pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.0a1723109142__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -17,6 +17,7 @@ class SecretBackendRoleArgs:
17
17
  backend: pulumi.Input[str],
18
18
  credential_type: pulumi.Input[str],
19
19
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
20
+ external_id: Optional[pulumi.Input[str]] = None,
20
21
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
22
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
23
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -26,6 +27,7 @@ class SecretBackendRoleArgs:
26
27
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
28
  policy_document: Optional[pulumi.Input[str]] = None,
28
29
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
29
31
  user_path: Optional[pulumi.Input[str]] = None):
30
32
  """
31
33
  The set of arguments for constructing a SecretBackendRole resource.
@@ -39,6 +41,8 @@ class SecretBackendRoleArgs:
39
41
  and a default TTL is specified on the role,
40
42
  then this default TTL will be used. Valid only when `credential_type` is one of
41
43
  `assumed_role` or `federation_token`.
44
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
45
+ Valid only when `credential_type` is set to `assumed_role`.
42
46
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
43
47
  against this vault role will be added to these IAM Groups. For a credential
44
48
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -75,6 +79,9 @@ class SecretBackendRoleArgs:
75
79
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
76
80
  is allowed to assume. Required when `credential_type` is `assumed_role` and
77
81
  prohibited otherwise.
82
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
83
+ during assume role creds creation. Valid only when `credential_type` is set to
84
+ `assumed_role`.
78
85
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
79
86
  `credential_type` is `iam_user`. Default is `/`.
80
87
  """
@@ -82,6 +89,8 @@ class SecretBackendRoleArgs:
82
89
  pulumi.set(__self__, "credential_type", credential_type)
83
90
  if default_sts_ttl is not None:
84
91
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
92
+ if external_id is not None:
93
+ pulumi.set(__self__, "external_id", external_id)
85
94
  if iam_groups is not None:
86
95
  pulumi.set(__self__, "iam_groups", iam_groups)
87
96
  if iam_tags is not None:
@@ -100,6 +109,8 @@ class SecretBackendRoleArgs:
100
109
  pulumi.set(__self__, "policy_document", policy_document)
101
110
  if role_arns is not None:
102
111
  pulumi.set(__self__, "role_arns", role_arns)
112
+ if session_tags is not None:
113
+ pulumi.set(__self__, "session_tags", session_tags)
103
114
  if user_path is not None:
104
115
  pulumi.set(__self__, "user_path", user_path)
105
116
 
@@ -146,6 +157,19 @@ class SecretBackendRoleArgs:
146
157
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
147
158
  pulumi.set(self, "default_sts_ttl", value)
148
159
 
160
+ @property
161
+ @pulumi.getter(name="externalId")
162
+ def external_id(self) -> Optional[pulumi.Input[str]]:
163
+ """
164
+ External ID to set for assume role creds.
165
+ Valid only when `credential_type` is set to `assumed_role`.
166
+ """
167
+ return pulumi.get(self, "external_id")
168
+
169
+ @external_id.setter
170
+ def external_id(self, value: Optional[pulumi.Input[str]]):
171
+ pulumi.set(self, "external_id", value)
172
+
149
173
  @property
150
174
  @pulumi.getter(name="iamGroups")
151
175
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -281,6 +305,20 @@ class SecretBackendRoleArgs:
281
305
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
282
306
  pulumi.set(self, "role_arns", value)
283
307
 
308
+ @property
309
+ @pulumi.getter(name="sessionTags")
310
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
311
+ """
312
+ A map of strings representing key/value pairs to be set
313
+ during assume role creds creation. Valid only when `credential_type` is set to
314
+ `assumed_role`.
315
+ """
316
+ return pulumi.get(self, "session_tags")
317
+
318
+ @session_tags.setter
319
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
320
+ pulumi.set(self, "session_tags", value)
321
+
284
322
  @property
285
323
  @pulumi.getter(name="userPath")
286
324
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -301,6 +339,7 @@ class _SecretBackendRoleState:
301
339
  backend: Optional[pulumi.Input[str]] = None,
302
340
  credential_type: Optional[pulumi.Input[str]] = None,
303
341
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
342
+ external_id: Optional[pulumi.Input[str]] = None,
304
343
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
305
344
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
306
345
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -310,6 +349,7 @@ class _SecretBackendRoleState:
310
349
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
350
  policy_document: Optional[pulumi.Input[str]] = None,
312
351
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
352
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
313
353
  user_path: Optional[pulumi.Input[str]] = None):
314
354
  """
315
355
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -323,6 +363,8 @@ class _SecretBackendRoleState:
323
363
  and a default TTL is specified on the role,
324
364
  then this default TTL will be used. Valid only when `credential_type` is one of
325
365
  `assumed_role` or `federation_token`.
366
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
367
+ Valid only when `credential_type` is set to `assumed_role`.
326
368
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
327
369
  against this vault role will be added to these IAM Groups. For a credential
328
370
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -359,6 +401,9 @@ class _SecretBackendRoleState:
359
401
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
360
402
  is allowed to assume. Required when `credential_type` is `assumed_role` and
361
403
  prohibited otherwise.
404
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
405
+ during assume role creds creation. Valid only when `credential_type` is set to
406
+ `assumed_role`.
362
407
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
363
408
  `credential_type` is `iam_user`. Default is `/`.
364
409
  """
@@ -368,6 +413,8 @@ class _SecretBackendRoleState:
368
413
  pulumi.set(__self__, "credential_type", credential_type)
369
414
  if default_sts_ttl is not None:
370
415
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
416
+ if external_id is not None:
417
+ pulumi.set(__self__, "external_id", external_id)
371
418
  if iam_groups is not None:
372
419
  pulumi.set(__self__, "iam_groups", iam_groups)
373
420
  if iam_tags is not None:
@@ -386,6 +433,8 @@ class _SecretBackendRoleState:
386
433
  pulumi.set(__self__, "policy_document", policy_document)
387
434
  if role_arns is not None:
388
435
  pulumi.set(__self__, "role_arns", role_arns)
436
+ if session_tags is not None:
437
+ pulumi.set(__self__, "session_tags", session_tags)
389
438
  if user_path is not None:
390
439
  pulumi.set(__self__, "user_path", user_path)
391
440
 
@@ -432,6 +481,19 @@ class _SecretBackendRoleState:
432
481
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
433
482
  pulumi.set(self, "default_sts_ttl", value)
434
483
 
484
+ @property
485
+ @pulumi.getter(name="externalId")
486
+ def external_id(self) -> Optional[pulumi.Input[str]]:
487
+ """
488
+ External ID to set for assume role creds.
489
+ Valid only when `credential_type` is set to `assumed_role`.
490
+ """
491
+ return pulumi.get(self, "external_id")
492
+
493
+ @external_id.setter
494
+ def external_id(self, value: Optional[pulumi.Input[str]]):
495
+ pulumi.set(self, "external_id", value)
496
+
435
497
  @property
436
498
  @pulumi.getter(name="iamGroups")
437
499
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -567,6 +629,20 @@ class _SecretBackendRoleState:
567
629
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
568
630
  pulumi.set(self, "role_arns", value)
569
631
 
632
+ @property
633
+ @pulumi.getter(name="sessionTags")
634
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
635
+ """
636
+ A map of strings representing key/value pairs to be set
637
+ during assume role creds creation. Valid only when `credential_type` is set to
638
+ `assumed_role`.
639
+ """
640
+ return pulumi.get(self, "session_tags")
641
+
642
+ @session_tags.setter
643
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
644
+ pulumi.set(self, "session_tags", value)
645
+
570
646
  @property
571
647
  @pulumi.getter(name="userPath")
572
648
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -589,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
589
665
  backend: Optional[pulumi.Input[str]] = None,
590
666
  credential_type: Optional[pulumi.Input[str]] = None,
591
667
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
668
+ external_id: Optional[pulumi.Input[str]] = None,
592
669
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
593
670
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
594
671
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -598,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
598
675
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
599
676
  policy_document: Optional[pulumi.Input[str]] = None,
600
677
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
678
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
601
679
  user_path: Optional[pulumi.Input[str]] = None,
602
680
  __props__=None):
603
681
  """
@@ -647,6 +725,8 @@ class SecretBackendRole(pulumi.CustomResource):
647
725
  and a default TTL is specified on the role,
648
726
  then this default TTL will be used. Valid only when `credential_type` is one of
649
727
  `assumed_role` or `federation_token`.
728
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
729
+ Valid only when `credential_type` is set to `assumed_role`.
650
730
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
651
731
  against this vault role will be added to these IAM Groups. For a credential
652
732
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -683,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
683
763
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
684
764
  is allowed to assume. Required when `credential_type` is `assumed_role` and
685
765
  prohibited otherwise.
766
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
767
+ during assume role creds creation. Valid only when `credential_type` is set to
768
+ `assumed_role`.
686
769
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
687
770
  `credential_type` is `iam_user`. Default is `/`.
688
771
  """
@@ -745,6 +828,7 @@ class SecretBackendRole(pulumi.CustomResource):
745
828
  backend: Optional[pulumi.Input[str]] = None,
746
829
  credential_type: Optional[pulumi.Input[str]] = None,
747
830
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
831
+ external_id: Optional[pulumi.Input[str]] = None,
748
832
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
749
833
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
750
834
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -754,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
754
838
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
755
839
  policy_document: Optional[pulumi.Input[str]] = None,
756
840
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
841
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
757
842
  user_path: Optional[pulumi.Input[str]] = None,
758
843
  __props__=None):
759
844
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -771,6 +856,7 @@ class SecretBackendRole(pulumi.CustomResource):
771
856
  raise TypeError("Missing required property 'credential_type'")
772
857
  __props__.__dict__["credential_type"] = credential_type
773
858
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
859
+ __props__.__dict__["external_id"] = external_id
774
860
  __props__.__dict__["iam_groups"] = iam_groups
775
861
  __props__.__dict__["iam_tags"] = iam_tags
776
862
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -780,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
780
866
  __props__.__dict__["policy_arns"] = policy_arns
781
867
  __props__.__dict__["policy_document"] = policy_document
782
868
  __props__.__dict__["role_arns"] = role_arns
869
+ __props__.__dict__["session_tags"] = session_tags
783
870
  __props__.__dict__["user_path"] = user_path
784
871
  super(SecretBackendRole, __self__).__init__(
785
872
  'vault:aws/secretBackendRole:SecretBackendRole',
@@ -794,6 +881,7 @@ class SecretBackendRole(pulumi.CustomResource):
794
881
  backend: Optional[pulumi.Input[str]] = None,
795
882
  credential_type: Optional[pulumi.Input[str]] = None,
796
883
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
884
+ external_id: Optional[pulumi.Input[str]] = None,
797
885
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
798
886
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
799
887
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -803,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
803
891
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
892
  policy_document: Optional[pulumi.Input[str]] = None,
805
893
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
894
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
806
895
  user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
807
896
  """
808
897
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -821,6 +910,8 @@ class SecretBackendRole(pulumi.CustomResource):
821
910
  and a default TTL is specified on the role,
822
911
  then this default TTL will be used. Valid only when `credential_type` is one of
823
912
  `assumed_role` or `federation_token`.
913
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
914
+ Valid only when `credential_type` is set to `assumed_role`.
824
915
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
825
916
  against this vault role will be added to these IAM Groups. For a credential
826
917
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -857,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
857
948
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
858
949
  is allowed to assume. Required when `credential_type` is `assumed_role` and
859
950
  prohibited otherwise.
951
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
952
+ during assume role creds creation. Valid only when `credential_type` is set to
953
+ `assumed_role`.
860
954
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
861
955
  `credential_type` is `iam_user`. Default is `/`.
862
956
  """
@@ -867,6 +961,7 @@ class SecretBackendRole(pulumi.CustomResource):
867
961
  __props__.__dict__["backend"] = backend
868
962
  __props__.__dict__["credential_type"] = credential_type
869
963
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
964
+ __props__.__dict__["external_id"] = external_id
870
965
  __props__.__dict__["iam_groups"] = iam_groups
871
966
  __props__.__dict__["iam_tags"] = iam_tags
872
967
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -876,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
876
971
  __props__.__dict__["policy_arns"] = policy_arns
877
972
  __props__.__dict__["policy_document"] = policy_document
878
973
  __props__.__dict__["role_arns"] = role_arns
974
+ __props__.__dict__["session_tags"] = session_tags
879
975
  __props__.__dict__["user_path"] = user_path
880
976
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
881
977
 
@@ -910,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
910
1006
  """
911
1007
  return pulumi.get(self, "default_sts_ttl")
912
1008
 
1009
+ @property
1010
+ @pulumi.getter(name="externalId")
1011
+ def external_id(self) -> pulumi.Output[Optional[str]]:
1012
+ """
1013
+ External ID to set for assume role creds.
1014
+ Valid only when `credential_type` is set to `assumed_role`.
1015
+ """
1016
+ return pulumi.get(self, "external_id")
1017
+
913
1018
  @property
914
1019
  @pulumi.getter(name="iamGroups")
915
1020
  def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -1009,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
1009
1114
  """
1010
1115
  return pulumi.get(self, "role_arns")
1011
1116
 
1117
+ @property
1118
+ @pulumi.getter(name="sessionTags")
1119
+ def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1120
+ """
1121
+ A map of strings representing key/value pairs to be set
1122
+ during assume role creds creation. Valid only when `credential_type` is set to
1123
+ `assumed_role`.
1124
+ """
1125
+ return pulumi.get(self, "session_tags")
1126
+
1012
1127
  @property
1013
1128
  @pulumi.getter(name="userPath")
1014
1129
  def user_path(self) -> pulumi.Output[Optional[str]]:
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
263
263
 
264
264
  ## Required Vault Capabilities
265
265
 
266
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
266
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
267
267
 
268
268
 
269
269
  :param str alias_id: ID of the alias.
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
333
333
 
334
334
  ## Required Vault Capabilities
335
335
 
336
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
336
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
337
337
 
338
338
 
339
339
  :param str alias_id: ID of the alias.
pulumi_vault/mount.py CHANGED
@@ -49,7 +49,8 @@ class MountArgs:
49
49
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
50
50
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
51
51
  not provided, this will default to Vault's OIDC default key.
52
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
52
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
53
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
53
54
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
54
55
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
55
56
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -240,7 +241,8 @@ class MountArgs:
240
241
  @pulumi.getter(name="listingVisibility")
241
242
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
242
243
  """
243
- Specifies whether to show this mount in the UI-specific listing endpoint
244
+ Specifies whether to show this mount in the UI-specific
245
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
244
246
  """
245
247
  return pulumi.get(self, "listing_visibility")
246
248
 
@@ -377,7 +379,8 @@ class _MountState:
377
379
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
378
380
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
379
381
  not provided, this will default to Vault's OIDC default key.
380
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
382
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
383
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
381
384
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
382
385
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
383
386
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -562,7 +565,8 @@ class _MountState:
562
565
  @pulumi.getter(name="listingVisibility")
563
566
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
564
567
  """
565
- Specifies whether to show this mount in the UI-specific listing endpoint
568
+ Specifies whether to show this mount in the UI-specific
569
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
566
570
  """
567
571
  return pulumi.get(self, "listing_visibility")
568
572
 
@@ -786,7 +790,8 @@ class Mount(pulumi.CustomResource):
786
790
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
787
791
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
788
792
  not provided, this will default to Vault's OIDC default key.
789
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
793
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
794
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
790
795
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
791
796
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
792
797
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -988,7 +993,8 @@ class Mount(pulumi.CustomResource):
988
993
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
989
994
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
990
995
  not provided, this will default to Vault's OIDC default key.
991
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
996
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
997
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
992
998
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
993
999
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
994
1000
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -1118,7 +1124,8 @@ class Mount(pulumi.CustomResource):
1118
1124
  @pulumi.getter(name="listingVisibility")
1119
1125
  def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1120
1126
  """
1121
- Specifies whether to show this mount in the UI-specific listing endpoint
1127
+ Specifies whether to show this mount in the UI-specific
1128
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1122
1129
  """
1123
1130
  return pulumi.get(self, "listing_visibility")
1124
1131
 
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.3.0-alpha.1723010642"
4
+ "version": "6.3.0-alpha.1723109142"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.3.0a1723010642
3
+ Version: 6.3.0a1723109142
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -17,7 +17,7 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
17
17
  pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
18
18
  pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
19
19
  pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
20
- pulumi_vault/mount.py,sha256=bcvGRLfo5rYBpP72qfdYm7H90lsPb5vDDQR1Xhviifo,59240
20
+ pulumi_vault/mount.py,sha256=c1LAxLDySvex6kcEwzd4ZmRUBhWf3Saetpue9MLTiYs,59849
21
21
  pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
22
22
  pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
23
23
  pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
@@ -27,7 +27,7 @@ pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
27
27
  pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
28
28
  pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
29
29
  pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
30
- pulumi_vault/pulumi-plugin.json,sha256=PtT2R0yyC01m_TLJUjD03jwILE4Dse9EEzRtkFVYUyc,81
30
+ pulumi_vault/pulumi-plugin.json,sha256=ai-5rsMMH-TIxAO6LovU87E7Wt5IkOxDxC_eEPe540k,81
31
31
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
32
32
  pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
33
33
  pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
@@ -60,7 +60,7 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
60
60
  pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
61
61
  pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
62
62
  pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
63
- pulumi_vault/aws/secret_backend_role.py,sha256=Vim6Vfq5SrC_oNajDFXv7TM9xlDP46ju7gBfuHQcyrM,50962
63
+ pulumi_vault/aws/secret_backend_role.py,sha256=mGJYeBEct69kdK9HfS7k7wQgrlatu93U-ZkFbgNUQck,56724
64
64
  pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
65
65
  pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
66
66
  pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
110
110
  pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
111
111
  pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
112
112
  pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
113
- pulumi_vault/identity/get_entity.py,sha256=6tp6fyb26cnkkxi2dahnoIJaz5RVshhq0BJGKHmPDVY,14351
113
+ pulumi_vault/identity/get_entity.py,sha256=DuvhHx1ZpDhxdHYebh7DWOQ-iIY57F6OscJR4LPvpAU,14351
114
114
  pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
115
115
  pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
116
116
  pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
250
250
  pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
251
251
  pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
252
252
  pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
253
- pulumi_vault-6.3.0a1723010642.dist-info/METADATA,sha256=LOgNHSmXCmRNT2xx3U3l157w3VJMhVr0EcSZvAcjW_U,4860
254
- pulumi_vault-6.3.0a1723010642.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
255
- pulumi_vault-6.3.0a1723010642.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD,,
253
+ pulumi_vault-6.3.0a1723109142.dist-info/METADATA,sha256=sCKAQQozcu9GmWzgMsbfvzHfhXOFJti9PtnieQ2NAwk,4860
254
+ pulumi_vault-6.3.0a1723109142.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
255
+ pulumi_vault-6.3.0a1723109142.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
+ pulumi_vault-6.3.0a1723109142.dist-info/RECORD,,