pulumi-vault 6.2.0a1718998938__py3-none-any.whl → 6.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/_utilities.py +40 -4
- pulumi_vault/aws/secret_backend_role.py +115 -0
- pulumi_vault/azure/backend.py +3 -9
- pulumi_vault/generic/endpoint.py +6 -6
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/mount.py +14 -7
- pulumi_vault/okta/auth_backend.py +6 -18
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/pkisecret/_inputs.py +10 -0
- pulumi_vault/pkisecret/outputs.py +10 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_config_ca.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2 -2
- pulumi_vault/pkisecret/secret_backend_sign.py +2 -2
- pulumi_vault/provider.py +1 -3
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.2.0a1718998938.dist-info → pulumi_vault-6.3.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1718998938.dist-info → pulumi_vault-6.3.0.dist-info}/RECORD +23 -23
- {pulumi_vault-6.2.0a1718998938.dist-info → pulumi_vault-6.3.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.2.0a1718998938.dist-info → pulumi_vault-6.3.0.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -1844,12 +1844,19 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
+
"""
|
1848
|
+
:param str key: name of permitted or denied parameter.
|
1849
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
+
"""
|
1847
1851
|
pulumi.set(__self__, "key", key)
|
1848
1852
|
pulumi.set(__self__, "values", values)
|
1849
1853
|
|
1850
1854
|
@property
|
1851
1855
|
@pulumi.getter
|
1852
1856
|
def key(self) -> str:
|
1857
|
+
"""
|
1858
|
+
name of permitted or denied parameter.
|
1859
|
+
"""
|
1853
1860
|
return pulumi.get(self, "key")
|
1854
1861
|
|
1855
1862
|
@key.setter
|
@@ -1859,6 +1866,9 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1859
1866
|
@property
|
1860
1867
|
@pulumi.getter
|
1861
1868
|
def values(self) -> Sequence[str]:
|
1869
|
+
"""
|
1870
|
+
list of values what are permitted or denied by policy rule.
|
1871
|
+
"""
|
1862
1872
|
return pulumi.get(self, "values")
|
1863
1873
|
|
1864
1874
|
@values.setter
|
@@ -1871,12 +1881,19 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1871
1881
|
def __init__(__self__, *,
|
1872
1882
|
key: str,
|
1873
1883
|
values: Sequence[str]):
|
1884
|
+
"""
|
1885
|
+
:param str key: name of permitted or denied parameter.
|
1886
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
+
"""
|
1874
1888
|
pulumi.set(__self__, "key", key)
|
1875
1889
|
pulumi.set(__self__, "values", values)
|
1876
1890
|
|
1877
1891
|
@property
|
1878
1892
|
@pulumi.getter
|
1879
1893
|
def key(self) -> str:
|
1894
|
+
"""
|
1895
|
+
name of permitted or denied parameter.
|
1896
|
+
"""
|
1880
1897
|
return pulumi.get(self, "key")
|
1881
1898
|
|
1882
1899
|
@key.setter
|
@@ -1886,6 +1903,9 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1886
1903
|
@property
|
1887
1904
|
@pulumi.getter
|
1888
1905
|
def values(self) -> Sequence[str]:
|
1906
|
+
"""
|
1907
|
+
list of values what are permitted or denied by policy rule.
|
1908
|
+
"""
|
1889
1909
|
return pulumi.get(self, "values")
|
1890
1910
|
|
1891
1911
|
@values.setter
|
pulumi_vault/_utilities.py
CHANGED
@@ -4,6 +4,7 @@
|
|
4
4
|
|
5
5
|
|
6
6
|
import asyncio
|
7
|
+
import functools
|
7
8
|
import importlib.metadata
|
8
9
|
import importlib.util
|
9
10
|
import inspect
|
@@ -11,14 +12,19 @@ import json
|
|
11
12
|
import os
|
12
13
|
import sys
|
13
14
|
import typing
|
15
|
+
import warnings
|
16
|
+
import base64
|
14
17
|
|
15
18
|
import pulumi
|
16
19
|
import pulumi.runtime
|
17
20
|
from pulumi.runtime.sync_await import _sync_await
|
21
|
+
from pulumi.runtime.proto import resource_pb2
|
18
22
|
|
19
23
|
from semver import VersionInfo as SemverVersion
|
20
24
|
from parver import Version as PEP440Version
|
21
25
|
|
26
|
+
C = typing.TypeVar("C", bound=typing.Callable)
|
27
|
+
|
22
28
|
|
23
29
|
def get_env(*args):
|
24
30
|
for v in args:
|
@@ -96,10 +102,6 @@ def _get_semver_version():
|
|
96
102
|
_version = _get_semver_version()
|
97
103
|
_version_str = str(_version)
|
98
104
|
|
99
|
-
|
100
|
-
def get_version():
|
101
|
-
return _version_str
|
102
|
-
|
103
105
|
def get_resource_opts_defaults() -> pulumi.ResourceOptions:
|
104
106
|
return pulumi.ResourceOptions(
|
105
107
|
version=get_version(),
|
@@ -287,5 +289,39 @@ async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bo
|
|
287
289
|
await o._resources,
|
288
290
|
)
|
289
291
|
|
292
|
+
|
293
|
+
# This is included to provide an upgrade path for users who are using a version
|
294
|
+
# of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
|
295
|
+
def deprecated(message: str) -> typing.Callable[[C], C]:
|
296
|
+
"""
|
297
|
+
Decorator to indicate a function is deprecated.
|
298
|
+
|
299
|
+
As well as inserting appropriate statements to indicate that the function is
|
300
|
+
deprecated, this decorator also tags the function with a special attribute
|
301
|
+
so that Pulumi code can detect that it is deprecated and react appropriately
|
302
|
+
in certain situations.
|
303
|
+
|
304
|
+
message is the deprecation message that should be printed if the function is called.
|
305
|
+
"""
|
306
|
+
|
307
|
+
def decorator(fn: C) -> C:
|
308
|
+
if not callable(fn):
|
309
|
+
raise TypeError("Expected fn to be callable")
|
310
|
+
|
311
|
+
@functools.wraps(fn)
|
312
|
+
def deprecated_fn(*args, **kwargs):
|
313
|
+
warnings.warn(message)
|
314
|
+
pulumi.warn(f"{fn.__name__} is deprecated: {message}")
|
315
|
+
|
316
|
+
return fn(*args, **kwargs)
|
317
|
+
|
318
|
+
deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
|
319
|
+
return typing.cast(C, deprecated_fn)
|
320
|
+
|
321
|
+
return decorator
|
322
|
+
|
290
323
|
def get_plugin_download_url():
|
291
324
|
return None
|
325
|
+
|
326
|
+
def get_version():
|
327
|
+
return _version_str
|
@@ -17,6 +17,7 @@ class SecretBackendRoleArgs:
|
|
17
17
|
backend: pulumi.Input[str],
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
20
21
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
22
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
23
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -26,6 +27,7 @@ class SecretBackendRoleArgs:
|
|
26
27
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
28
|
policy_document: Optional[pulumi.Input[str]] = None,
|
28
29
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
29
31
|
user_path: Optional[pulumi.Input[str]] = None):
|
30
32
|
"""
|
31
33
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -39,6 +41,8 @@ class SecretBackendRoleArgs:
|
|
39
41
|
and a default TTL is specified on the role,
|
40
42
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
41
43
|
`assumed_role` or `federation_token`.
|
44
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
45
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
42
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
43
47
|
against this vault role will be added to these IAM Groups. For a credential
|
44
48
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -75,6 +79,9 @@ class SecretBackendRoleArgs:
|
|
75
79
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
76
80
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
77
81
|
prohibited otherwise.
|
82
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
83
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
84
|
+
`assumed_role`.
|
78
85
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
79
86
|
`credential_type` is `iam_user`. Default is `/`.
|
80
87
|
"""
|
@@ -82,6 +89,8 @@ class SecretBackendRoleArgs:
|
|
82
89
|
pulumi.set(__self__, "credential_type", credential_type)
|
83
90
|
if default_sts_ttl is not None:
|
84
91
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
92
|
+
if external_id is not None:
|
93
|
+
pulumi.set(__self__, "external_id", external_id)
|
85
94
|
if iam_groups is not None:
|
86
95
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
87
96
|
if iam_tags is not None:
|
@@ -100,6 +109,8 @@ class SecretBackendRoleArgs:
|
|
100
109
|
pulumi.set(__self__, "policy_document", policy_document)
|
101
110
|
if role_arns is not None:
|
102
111
|
pulumi.set(__self__, "role_arns", role_arns)
|
112
|
+
if session_tags is not None:
|
113
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
103
114
|
if user_path is not None:
|
104
115
|
pulumi.set(__self__, "user_path", user_path)
|
105
116
|
|
@@ -146,6 +157,19 @@ class SecretBackendRoleArgs:
|
|
146
157
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
147
158
|
pulumi.set(self, "default_sts_ttl", value)
|
148
159
|
|
160
|
+
@property
|
161
|
+
@pulumi.getter(name="externalId")
|
162
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
"""
|
164
|
+
External ID to set for assume role creds.
|
165
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "external_id")
|
168
|
+
|
169
|
+
@external_id.setter
|
170
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
pulumi.set(self, "external_id", value)
|
172
|
+
|
149
173
|
@property
|
150
174
|
@pulumi.getter(name="iamGroups")
|
151
175
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -281,6 +305,20 @@ class SecretBackendRoleArgs:
|
|
281
305
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
282
306
|
pulumi.set(self, "role_arns", value)
|
283
307
|
|
308
|
+
@property
|
309
|
+
@pulumi.getter(name="sessionTags")
|
310
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
311
|
+
"""
|
312
|
+
A map of strings representing key/value pairs to be set
|
313
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
314
|
+
`assumed_role`.
|
315
|
+
"""
|
316
|
+
return pulumi.get(self, "session_tags")
|
317
|
+
|
318
|
+
@session_tags.setter
|
319
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
320
|
+
pulumi.set(self, "session_tags", value)
|
321
|
+
|
284
322
|
@property
|
285
323
|
@pulumi.getter(name="userPath")
|
286
324
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -301,6 +339,7 @@ class _SecretBackendRoleState:
|
|
301
339
|
backend: Optional[pulumi.Input[str]] = None,
|
302
340
|
credential_type: Optional[pulumi.Input[str]] = None,
|
303
341
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
304
343
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
305
344
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
306
345
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -310,6 +349,7 @@ class _SecretBackendRoleState:
|
|
310
349
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
350
|
policy_document: Optional[pulumi.Input[str]] = None,
|
312
351
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
313
353
|
user_path: Optional[pulumi.Input[str]] = None):
|
314
354
|
"""
|
315
355
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -323,6 +363,8 @@ class _SecretBackendRoleState:
|
|
323
363
|
and a default TTL is specified on the role,
|
324
364
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
325
365
|
`assumed_role` or `federation_token`.
|
366
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
367
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
326
368
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
327
369
|
against this vault role will be added to these IAM Groups. For a credential
|
328
370
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -359,6 +401,9 @@ class _SecretBackendRoleState:
|
|
359
401
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
360
402
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
361
403
|
prohibited otherwise.
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
405
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
406
|
+
`assumed_role`.
|
362
407
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
363
408
|
`credential_type` is `iam_user`. Default is `/`.
|
364
409
|
"""
|
@@ -368,6 +413,8 @@ class _SecretBackendRoleState:
|
|
368
413
|
pulumi.set(__self__, "credential_type", credential_type)
|
369
414
|
if default_sts_ttl is not None:
|
370
415
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
416
|
+
if external_id is not None:
|
417
|
+
pulumi.set(__self__, "external_id", external_id)
|
371
418
|
if iam_groups is not None:
|
372
419
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
373
420
|
if iam_tags is not None:
|
@@ -386,6 +433,8 @@ class _SecretBackendRoleState:
|
|
386
433
|
pulumi.set(__self__, "policy_document", policy_document)
|
387
434
|
if role_arns is not None:
|
388
435
|
pulumi.set(__self__, "role_arns", role_arns)
|
436
|
+
if session_tags is not None:
|
437
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
389
438
|
if user_path is not None:
|
390
439
|
pulumi.set(__self__, "user_path", user_path)
|
391
440
|
|
@@ -432,6 +481,19 @@ class _SecretBackendRoleState:
|
|
432
481
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
433
482
|
pulumi.set(self, "default_sts_ttl", value)
|
434
483
|
|
484
|
+
@property
|
485
|
+
@pulumi.getter(name="externalId")
|
486
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
487
|
+
"""
|
488
|
+
External ID to set for assume role creds.
|
489
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
490
|
+
"""
|
491
|
+
return pulumi.get(self, "external_id")
|
492
|
+
|
493
|
+
@external_id.setter
|
494
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
495
|
+
pulumi.set(self, "external_id", value)
|
496
|
+
|
435
497
|
@property
|
436
498
|
@pulumi.getter(name="iamGroups")
|
437
499
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -567,6 +629,20 @@ class _SecretBackendRoleState:
|
|
567
629
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
568
630
|
pulumi.set(self, "role_arns", value)
|
569
631
|
|
632
|
+
@property
|
633
|
+
@pulumi.getter(name="sessionTags")
|
634
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
635
|
+
"""
|
636
|
+
A map of strings representing key/value pairs to be set
|
637
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
638
|
+
`assumed_role`.
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "session_tags")
|
641
|
+
|
642
|
+
@session_tags.setter
|
643
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
644
|
+
pulumi.set(self, "session_tags", value)
|
645
|
+
|
570
646
|
@property
|
571
647
|
@pulumi.getter(name="userPath")
|
572
648
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -589,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
589
665
|
backend: Optional[pulumi.Input[str]] = None,
|
590
666
|
credential_type: Optional[pulumi.Input[str]] = None,
|
591
667
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
668
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
592
669
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
593
670
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
594
671
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -598,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
598
675
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
599
676
|
policy_document: Optional[pulumi.Input[str]] = None,
|
600
677
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
678
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
601
679
|
user_path: Optional[pulumi.Input[str]] = None,
|
602
680
|
__props__=None):
|
603
681
|
"""
|
@@ -647,6 +725,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
647
725
|
and a default TTL is specified on the role,
|
648
726
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
649
727
|
`assumed_role` or `federation_token`.
|
728
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
729
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
650
730
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
651
731
|
against this vault role will be added to these IAM Groups. For a credential
|
652
732
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -683,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
763
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
684
764
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
685
765
|
prohibited otherwise.
|
766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
767
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
768
|
+
`assumed_role`.
|
686
769
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
687
770
|
`credential_type` is `iam_user`. Default is `/`.
|
688
771
|
"""
|
@@ -745,6 +828,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
828
|
backend: Optional[pulumi.Input[str]] = None,
|
746
829
|
credential_type: Optional[pulumi.Input[str]] = None,
|
747
830
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
831
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
748
832
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
833
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
750
834
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -754,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
754
838
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
755
839
|
policy_document: Optional[pulumi.Input[str]] = None,
|
756
840
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
841
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
757
842
|
user_path: Optional[pulumi.Input[str]] = None,
|
758
843
|
__props__=None):
|
759
844
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -771,6 +856,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
771
856
|
raise TypeError("Missing required property 'credential_type'")
|
772
857
|
__props__.__dict__["credential_type"] = credential_type
|
773
858
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
859
|
+
__props__.__dict__["external_id"] = external_id
|
774
860
|
__props__.__dict__["iam_groups"] = iam_groups
|
775
861
|
__props__.__dict__["iam_tags"] = iam_tags
|
776
862
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -780,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
866
|
__props__.__dict__["policy_arns"] = policy_arns
|
781
867
|
__props__.__dict__["policy_document"] = policy_document
|
782
868
|
__props__.__dict__["role_arns"] = role_arns
|
869
|
+
__props__.__dict__["session_tags"] = session_tags
|
783
870
|
__props__.__dict__["user_path"] = user_path
|
784
871
|
super(SecretBackendRole, __self__).__init__(
|
785
872
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -794,6 +881,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
794
881
|
backend: Optional[pulumi.Input[str]] = None,
|
795
882
|
credential_type: Optional[pulumi.Input[str]] = None,
|
796
883
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
884
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
797
885
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
886
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
799
887
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -803,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
803
891
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
892
|
policy_document: Optional[pulumi.Input[str]] = None,
|
805
893
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
806
895
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
807
896
|
"""
|
808
897
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -821,6 +910,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
821
910
|
and a default TTL is specified on the role,
|
822
911
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
823
912
|
`assumed_role` or `federation_token`.
|
913
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
914
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
824
915
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
825
916
|
against this vault role will be added to these IAM Groups. For a credential
|
826
917
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -857,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
857
948
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
858
949
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
859
950
|
prohibited otherwise.
|
951
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
952
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
953
|
+
`assumed_role`.
|
860
954
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
861
955
|
`credential_type` is `iam_user`. Default is `/`.
|
862
956
|
"""
|
@@ -867,6 +961,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
867
961
|
__props__.__dict__["backend"] = backend
|
868
962
|
__props__.__dict__["credential_type"] = credential_type
|
869
963
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
964
|
+
__props__.__dict__["external_id"] = external_id
|
870
965
|
__props__.__dict__["iam_groups"] = iam_groups
|
871
966
|
__props__.__dict__["iam_tags"] = iam_tags
|
872
967
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -876,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
876
971
|
__props__.__dict__["policy_arns"] = policy_arns
|
877
972
|
__props__.__dict__["policy_document"] = policy_document
|
878
973
|
__props__.__dict__["role_arns"] = role_arns
|
974
|
+
__props__.__dict__["session_tags"] = session_tags
|
879
975
|
__props__.__dict__["user_path"] = user_path
|
880
976
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
881
977
|
|
@@ -910,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
910
1006
|
"""
|
911
1007
|
return pulumi.get(self, "default_sts_ttl")
|
912
1008
|
|
1009
|
+
@property
|
1010
|
+
@pulumi.getter(name="externalId")
|
1011
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1012
|
+
"""
|
1013
|
+
External ID to set for assume role creds.
|
1014
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
1015
|
+
"""
|
1016
|
+
return pulumi.get(self, "external_id")
|
1017
|
+
|
913
1018
|
@property
|
914
1019
|
@pulumi.getter(name="iamGroups")
|
915
1020
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -1009,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1009
1114
|
"""
|
1010
1115
|
return pulumi.get(self, "role_arns")
|
1011
1116
|
|
1117
|
+
@property
|
1118
|
+
@pulumi.getter(name="sessionTags")
|
1119
|
+
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1120
|
+
"""
|
1121
|
+
A map of strings representing key/value pairs to be set
|
1122
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
1123
|
+
`assumed_role`.
|
1124
|
+
"""
|
1125
|
+
return pulumi.get(self, "session_tags")
|
1126
|
+
|
1012
1127
|
@property
|
1013
1128
|
@pulumi.getter(name="userPath")
|
1014
1129
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|
pulumi_vault/azure/backend.py
CHANGED
@@ -231,13 +231,11 @@ class BackendArgs:
|
|
231
231
|
|
232
232
|
@property
|
233
233
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
234
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
234
235
|
def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
|
235
236
|
"""
|
236
237
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
237
238
|
"""
|
238
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
239
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
240
|
-
|
241
239
|
return pulumi.get(self, "use_microsoft_graph_api")
|
242
240
|
|
243
241
|
@use_microsoft_graph_api.setter
|
@@ -467,13 +465,11 @@ class _BackendState:
|
|
467
465
|
|
468
466
|
@property
|
469
467
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
468
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
470
469
|
def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
|
471
470
|
"""
|
472
471
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
473
472
|
"""
|
474
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
475
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
476
|
-
|
477
473
|
return pulumi.get(self, "use_microsoft_graph_api")
|
478
474
|
|
479
475
|
@use_microsoft_graph_api.setter
|
@@ -852,12 +848,10 @@ class Backend(pulumi.CustomResource):
|
|
852
848
|
|
853
849
|
@property
|
854
850
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
851
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
855
852
|
def use_microsoft_graph_api(self) -> pulumi.Output[bool]:
|
856
853
|
"""
|
857
854
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
858
855
|
"""
|
859
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
860
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
861
|
-
|
862
856
|
return pulumi.get(self, "use_microsoft_graph_api")
|
863
857
|
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -420,7 +420,7 @@ class Endpoint(pulumi.CustomResource):
|
|
420
420
|
"password": "changeme"
|
421
421
|
}
|
422
422
|
\"\"\",
|
423
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
423
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
424
424
|
u1_token = vault.generic.Endpoint("u1_token",
|
425
425
|
path="auth/userpass/login/u1",
|
426
426
|
disable_read=True,
|
@@ -429,7 +429,7 @@ class Endpoint(pulumi.CustomResource):
|
|
429
429
|
"password": "changeme"
|
430
430
|
}
|
431
431
|
\"\"\",
|
432
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
432
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
433
433
|
u1_entity = vault.generic.Endpoint("u1_entity",
|
434
434
|
disable_read=True,
|
435
435
|
disable_delete=True,
|
@@ -441,7 +441,7 @@ class Endpoint(pulumi.CustomResource):
|
|
441
441
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
442
442
|
}
|
443
443
|
\"\"\",
|
444
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
444
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
445
445
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
446
446
|
```
|
447
447
|
|
@@ -513,7 +513,7 @@ class Endpoint(pulumi.CustomResource):
|
|
513
513
|
"password": "changeme"
|
514
514
|
}
|
515
515
|
\"\"\",
|
516
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
516
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
517
517
|
u1_token = vault.generic.Endpoint("u1_token",
|
518
518
|
path="auth/userpass/login/u1",
|
519
519
|
disable_read=True,
|
@@ -522,7 +522,7 @@ class Endpoint(pulumi.CustomResource):
|
|
522
522
|
"password": "changeme"
|
523
523
|
}
|
524
524
|
\"\"\",
|
525
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
525
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
526
526
|
u1_entity = vault.generic.Endpoint("u1_entity",
|
527
527
|
disable_read=True,
|
528
528
|
disable_delete=True,
|
@@ -534,7 +534,7 @@ class Endpoint(pulumi.CustomResource):
|
|
534
534
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
535
535
|
}
|
536
536
|
\"\"\",
|
537
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
537
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
538
538
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
539
539
|
```
|
540
540
|
|
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
|
|
263
263
|
|
264
264
|
## Required Vault Capabilities
|
265
265
|
|
266
|
-
Use of this resource requires the `
|
266
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
267
267
|
|
268
268
|
|
269
269
|
:param str alias_id: ID of the alias.
|
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
333
333
|
|
334
334
|
## Required Vault Capabilities
|
335
335
|
|
336
|
-
Use of this resource requires the `
|
336
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
337
337
|
|
338
338
|
|
339
339
|
:param str alias_id: ID of the alias.
|
pulumi_vault/mount.py
CHANGED
@@ -49,7 +49,8 @@ class MountArgs:
|
|
49
49
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
50
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
51
|
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
52
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
53
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
53
54
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
54
55
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
55
56
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -240,7 +241,8 @@ class MountArgs:
|
|
240
241
|
@pulumi.getter(name="listingVisibility")
|
241
242
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
242
243
|
"""
|
243
|
-
Specifies whether to show this mount in the UI-specific
|
244
|
+
Specifies whether to show this mount in the UI-specific
|
245
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
244
246
|
"""
|
245
247
|
return pulumi.get(self, "listing_visibility")
|
246
248
|
|
@@ -377,7 +379,8 @@ class _MountState:
|
|
377
379
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
378
380
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
379
381
|
not provided, this will default to Vault's OIDC default key.
|
380
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
382
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
383
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
381
384
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
382
385
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
383
386
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -562,7 +565,8 @@ class _MountState:
|
|
562
565
|
@pulumi.getter(name="listingVisibility")
|
563
566
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
564
567
|
"""
|
565
|
-
Specifies whether to show this mount in the UI-specific
|
568
|
+
Specifies whether to show this mount in the UI-specific
|
569
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
566
570
|
"""
|
567
571
|
return pulumi.get(self, "listing_visibility")
|
568
572
|
|
@@ -786,7 +790,8 @@ class Mount(pulumi.CustomResource):
|
|
786
790
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
787
791
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
788
792
|
not provided, this will default to Vault's OIDC default key.
|
789
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
793
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
794
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
790
795
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
791
796
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
792
797
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -988,7 +993,8 @@ class Mount(pulumi.CustomResource):
|
|
988
993
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
989
994
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
990
995
|
not provided, this will default to Vault's OIDC default key.
|
991
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
996
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
997
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
992
998
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
993
999
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
994
1000
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -1118,7 +1124,8 @@ class Mount(pulumi.CustomResource):
|
|
1118
1124
|
@pulumi.getter(name="listingVisibility")
|
1119
1125
|
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1120
1126
|
"""
|
1121
|
-
Specifies whether to show this mount in the UI-specific
|
1127
|
+
Specifies whether to show this mount in the UI-specific
|
1128
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1122
1129
|
"""
|
1123
1130
|
return pulumi.get(self, "listing_visibility")
|
1124
1131
|
|
@@ -194,14 +194,12 @@ class AuthBackendArgs:
|
|
194
194
|
|
195
195
|
@property
|
196
196
|
@pulumi.getter(name="maxTtl")
|
197
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
197
198
|
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
198
199
|
"""
|
199
200
|
Maximum duration after which authentication will be expired
|
200
201
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
201
202
|
"""
|
202
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
203
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
204
|
-
|
205
203
|
return pulumi.get(self, "max_ttl")
|
206
204
|
|
207
205
|
@max_ttl.setter
|
@@ -358,14 +356,12 @@ class AuthBackendArgs:
|
|
358
356
|
|
359
357
|
@property
|
360
358
|
@pulumi.getter
|
359
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
361
360
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
362
361
|
"""
|
363
362
|
Duration after which authentication will be expired.
|
364
363
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
365
364
|
"""
|
366
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
367
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
368
|
-
|
369
365
|
return pulumi.get(self, "ttl")
|
370
366
|
|
371
367
|
@ttl.setter
|
@@ -572,14 +568,12 @@ class _AuthBackendState:
|
|
572
568
|
|
573
569
|
@property
|
574
570
|
@pulumi.getter(name="maxTtl")
|
571
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
575
572
|
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
576
573
|
"""
|
577
574
|
Maximum duration after which authentication will be expired
|
578
575
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
579
576
|
"""
|
580
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
581
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
582
|
-
|
583
577
|
return pulumi.get(self, "max_ttl")
|
584
578
|
|
585
579
|
@max_ttl.setter
|
@@ -748,14 +742,12 @@ class _AuthBackendState:
|
|
748
742
|
|
749
743
|
@property
|
750
744
|
@pulumi.getter
|
745
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
751
746
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
752
747
|
"""
|
753
748
|
Duration after which authentication will be expired.
|
754
749
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
755
750
|
"""
|
756
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
757
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
758
|
-
|
759
751
|
return pulumi.get(self, "ttl")
|
760
752
|
|
761
753
|
@ttl.setter
|
@@ -1134,14 +1126,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
1134
1126
|
|
1135
1127
|
@property
|
1136
1128
|
@pulumi.getter(name="maxTtl")
|
1129
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
1137
1130
|
def max_ttl(self) -> pulumi.Output[Optional[str]]:
|
1138
1131
|
"""
|
1139
1132
|
Maximum duration after which authentication will be expired
|
1140
1133
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1141
1134
|
"""
|
1142
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
1143
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
1144
|
-
|
1145
1135
|
return pulumi.get(self, "max_ttl")
|
1146
1136
|
|
1147
1137
|
@property
|
@@ -1254,14 +1244,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
1254
1244
|
|
1255
1245
|
@property
|
1256
1246
|
@pulumi.getter
|
1247
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
1257
1248
|
def ttl(self) -> pulumi.Output[Optional[str]]:
|
1258
1249
|
"""
|
1259
1250
|
Duration after which authentication will be expired.
|
1260
1251
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1261
1252
|
"""
|
1262
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
1263
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
1264
|
-
|
1265
1253
|
return pulumi.get(self, "ttl")
|
1266
1254
|
|
1267
1255
|
@property
|
pulumi_vault/outputs.py
CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
+
"""
|
281
|
+
:param str key: name of permitted or denied parameter.
|
282
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
+
"""
|
280
284
|
pulumi.set(__self__, "key", key)
|
281
285
|
pulumi.set(__self__, "values", values)
|
282
286
|
|
283
287
|
@property
|
284
288
|
@pulumi.getter
|
285
289
|
def key(self) -> str:
|
290
|
+
"""
|
291
|
+
name of permitted or denied parameter.
|
292
|
+
"""
|
286
293
|
return pulumi.get(self, "key")
|
287
294
|
|
288
295
|
@property
|
289
296
|
@pulumi.getter
|
290
297
|
def values(self) -> Sequence[str]:
|
298
|
+
"""
|
299
|
+
list of values what are permitted or denied by policy rule.
|
300
|
+
"""
|
291
301
|
return pulumi.get(self, "values")
|
292
302
|
|
293
303
|
|
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
296
306
|
def __init__(__self__, *,
|
297
307
|
key: str,
|
298
308
|
values: Sequence[str]):
|
309
|
+
"""
|
310
|
+
:param str key: name of permitted or denied parameter.
|
311
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
+
"""
|
299
313
|
pulumi.set(__self__, "key", key)
|
300
314
|
pulumi.set(__self__, "values", values)
|
301
315
|
|
302
316
|
@property
|
303
317
|
@pulumi.getter
|
304
318
|
def key(self) -> str:
|
319
|
+
"""
|
320
|
+
name of permitted or denied parameter.
|
321
|
+
"""
|
305
322
|
return pulumi.get(self, "key")
|
306
323
|
|
307
324
|
@property
|
308
325
|
@pulumi.getter
|
309
326
|
def values(self) -> Sequence[str]:
|
327
|
+
"""
|
328
|
+
list of values what are permitted or denied by policy rule.
|
329
|
+
"""
|
310
330
|
return pulumi.get(self, "values")
|
311
331
|
|
312
332
|
|
@@ -19,6 +19,10 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
19
19
|
def __init__(__self__, *,
|
20
20
|
cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
21
21
|
userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
22
|
+
"""
|
23
|
+
:param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
24
|
+
:param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
|
25
|
+
"""
|
22
26
|
if cert is not None:
|
23
27
|
pulumi.set(__self__, "cert", cert)
|
24
28
|
if userpass is not None:
|
@@ -27,6 +31,9 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
27
31
|
@property
|
28
32
|
@pulumi.getter
|
29
33
|
def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
34
|
+
"""
|
35
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
36
|
+
"""
|
30
37
|
return pulumi.get(self, "cert")
|
31
38
|
|
32
39
|
@cert.setter
|
@@ -36,6 +43,9 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
36
43
|
@property
|
37
44
|
@pulumi.getter
|
38
45
|
def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
46
|
+
"""
|
47
|
+
"The accessor (required) property for user pass auth backends".
|
48
|
+
"""
|
39
49
|
return pulumi.get(self, "userpass")
|
40
50
|
|
41
51
|
@userpass.setter
|
@@ -20,6 +20,10 @@ class BackendConfigEstAuthenticators(dict):
|
|
20
20
|
def __init__(__self__, *,
|
21
21
|
cert: Optional[Mapping[str, Any]] = None,
|
22
22
|
userpass: Optional[Mapping[str, Any]] = None):
|
23
|
+
"""
|
24
|
+
:param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
25
|
+
:param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
|
26
|
+
"""
|
23
27
|
if cert is not None:
|
24
28
|
pulumi.set(__self__, "cert", cert)
|
25
29
|
if userpass is not None:
|
@@ -28,11 +32,17 @@ class BackendConfigEstAuthenticators(dict):
|
|
28
32
|
@property
|
29
33
|
@pulumi.getter
|
30
34
|
def cert(self) -> Optional[Mapping[str, Any]]:
|
35
|
+
"""
|
36
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
37
|
+
"""
|
31
38
|
return pulumi.get(self, "cert")
|
32
39
|
|
33
40
|
@property
|
34
41
|
@pulumi.getter
|
35
42
|
def userpass(self) -> Optional[Mapping[str, Any]]:
|
43
|
+
"""
|
44
|
+
"The accessor (required) property for user pass auth backends".
|
45
|
+
"""
|
36
46
|
return pulumi.get(self, "userpass")
|
37
47
|
|
38
48
|
|
@@ -743,7 +743,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
743
743
|
backend=intermediate["path"],
|
744
744
|
name=test["name"],
|
745
745
|
common_name="app.my.domain",
|
746
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
746
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
747
747
|
```
|
748
748
|
|
749
749
|
:param str resource_name: The name of the resource.
|
@@ -786,7 +786,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
786
786
|
backend=intermediate["path"],
|
787
787
|
name=test["name"],
|
788
788
|
common_name="app.my.domain",
|
789
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
789
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
790
790
|
```
|
791
791
|
|
792
792
|
:param str resource_name: The name of the resource.
|
@@ -200,7 +200,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
200
200
|
MUR4qFxeUOW/GJGccMUd
|
201
201
|
-----END CERTIFICATE-----
|
202
202
|
\"\"\",
|
203
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
203
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
204
204
|
```
|
205
205
|
|
206
206
|
:param str resource_name: The name of the resource.
|
@@ -276,7 +276,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
276
276
|
MUR4qFxeUOW/GJGccMUd
|
277
277
|
-----END CERTIFICATE-----
|
278
278
|
\"\"\",
|
279
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
279
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
280
280
|
```
|
281
281
|
|
282
282
|
:param str resource_name: The name of the resource.
|
@@ -970,7 +970,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
970
970
|
backend=pki["path"],
|
971
971
|
type="internal",
|
972
972
|
common_name="app.my.domain",
|
973
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
973
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
974
974
|
```
|
975
975
|
|
976
976
|
:param str resource_name: The name of the resource.
|
@@ -1028,7 +1028,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1028
1028
|
backend=pki["path"],
|
1029
1029
|
type="internal",
|
1030
1030
|
common_name="app.my.domain",
|
1031
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1031
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1032
1032
|
```
|
1033
1033
|
|
1034
1034
|
:param str resource_name: The name of the resource.
|
@@ -1089,7 +1089,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1089
1089
|
exclude_cn_from_sans=True,
|
1090
1090
|
ou="My OU",
|
1091
1091
|
organization="My organization",
|
1092
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1092
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1093
1093
|
```
|
1094
1094
|
|
1095
1095
|
:param str resource_name: The name of the resource.
|
@@ -1157,7 +1157,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1157
1157
|
exclude_cn_from_sans=True,
|
1158
1158
|
ou="My OU",
|
1159
1159
|
organization="My organization",
|
1160
|
-
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1160
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1161
1161
|
```
|
1162
1162
|
|
1163
1163
|
:param str resource_name: The name of the resource.
|
@@ -911,7 +911,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
911
911
|
exclude_cn_from_sans=True,
|
912
912
|
ou="My OU",
|
913
913
|
organization="My organization",
|
914
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
914
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate]))
|
915
915
|
```
|
916
916
|
|
917
917
|
:param str resource_name: The name of the resource.
|
@@ -968,7 +968,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
968
968
|
exclude_cn_from_sans=True,
|
969
969
|
ou="My OU",
|
970
970
|
organization="My organization",
|
971
|
-
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
971
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate]))
|
972
972
|
```
|
973
973
|
|
974
974
|
:param str resource_name: The name of the resource.
|
@@ -684,7 +684,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
684
684
|
-----END CERTIFICATE REQUEST-----
|
685
685
|
\"\"\",
|
686
686
|
common_name="test.my.domain",
|
687
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
687
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
688
688
|
```
|
689
689
|
|
690
690
|
:param str resource_name: The name of the resource.
|
@@ -756,7 +756,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
756
756
|
-----END CERTIFICATE REQUEST-----
|
757
757
|
\"\"\",
|
758
758
|
common_name="test.my.domain",
|
759
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
759
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
760
760
|
```
|
761
761
|
|
762
762
|
:param str resource_name: The name of the resource.
|
pulumi_vault/provider.py
CHANGED
@@ -349,13 +349,11 @@ class ProviderArgs:
|
|
349
349
|
|
350
350
|
@property
|
351
351
|
@pulumi.getter(name="clientAuth")
|
352
|
+
@_utilities.deprecated("""Use auth_login_cert instead""")
|
352
353
|
def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
|
353
354
|
"""
|
354
355
|
Client authentication credentials.
|
355
356
|
"""
|
356
|
-
warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
|
357
|
-
pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
|
358
|
-
|
359
357
|
return pulumi.get(self, "client_auth")
|
360
358
|
|
361
359
|
@client_auth.setter
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
pulumi_vault/__init__.py,sha256=YyUZ3AwssRd84-MFiLiMsKlEs0Gl5dnqjoRlDWbWe70,31607
|
2
|
-
pulumi_vault/_inputs.py,sha256=
|
3
|
-
pulumi_vault/_utilities.py,sha256=
|
2
|
+
pulumi_vault/_inputs.py,sha256=Q9weKCzZZ0f0tVbn8d3jxCbKRwRhRzvmBLbinoDTPns,73552
|
3
|
+
pulumi_vault/_utilities.py,sha256=aNnnaO6zRha3FhNHonuabR4fJLWGXANtK5dlh1Mz95k,10506
|
4
4
|
pulumi_vault/audit.py,sha256=DlMWyovN9OrGVBpDgNvvtMRMpZRI_pC8YwqEaI9S6lk,20343
|
5
5
|
pulumi_vault/audit_request_header.py,sha256=CHCfbFBwzX3mU6Fi34Havyl8cH9Mtzj5BDmKIc2tIno,10313
|
6
6
|
pulumi_vault/auth_backend.py,sha256=v4dxfpqhg94wXTnSuKAJ8-qBC_TnUXneSa-ODx9NNoQ,23808
|
@@ -17,17 +17,17 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
|
|
17
17
|
pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
|
18
18
|
pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
|
20
|
-
pulumi_vault/mount.py,sha256=
|
20
|
+
pulumi_vault/mount.py,sha256=c1LAxLDySvex6kcEwzd4ZmRUBhWf3Saetpue9MLTiYs,59849
|
21
21
|
pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
|
22
22
|
pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
|
24
|
-
pulumi_vault/outputs.py,sha256=
|
24
|
+
pulumi_vault/outputs.py,sha256=88VJ3ypd_FjGNbSs30B5o6hAiAvWU2bx4SoCfTBGyIc,13760
|
25
25
|
pulumi_vault/password_policy.py,sha256=sDU2lauo4-13snK35DOXtWbzn_bMJ5AZS-gS57T0aUw,12241
|
26
26
|
pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
|
27
27
|
pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
|
28
28
|
pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
|
29
|
-
pulumi_vault/provider.py,sha256=
|
30
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
29
|
+
pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
|
30
|
+
pulumi_vault/pulumi-plugin.json,sha256=j8R--JRVm5NAC9dzEru5GOAjDXh5eXuVXX3iv7h9Z4I,64
|
31
31
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
32
32
|
pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
|
33
33
|
pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
|
@@ -60,13 +60,13 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
|
|
60
60
|
pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
|
61
61
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
|
62
62
|
pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
|
63
|
-
pulumi_vault/aws/secret_backend_role.py,sha256=
|
63
|
+
pulumi_vault/aws/secret_backend_role.py,sha256=mGJYeBEct69kdK9HfS7k7wQgrlatu93U-ZkFbgNUQck,56724
|
64
64
|
pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
|
65
65
|
pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
|
66
66
|
pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
|
67
67
|
pulumi_vault/azure/auth_backend_config.py,sha256=L7BYNzTzVvSpEwAcj-L5i72svSmN7vxbdSoyhNcGXqs,29998
|
68
68
|
pulumi_vault/azure/auth_backend_role.py,sha256=WIsx6I1JGTLpc6L-OWNkLG2HrUFtjM1GK3KZ2ZZUIms,54712
|
69
|
-
pulumi_vault/azure/backend.py,sha256=
|
69
|
+
pulumi_vault/azure/backend.py,sha256=VrAO8acNmopJ756h-yQtw1Of74Nu8Rjva8s3R7h5TF4,39774
|
70
70
|
pulumi_vault/azure/backend_role.py,sha256=jttVdJcKQDTHMUTm9yA3K6ghgSC3Ubi_Sd38_U2NgPQ,39016
|
71
71
|
pulumi_vault/azure/get_access_credentials.py,sha256=Mg39uwR4vmnoeVjQNhJ_SWLlxJIw3C66uo4gA-WGuy4,17803
|
72
72
|
pulumi_vault/azure/outputs.py,sha256=YagOWiNzWojabE3fAvk4VvINp5R5IcBBr1Gmu6PbYNI,3097
|
@@ -97,7 +97,7 @@ pulumi_vault/gcp/secret_impersonated_account.py,sha256=dvpRVSEVLzBU_cGAlaJ-7Hecd
|
|
97
97
|
pulumi_vault/gcp/secret_roleset.py,sha256=RomErefa7yXgVrBMBwMezWmOwrQEEp8jLPIS2vZw1rQ,25967
|
98
98
|
pulumi_vault/gcp/secret_static_account.py,sha256=jkq1H-JpJq3UqBPNLFfvT0M9rvWvW7F_f7VD8vUw7yI,27271
|
99
99
|
pulumi_vault/generic/__init__.py,sha256=sKMQ22SKTgwwj91ZVDPGiwt7EuLghz3p3bdX6oiTwZ0,341
|
100
|
-
pulumi_vault/generic/endpoint.py,sha256=
|
100
|
+
pulumi_vault/generic/endpoint.py,sha256=JdeSmTe79jG7cTOlL8z2PwnddPlnh0MNqMexeNxihE4,39081
|
101
101
|
pulumi_vault/generic/get_secret.py,sha256=HsfdXt5HHkoscA6cV4VRjO3NrETRPm2rg1IuZZh5H0Y,11244
|
102
102
|
pulumi_vault/generic/secret.py,sha256=3hCZ9LrKPJ_2ek83OmQ3YMk-8ub3cn-d8Vcd9TbxscM,22847
|
103
103
|
pulumi_vault/github/__init__.py,sha256=ZYCQvKsnIeVKx_BIqkC8IqGBS4TjXNeo8iZxHbmztGk,382
|
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
|
|
110
110
|
pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
|
111
111
|
pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
|
112
112
|
pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
|
113
|
-
pulumi_vault/identity/get_entity.py,sha256=
|
113
|
+
pulumi_vault/identity/get_entity.py,sha256=DuvhHx1ZpDhxdHYebh7DWOQ-iIY57F6OscJR4LPvpAU,14351
|
114
114
|
pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
|
115
115
|
pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
|
116
116
|
pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
|
@@ -181,12 +181,12 @@ pulumi_vault/mongodbatlas/secret_backend.py,sha256=AO34JvDA1RYZTstomWWIXdWWpKfGi
|
|
181
181
|
pulumi_vault/mongodbatlas/secret_role.py,sha256=0OpKNxuX6l7OT3Ov5rEqetlaHWmu6oLNTiUxsxiVGjQ,33615
|
182
182
|
pulumi_vault/okta/__init__.py,sha256=XjquFz2tppASPCFGZ9YE51_cVH69eGAiToFyehc0wcY,409
|
183
183
|
pulumi_vault/okta/_inputs.py,sha256=LJ6EEWcEeLwVRZJYT0YRlH1oJH5pf_0nVf8Cu_uQf5E,3511
|
184
|
-
pulumi_vault/okta/auth_backend.py,sha256=
|
184
|
+
pulumi_vault/okta/auth_backend.py,sha256=bxVG-o09XHx5eeAgMpcqLz1poiDT3Ov0R72qFsNpBiQ,59946
|
185
185
|
pulumi_vault/okta/auth_backend_group.py,sha256=5Sw2MK4d5AnVMXT3O1a8fMbiqDOP1gmaudY-KLDhRfo,14975
|
186
186
|
pulumi_vault/okta/auth_backend_user.py,sha256=kiNHbdduI1R4XWbtnHWvdCIW8xR-UykSQGp1CLujeRk,16937
|
187
187
|
pulumi_vault/okta/outputs.py,sha256=8IPwy3nKDVxvwT8wd9dyFm3hfPYd_FXZ4TcCkT9vUR4,3067
|
188
188
|
pulumi_vault/pkisecret/__init__.py,sha256=Lwp_52rZJohEKOGZTENoaHtUcsrMDlAa87JRrMSrXcw,1103
|
189
|
-
pulumi_vault/pkisecret/_inputs.py,sha256=
|
189
|
+
pulumi_vault/pkisecret/_inputs.py,sha256=w-AtpcUpcZAI0q1yE_6E8MuYUWe7tKkxOinoCFrps-I,3592
|
190
190
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=gJDXjoh1qkAnXm6BAP65AXrDaY2q8aZpclglNBwCx2U,15929
|
191
191
|
pulumi_vault/pkisecret/backend_config_est.py,sha256=NEhpisOocjL-_w3_b97Bw2kUz9lPxki1PGylh-1M0wQ,32409
|
192
192
|
pulumi_vault/pkisecret/get_backend_config_est.py,sha256=pYeRNsK3RLeTmrPaU1rCi1pn8BC12kIvME6uHqniQps,9896
|
@@ -194,20 +194,20 @@ pulumi_vault/pkisecret/get_backend_issuer.py,sha256=098K4SWse6Xt5NCzqLqFFaqMHtuP
|
|
194
194
|
pulumi_vault/pkisecret/get_backend_issuers.py,sha256=SQMnqHSCQzVBVNjHio7Pt3BQvYS1sNbgb75TeoClWoU,6398
|
195
195
|
pulumi_vault/pkisecret/get_backend_key.py,sha256=NIjBO6CBmZ0gJ44wWnz510nQ4E47aQhuytFE-iSyhXY,6930
|
196
196
|
pulumi_vault/pkisecret/get_backend_keys.py,sha256=Ke6ggiCEupZK3x1bvo1cPTLlKeOp4wVG09LyuldvL90,6303
|
197
|
-
pulumi_vault/pkisecret/outputs.py,sha256=
|
198
|
-
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=
|
199
|
-
pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=
|
197
|
+
pulumi_vault/pkisecret/outputs.py,sha256=yPqzmnBbWgIR8K2_Bln9dE3ZNdxc6ns4cligGeEeJjE,3879
|
198
|
+
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=arfvGLS6IEmMVdIAl7d5OTjPPt05VGtRKdYV7QhMSnc,49699
|
199
|
+
pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8JIjvEqZ-2uCuK6sh7TwhVdU5RgakdsGjham4iRsKUg,18958
|
200
200
|
pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Hrk1TZ-vIYlDE-lmBRPndL2dwTh9MZbDN1Q3AVA6IZ0,16978
|
201
201
|
pulumi_vault/pkisecret/secret_backend_config_urls.py,sha256=rWkiZ4WZYw6i2zqyq0BK6J0gV8gWciUM_EDdgJJhW2c,22043
|
202
202
|
pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=CfErn8n871l4dL3ZriMJno4zTIm7jGWHvZjcPjYFdwc,36811
|
203
|
-
pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=
|
203
|
+
pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=MoWBzOHYCtF0uTywkZ-14dQuOi2iES0D7NdIMbzpnNI,61793
|
204
204
|
pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py,sha256=VzfgaPaTkYOfrTD2m6KhkI6Odd1ioezzi33vhpv9ZnM,20048
|
205
205
|
pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=w8BHFPIuP9JywCIUBnbsoa8EzAaw0BMK6EpFJLb1tYU,36625
|
206
206
|
pulumi_vault/pkisecret/secret_backend_key.py,sha256=XFjLUzMf1ssTfrlO0n-IABiAkiBMpGh4yBmn0TgIv3A,25523
|
207
207
|
pulumi_vault/pkisecret/secret_backend_role.py,sha256=Jy_YC8WubYSnkhTNPy-RsDJloS0n_wkfzJ7Kuyq2cfs,116221
|
208
|
-
pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=
|
209
|
-
pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=
|
210
|
-
pulumi_vault/pkisecret/secret_backend_sign.py,sha256=
|
208
|
+
pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=Qeosf1eYf7qjvkF7xLoVL1pCTcC7ZvH37bI2puIKYro,68837
|
209
|
+
pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=AMxQpjkCBXc18gbup1i8RXhHIHSSeDqjpapy2OpCECg,58424
|
210
|
+
pulumi_vault/pkisecret/secret_backend_sign.py,sha256=QOPtCkvvIAU8tBO4bQNrDq_oHVgsEd9ysXqavAtDfoo,48580
|
211
211
|
pulumi_vault/rabbitmq/__init__.py,sha256=8QnL4OBf123TwWNwxgf2zSsJVPuTixNLywif1gW1yII,379
|
212
212
|
pulumi_vault/rabbitmq/_inputs.py,sha256=F2Cv6ny7hvCFdKWpRxP2LIVqc4pa7X7x1opydarlnfI,5281
|
213
213
|
pulumi_vault/rabbitmq/outputs.py,sha256=0KZQuaiJ0oKjsGfuUordXRtsZxSeApHVIK-sI9k_7gg,3853
|
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
|
|
250
250
|
pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
|
251
251
|
pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
|
252
252
|
pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
|
253
|
-
pulumi_vault-6.
|
254
|
-
pulumi_vault-6.
|
255
|
-
pulumi_vault-6.
|
256
|
-
pulumi_vault-6.
|
253
|
+
pulumi_vault-6.3.0.dist-info/METADATA,sha256=EAluMaciG4gKF2BjCluv6DF8x2Wdn5cX8v5sirQf6CQ,4849
|
254
|
+
pulumi_vault-6.3.0.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
|
255
|
+
pulumi_vault-6.3.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
256
|
+
pulumi_vault-6.3.0.dist-info/RECORD,,
|
File without changes
|