pulumi-vault 5.21.0a1711033014__py3-none-any.whl → 6.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +24 -0
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/ad/secret_backend.py +7 -138
- pulumi_vault/ad/secret_library.py +7 -7
- pulumi_vault/ad/secret_role.py +7 -7
- pulumi_vault/approle/auth_backend_login.py +7 -7
- pulumi_vault/approle/auth_backend_role.py +7 -7
- pulumi_vault/approle/auth_backend_role_secret_id.py +7 -7
- pulumi_vault/audit.py +7 -7
- pulumi_vault/auth_backend.py +7 -7
- pulumi_vault/aws/auth_backend_cert.py +7 -7
- pulumi_vault/aws/auth_backend_client.py +7 -7
- pulumi_vault/aws/auth_backend_config_identity.py +7 -7
- pulumi_vault/aws/auth_backend_identity_whitelist.py +7 -7
- pulumi_vault/aws/auth_backend_login.py +7 -7
- pulumi_vault/aws/auth_backend_role.py +7 -7
- pulumi_vault/aws/auth_backend_role_tag.py +7 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +7 -7
- pulumi_vault/aws/auth_backend_sts_role.py +7 -7
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +7 -7
- pulumi_vault/aws/secret_backend_role.py +7 -7
- pulumi_vault/aws/secret_backend_static_role.py +7 -7
- pulumi_vault/azure/auth_backend_config.py +7 -7
- pulumi_vault/azure/auth_backend_role.py +7 -7
- pulumi_vault/azure/backend.py +7 -7
- pulumi_vault/azure/backend_role.py +7 -7
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/cert_auth_backend_role.py +7 -63
- pulumi_vault/config/_inputs.py +52 -0
- pulumi_vault/config/outputs.py +30 -0
- pulumi_vault/config/ui_custom_message.py +524 -0
- pulumi_vault/consul/secret_backend.py +7 -7
- pulumi_vault/consul/secret_backend_role.py +7 -76
- pulumi_vault/egp_policy.py +7 -7
- pulumi_vault/gcp/auth_backend.py +7 -7
- pulumi_vault/gcp/auth_backend_role.py +7 -7
- pulumi_vault/gcp/secret_backend.py +7 -7
- pulumi_vault/gcp/secret_roleset.py +7 -7
- pulumi_vault/gcp/secret_static_account.py +7 -7
- pulumi_vault/generic/endpoint.py +7 -7
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/generic/secret.py +7 -7
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +20 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/github/auth_backend.py +7 -7
- pulumi_vault/github/team.py +7 -7
- pulumi_vault/github/user.py +7 -7
- pulumi_vault/identity/entity.py +7 -7
- pulumi_vault/identity/entity_alias.py +7 -7
- pulumi_vault/identity/entity_policies.py +7 -7
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/identity/group.py +7 -7
- pulumi_vault/identity/group_alias.py +7 -7
- pulumi_vault/identity/group_member_entity_ids.py +7 -58
- pulumi_vault/identity/group_member_group_ids.py +7 -7
- pulumi_vault/identity/group_policies.py +7 -7
- pulumi_vault/identity/oidc.py +7 -7
- pulumi_vault/identity/oidc_assignment.py +7 -7
- pulumi_vault/identity/oidc_client.py +19 -15
- pulumi_vault/identity/oidc_key.py +7 -7
- pulumi_vault/identity/oidc_key_allowed_client_id.py +7 -7
- pulumi_vault/identity/oidc_provider.py +7 -7
- pulumi_vault/identity/oidc_role.py +7 -7
- pulumi_vault/identity/oidc_scope.py +7 -7
- pulumi_vault/jwt/auth_backend.py +7 -7
- pulumi_vault/jwt/auth_backend_role.py +7 -7
- pulumi_vault/kmip/secret_backend.py +7 -7
- pulumi_vault/kmip/secret_role.py +7 -7
- pulumi_vault/kmip/secret_scope.py +7 -7
- pulumi_vault/kubernetes/auth_backend_role.py +7 -7
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kubernetes/secret_backend.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +7 -7
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +5 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/kv/secret.py +7 -7
- pulumi_vault/kv/secret_backend_v2.py +7 -7
- pulumi_vault/kv/secret_v2.py +7 -7
- pulumi_vault/ldap/auth_backend.py +7 -7
- pulumi_vault/ldap/auth_backend_group.py +7 -7
- pulumi_vault/ldap/auth_backend_user.py +7 -7
- pulumi_vault/ldap/secret_backend.py +61 -76
- pulumi_vault/ldap/secret_backend_dynamic_role.py +7 -7
- pulumi_vault/ldap/secret_backend_library_set.py +7 -7
- pulumi_vault/ldap/secret_backend_static_role.py +62 -8
- pulumi_vault/mfa_duo.py +7 -7
- pulumi_vault/mfa_okta.py +7 -7
- pulumi_vault/mfa_pingid.py +7 -7
- pulumi_vault/mfa_totp.py +7 -7
- pulumi_vault/mongodbatlas/secret_backend.py +7 -7
- pulumi_vault/mongodbatlas/secret_role.py +7 -7
- pulumi_vault/mount.py +11 -7
- pulumi_vault/namespace.py +7 -7
- pulumi_vault/nomad_secret_backend.py +7 -7
- pulumi_vault/nomad_secret_role.py +7 -7
- pulumi_vault/okta/auth_backend.py +7 -7
- pulumi_vault/okta/auth_backend_group.py +7 -7
- pulumi_vault/okta/auth_backend_user.py +7 -7
- pulumi_vault/password_policy.py +7 -7
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +368 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_ca.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +7 -7
- pulumi_vault/pkisecret/secret_backend_config_urls.py +54 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +7 -7
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +7 -7
- pulumi_vault/pkisecret/secret_backend_issuer.py +7 -7
- pulumi_vault/pkisecret/secret_backend_key.py +7 -7
- pulumi_vault/pkisecret/secret_backend_role.py +7 -7
- pulumi_vault/pkisecret/secret_backend_root_cert.py +7 -44
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +7 -52
- pulumi_vault/pkisecret/secret_backend_sign.py +7 -52
- pulumi_vault/policy.py +7 -7
- pulumi_vault/rabbitmq/secret_backend.py +7 -7
- pulumi_vault/rabbitmq/secret_backend_role.py +7 -7
- pulumi_vault/raft_autopilot.py +7 -7
- pulumi_vault/raft_snapshot_agent_config.py +7 -7
- pulumi_vault/rgp_policy.py +7 -7
- pulumi_vault/saml/auth_backend.py +7 -7
- pulumi_vault/saml/auth_backend_role.py +7 -7
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/sync_association.py +7 -7
- pulumi_vault/secrets/sync_aws_destination.py +161 -7
- pulumi_vault/secrets/sync_azure_destination.py +7 -7
- pulumi_vault/secrets/sync_gcp_destination.py +77 -7
- pulumi_vault/secrets/sync_gh_destination.py +122 -7
- pulumi_vault/secrets/sync_github_apps.py +370 -0
- pulumi_vault/secrets/sync_vercel_destination.py +7 -7
- pulumi_vault/ssh/secret_backend_ca.py +7 -7
- pulumi_vault/ssh/secret_backend_role.py +7 -83
- pulumi_vault/terraformcloud/secret_creds.py +7 -7
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/token.py +7 -7
- pulumi_vault/tokenauth/auth_backend_role.py +7 -7
- pulumi_vault/transform/alphabet.py +7 -7
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transform/role.py +7 -7
- pulumi_vault/transform/template.py +7 -7
- pulumi_vault/transform/transformation.py +7 -7
- pulumi_vault/transit/secret_backend_key.py +7 -84
- pulumi_vault/transit/secret_cache_config.py +7 -7
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.0.0.dist-info/RECORD +248 -0
- pulumi_vault-5.21.0a1711033014.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.21.0a1711033014.dist-info → pulumi_vault-6.0.0.dist-info}/top_level.txt +0 -0
@@ -29,7 +29,6 @@ class SecretBackendRoleArgs:
|
|
29
29
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
30
30
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
31
31
|
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
|
32
|
-
allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
|
33
32
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
34
33
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
35
34
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
@@ -61,9 +60,6 @@ class SecretBackendRoleArgs:
|
|
61
60
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
62
61
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
63
62
|
*See Configuration-Options for more info*
|
64
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
|
65
|
-
are allowed to be signed by the CA type.
|
66
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
67
63
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
68
64
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
69
65
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
@@ -76,7 +72,7 @@ class SecretBackendRoleArgs:
|
|
76
72
|
:param pulumi.Input[str] name: Specifies the name of the role to create.
|
77
73
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
78
74
|
The value should not contain leading or trailing forward slashes.
|
79
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
75
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
80
76
|
*Available only for Vault Enterprise*.
|
81
77
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
|
82
78
|
:param pulumi.Input[str] ttl: Specifies the Time To Live value.
|
@@ -105,11 +101,6 @@ class SecretBackendRoleArgs:
|
|
105
101
|
pulumi.set(__self__, "allowed_extensions", allowed_extensions)
|
106
102
|
if allowed_user_key_configs is not None:
|
107
103
|
pulumi.set(__self__, "allowed_user_key_configs", allowed_user_key_configs)
|
108
|
-
if allowed_user_key_lengths is not None:
|
109
|
-
warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
|
110
|
-
pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
|
111
|
-
if allowed_user_key_lengths is not None:
|
112
|
-
pulumi.set(__self__, "allowed_user_key_lengths", allowed_user_key_lengths)
|
113
104
|
if allowed_users is not None:
|
114
105
|
pulumi.set(__self__, "allowed_users", allowed_users)
|
115
106
|
if allowed_users_template is not None:
|
@@ -296,23 +287,6 @@ class SecretBackendRoleArgs:
|
|
296
287
|
def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
|
297
288
|
pulumi.set(self, "allowed_user_key_configs", value)
|
298
289
|
|
299
|
-
@property
|
300
|
-
@pulumi.getter(name="allowedUserKeyLengths")
|
301
|
-
def allowed_user_key_lengths(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]:
|
302
|
-
"""
|
303
|
-
Specifies a map of ssh key types and their expected sizes which
|
304
|
-
are allowed to be signed by the CA type.
|
305
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
306
|
-
"""
|
307
|
-
warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
|
308
|
-
pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
|
309
|
-
|
310
|
-
return pulumi.get(self, "allowed_user_key_lengths")
|
311
|
-
|
312
|
-
@allowed_user_key_lengths.setter
|
313
|
-
def allowed_user_key_lengths(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]):
|
314
|
-
pulumi.set(self, "allowed_user_key_lengths", value)
|
315
|
-
|
316
290
|
@property
|
317
291
|
@pulumi.getter(name="allowedUsers")
|
318
292
|
def allowed_users(self) -> Optional[pulumi.Input[str]]:
|
@@ -439,7 +413,7 @@ class SecretBackendRoleArgs:
|
|
439
413
|
"""
|
440
414
|
The namespace to provision the resource in.
|
441
415
|
The value should not contain leading or trailing forward slashes.
|
442
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
416
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
443
417
|
*Available only for Vault Enterprise*.
|
444
418
|
"""
|
445
419
|
return pulumi.get(self, "namespace")
|
@@ -487,7 +461,6 @@ class _SecretBackendRoleState:
|
|
487
461
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
488
462
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
489
463
|
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]] = None,
|
490
|
-
allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
|
491
464
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
492
465
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
493
466
|
backend: Optional[pulumi.Input[str]] = None,
|
@@ -519,9 +492,6 @@ class _SecretBackendRoleState:
|
|
519
492
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
520
493
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
521
494
|
*See Configuration-Options for more info*
|
522
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
|
523
|
-
are allowed to be signed by the CA type.
|
524
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
525
495
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
526
496
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
527
497
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
@@ -536,7 +506,7 @@ class _SecretBackendRoleState:
|
|
536
506
|
:param pulumi.Input[str] name: Specifies the name of the role to create.
|
537
507
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
538
508
|
The value should not contain leading or trailing forward slashes.
|
539
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
509
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
540
510
|
*Available only for Vault Enterprise*.
|
541
511
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
|
542
512
|
:param pulumi.Input[str] ttl: Specifies the Time To Live value.
|
@@ -563,11 +533,6 @@ class _SecretBackendRoleState:
|
|
563
533
|
pulumi.set(__self__, "allowed_extensions", allowed_extensions)
|
564
534
|
if allowed_user_key_configs is not None:
|
565
535
|
pulumi.set(__self__, "allowed_user_key_configs", allowed_user_key_configs)
|
566
|
-
if allowed_user_key_lengths is not None:
|
567
|
-
warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
|
568
|
-
pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
|
569
|
-
if allowed_user_key_lengths is not None:
|
570
|
-
pulumi.set(__self__, "allowed_user_key_lengths", allowed_user_key_lengths)
|
571
536
|
if allowed_users is not None:
|
572
537
|
pulumi.set(__self__, "allowed_users", allowed_users)
|
573
538
|
if allowed_users_template is not None:
|
@@ -734,23 +699,6 @@ class _SecretBackendRoleState:
|
|
734
699
|
def allowed_user_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleAllowedUserKeyConfigArgs']]]]):
|
735
700
|
pulumi.set(self, "allowed_user_key_configs", value)
|
736
701
|
|
737
|
-
@property
|
738
|
-
@pulumi.getter(name="allowedUserKeyLengths")
|
739
|
-
def allowed_user_key_lengths(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]:
|
740
|
-
"""
|
741
|
-
Specifies a map of ssh key types and their expected sizes which
|
742
|
-
are allowed to be signed by the CA type.
|
743
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
744
|
-
"""
|
745
|
-
warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
|
746
|
-
pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
|
747
|
-
|
748
|
-
return pulumi.get(self, "allowed_user_key_lengths")
|
749
|
-
|
750
|
-
@allowed_user_key_lengths.setter
|
751
|
-
def allowed_user_key_lengths(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]]):
|
752
|
-
pulumi.set(self, "allowed_user_key_lengths", value)
|
753
|
-
|
754
702
|
@property
|
755
703
|
@pulumi.getter(name="allowedUsers")
|
756
704
|
def allowed_users(self) -> Optional[pulumi.Input[str]]:
|
@@ -901,7 +849,7 @@ class _SecretBackendRoleState:
|
|
901
849
|
"""
|
902
850
|
The namespace to provision the resource in.
|
903
851
|
The value should not contain leading or trailing forward slashes.
|
904
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
852
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
905
853
|
*Available only for Vault Enterprise*.
|
906
854
|
"""
|
907
855
|
return pulumi.get(self, "namespace")
|
@@ -951,7 +899,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
951
899
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
952
900
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
953
901
|
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
|
954
|
-
allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
|
955
902
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
956
903
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
957
904
|
backend: Optional[pulumi.Input[str]] = None,
|
@@ -1017,9 +964,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1017
964
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
1018
965
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
1019
966
|
*See Configuration-Options for more info*
|
1020
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
|
1021
|
-
are allowed to be signed by the CA type.
|
1022
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
1023
967
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
1024
968
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
1025
969
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
@@ -1034,7 +978,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1034
978
|
:param pulumi.Input[str] name: Specifies the name of the role to create.
|
1035
979
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1036
980
|
The value should not contain leading or trailing forward slashes.
|
1037
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
981
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1038
982
|
*Available only for Vault Enterprise*.
|
1039
983
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
|
1040
984
|
:param pulumi.Input[str] ttl: Specifies the Time To Live value.
|
@@ -1104,7 +1048,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1104
1048
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
1105
1049
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
1106
1050
|
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
|
1107
|
-
allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
|
1108
1051
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
1109
1052
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1110
1053
|
backend: Optional[pulumi.Input[str]] = None,
|
@@ -1140,7 +1083,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1140
1083
|
__props__.__dict__["allowed_domains_template"] = allowed_domains_template
|
1141
1084
|
__props__.__dict__["allowed_extensions"] = allowed_extensions
|
1142
1085
|
__props__.__dict__["allowed_user_key_configs"] = allowed_user_key_configs
|
1143
|
-
__props__.__dict__["allowed_user_key_lengths"] = allowed_user_key_lengths
|
1144
1086
|
__props__.__dict__["allowed_users"] = allowed_users
|
1145
1087
|
__props__.__dict__["allowed_users_template"] = allowed_users_template
|
1146
1088
|
if backend is None and not opts.urn:
|
@@ -1181,7 +1123,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1181
1123
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
1182
1124
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
1183
1125
|
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]]] = None,
|
1184
|
-
allowed_user_key_lengths: Optional[pulumi.Input[Mapping[str, pulumi.Input[int]]]] = None,
|
1185
1126
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
1186
1127
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1187
1128
|
backend: Optional[pulumi.Input[str]] = None,
|
@@ -1218,9 +1159,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1218
1159
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRoleAllowedUserKeyConfigArgs']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
1219
1160
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
1220
1161
|
*See Configuration-Options for more info*
|
1221
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[int]]] allowed_user_key_lengths: Specifies a map of ssh key types and their expected sizes which
|
1222
|
-
are allowed to be signed by the CA type.
|
1223
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
1224
1162
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
1225
1163
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
1226
1164
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
@@ -1235,7 +1173,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1235
1173
|
:param pulumi.Input[str] name: Specifies the name of the role to create.
|
1236
1174
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1237
1175
|
The value should not contain leading or trailing forward slashes.
|
1238
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1239
1177
|
*Available only for Vault Enterprise*.
|
1240
1178
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
|
1241
1179
|
:param pulumi.Input[str] ttl: Specifies the Time To Live value.
|
@@ -1255,7 +1193,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1255
1193
|
__props__.__dict__["allowed_domains_template"] = allowed_domains_template
|
1256
1194
|
__props__.__dict__["allowed_extensions"] = allowed_extensions
|
1257
1195
|
__props__.__dict__["allowed_user_key_configs"] = allowed_user_key_configs
|
1258
|
-
__props__.__dict__["allowed_user_key_lengths"] = allowed_user_key_lengths
|
1259
1196
|
__props__.__dict__["allowed_users"] = allowed_users
|
1260
1197
|
__props__.__dict__["allowed_users_template"] = allowed_users_template
|
1261
1198
|
__props__.__dict__["backend"] = backend
|
@@ -1364,19 +1301,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1364
1301
|
"""
|
1365
1302
|
return pulumi.get(self, "allowed_user_key_configs")
|
1366
1303
|
|
1367
|
-
@property
|
1368
|
-
@pulumi.getter(name="allowedUserKeyLengths")
|
1369
|
-
def allowed_user_key_lengths(self) -> pulumi.Output[Optional[Mapping[str, int]]]:
|
1370
|
-
"""
|
1371
|
-
Specifies a map of ssh key types and their expected sizes which
|
1372
|
-
are allowed to be signed by the CA type.
|
1373
|
-
*Deprecated: use* allowed_user_key_config *instead*
|
1374
|
-
"""
|
1375
|
-
warnings.warn("""Set in allowed_user_key_config""", DeprecationWarning)
|
1376
|
-
pulumi.log.warn("""allowed_user_key_lengths is deprecated: Set in allowed_user_key_config""")
|
1377
|
-
|
1378
|
-
return pulumi.get(self, "allowed_user_key_lengths")
|
1379
|
-
|
1380
1304
|
@property
|
1381
1305
|
@pulumi.getter(name="allowedUsers")
|
1382
1306
|
def allowed_users(self) -> pulumi.Output[Optional[str]]:
|
@@ -1479,7 +1403,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1479
1403
|
"""
|
1480
1404
|
The namespace to provision the resource in.
|
1481
1405
|
The value should not contain leading or trailing forward slashes.
|
1482
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1406
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1483
1407
|
*Available only for Vault Enterprise*.
|
1484
1408
|
"""
|
1485
1409
|
return pulumi.get(self, "namespace")
|
@@ -23,7 +23,7 @@ class SecretCredsArgs:
|
|
23
23
|
:param pulumi.Input[str] role: Name of the role.
|
24
24
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
25
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
26
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
27
|
*Available only for Vault Enterprise*.
|
28
28
|
"""
|
29
29
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +61,7 @@ class SecretCredsArgs:
|
|
61
61
|
"""
|
62
62
|
The namespace to provision the resource in.
|
63
63
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
64
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
65
|
*Available only for Vault Enterprise*.
|
66
66
|
"""
|
67
67
|
return pulumi.get(self, "namespace")
|
@@ -89,7 +89,7 @@ class _SecretCredsState:
|
|
89
89
|
Vault lease associated with them.
|
90
90
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
91
91
|
The value should not contain leading or trailing forward slashes.
|
92
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
92
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
93
93
|
*Available only for Vault Enterprise*.
|
94
94
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
95
95
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -147,7 +147,7 @@ class _SecretCredsState:
|
|
147
147
|
"""
|
148
148
|
The namespace to provision the resource in.
|
149
149
|
The value should not contain leading or trailing forward slashes.
|
150
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
150
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
151
151
|
*Available only for Vault Enterprise*.
|
152
152
|
"""
|
153
153
|
return pulumi.get(self, "namespace")
|
@@ -255,7 +255,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
255
255
|
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
256
256
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
257
257
|
The value should not contain leading or trailing forward slashes.
|
258
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
258
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
259
259
|
*Available only for Vault Enterprise*.
|
260
260
|
:param pulumi.Input[str] role: Name of the role.
|
261
261
|
"""
|
@@ -358,7 +358,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
358
358
|
Vault lease associated with them.
|
359
359
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
360
360
|
The value should not contain leading or trailing forward slashes.
|
361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
361
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
362
362
|
*Available only for Vault Enterprise*.
|
363
363
|
:param pulumi.Input[str] organization: The organization associated with the token provided.
|
364
364
|
:param pulumi.Input[str] role: Name of the role.
|
@@ -405,7 +405,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
405
405
|
"""
|
406
406
|
The namespace to provision the resource in.
|
407
407
|
The value should not contain leading or trailing forward slashes.
|
408
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
408
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
409
409
|
*Available only for Vault Enterprise*.
|
410
410
|
"""
|
411
411
|
return pulumi.get(self, "namespace")
|
@@ -29,7 +29,7 @@ class SecretRoleArgs:
|
|
29
29
|
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
30
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
31
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
33
|
*Available only for Vault Enterprise*.
|
34
34
|
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
35
35
|
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
@@ -95,7 +95,7 @@ class SecretRoleArgs:
|
|
95
95
|
"""
|
96
96
|
The namespace to provision the resource in.
|
97
97
|
The value should not contain leading or trailing forward slashes.
|
98
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
98
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
99
99
|
*Available only for Vault Enterprise*.
|
100
100
|
"""
|
101
101
|
return pulumi.get(self, "namespace")
|
@@ -171,7 +171,7 @@ class _SecretRoleState:
|
|
171
171
|
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
172
172
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
173
173
|
The value should not contain leading or trailing forward slashes.
|
174
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
174
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
175
175
|
*Available only for Vault Enterprise*.
|
176
176
|
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
177
177
|
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
@@ -237,7 +237,7 @@ class _SecretRoleState:
|
|
237
237
|
"""
|
238
238
|
The namespace to provision the resource in.
|
239
239
|
The value should not contain leading or trailing forward slashes.
|
240
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
240
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
241
241
|
*Available only for Vault Enterprise*.
|
242
242
|
"""
|
243
243
|
return pulumi.get(self, "namespace")
|
@@ -343,7 +343,7 @@ class SecretRole(pulumi.CustomResource):
|
|
343
343
|
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
344
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
345
345
|
The value should not contain leading or trailing forward slashes.
|
346
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
346
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
347
347
|
*Available only for Vault Enterprise*.
|
348
348
|
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
349
349
|
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
@@ -453,7 +453,7 @@ class SecretRole(pulumi.CustomResource):
|
|
453
453
|
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
454
454
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
455
455
|
The value should not contain leading or trailing forward slashes.
|
456
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
456
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
457
457
|
*Available only for Vault Enterprise*.
|
458
458
|
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
459
459
|
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
@@ -504,7 +504,7 @@ class SecretRole(pulumi.CustomResource):
|
|
504
504
|
"""
|
505
505
|
The namespace to provision the resource in.
|
506
506
|
The value should not contain leading or trailing forward slashes.
|
507
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
507
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
508
508
|
*Available only for Vault Enterprise*.
|
509
509
|
"""
|
510
510
|
return pulumi.get(self, "namespace")
|
pulumi_vault/token.py
CHANGED
@@ -36,7 +36,7 @@ class TokenArgs:
|
|
36
36
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
37
37
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
38
38
|
The value should not contain leading or trailing forward slashes.
|
39
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
39
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
40
40
|
*Available only for Vault Enterprise*.
|
41
41
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
42
42
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -123,7 +123,7 @@ class TokenArgs:
|
|
123
123
|
"""
|
124
124
|
The namespace to provision the resource in.
|
125
125
|
The value should not contain leading or trailing forward slashes.
|
126
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
126
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
127
127
|
*Available only for Vault Enterprise*.
|
128
128
|
"""
|
129
129
|
return pulumi.get(self, "namespace")
|
@@ -298,7 +298,7 @@ class _TokenState:
|
|
298
298
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
299
299
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
300
300
|
The value should not contain leading or trailing forward slashes.
|
301
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
301
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
302
|
*Available only for Vault Enterprise*.
|
303
303
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
304
304
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -433,7 +433,7 @@ class _TokenState:
|
|
433
433
|
"""
|
434
434
|
The namespace to provision the resource in.
|
435
435
|
The value should not contain leading or trailing forward slashes.
|
436
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
436
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
437
437
|
*Available only for Vault Enterprise*.
|
438
438
|
"""
|
439
439
|
return pulumi.get(self, "namespace")
|
@@ -659,7 +659,7 @@ class Token(pulumi.CustomResource):
|
|
659
659
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
660
660
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
661
661
|
The value should not contain leading or trailing forward slashes.
|
662
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
662
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
663
663
|
*Available only for Vault Enterprise*.
|
664
664
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
665
665
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -817,7 +817,7 @@ class Token(pulumi.CustomResource):
|
|
817
817
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
|
818
818
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
819
819
|
The value should not contain leading or trailing forward slashes.
|
820
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
820
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
821
821
|
*Available only for Vault Enterprise*.
|
822
822
|
:param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
|
823
823
|
:param pulumi.Input[bool] no_parent: Flag to create a token without parent
|
@@ -913,7 +913,7 @@ class Token(pulumi.CustomResource):
|
|
913
913
|
"""
|
914
914
|
The namespace to provision the resource in.
|
915
915
|
The value should not contain leading or trailing forward slashes.
|
916
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
916
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
917
917
|
*Available only for Vault Enterprise*.
|
918
918
|
"""
|
919
919
|
return pulumi.get(self, "namespace")
|
@@ -43,7 +43,7 @@ class AuthBackendRoleArgs:
|
|
43
43
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
44
44
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
45
45
|
The value should not contain leading or trailing forward slashes.
|
46
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
46
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
47
|
*Available only for Vault Enterprise*.
|
48
48
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
49
49
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
@@ -192,7 +192,7 @@ class AuthBackendRoleArgs:
|
|
192
192
|
"""
|
193
193
|
The namespace to provision the resource in.
|
194
194
|
The value should not contain leading or trailing forward slashes.
|
195
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
196
|
*Available only for Vault Enterprise*.
|
197
197
|
"""
|
198
198
|
return pulumi.get(self, "namespace")
|
@@ -395,7 +395,7 @@ class _AuthBackendRoleState:
|
|
395
395
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
396
396
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
397
397
|
The value should not contain leading or trailing forward slashes.
|
398
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
399
399
|
*Available only for Vault Enterprise*.
|
400
400
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
401
401
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
@@ -534,7 +534,7 @@ class _AuthBackendRoleState:
|
|
534
534
|
"""
|
535
535
|
The namespace to provision the resource in.
|
536
536
|
The value should not contain leading or trailing forward slashes.
|
537
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
537
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
538
538
|
*Available only for Vault Enterprise*.
|
539
539
|
"""
|
540
540
|
return pulumi.get(self, "namespace")
|
@@ -788,7 +788,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
788
788
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
789
789
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
790
790
|
The value should not contain leading or trailing forward slashes.
|
791
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
791
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
792
792
|
*Available only for Vault Enterprise*.
|
793
793
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
794
794
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
@@ -971,7 +971,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
971
971
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
972
972
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
973
973
|
The value should not contain leading or trailing forward slashes.
|
974
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
974
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
975
975
|
*Available only for Vault Enterprise*.
|
976
976
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
977
977
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
@@ -1076,7 +1076,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1076
1076
|
"""
|
1077
1077
|
The namespace to provision the resource in.
|
1078
1078
|
The value should not contain leading or trailing forward slashes.
|
1079
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1079
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1080
1080
|
*Available only for Vault Enterprise*.
|
1081
1081
|
"""
|
1082
1082
|
return pulumi.get(self, "namespace")
|
@@ -25,7 +25,7 @@ class AlphabetArgs:
|
|
25
25
|
:param pulumi.Input[str] name: The name of the alphabet.
|
26
26
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
27
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
28
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
29
|
*Available only for Vault Enterprise*.
|
30
30
|
"""
|
31
31
|
pulumi.set(__self__, "path", path)
|
@@ -78,7 +78,7 @@ class AlphabetArgs:
|
|
78
78
|
"""
|
79
79
|
The namespace to provision the resource in.
|
80
80
|
The value should not contain leading or trailing forward slashes.
|
81
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
81
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
82
82
|
*Available only for Vault Enterprise*.
|
83
83
|
"""
|
84
84
|
return pulumi.get(self, "namespace")
|
@@ -101,7 +101,7 @@ class _AlphabetState:
|
|
101
101
|
:param pulumi.Input[str] name: The name of the alphabet.
|
102
102
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
103
103
|
The value should not contain leading or trailing forward slashes.
|
104
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
104
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
105
105
|
*Available only for Vault Enterprise*.
|
106
106
|
:param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
|
107
107
|
"""
|
@@ -144,7 +144,7 @@ class _AlphabetState:
|
|
144
144
|
"""
|
145
145
|
The namespace to provision the resource in.
|
146
146
|
The value should not contain leading or trailing forward slashes.
|
147
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
148
|
*Available only for Vault Enterprise*.
|
149
149
|
"""
|
150
150
|
return pulumi.get(self, "namespace")
|
@@ -203,7 +203,7 @@ class Alphabet(pulumi.CustomResource):
|
|
203
203
|
:param pulumi.Input[str] name: The name of the alphabet.
|
204
204
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
205
205
|
The value should not contain leading or trailing forward slashes.
|
206
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
206
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
207
207
|
*Available only for Vault Enterprise*.
|
208
208
|
:param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
|
209
209
|
"""
|
@@ -293,7 +293,7 @@ class Alphabet(pulumi.CustomResource):
|
|
293
293
|
:param pulumi.Input[str] name: The name of the alphabet.
|
294
294
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
295
295
|
The value should not contain leading or trailing forward slashes.
|
296
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
296
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
297
297
|
*Available only for Vault Enterprise*.
|
298
298
|
:param pulumi.Input[str] path: Path to where the back-end is mounted within Vault.
|
299
299
|
"""
|
@@ -329,7 +329,7 @@ class Alphabet(pulumi.CustomResource):
|
|
329
329
|
"""
|
330
330
|
The namespace to provision the resource in.
|
331
331
|
The value should not contain leading or trailing forward slashes.
|
332
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
332
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
333
333
|
*Available only for Vault Enterprise*.
|
334
334
|
"""
|
335
335
|
return pulumi.get(self, "namespace")
|
@@ -171,7 +171,7 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
171
171
|
:param str decoded_value: The result of decoding a value.
|
172
172
|
:param str namespace: The namespace of the target resource.
|
173
173
|
The value should not contain leading or trailing forward slashes.
|
174
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
174
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
175
175
|
*Available only for Vault Enterprise*.
|
176
176
|
:param str path: Path to where the back-end is mounted within Vault.
|
177
177
|
:param str role_name: The name of the role.
|
@@ -252,7 +252,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
252
252
|
:param str decoded_value: The result of decoding a value.
|
253
253
|
:param str namespace: The namespace of the target resource.
|
254
254
|
The value should not contain leading or trailing forward slashes.
|
255
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
255
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
256
256
|
*Available only for Vault Enterprise*.
|
257
257
|
:param str path: Path to where the back-end is mounted within Vault.
|
258
258
|
:param str role_name: The name of the role.
|
@@ -173,7 +173,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
173
173
|
:param str encoded_value: The result of encoding a value.
|
174
174
|
:param str namespace: The namespace of the target resource.
|
175
175
|
The value should not contain leading or trailing forward slashes.
|
176
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
177
|
*Available only for Vault Enterprise*.
|
178
178
|
:param str path: Path to where the back-end is mounted within Vault.
|
179
179
|
:param str role_name: The name of the role.
|
@@ -256,7 +256,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
256
256
|
:param str encoded_value: The result of encoding a value.
|
257
257
|
:param str namespace: The namespace of the target resource.
|
258
258
|
The value should not contain leading or trailing forward slashes.
|
259
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
259
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
260
260
|
*Available only for Vault Enterprise*.
|
261
261
|
:param str path: Path to where the back-end is mounted within Vault.
|
262
262
|
:param str role_name: The name of the role.
|