pulumi-vault 6.2.0a1718998938__tar.gz → 6.3.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/PKG-INFO +1 -1
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/_inputs.py +20 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/_utilities.py +40 -4
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/secret_backend_role.py +115 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/backend.py +3 -9
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/generic/endpoint.py +6 -6
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/get_entity.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mount.py +14 -7
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/auth_backend.py +6 -18
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/outputs.py +20 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/_inputs.py +10 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/outputs.py +10 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_cert.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_config_ca.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_root_cert.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_sign.py +2 -2
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/provider.py +1 -3
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pyproject.toml +1 -1
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/README.md +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_auth_backends.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_namespace.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_namespaces.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/get_raft_autopilot_state.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/get_static_credentials.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/token.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/setup.cfg +0 -0
@@ -1844,12 +1844,19 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
+
"""
|
1848
|
+
:param str key: name of permitted or denied parameter.
|
1849
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
+
"""
|
1847
1851
|
pulumi.set(__self__, "key", key)
|
1848
1852
|
pulumi.set(__self__, "values", values)
|
1849
1853
|
|
1850
1854
|
@property
|
1851
1855
|
@pulumi.getter
|
1852
1856
|
def key(self) -> str:
|
1857
|
+
"""
|
1858
|
+
name of permitted or denied parameter.
|
1859
|
+
"""
|
1853
1860
|
return pulumi.get(self, "key")
|
1854
1861
|
|
1855
1862
|
@key.setter
|
@@ -1859,6 +1866,9 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1859
1866
|
@property
|
1860
1867
|
@pulumi.getter
|
1861
1868
|
def values(self) -> Sequence[str]:
|
1869
|
+
"""
|
1870
|
+
list of values what are permitted or denied by policy rule.
|
1871
|
+
"""
|
1862
1872
|
return pulumi.get(self, "values")
|
1863
1873
|
|
1864
1874
|
@values.setter
|
@@ -1871,12 +1881,19 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1871
1881
|
def __init__(__self__, *,
|
1872
1882
|
key: str,
|
1873
1883
|
values: Sequence[str]):
|
1884
|
+
"""
|
1885
|
+
:param str key: name of permitted or denied parameter.
|
1886
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
+
"""
|
1874
1888
|
pulumi.set(__self__, "key", key)
|
1875
1889
|
pulumi.set(__self__, "values", values)
|
1876
1890
|
|
1877
1891
|
@property
|
1878
1892
|
@pulumi.getter
|
1879
1893
|
def key(self) -> str:
|
1894
|
+
"""
|
1895
|
+
name of permitted or denied parameter.
|
1896
|
+
"""
|
1880
1897
|
return pulumi.get(self, "key")
|
1881
1898
|
|
1882
1899
|
@key.setter
|
@@ -1886,6 +1903,9 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1886
1903
|
@property
|
1887
1904
|
@pulumi.getter
|
1888
1905
|
def values(self) -> Sequence[str]:
|
1906
|
+
"""
|
1907
|
+
list of values what are permitted or denied by policy rule.
|
1908
|
+
"""
|
1889
1909
|
return pulumi.get(self, "values")
|
1890
1910
|
|
1891
1911
|
@values.setter
|
@@ -4,6 +4,7 @@
|
|
4
4
|
|
5
5
|
|
6
6
|
import asyncio
|
7
|
+
import functools
|
7
8
|
import importlib.metadata
|
8
9
|
import importlib.util
|
9
10
|
import inspect
|
@@ -11,14 +12,19 @@ import json
|
|
11
12
|
import os
|
12
13
|
import sys
|
13
14
|
import typing
|
15
|
+
import warnings
|
16
|
+
import base64
|
14
17
|
|
15
18
|
import pulumi
|
16
19
|
import pulumi.runtime
|
17
20
|
from pulumi.runtime.sync_await import _sync_await
|
21
|
+
from pulumi.runtime.proto import resource_pb2
|
18
22
|
|
19
23
|
from semver import VersionInfo as SemverVersion
|
20
24
|
from parver import Version as PEP440Version
|
21
25
|
|
26
|
+
C = typing.TypeVar("C", bound=typing.Callable)
|
27
|
+
|
22
28
|
|
23
29
|
def get_env(*args):
|
24
30
|
for v in args:
|
@@ -96,10 +102,6 @@ def _get_semver_version():
|
|
96
102
|
_version = _get_semver_version()
|
97
103
|
_version_str = str(_version)
|
98
104
|
|
99
|
-
|
100
|
-
def get_version():
|
101
|
-
return _version_str
|
102
|
-
|
103
105
|
def get_resource_opts_defaults() -> pulumi.ResourceOptions:
|
104
106
|
return pulumi.ResourceOptions(
|
105
107
|
version=get_version(),
|
@@ -287,5 +289,39 @@ async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bo
|
|
287
289
|
await o._resources,
|
288
290
|
)
|
289
291
|
|
292
|
+
|
293
|
+
# This is included to provide an upgrade path for users who are using a version
|
294
|
+
# of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
|
295
|
+
def deprecated(message: str) -> typing.Callable[[C], C]:
|
296
|
+
"""
|
297
|
+
Decorator to indicate a function is deprecated.
|
298
|
+
|
299
|
+
As well as inserting appropriate statements to indicate that the function is
|
300
|
+
deprecated, this decorator also tags the function with a special attribute
|
301
|
+
so that Pulumi code can detect that it is deprecated and react appropriately
|
302
|
+
in certain situations.
|
303
|
+
|
304
|
+
message is the deprecation message that should be printed if the function is called.
|
305
|
+
"""
|
306
|
+
|
307
|
+
def decorator(fn: C) -> C:
|
308
|
+
if not callable(fn):
|
309
|
+
raise TypeError("Expected fn to be callable")
|
310
|
+
|
311
|
+
@functools.wraps(fn)
|
312
|
+
def deprecated_fn(*args, **kwargs):
|
313
|
+
warnings.warn(message)
|
314
|
+
pulumi.warn(f"{fn.__name__} is deprecated: {message}")
|
315
|
+
|
316
|
+
return fn(*args, **kwargs)
|
317
|
+
|
318
|
+
deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
|
319
|
+
return typing.cast(C, deprecated_fn)
|
320
|
+
|
321
|
+
return decorator
|
322
|
+
|
290
323
|
def get_plugin_download_url():
|
291
324
|
return None
|
325
|
+
|
326
|
+
def get_version():
|
327
|
+
return _version_str
|
{pulumi_vault-6.2.0a1718998938 → pulumi_vault-6.3.0}/pulumi_vault/aws/secret_backend_role.py
RENAMED
@@ -17,6 +17,7 @@ class SecretBackendRoleArgs:
|
|
17
17
|
backend: pulumi.Input[str],
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
20
21
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
22
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
23
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -26,6 +27,7 @@ class SecretBackendRoleArgs:
|
|
26
27
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
28
|
policy_document: Optional[pulumi.Input[str]] = None,
|
28
29
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
29
31
|
user_path: Optional[pulumi.Input[str]] = None):
|
30
32
|
"""
|
31
33
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -39,6 +41,8 @@ class SecretBackendRoleArgs:
|
|
39
41
|
and a default TTL is specified on the role,
|
40
42
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
41
43
|
`assumed_role` or `federation_token`.
|
44
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
45
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
42
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
43
47
|
against this vault role will be added to these IAM Groups. For a credential
|
44
48
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -75,6 +79,9 @@ class SecretBackendRoleArgs:
|
|
75
79
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
76
80
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
77
81
|
prohibited otherwise.
|
82
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
83
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
84
|
+
`assumed_role`.
|
78
85
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
79
86
|
`credential_type` is `iam_user`. Default is `/`.
|
80
87
|
"""
|
@@ -82,6 +89,8 @@ class SecretBackendRoleArgs:
|
|
82
89
|
pulumi.set(__self__, "credential_type", credential_type)
|
83
90
|
if default_sts_ttl is not None:
|
84
91
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
92
|
+
if external_id is not None:
|
93
|
+
pulumi.set(__self__, "external_id", external_id)
|
85
94
|
if iam_groups is not None:
|
86
95
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
87
96
|
if iam_tags is not None:
|
@@ -100,6 +109,8 @@ class SecretBackendRoleArgs:
|
|
100
109
|
pulumi.set(__self__, "policy_document", policy_document)
|
101
110
|
if role_arns is not None:
|
102
111
|
pulumi.set(__self__, "role_arns", role_arns)
|
112
|
+
if session_tags is not None:
|
113
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
103
114
|
if user_path is not None:
|
104
115
|
pulumi.set(__self__, "user_path", user_path)
|
105
116
|
|
@@ -146,6 +157,19 @@ class SecretBackendRoleArgs:
|
|
146
157
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
147
158
|
pulumi.set(self, "default_sts_ttl", value)
|
148
159
|
|
160
|
+
@property
|
161
|
+
@pulumi.getter(name="externalId")
|
162
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
"""
|
164
|
+
External ID to set for assume role creds.
|
165
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "external_id")
|
168
|
+
|
169
|
+
@external_id.setter
|
170
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
pulumi.set(self, "external_id", value)
|
172
|
+
|
149
173
|
@property
|
150
174
|
@pulumi.getter(name="iamGroups")
|
151
175
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -281,6 +305,20 @@ class SecretBackendRoleArgs:
|
|
281
305
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
282
306
|
pulumi.set(self, "role_arns", value)
|
283
307
|
|
308
|
+
@property
|
309
|
+
@pulumi.getter(name="sessionTags")
|
310
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
311
|
+
"""
|
312
|
+
A map of strings representing key/value pairs to be set
|
313
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
314
|
+
`assumed_role`.
|
315
|
+
"""
|
316
|
+
return pulumi.get(self, "session_tags")
|
317
|
+
|
318
|
+
@session_tags.setter
|
319
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
320
|
+
pulumi.set(self, "session_tags", value)
|
321
|
+
|
284
322
|
@property
|
285
323
|
@pulumi.getter(name="userPath")
|
286
324
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -301,6 +339,7 @@ class _SecretBackendRoleState:
|
|
301
339
|
backend: Optional[pulumi.Input[str]] = None,
|
302
340
|
credential_type: Optional[pulumi.Input[str]] = None,
|
303
341
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
304
343
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
305
344
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
306
345
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -310,6 +349,7 @@ class _SecretBackendRoleState:
|
|
310
349
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
350
|
policy_document: Optional[pulumi.Input[str]] = None,
|
312
351
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
313
353
|
user_path: Optional[pulumi.Input[str]] = None):
|
314
354
|
"""
|
315
355
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -323,6 +363,8 @@ class _SecretBackendRoleState:
|
|
323
363
|
and a default TTL is specified on the role,
|
324
364
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
325
365
|
`assumed_role` or `federation_token`.
|
366
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
367
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
326
368
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
327
369
|
against this vault role will be added to these IAM Groups. For a credential
|
328
370
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -359,6 +401,9 @@ class _SecretBackendRoleState:
|
|
359
401
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
360
402
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
361
403
|
prohibited otherwise.
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
405
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
406
|
+
`assumed_role`.
|
362
407
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
363
408
|
`credential_type` is `iam_user`. Default is `/`.
|
364
409
|
"""
|
@@ -368,6 +413,8 @@ class _SecretBackendRoleState:
|
|
368
413
|
pulumi.set(__self__, "credential_type", credential_type)
|
369
414
|
if default_sts_ttl is not None:
|
370
415
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
416
|
+
if external_id is not None:
|
417
|
+
pulumi.set(__self__, "external_id", external_id)
|
371
418
|
if iam_groups is not None:
|
372
419
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
373
420
|
if iam_tags is not None:
|
@@ -386,6 +433,8 @@ class _SecretBackendRoleState:
|
|
386
433
|
pulumi.set(__self__, "policy_document", policy_document)
|
387
434
|
if role_arns is not None:
|
388
435
|
pulumi.set(__self__, "role_arns", role_arns)
|
436
|
+
if session_tags is not None:
|
437
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
389
438
|
if user_path is not None:
|
390
439
|
pulumi.set(__self__, "user_path", user_path)
|
391
440
|
|
@@ -432,6 +481,19 @@ class _SecretBackendRoleState:
|
|
432
481
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
433
482
|
pulumi.set(self, "default_sts_ttl", value)
|
434
483
|
|
484
|
+
@property
|
485
|
+
@pulumi.getter(name="externalId")
|
486
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
487
|
+
"""
|
488
|
+
External ID to set for assume role creds.
|
489
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
490
|
+
"""
|
491
|
+
return pulumi.get(self, "external_id")
|
492
|
+
|
493
|
+
@external_id.setter
|
494
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
495
|
+
pulumi.set(self, "external_id", value)
|
496
|
+
|
435
497
|
@property
|
436
498
|
@pulumi.getter(name="iamGroups")
|
437
499
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -567,6 +629,20 @@ class _SecretBackendRoleState:
|
|
567
629
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
568
630
|
pulumi.set(self, "role_arns", value)
|
569
631
|
|
632
|
+
@property
|
633
|
+
@pulumi.getter(name="sessionTags")
|
634
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
635
|
+
"""
|
636
|
+
A map of strings representing key/value pairs to be set
|
637
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
638
|
+
`assumed_role`.
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "session_tags")
|
641
|
+
|
642
|
+
@session_tags.setter
|
643
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
644
|
+
pulumi.set(self, "session_tags", value)
|
645
|
+
|
570
646
|
@property
|
571
647
|
@pulumi.getter(name="userPath")
|
572
648
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -589,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
589
665
|
backend: Optional[pulumi.Input[str]] = None,
|
590
666
|
credential_type: Optional[pulumi.Input[str]] = None,
|
591
667
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
668
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
592
669
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
593
670
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
594
671
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -598,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
598
675
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
599
676
|
policy_document: Optional[pulumi.Input[str]] = None,
|
600
677
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
678
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
601
679
|
user_path: Optional[pulumi.Input[str]] = None,
|
602
680
|
__props__=None):
|
603
681
|
"""
|
@@ -647,6 +725,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
647
725
|
and a default TTL is specified on the role,
|
648
726
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
649
727
|
`assumed_role` or `federation_token`.
|
728
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
729
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
650
730
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
651
731
|
against this vault role will be added to these IAM Groups. For a credential
|
652
732
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -683,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
763
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
684
764
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
685
765
|
prohibited otherwise.
|
766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
767
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
768
|
+
`assumed_role`.
|
686
769
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
687
770
|
`credential_type` is `iam_user`. Default is `/`.
|
688
771
|
"""
|
@@ -745,6 +828,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
828
|
backend: Optional[pulumi.Input[str]] = None,
|
746
829
|
credential_type: Optional[pulumi.Input[str]] = None,
|
747
830
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
831
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
748
832
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
833
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
750
834
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -754,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
754
838
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
755
839
|
policy_document: Optional[pulumi.Input[str]] = None,
|
756
840
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
841
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
757
842
|
user_path: Optional[pulumi.Input[str]] = None,
|
758
843
|
__props__=None):
|
759
844
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -771,6 +856,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
771
856
|
raise TypeError("Missing required property 'credential_type'")
|
772
857
|
__props__.__dict__["credential_type"] = credential_type
|
773
858
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
859
|
+
__props__.__dict__["external_id"] = external_id
|
774
860
|
__props__.__dict__["iam_groups"] = iam_groups
|
775
861
|
__props__.__dict__["iam_tags"] = iam_tags
|
776
862
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -780,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
866
|
__props__.__dict__["policy_arns"] = policy_arns
|
781
867
|
__props__.__dict__["policy_document"] = policy_document
|
782
868
|
__props__.__dict__["role_arns"] = role_arns
|
869
|
+
__props__.__dict__["session_tags"] = session_tags
|
783
870
|
__props__.__dict__["user_path"] = user_path
|
784
871
|
super(SecretBackendRole, __self__).__init__(
|
785
872
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -794,6 +881,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
794
881
|
backend: Optional[pulumi.Input[str]] = None,
|
795
882
|
credential_type: Optional[pulumi.Input[str]] = None,
|
796
883
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
884
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
797
885
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
886
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
799
887
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -803,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
803
891
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
892
|
policy_document: Optional[pulumi.Input[str]] = None,
|
805
893
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
806
895
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
807
896
|
"""
|
808
897
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -821,6 +910,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
821
910
|
and a default TTL is specified on the role,
|
822
911
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
823
912
|
`assumed_role` or `federation_token`.
|
913
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
914
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
824
915
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
825
916
|
against this vault role will be added to these IAM Groups. For a credential
|
826
917
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -857,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
857
948
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
858
949
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
859
950
|
prohibited otherwise.
|
951
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
952
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
953
|
+
`assumed_role`.
|
860
954
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
861
955
|
`credential_type` is `iam_user`. Default is `/`.
|
862
956
|
"""
|
@@ -867,6 +961,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
867
961
|
__props__.__dict__["backend"] = backend
|
868
962
|
__props__.__dict__["credential_type"] = credential_type
|
869
963
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
964
|
+
__props__.__dict__["external_id"] = external_id
|
870
965
|
__props__.__dict__["iam_groups"] = iam_groups
|
871
966
|
__props__.__dict__["iam_tags"] = iam_tags
|
872
967
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -876,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
876
971
|
__props__.__dict__["policy_arns"] = policy_arns
|
877
972
|
__props__.__dict__["policy_document"] = policy_document
|
878
973
|
__props__.__dict__["role_arns"] = role_arns
|
974
|
+
__props__.__dict__["session_tags"] = session_tags
|
879
975
|
__props__.__dict__["user_path"] = user_path
|
880
976
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
881
977
|
|
@@ -910,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
910
1006
|
"""
|
911
1007
|
return pulumi.get(self, "default_sts_ttl")
|
912
1008
|
|
1009
|
+
@property
|
1010
|
+
@pulumi.getter(name="externalId")
|
1011
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1012
|
+
"""
|
1013
|
+
External ID to set for assume role creds.
|
1014
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
1015
|
+
"""
|
1016
|
+
return pulumi.get(self, "external_id")
|
1017
|
+
|
913
1018
|
@property
|
914
1019
|
@pulumi.getter(name="iamGroups")
|
915
1020
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -1009,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1009
1114
|
"""
|
1010
1115
|
return pulumi.get(self, "role_arns")
|
1011
1116
|
|
1117
|
+
@property
|
1118
|
+
@pulumi.getter(name="sessionTags")
|
1119
|
+
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1120
|
+
"""
|
1121
|
+
A map of strings representing key/value pairs to be set
|
1122
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
1123
|
+
`assumed_role`.
|
1124
|
+
"""
|
1125
|
+
return pulumi.get(self, "session_tags")
|
1126
|
+
|
1012
1127
|
@property
|
1013
1128
|
@pulumi.getter(name="userPath")
|
1014
1129
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|
@@ -231,13 +231,11 @@ class BackendArgs:
|
|
231
231
|
|
232
232
|
@property
|
233
233
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
234
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
234
235
|
def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
|
235
236
|
"""
|
236
237
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
237
238
|
"""
|
238
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
239
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
240
|
-
|
241
239
|
return pulumi.get(self, "use_microsoft_graph_api")
|
242
240
|
|
243
241
|
@use_microsoft_graph_api.setter
|
@@ -467,13 +465,11 @@ class _BackendState:
|
|
467
465
|
|
468
466
|
@property
|
469
467
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
468
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
470
469
|
def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
|
471
470
|
"""
|
472
471
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
473
472
|
"""
|
474
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
475
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
476
|
-
|
477
473
|
return pulumi.get(self, "use_microsoft_graph_api")
|
478
474
|
|
479
475
|
@use_microsoft_graph_api.setter
|
@@ -852,12 +848,10 @@ class Backend(pulumi.CustomResource):
|
|
852
848
|
|
853
849
|
@property
|
854
850
|
@pulumi.getter(name="useMicrosoftGraphApi")
|
851
|
+
@_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
855
852
|
def use_microsoft_graph_api(self) -> pulumi.Output[bool]:
|
856
853
|
"""
|
857
854
|
Use the Microsoft Graph API. Should be set to true on vault-1.10+
|
858
855
|
"""
|
859
|
-
warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
|
860
|
-
pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
|
861
|
-
|
862
856
|
return pulumi.get(self, "use_microsoft_graph_api")
|
863
857
|
|
@@ -420,7 +420,7 @@ class Endpoint(pulumi.CustomResource):
|
|
420
420
|
"password": "changeme"
|
421
421
|
}
|
422
422
|
\"\"\",
|
423
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
423
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
424
424
|
u1_token = vault.generic.Endpoint("u1_token",
|
425
425
|
path="auth/userpass/login/u1",
|
426
426
|
disable_read=True,
|
@@ -429,7 +429,7 @@ class Endpoint(pulumi.CustomResource):
|
|
429
429
|
"password": "changeme"
|
430
430
|
}
|
431
431
|
\"\"\",
|
432
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
432
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
433
433
|
u1_entity = vault.generic.Endpoint("u1_entity",
|
434
434
|
disable_read=True,
|
435
435
|
disable_delete=True,
|
@@ -441,7 +441,7 @@ class Endpoint(pulumi.CustomResource):
|
|
441
441
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
442
442
|
}
|
443
443
|
\"\"\",
|
444
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
444
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
445
445
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
446
446
|
```
|
447
447
|
|
@@ -513,7 +513,7 @@ class Endpoint(pulumi.CustomResource):
|
|
513
513
|
"password": "changeme"
|
514
514
|
}
|
515
515
|
\"\"\",
|
516
|
-
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
516
|
+
opts = pulumi.ResourceOptions(depends_on=[userpass]))
|
517
517
|
u1_token = vault.generic.Endpoint("u1_token",
|
518
518
|
path="auth/userpass/login/u1",
|
519
519
|
disable_read=True,
|
@@ -522,7 +522,7 @@ class Endpoint(pulumi.CustomResource):
|
|
522
522
|
"password": "changeme"
|
523
523
|
}
|
524
524
|
\"\"\",
|
525
|
-
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
525
|
+
opts = pulumi.ResourceOptions(depends_on=[u1]))
|
526
526
|
u1_entity = vault.generic.Endpoint("u1_entity",
|
527
527
|
disable_read=True,
|
528
528
|
disable_delete=True,
|
@@ -534,7 +534,7 @@ class Endpoint(pulumi.CustomResource):
|
|
534
534
|
"alias_mount_accessor": vault_auth_backend.userpass.accessor
|
535
535
|
}
|
536
536
|
\"\"\",
|
537
|
-
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
537
|
+
opts = pulumi.ResourceOptions(depends_on=[u1_token]))
|
538
538
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
539
539
|
```
|
540
540
|
|
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
|
|
263
263
|
|
264
264
|
## Required Vault Capabilities
|
265
265
|
|
266
|
-
Use of this resource requires the `
|
266
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
267
267
|
|
268
268
|
|
269
269
|
:param str alias_id: ID of the alias.
|
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
333
333
|
|
334
334
|
## Required Vault Capabilities
|
335
335
|
|
336
|
-
Use of this resource requires the `
|
336
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
337
337
|
|
338
338
|
|
339
339
|
:param str alias_id: ID of the alias.
|
@@ -49,7 +49,8 @@ class MountArgs:
|
|
49
49
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
50
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
51
|
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
52
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
53
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
53
54
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
54
55
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
55
56
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -240,7 +241,8 @@ class MountArgs:
|
|
240
241
|
@pulumi.getter(name="listingVisibility")
|
241
242
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
242
243
|
"""
|
243
|
-
Specifies whether to show this mount in the UI-specific
|
244
|
+
Specifies whether to show this mount in the UI-specific
|
245
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
244
246
|
"""
|
245
247
|
return pulumi.get(self, "listing_visibility")
|
246
248
|
|
@@ -377,7 +379,8 @@ class _MountState:
|
|
377
379
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
378
380
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
379
381
|
not provided, this will default to Vault's OIDC default key.
|
380
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
382
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
383
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
381
384
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
382
385
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
383
386
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -562,7 +565,8 @@ class _MountState:
|
|
562
565
|
@pulumi.getter(name="listingVisibility")
|
563
566
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
564
567
|
"""
|
565
|
-
Specifies whether to show this mount in the UI-specific
|
568
|
+
Specifies whether to show this mount in the UI-specific
|
569
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
566
570
|
"""
|
567
571
|
return pulumi.get(self, "listing_visibility")
|
568
572
|
|
@@ -786,7 +790,8 @@ class Mount(pulumi.CustomResource):
|
|
786
790
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
787
791
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
788
792
|
not provided, this will default to Vault's OIDC default key.
|
789
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
793
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
794
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
790
795
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
791
796
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
792
797
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -988,7 +993,8 @@ class Mount(pulumi.CustomResource):
|
|
988
993
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
989
994
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
990
995
|
not provided, this will default to Vault's OIDC default key.
|
991
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
996
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
997
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
992
998
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
993
999
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
994
1000
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -1118,7 +1124,8 @@ class Mount(pulumi.CustomResource):
|
|
1118
1124
|
@pulumi.getter(name="listingVisibility")
|
1119
1125
|
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1120
1126
|
"""
|
1121
|
-
Specifies whether to show this mount in the UI-specific
|
1127
|
+
Specifies whether to show this mount in the UI-specific
|
1128
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1122
1129
|
"""
|
1123
1130
|
return pulumi.get(self, "listing_visibility")
|
1124
1131
|
|