359
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
355
360
|
*Available only for Vault Enterprise*.
|
356
361
|
"""
|
357
362
|
return pulumi.get(self, "namespace")
|
@@ -422,7 +427,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
422
427
|
"""
|
423
428
|
## Example Usage
|
424
429
|
|
425
|
-
<!--Start PulumiCodeChooser -->
|
426
430
|
```python
|
427
431
|
import pulumi
|
428
432
|
import pulumi_vault as vault
|
@@ -451,7 +455,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
451
455
|
changetype: delete
|
452
456
|
\"\"\")
|
453
457
|
```
|
454
|
-
<!--End PulumiCodeChooser -->
|
455
458
|
|
456
459
|
## Import
|
457
460
|
|
@@ -484,7 +487,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
484
487
|
not begin or end with a `/`. Defaults to `ldap`.
|
485
488
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
486
489
|
The value should not contain leading or trailing forward slashes.
|
487
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
490
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
488
491
|
*Available only for Vault Enterprise*.
|
489
492
|
:param pulumi.Input[str] role_name: Name of the role.
|
490
493
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -506,7 +509,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
506
509
|
"""
|
507
510
|
## Example Usage
|
508
511
|
|
509
|
-
<!--Start PulumiCodeChooser -->
|
510
512
|
```python
|
511
513
|
import pulumi
|
512
514
|
import pulumi_vault as vault
|
@@ -535,7 +537,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
535
537
|
changetype: delete
|
536
538
|
\"\"\")
|
537
539
|
```
|
538
|
-
<!--End PulumiCodeChooser -->
|
539
540
|
|
540
541
|
## Import
|
541
542
|
|
@@ -640,7 +641,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
640
641
|
not begin or end with a `/`. Defaults to `ldap`.
|
641
642
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
642
643
|
The value should not contain leading or trailing forward slashes.
|
643
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
644
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
644
645
|
*Available only for Vault Enterprise*.
|
645
646
|
:param pulumi.Input[str] role_name: Name of the role.
|
646
647
|
:param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
|
@@ -727,7 +728,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
727
728
|
"""
|
728
729
|
The namespace to provision the resource in.
|
729
730
|
The value should not contain leading or trailing forward slashes.
|
730
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
731
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
731
732
|
*Available only for Vault Enterprise*.
|
732
733
|
"""
|
733
734
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -34,7 +39,7 @@ class SecretBackendLibrarySetArgs:
|
|
34
39
|
Must be unique within the backend.
|
35
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
41
|
The value should not contain leading or trailing forward slashes.
|
37
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
43
|
*Available only for Vault Enterprise*.
|
39
44
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
40
45
|
ttl if not provided.
|
@@ -123,7 +128,7 @@ class SecretBackendLibrarySetArgs:
|
|
123
128
|
"""
|
124
129
|
The namespace to provision the resource in.
|
125
130
|
The value should not contain leading or trailing forward slashes.
|
126
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
131
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
127
132
|
*Available only for Vault Enterprise*.
|
128
133
|
"""
|
129
134
|
return pulumi.get(self, "namespace")
|
@@ -168,7 +173,7 @@ class _SecretBackendLibrarySetState:
|
|
168
173
|
Must be unique within the backend.
|
169
174
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
170
175
|
The value should not contain leading or trailing forward slashes.
|
171
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
172
177
|
*Available only for Vault Enterprise*.
|
173
178
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
174
179
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -247,7 +252,7 @@ class _SecretBackendLibrarySetState:
|
|
247
252
|
"""
|
248
253
|
The namespace to provision the resource in.
|
249
254
|
The value should not contain leading or trailing forward slashes.
|
250
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
255
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
251
256
|
*Available only for Vault Enterprise*.
|
252
257
|
"""
|
253
258
|
return pulumi.get(self, "namespace")
|
@@ -298,7 +303,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
298
303
|
"""
|
299
304
|
## Example Usage
|
300
305
|
|
301
|
-
<!--Start PulumiCodeChooser -->
|
302
306
|
```python
|
303
307
|
import pulumi
|
304
308
|
import pulumi_vault as vault
|
@@ -312,6 +316,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
312
316
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
313
317
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
314
318
|
mount=config.path,
|
319
|
+
name="qa",
|
315
320
|
service_account_names=[
|
316
321
|
"Bob",
|
317
322
|
"Mary",
|
@@ -320,7 +325,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
320
325
|
disable_check_in_enforcement=True,
|
321
326
|
max_ttl=120)
|
322
327
|
```
|
323
|
-
<!--End PulumiCodeChooser -->
|
324
328
|
|
325
329
|
## Import
|
326
330
|
|
@@ -342,7 +346,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
342
346
|
Must be unique within the backend.
|
343
347
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
344
348
|
The value should not contain leading or trailing forward slashes.
|
345
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
349
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
346
350
|
*Available only for Vault Enterprise*.
|
347
351
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
348
352
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -357,7 +361,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
357
361
|
"""
|
358
362
|
## Example Usage
|
359
363
|
|
360
|
-
<!--Start PulumiCodeChooser -->
|
361
364
|
```python
|
362
365
|
import pulumi
|
363
366
|
import pulumi_vault as vault
|
@@ -371,6 +374,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
371
374
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
372
375
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
373
376
|
mount=config.path,
|
377
|
+
name="qa",
|
374
378
|
service_account_names=[
|
375
379
|
"Bob",
|
376
380
|
"Mary",
|
@@ -379,7 +383,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
379
383
|
disable_check_in_enforcement=True,
|
380
384
|
max_ttl=120)
|
381
385
|
```
|
382
|
-
<!--End PulumiCodeChooser -->
|
383
386
|
|
384
387
|
## Import
|
385
388
|
|
@@ -463,7 +466,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
463
466
|
Must be unique within the backend.
|
464
467
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
465
468
|
The value should not contain leading or trailing forward slashes.
|
466
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
469
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
467
470
|
*Available only for Vault Enterprise*.
|
468
471
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
|
469
472
|
:param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
|
@@ -524,7 +527,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
524
527
|
"""
|
525
528
|
The namespace to provision the resource in.
|
526
529
|
The value should not contain leading or trailing forward slashes.
|
527
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
530
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
528
531
|
*Available only for Vault Enterprise*.
|
529
532
|
"""
|
530
533
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -19,7 +24,8 @@ class SecretBackendStaticRoleArgs:
|
|
19
24
|
username: pulumi.Input[str],
|
20
25
|
dn: Optional[pulumi.Input[str]] = None,
|
21
26
|
mount: Optional[pulumi.Input[str]] = None,
|
22
|
-
namespace: Optional[pulumi.Input[str]] = None
|
27
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
28
|
+
skip_import_rotation: Optional[pulumi.Input[bool]] = None):
|
23
29
|
"""
|
24
30
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
25
31
|
:param pulumi.Input[str] role_name: Name of the role.
|
@@ -32,8 +38,10 @@ class SecretBackendStaticRoleArgs:
|
|
32
38
|
not begin or end with a `/`. Defaults to `ldap`.
|
33
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
40
|
The value should not contain leading or trailing forward slashes.
|
35
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
41
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
42
|
*Available only for Vault Enterprise*.
|
43
|
+
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
44
|
+
Requires Vault 1.16 or above.
|
37
45
|
"""
|
38
46
|
pulumi.set(__self__, "role_name", role_name)
|
39
47
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
@@ -44,6 +52,8 @@ class SecretBackendStaticRoleArgs:
|
|
44
52
|
pulumi.set(__self__, "mount", mount)
|
45
53
|
if namespace is not None:
|
46
54
|
pulumi.set(__self__, "namespace", namespace)
|
55
|
+
if skip_import_rotation is not None:
|
56
|
+
pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
|
47
57
|
|
48
58
|
@property
|
49
59
|
@pulumi.getter(name="roleName")
|
@@ -114,7 +124,7 @@ class SecretBackendStaticRoleArgs:
|
|
114
124
|
"""
|
115
125
|
The namespace to provision the resource in.
|
116
126
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
127
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
128
|
*Available only for Vault Enterprise*.
|
119
129
|
"""
|
120
130
|
return pulumi.get(self, "namespace")
|
@@ -123,6 +133,19 @@ class SecretBackendStaticRoleArgs:
|
|
123
133
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
124
134
|
pulumi.set(self, "namespace", value)
|
125
135
|
|
136
|
+
@property
|
137
|
+
@pulumi.getter(name="skipImportRotation")
|
138
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
139
|
+
"""
|
140
|
+
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
141
|
+
Requires Vault 1.16 or above.
|
142
|
+
"""
|
143
|
+
return pulumi.get(self, "skip_import_rotation")
|
144
|
+
|
145
|
+
@skip_import_rotation.setter
|
146
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
147
|
+
pulumi.set(self, "skip_import_rotation", value)
|
148
|
+
|
126
149
|
|
127
150
|
@pulumi.input_type
|
128
151
|
class _SecretBackendStaticRoleState:
|
@@ -132,6 +155,7 @@ class _SecretBackendStaticRoleState:
|
|
132
155
|
namespace: Optional[pulumi.Input[str]] = None,
|
133
156
|
role_name: Optional[pulumi.Input[str]] = None,
|
134
157
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
158
|
+
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
135
159
|
username: Optional[pulumi.Input[str]] = None):
|
136
160
|
"""
|
137
161
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
@@ -142,10 +166,12 @@ class _SecretBackendStaticRoleState:
|
|
142
166
|
not begin or end with a `/`. Defaults to `ldap`.
|
143
167
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
144
168
|
The value should not contain leading or trailing forward slashes.
|
145
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
169
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
146
170
|
*Available only for Vault Enterprise*.
|
147
171
|
:param pulumi.Input[str] role_name: Name of the role.
|
148
172
|
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
173
|
+
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
174
|
+
Requires Vault 1.16 or above.
|
149
175
|
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
150
176
|
"""
|
151
177
|
if dn is not None:
|
@@ -158,6 +184,8 @@ class _SecretBackendStaticRoleState:
|
|
158
184
|
pulumi.set(__self__, "role_name", role_name)
|
159
185
|
if rotation_period is not None:
|
160
186
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
187
|
+
if skip_import_rotation is not None:
|
188
|
+
pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
|
161
189
|
if username is not None:
|
162
190
|
pulumi.set(__self__, "username", username)
|
163
191
|
|
@@ -194,7 +222,7 @@ class _SecretBackendStaticRoleState:
|
|
194
222
|
"""
|
195
223
|
The namespace to provision the resource in.
|
196
224
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
225
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
226
|
*Available only for Vault Enterprise*.
|
199
227
|
"""
|
200
228
|
return pulumi.get(self, "namespace")
|
@@ -227,6 +255,19 @@ class _SecretBackendStaticRoleState:
|
|
227
255
|
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
228
256
|
pulumi.set(self, "rotation_period", value)
|
229
257
|
|
258
|
+
@property
|
259
|
+
@pulumi.getter(name="skipImportRotation")
|
260
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
|
261
|
+
"""
|
262
|
+
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
263
|
+
Requires Vault 1.16 or above.
|
264
|
+
"""
|
265
|
+
return pulumi.get(self, "skip_import_rotation")
|
266
|
+
|
267
|
+
@skip_import_rotation.setter
|
268
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
|
269
|
+
pulumi.set(self, "skip_import_rotation", value)
|
270
|
+
|
230
271
|
@property
|
231
272
|
@pulumi.getter
|
232
273
|
def username(self) -> Optional[pulumi.Input[str]]:
|
@@ -250,12 +291,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
250
291
|
namespace: Optional[pulumi.Input[str]] = None,
|
251
292
|
role_name: Optional[pulumi.Input[str]] = None,
|
252
293
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
294
|
+
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
253
295
|
username: Optional[pulumi.Input[str]] = None,
|
254
296
|
__props__=None):
|
255
297
|
"""
|
256
298
|
## Example Usage
|
257
299
|
|
258
|
-
<!--Start PulumiCodeChooser -->
|
259
300
|
```python
|
260
301
|
import pulumi
|
261
302
|
import pulumi_vault as vault
|
@@ -274,7 +315,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
274
315
|
role_name="alice",
|
275
316
|
rotation_period=60)
|
276
317
|
```
|
277
|
-
<!--End PulumiCodeChooser -->
|
278
318
|
|
279
319
|
## Import
|
280
320
|
|
@@ -294,10 +334,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
294
334
|
not begin or end with a `/`. Defaults to `ldap`.
|
295
335
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
296
336
|
The value should not contain leading or trailing forward slashes.
|
297
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
337
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
298
338
|
*Available only for Vault Enterprise*.
|
299
339
|
:param pulumi.Input[str] role_name: Name of the role.
|
300
340
|
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
341
|
+
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
342
|
+
Requires Vault 1.16 or above.
|
301
343
|
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
302
344
|
"""
|
303
345
|
...
|
@@ -309,7 +351,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
309
351
|
"""
|
310
352
|
## Example Usage
|
311
353
|
|
312
|
-
<!--Start PulumiCodeChooser -->
|
313
354
|
```python
|
314
355
|
import pulumi
|
315
356
|
import pulumi_vault as vault
|
@@ -328,7 +369,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
328
369
|
role_name="alice",
|
329
370
|
rotation_period=60)
|
330
371
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
372
|
|
333
373
|
## Import
|
334
374
|
|
@@ -359,6 +399,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
359
399
|
namespace: Optional[pulumi.Input[str]] = None,
|
360
400
|
role_name: Optional[pulumi.Input[str]] = None,
|
361
401
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
402
|
+
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
362
403
|
username: Optional[pulumi.Input[str]] = None,
|
363
404
|
__props__=None):
|
364
405
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -378,6 +419,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
378
419
|
if rotation_period is None and not opts.urn:
|
379
420
|
raise TypeError("Missing required property 'rotation_period'")
|
380
421
|
__props__.__dict__["rotation_period"] = rotation_period
|
422
|
+
__props__.__dict__["skip_import_rotation"] = skip_import_rotation
|
381
423
|
if username is None and not opts.urn:
|
382
424
|
raise TypeError("Missing required property 'username'")
|
383
425
|
__props__.__dict__["username"] = username
|
@@ -396,6 +438,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
396
438
|
namespace: Optional[pulumi.Input[str]] = None,
|
397
439
|
role_name: Optional[pulumi.Input[str]] = None,
|
398
440
|
rotation_period: Optional[pulumi.Input[int]] = None,
|
441
|
+
skip_import_rotation: Optional[pulumi.Input[bool]] = None,
|
399
442
|
username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
|
400
443
|
"""
|
401
444
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
@@ -411,10 +454,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
411
454
|
not begin or end with a `/`. Defaults to `ldap`.
|
412
455
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
413
456
|
The value should not contain leading or trailing forward slashes.
|
414
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
457
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
415
458
|
*Available only for Vault Enterprise*.
|
416
459
|
:param pulumi.Input[str] role_name: Name of the role.
|
417
460
|
:param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
|
461
|
+
:param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
462
|
+
Requires Vault 1.16 or above.
|
418
463
|
:param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
|
419
464
|
"""
|
420
465
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -426,6 +471,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
426
471
|
__props__.__dict__["namespace"] = namespace
|
427
472
|
__props__.__dict__["role_name"] = role_name
|
428
473
|
__props__.__dict__["rotation_period"] = rotation_period
|
474
|
+
__props__.__dict__["skip_import_rotation"] = skip_import_rotation
|
429
475
|
__props__.__dict__["username"] = username
|
430
476
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
431
477
|
|
@@ -454,7 +500,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
454
500
|
"""
|
455
501
|
The namespace to provision the resource in.
|
456
502
|
The value should not contain leading or trailing forward slashes.
|
457
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
503
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
458
504
|
*Available only for Vault Enterprise*.
|
459
505
|
"""
|
460
506
|
return pulumi.get(self, "namespace")
|
@@ -475,6 +521,15 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
475
521
|
"""
|
476
522
|
return pulumi.get(self, "rotation_period")
|
477
523
|
|
524
|
+
@property
|
525
|
+
@pulumi.getter(name="skipImportRotation")
|
526
|
+
def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
|
527
|
+
"""
|
528
|
+
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
529
|
+
Requires Vault 1.16 or above.
|
530
|
+
"""
|
531
|
+
return pulumi.get(self, "skip_import_rotation")
|
532
|
+
|
478
533
|
@property
|
479
534
|
@pulumi.getter
|
480
535
|
def username(self) -> pulumi.Output[str]:
|