pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/generic/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -126,7 +131,7 @@ class SecretArgs:
|
|
126
131
|
@pulumi.input_type
|
127
132
|
class _SecretState:
|
128
133
|
def __init__(__self__, *,
|
129
|
-
data: Optional[pulumi.Input[Mapping[str,
|
134
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
130
135
|
data_json: Optional[pulumi.Input[str]] = None,
|
131
136
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
132
137
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -134,7 +139,7 @@ class _SecretState:
|
|
134
139
|
path: Optional[pulumi.Input[str]] = None):
|
135
140
|
"""
|
136
141
|
Input properties used for looking up and filtering Secret resources.
|
137
|
-
:param pulumi.Input[Mapping[str,
|
142
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
138
143
|
Vault and whose values are the corresponding values. This map can only
|
139
144
|
represent string data, so any non-string values returned from Vault are
|
140
145
|
serialized as JSON.
|
@@ -172,7 +177,7 @@ class _SecretState:
|
|
172
177
|
|
173
178
|
@property
|
174
179
|
@pulumi.getter
|
175
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
180
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
176
181
|
"""
|
177
182
|
A mapping whose keys are the top-level data keys returned from
|
178
183
|
Vault and whose values are the corresponding values. This map can only
|
@@ -182,7 +187,7 @@ class _SecretState:
|
|
182
187
|
return pulumi.get(self, "data")
|
183
188
|
|
184
189
|
@data.setter
|
185
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
190
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
186
191
|
pulumi.set(self, "data", value)
|
187
192
|
|
188
193
|
@property
|
@@ -366,7 +371,7 @@ class Secret(pulumi.CustomResource):
|
|
366
371
|
def get(resource_name: str,
|
367
372
|
id: pulumi.Input[str],
|
368
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
369
|
-
data: Optional[pulumi.Input[Mapping[str,
|
374
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
370
375
|
data_json: Optional[pulumi.Input[str]] = None,
|
371
376
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
372
377
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
@@ -379,7 +384,7 @@ class Secret(pulumi.CustomResource):
|
|
379
384
|
:param str resource_name: The unique name of the resulting resource.
|
380
385
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
381
386
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
382
|
-
:param pulumi.Input[Mapping[str,
|
387
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
383
388
|
Vault and whose values are the corresponding values. This map can only
|
384
389
|
represent string data, so any non-string values returned from Vault are
|
385
390
|
serialized as JSON.
|
@@ -416,7 +421,7 @@ class Secret(pulumi.CustomResource):
|
|
416
421
|
|
417
422
|
@property
|
418
423
|
@pulumi.getter
|
419
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
424
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
420
425
|
"""
|
421
426
|
A mapping whose keys are the top-level data keys returned from
|
422
427
|
Vault and whose values are the corresponding values. This map can only
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -183,9 +188,6 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
183
188
|
namespace=pulumi.get(__ret__, 'namespace'),
|
184
189
|
path=pulumi.get(__ret__, 'path'),
|
185
190
|
type=pulumi.get(__ret__, 'type'))
|
186
|
-
|
187
|
-
|
188
|
-
@_utilities.lift_output_func(get_auth_backend)
|
189
191
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
192
|
path: Optional[pulumi.Input[str]] = None,
|
191
193
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
@@ -206,4 +208,19 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
206
208
|
*Available only for Vault Enterprise*.
|
207
209
|
:param str path: The auth backend mount point.
|
208
210
|
"""
|
209
|
-
|
211
|
+
__args__ = dict()
|
212
|
+
__args__['namespace'] = namespace
|
213
|
+
__args__['path'] = path
|
214
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
+
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
+
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
+
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
+
description=pulumi.get(__response__, 'description'),
|
220
|
+
id=pulumi.get(__response__, 'id'),
|
221
|
+
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
+
local=pulumi.get(__response__, 'local'),
|
223
|
+
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -125,9 +130,6 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
125
130
|
namespace=pulumi.get(__ret__, 'namespace'),
|
126
131
|
paths=pulumi.get(__ret__, 'paths'),
|
127
132
|
type=pulumi.get(__ret__, 'type'))
|
128
|
-
|
129
|
-
|
130
|
-
@_utilities.lift_output_func(get_auth_backends)
|
131
133
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
132
134
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
133
135
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
@@ -155,4 +157,14 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
155
157
|
*Available only for Vault Enterprise*.
|
156
158
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
157
159
|
"""
|
158
|
-
|
160
|
+
__args__ = dict()
|
161
|
+
__args__['namespace'] = namespace
|
162
|
+
__args__['type'] = type
|
163
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
+
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
+
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
+
id=pulumi.get(__response__, 'id'),
|
168
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
+
paths=pulumi.get(__response__, 'paths'),
|
170
|
+
type=pulumi.get(__response__, 'type')))
|
pulumi_vault/get_namespace.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -43,7 +48,7 @@ class GetNamespaceResult:
|
|
43
48
|
|
44
49
|
@property
|
45
50
|
@pulumi.getter(name="customMetadata")
|
46
|
-
def custom_metadata(self) -> Mapping[str,
|
51
|
+
def custom_metadata(self) -> Mapping[str, str]:
|
47
52
|
"""
|
48
53
|
(Optional) A map of strings containing arbitrary metadata for the namespace.
|
49
54
|
Only fetched if `path` is specified.
|
@@ -161,9 +166,6 @@ def get_namespace(namespace: Optional[str] = None,
|
|
161
166
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
162
167
|
path=pulumi.get(__ret__, 'path'),
|
163
168
|
path_fq=pulumi.get(__ret__, 'path_fq'))
|
164
|
-
|
165
|
-
|
166
|
-
@_utilities.lift_output_func(get_namespace)
|
167
169
|
def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
path: Optional[pulumi.Input[Optional[str]]] = None,
|
169
171
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]:
|
@@ -210,4 +212,15 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
210
212
|
based on the `namespace` arguments of the provider and this data source.
|
211
213
|
Other path related attributes will be empty in this case.
|
212
214
|
"""
|
213
|
-
|
215
|
+
__args__ = dict()
|
216
|
+
__args__['namespace'] = namespace
|
217
|
+
__args__['path'] = path
|
218
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
219
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult)
|
220
|
+
return __ret__.apply(lambda __response__: GetNamespaceResult(
|
221
|
+
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
222
|
+
id=pulumi.get(__response__, 'id'),
|
223
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
224
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
225
|
+
path=pulumi.get(__response__, 'path'),
|
226
|
+
path_fq=pulumi.get(__response__, 'path_fq')))
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -106,9 +111,6 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
106
111
|
id=pulumi.get(__ret__, 'id'),
|
107
112
|
namespace=pulumi.get(__ret__, 'namespace'),
|
108
113
|
paths=pulumi.get(__ret__, 'paths'))
|
109
|
-
|
110
|
-
|
111
|
-
@_utilities.lift_output_func(get_namespaces)
|
112
114
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
113
115
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]:
|
114
116
|
"""
|
@@ -141,4 +143,11 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
141
143
|
The value should not contain leading or trailing forward slashes.
|
142
144
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
143
145
|
"""
|
144
|
-
|
146
|
+
__args__ = dict()
|
147
|
+
__args__['namespace'] = namespace
|
148
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
149
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
150
|
+
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
151
|
+
id=pulumi.get(__response__, 'id'),
|
152
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
153
|
+
paths=pulumi.get(__response__, 'paths')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -119,8 +124,11 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
119
124
|
role="test",
|
120
125
|
type="client",
|
121
126
|
policies=["readonly"])
|
122
|
-
token = pulumi.Output.all(
|
123
|
-
|
127
|
+
token = pulumi.Output.all(
|
128
|
+
backend=config.backend,
|
129
|
+
role=test.role
|
130
|
+
).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
|
131
|
+
role=resolved_outputs['role']))
|
124
132
|
```
|
125
133
|
|
126
134
|
|
@@ -147,9 +155,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
147
155
|
namespace=pulumi.get(__ret__, 'namespace'),
|
148
156
|
role=pulumi.get(__ret__, 'role'),
|
149
157
|
secret_id=pulumi.get(__ret__, 'secret_id'))
|
150
|
-
|
151
|
-
|
152
|
-
@_utilities.lift_output_func(get_nomad_access_token)
|
153
158
|
def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
154
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
155
160
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -173,8 +178,11 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
173
178
|
role="test",
|
174
179
|
type="client",
|
175
180
|
policies=["readonly"])
|
176
|
-
token = pulumi.Output.all(
|
177
|
-
|
181
|
+
token = pulumi.Output.all(
|
182
|
+
backend=config.backend,
|
183
|
+
role=test.role
|
184
|
+
).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],
|
185
|
+
role=resolved_outputs['role']))
|
178
186
|
```
|
179
187
|
|
180
188
|
|
@@ -187,4 +195,16 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
187
195
|
:param str role: The name of the Nomad secret backend role to generate
|
188
196
|
a token for, with no leading or trailing `/`s.
|
189
197
|
"""
|
190
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['namespace'] = namespace
|
201
|
+
__args__['role'] = role
|
202
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
|
205
|
+
accessor_id=pulumi.get(__response__, 'accessor_id'),
|
206
|
+
backend=pulumi.get(__response__, 'backend'),
|
207
|
+
id=pulumi.get(__response__, 'id'),
|
208
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
209
|
+
role=pulumi.get(__response__, 'role'),
|
210
|
+
secret_id=pulumi.get(__response__, 'secret_id')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -77,7 +82,7 @@ class AwaitableGetPolicyDocumentResult(GetPolicyDocumentResult):
|
|
77
82
|
|
78
83
|
|
79
84
|
def get_policy_document(namespace: Optional[str] = None,
|
80
|
-
rules: Optional[Sequence[
|
85
|
+
rules: Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]] = None,
|
81
86
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPolicyDocumentResult:
|
82
87
|
"""
|
83
88
|
This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource.
|
@@ -88,17 +93,17 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
88
93
|
import pulumi
|
89
94
|
import pulumi_vault as vault
|
90
95
|
|
91
|
-
example = vault.get_policy_document(rules=[
|
92
|
-
path
|
93
|
-
capabilities
|
96
|
+
example = vault.get_policy_document(rules=[{
|
97
|
+
"path": "secret/*",
|
98
|
+
"capabilities": [
|
94
99
|
"create",
|
95
100
|
"read",
|
96
101
|
"update",
|
97
102
|
"delete",
|
98
103
|
"list",
|
99
104
|
],
|
100
|
-
description
|
101
|
-
|
105
|
+
"description": "allow all on secrets",
|
106
|
+
}])
|
102
107
|
example_policy = vault.Policy("example",
|
103
108
|
name="example_policy",
|
104
109
|
policy=example.hcl)
|
@@ -115,11 +120,8 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
115
120
|
id=pulumi.get(__ret__, 'id'),
|
116
121
|
namespace=pulumi.get(__ret__, 'namespace'),
|
117
122
|
rules=pulumi.get(__ret__, 'rules'))
|
118
|
-
|
119
|
-
|
120
|
-
@_utilities.lift_output_func(get_policy_document)
|
121
123
|
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
122
|
-
rules: Optional[pulumi.Input[Optional[Sequence[
|
124
|
+
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
123
125
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
124
126
|
"""
|
125
127
|
This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource.
|
@@ -130,20 +132,29 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
130
132
|
import pulumi
|
131
133
|
import pulumi_vault as vault
|
132
134
|
|
133
|
-
example = vault.get_policy_document(rules=[
|
134
|
-
path
|
135
|
-
capabilities
|
135
|
+
example = vault.get_policy_document(rules=[{
|
136
|
+
"path": "secret/*",
|
137
|
+
"capabilities": [
|
136
138
|
"create",
|
137
139
|
"read",
|
138
140
|
"update",
|
139
141
|
"delete",
|
140
142
|
"list",
|
141
143
|
],
|
142
|
-
description
|
143
|
-
|
144
|
+
"description": "allow all on secrets",
|
145
|
+
}])
|
144
146
|
example_policy = vault.Policy("example",
|
145
147
|
name="example_policy",
|
146
148
|
policy=example.hcl)
|
147
149
|
```
|
148
150
|
"""
|
149
|
-
|
151
|
+
__args__ = dict()
|
152
|
+
__args__['namespace'] = namespace
|
153
|
+
__args__['rules'] = rules
|
154
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
155
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
|
156
|
+
return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
|
157
|
+
hcl=pulumi.get(__response__, 'hcl'),
|
158
|
+
id=pulumi.get(__response__, 'id'),
|
159
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
160
|
+
rules=pulumi.get(__response__, 'rules')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -109,7 +114,7 @@ class GetRaftAutopilotStateResult:
|
|
109
114
|
|
110
115
|
@property
|
111
116
|
@pulumi.getter(name="redundancyZones")
|
112
|
-
def redundancy_zones(self) -> Mapping[str,
|
117
|
+
def redundancy_zones(self) -> Mapping[str, str]:
|
113
118
|
"""
|
114
119
|
Additional output related to redundancy zones stored as a serialized map of strings.
|
115
120
|
"""
|
@@ -125,7 +130,7 @@ class GetRaftAutopilotStateResult:
|
|
125
130
|
|
126
131
|
@property
|
127
132
|
@pulumi.getter
|
128
|
-
def servers(self) -> Mapping[str,
|
133
|
+
def servers(self) -> Mapping[str, str]:
|
129
134
|
"""
|
130
135
|
Additionaly output related to servers in the cluster stored as a serialized map of strings.
|
131
136
|
"""
|
@@ -141,7 +146,7 @@ class GetRaftAutopilotStateResult:
|
|
141
146
|
|
142
147
|
@property
|
143
148
|
@pulumi.getter(name="upgradeInfo")
|
144
|
-
def upgrade_info(self) -> Mapping[str,
|
149
|
+
def upgrade_info(self) -> Mapping[str, str]:
|
145
150
|
"""
|
146
151
|
Additional output related to upgrade information stored as a serialized map of strings.
|
147
152
|
"""
|
@@ -223,9 +228,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
223
228
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
224
229
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
225
230
|
voters=pulumi.get(__ret__, 'voters'))
|
226
|
-
|
227
|
-
|
228
|
-
@_utilities.lift_output_func(get_raft_autopilot_state)
|
229
231
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
230
232
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
231
233
|
"""
|
@@ -245,4 +247,21 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
245
247
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
246
248
|
*Available only for Vault Enterprise*.
|
247
249
|
"""
|
248
|
-
|
250
|
+
__args__ = dict()
|
251
|
+
__args__['namespace'] = namespace
|
252
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
|
+
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
|
+
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
256
|
+
healthy=pulumi.get(__response__, 'healthy'),
|
257
|
+
id=pulumi.get(__response__, 'id'),
|
258
|
+
leader=pulumi.get(__response__, 'leader'),
|
259
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
260
|
+
optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
|
261
|
+
redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
|
262
|
+
redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
|
263
|
+
servers=pulumi.get(__response__, 'servers'),
|
264
|
+
servers_json=pulumi.get(__response__, 'servers_json'),
|
265
|
+
upgrade_info=pulumi.get(__response__, 'upgrade_info'),
|
266
|
+
upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
|
267
|
+
voters=pulumi.get(__response__, 'voters')))
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
705
710
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
706
711
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
707
712
|
token_type: Optional[pulumi.Input[str]] = None,
|
708
|
-
tune: Optional[pulumi.Input[
|
713
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
709
714
|
__props__=None):
|
710
715
|
"""
|
711
716
|
Manages a GitHub Auth mount in a Vault server. See the [Vault
|
@@ -769,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
769
774
|
Its current value will be referenced at renewal time.
|
770
775
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
771
776
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
772
|
-
:param pulumi.Input[
|
777
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
773
778
|
|
774
779
|
The `tune` block is used to tune the auth backend:
|
775
780
|
"""
|
@@ -832,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
832
837
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
833
838
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
834
839
|
token_type: Optional[pulumi.Input[str]] = None,
|
835
|
-
tune: Optional[pulumi.Input[
|
840
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
836
841
|
__props__=None):
|
837
842
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
838
843
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -889,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
889
894
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
890
895
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
891
896
|
token_type: Optional[pulumi.Input[str]] = None,
|
892
|
-
tune: Optional[pulumi.Input[
|
897
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
893
898
|
"""
|
894
899
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
895
900
|
properties used to qualify the lookup.
|
@@ -936,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
936
941
|
Its current value will be referenced at renewal time.
|
937
942
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
938
943
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
939
|
-
:param pulumi.Input[
|
944
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
940
945
|
|
941
946
|
The `tune` block is used to tune the auth backend:
|
942
947
|
"""
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TeamArgs', 'Team']
|
pulumi_vault/github/user.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['UserArgs', 'User']
|