pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -42,7 +47,7 @@ class SecretsMountArgs:
|
|
42
47
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
43
48
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
44
49
|
namespace: Optional[pulumi.Input[str]] = None,
|
45
|
-
options: Optional[pulumi.Input[Mapping[str,
|
50
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
46
51
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
47
52
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
48
53
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -94,7 +99,7 @@ class SecretsMountArgs:
|
|
94
99
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
95
100
|
*See Configuration Options for more info*
|
96
101
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
97
|
-
:param pulumi.Input[Mapping[str,
|
102
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
98
103
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
99
104
|
*See Configuration Options for more info*
|
100
105
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -511,14 +516,14 @@ class SecretsMountArgs:
|
|
511
516
|
|
512
517
|
@property
|
513
518
|
@pulumi.getter
|
514
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
519
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
515
520
|
"""
|
516
521
|
Specifies mount type specific options that are passed to the backend
|
517
522
|
"""
|
518
523
|
return pulumi.get(self, "options")
|
519
524
|
|
520
525
|
@options.setter
|
521
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
526
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
522
527
|
pulumi.set(self, "options", value)
|
523
528
|
|
524
529
|
@property
|
@@ -666,7 +671,7 @@ class _SecretsMountState:
|
|
666
671
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
667
672
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
668
673
|
namespace: Optional[pulumi.Input[str]] = None,
|
669
|
-
options: Optional[pulumi.Input[Mapping[str,
|
674
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
670
675
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
671
676
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
672
677
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -720,7 +725,7 @@ class _SecretsMountState:
|
|
720
725
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
721
726
|
*See Configuration Options for more info*
|
722
727
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
723
|
-
:param pulumi.Input[Mapping[str,
|
728
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
724
729
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
725
730
|
*See Configuration Options for more info*
|
726
731
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1155,14 +1160,14 @@ class _SecretsMountState:
|
|
1155
1160
|
|
1156
1161
|
@property
|
1157
1162
|
@pulumi.getter
|
1158
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1163
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
1159
1164
|
"""
|
1160
1165
|
Specifies mount type specific options that are passed to the backend
|
1161
1166
|
"""
|
1162
1167
|
return pulumi.get(self, "options")
|
1163
1168
|
|
1164
1169
|
@options.setter
|
1165
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1170
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
1166
1171
|
pulumi.set(self, "options", value)
|
1167
1172
|
|
1168
1173
|
@property
|
@@ -1301,38 +1306,38 @@ class SecretsMount(pulumi.CustomResource):
|
|
1301
1306
|
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1302
1307
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1303
1308
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1304
|
-
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1305
|
-
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1309
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1310
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1306
1311
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1307
1312
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1308
1313
|
description: Optional[pulumi.Input[str]] = None,
|
1309
|
-
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1314
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1310
1315
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1311
|
-
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1316
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1312
1317
|
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1313
|
-
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1318
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1314
1319
|
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1315
1320
|
local: Optional[pulumi.Input[bool]] = None,
|
1316
1321
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1317
|
-
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1318
|
-
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1319
|
-
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1320
|
-
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1321
|
-
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1322
|
-
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1323
|
-
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1322
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1323
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1324
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
1325
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
1326
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1327
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1328
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1324
1329
|
namespace: Optional[pulumi.Input[str]] = None,
|
1325
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1326
|
-
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1330
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1331
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1327
1332
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1328
1333
|
path: Optional[pulumi.Input[str]] = None,
|
1329
1334
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
1330
|
-
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1331
|
-
redis: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1332
|
-
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1333
|
-
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1335
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1336
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1337
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1338
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1334
1339
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1335
|
-
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1340
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1336
1341
|
__props__=None):
|
1337
1342
|
"""
|
1338
1343
|
## Example Usage
|
@@ -1343,21 +1348,21 @@ class SecretsMount(pulumi.CustomResource):
|
|
1343
1348
|
|
1344
1349
|
db = vault.database.SecretsMount("db",
|
1345
1350
|
path="db",
|
1346
|
-
mssqls=[
|
1347
|
-
name
|
1348
|
-
username
|
1349
|
-
password
|
1350
|
-
connection_url
|
1351
|
-
allowed_roles
|
1352
|
-
|
1353
|
-
postgresqls=[
|
1354
|
-
name
|
1355
|
-
username
|
1356
|
-
password
|
1357
|
-
connection_url
|
1358
|
-
verify_connection
|
1359
|
-
allowed_roles
|
1360
|
-
|
1351
|
+
mssqls=[{
|
1352
|
+
"name": "db1",
|
1353
|
+
"username": "sa",
|
1354
|
+
"password": "super_secret_1",
|
1355
|
+
"connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
1356
|
+
"allowed_roles": ["dev1"],
|
1357
|
+
}],
|
1358
|
+
postgresqls=[{
|
1359
|
+
"name": "db2",
|
1360
|
+
"username": "postgres",
|
1361
|
+
"password": "super_secret_2",
|
1362
|
+
"connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
1363
|
+
"verify_connection": True,
|
1364
|
+
"allowed_roles": ["dev2"],
|
1365
|
+
}])
|
1361
1366
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1362
1367
|
name="dev1",
|
1363
1368
|
backend=db.path,
|
@@ -1393,55 +1398,55 @@ class SecretsMount(pulumi.CustomResource):
|
|
1393
1398
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1394
1399
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1395
1400
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1396
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1401
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1397
1402
|
*See Configuration Options for more info*
|
1398
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1403
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1399
1404
|
*See Configuration Options for more info*
|
1400
1405
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1401
1406
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1402
1407
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
1403
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1408
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1404
1409
|
*See Configuration Options for more info*
|
1405
1410
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1406
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1411
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1407
1412
|
*See Configuration Options for more info*
|
1408
1413
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1409
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1414
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1410
1415
|
*See Configuration Options for more info*
|
1411
1416
|
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1412
1417
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1413
1418
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1414
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1419
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1415
1420
|
*See Configuration Options for more info*
|
1416
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1421
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
1417
1422
|
*See Configuration Options for more info*
|
1418
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1423
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
|
1419
1424
|
*See Configuration Options for more info*
|
1420
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1425
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
1421
1426
|
*See Configuration Options for more info*
|
1422
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1427
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
1423
1428
|
*See Configuration Options for more info*
|
1424
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1429
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1425
1430
|
*See Configuration Options for more info*
|
1426
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1431
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1427
1432
|
*See Configuration Options for more info*
|
1428
1433
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1429
|
-
:param pulumi.Input[Mapping[str,
|
1430
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1434
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1435
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1431
1436
|
*See Configuration Options for more info*
|
1432
1437
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1433
1438
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1434
1439
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1435
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1440
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1436
1441
|
*See Configuration Options for more info*
|
1437
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1442
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
1438
1443
|
*See Configuration Options for more info*
|
1439
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1444
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
1440
1445
|
*See Configuration Options for more info*
|
1441
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1446
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1442
1447
|
*See Configuration Options for more info*
|
1443
1448
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1444
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1449
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1445
1450
|
*See Configuration Options for more info*
|
1446
1451
|
"""
|
1447
1452
|
...
|
@@ -1459,21 +1464,21 @@ class SecretsMount(pulumi.CustomResource):
|
|
1459
1464
|
|
1460
1465
|
db = vault.database.SecretsMount("db",
|
1461
1466
|
path="db",
|
1462
|
-
mssqls=[
|
1463
|
-
name
|
1464
|
-
username
|
1465
|
-
password
|
1466
|
-
connection_url
|
1467
|
-
allowed_roles
|
1468
|
-
|
1469
|
-
postgresqls=[
|
1470
|
-
name
|
1471
|
-
username
|
1472
|
-
password
|
1473
|
-
connection_url
|
1474
|
-
verify_connection
|
1475
|
-
allowed_roles
|
1476
|
-
|
1467
|
+
mssqls=[{
|
1468
|
+
"name": "db1",
|
1469
|
+
"username": "sa",
|
1470
|
+
"password": "super_secret_1",
|
1471
|
+
"connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
1472
|
+
"allowed_roles": ["dev1"],
|
1473
|
+
}],
|
1474
|
+
postgresqls=[{
|
1475
|
+
"name": "db2",
|
1476
|
+
"username": "postgres",
|
1477
|
+
"password": "super_secret_2",
|
1478
|
+
"connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
1479
|
+
"verify_connection": True,
|
1480
|
+
"allowed_roles": ["dev2"],
|
1481
|
+
}])
|
1477
1482
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1478
1483
|
name="dev1",
|
1479
1484
|
backend=db.path,
|
@@ -1520,38 +1525,38 @@ class SecretsMount(pulumi.CustomResource):
|
|
1520
1525
|
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1521
1526
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1522
1527
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1523
|
-
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1524
|
-
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1528
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1529
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1525
1530
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1526
1531
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1527
1532
|
description: Optional[pulumi.Input[str]] = None,
|
1528
|
-
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1533
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1529
1534
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1530
|
-
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1535
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1531
1536
|
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1532
|
-
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1537
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1533
1538
|
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1534
1539
|
local: Optional[pulumi.Input[bool]] = None,
|
1535
1540
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1536
|
-
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1537
|
-
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1538
|
-
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1539
|
-
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1540
|
-
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1541
|
-
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1542
|
-
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1541
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1542
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1543
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
1544
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
1545
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1546
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1547
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1543
1548
|
namespace: Optional[pulumi.Input[str]] = None,
|
1544
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1545
|
-
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1549
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1550
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1546
1551
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1547
1552
|
path: Optional[pulumi.Input[str]] = None,
|
1548
1553
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
1549
|
-
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1550
|
-
redis: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1551
|
-
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1552
|
-
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1554
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1555
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1556
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1557
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1553
1558
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1554
|
-
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1559
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
|
1555
1560
|
__props__=None):
|
1556
1561
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1557
1562
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1616,39 +1621,39 @@ class SecretsMount(pulumi.CustomResource):
|
|
1616
1621
|
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1617
1622
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1618
1623
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1619
|
-
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1620
|
-
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1624
|
+
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
|
1625
|
+
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
|
1621
1626
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1622
1627
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1623
1628
|
description: Optional[pulumi.Input[str]] = None,
|
1624
|
-
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1629
|
+
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
|
1625
1630
|
engine_count: Optional[pulumi.Input[int]] = None,
|
1626
1631
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1627
|
-
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1632
|
+
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
|
1628
1633
|
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1629
|
-
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1634
|
+
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
|
1630
1635
|
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1631
1636
|
local: Optional[pulumi.Input[bool]] = None,
|
1632
1637
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1633
|
-
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1634
|
-
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1635
|
-
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1636
|
-
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1637
|
-
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1638
|
-
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1639
|
-
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1638
|
+
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
|
1639
|
+
mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
|
1640
|
+
mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
|
1641
|
+
mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
|
1642
|
+
mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
|
1643
|
+
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1644
|
+
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1640
1645
|
namespace: Optional[pulumi.Input[str]] = None,
|
1641
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1642
|
-
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1646
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1647
|
+
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1643
1648
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1644
1649
|
path: Optional[pulumi.Input[str]] = None,
|
1645
1650
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
1646
|
-
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1647
|
-
redis: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1648
|
-
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1649
|
-
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1651
|
+
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
|
1652
|
+
redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
|
1653
|
+
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
|
1654
|
+
redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
|
1650
1655
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
1651
|
-
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1656
|
+
snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
|
1652
1657
|
"""
|
1653
1658
|
Get an existing SecretsMount resource's state with the given name, id, and optional extra
|
1654
1659
|
properties used to qualify the lookup.
|
@@ -1663,56 +1668,56 @@ class SecretsMount(pulumi.CustomResource):
|
|
1663
1668
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1664
1669
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1665
1670
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1666
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1671
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
1667
1672
|
*See Configuration Options for more info*
|
1668
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1673
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1669
1674
|
*See Configuration Options for more info*
|
1670
1675
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1671
1676
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1672
1677
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
1673
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1678
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1674
1679
|
*See Configuration Options for more info*
|
1675
1680
|
:param pulumi.Input[int] engine_count: The total number of database secrets engines configured.
|
1676
1681
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1677
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1682
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1678
1683
|
*See Configuration Options for more info*
|
1679
1684
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1680
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1685
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1681
1686
|
*See Configuration Options for more info*
|
1682
1687
|
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1683
1688
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1684
1689
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1685
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1690
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
1686
1691
|
*See Configuration Options for more info*
|
1687
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1692
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
|
1688
1693
|
*See Configuration Options for more info*
|
1689
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1694
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
|
1690
1695
|
*See Configuration Options for more info*
|
1691
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1696
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
|
1692
1697
|
*See Configuration Options for more info*
|
1693
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1698
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
|
1694
1699
|
*See Configuration Options for more info*
|
1695
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1700
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
|
1696
1701
|
*See Configuration Options for more info*
|
1697
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1702
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1698
1703
|
*See Configuration Options for more info*
|
1699
1704
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1700
|
-
:param pulumi.Input[Mapping[str,
|
1701
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1705
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1706
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1702
1707
|
*See Configuration Options for more info*
|
1703
1708
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1704
1709
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1705
1710
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1706
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1711
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1707
1712
|
*See Configuration Options for more info*
|
1708
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1713
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
|
1709
1714
|
*See Configuration Options for more info*
|
1710
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1715
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
|
1711
1716
|
*See Configuration Options for more info*
|
1712
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1717
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
|
1713
1718
|
*See Configuration Options for more info*
|
1714
1719
|
:param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1715
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1720
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
|
1716
1721
|
*See Configuration Options for more info*
|
1717
1722
|
"""
|
1718
1723
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -1991,7 +1996,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1991
1996
|
|
1992
1997
|
@property
|
1993
1998
|
@pulumi.getter
|
1994
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1999
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1995
2000
|
"""
|
1996
2001
|
Specifies mount type specific options that are passed to the backend
|
1997
2002
|
"""
|
pulumi_vault/egp_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|