pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -24,7 +29,7 @@ class SecretV2Args:
|
|
24
29
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
25
30
|
name: Optional[pulumi.Input[str]] = None,
|
26
31
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
options: Optional[pulumi.Input[Mapping[str,
|
32
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
28
33
|
"""
|
29
34
|
The set of arguments for constructing a SecretV2 resource.
|
30
35
|
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
@@ -49,7 +54,7 @@ class SecretV2Args:
|
|
49
54
|
The value should not contain leading or trailing forward slashes.
|
50
55
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
56
|
*Available only for Vault Enterprise*.
|
52
|
-
:param pulumi.Input[Mapping[str,
|
57
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
53
58
|
"""
|
54
59
|
pulumi.set(__self__, "data_json", data_json)
|
55
60
|
pulumi.set(__self__, "mount", mount)
|
@@ -180,14 +185,14 @@ class SecretV2Args:
|
|
180
185
|
|
181
186
|
@property
|
182
187
|
@pulumi.getter
|
183
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
188
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
184
189
|
"""
|
185
190
|
An object that holds option settings.
|
186
191
|
"""
|
187
192
|
return pulumi.get(self, "options")
|
188
193
|
|
189
194
|
@options.setter
|
190
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
195
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
191
196
|
pulumi.set(self, "options", value)
|
192
197
|
|
193
198
|
|
@@ -196,15 +201,15 @@ class _SecretV2State:
|
|
196
201
|
def __init__(__self__, *,
|
197
202
|
cas: Optional[pulumi.Input[int]] = None,
|
198
203
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
199
|
-
data: Optional[pulumi.Input[Mapping[str,
|
204
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
200
205
|
data_json: Optional[pulumi.Input[str]] = None,
|
201
206
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
202
207
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
203
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
208
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
204
209
|
mount: Optional[pulumi.Input[str]] = None,
|
205
210
|
name: Optional[pulumi.Input[str]] = None,
|
206
211
|
namespace: Optional[pulumi.Input[str]] = None,
|
207
|
-
options: Optional[pulumi.Input[Mapping[str,
|
212
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
208
213
|
path: Optional[pulumi.Input[str]] = None):
|
209
214
|
"""
|
210
215
|
Input properties used for looking up and filtering SecretV2 resources.
|
@@ -215,7 +220,7 @@ class _SecretV2State:
|
|
215
220
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
216
221
|
KV secret. Refer to the
|
217
222
|
Configuration Options for more info.
|
218
|
-
:param pulumi.Input[Mapping[str,
|
223
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
219
224
|
Vault and whose values are the corresponding values. This map can only
|
220
225
|
represent string data, so any non-string values returned from Vault are
|
221
226
|
serialized as JSON.
|
@@ -225,7 +230,7 @@ class _SecretV2State:
|
|
225
230
|
versions for the specified key.
|
226
231
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
227
232
|
note: drift won't be detected.
|
228
|
-
:param pulumi.Input[Mapping[str,
|
233
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
|
229
234
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
230
235
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
231
236
|
the name is the nested path excluding the mount and data
|
@@ -235,7 +240,7 @@ class _SecretV2State:
|
|
235
240
|
The value should not contain leading or trailing forward slashes.
|
236
241
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
237
242
|
*Available only for Vault Enterprise*.
|
238
|
-
:param pulumi.Input[Mapping[str,
|
243
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
239
244
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
240
245
|
"""
|
241
246
|
if cas is not None:
|
@@ -294,7 +299,7 @@ class _SecretV2State:
|
|
294
299
|
|
295
300
|
@property
|
296
301
|
@pulumi.getter
|
297
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
302
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
298
303
|
"""
|
299
304
|
A mapping whose keys are the top-level data keys returned from
|
300
305
|
Vault and whose values are the corresponding values. This map can only
|
@@ -304,7 +309,7 @@ class _SecretV2State:
|
|
304
309
|
return pulumi.get(self, "data")
|
305
310
|
|
306
311
|
@data.setter
|
307
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
312
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
308
313
|
pulumi.set(self, "data", value)
|
309
314
|
|
310
315
|
@property
|
@@ -348,14 +353,14 @@ class _SecretV2State:
|
|
348
353
|
|
349
354
|
@property
|
350
355
|
@pulumi.getter
|
351
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
356
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
352
357
|
"""
|
353
358
|
Metadata associated with this secret read from Vault.
|
354
359
|
"""
|
355
360
|
return pulumi.get(self, "metadata")
|
356
361
|
|
357
362
|
@metadata.setter
|
358
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
363
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
359
364
|
pulumi.set(self, "metadata", value)
|
360
365
|
|
361
366
|
@property
|
@@ -402,14 +407,14 @@ class _SecretV2State:
|
|
402
407
|
|
403
408
|
@property
|
404
409
|
@pulumi.getter
|
405
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
410
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
406
411
|
"""
|
407
412
|
An object that holds option settings.
|
408
413
|
"""
|
409
414
|
return pulumi.get(self, "options")
|
410
415
|
|
411
416
|
@options.setter
|
412
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
417
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
413
418
|
pulumi.set(self, "options", value)
|
414
419
|
|
415
420
|
@property
|
@@ -431,14 +436,14 @@ class SecretV2(pulumi.CustomResource):
|
|
431
436
|
resource_name: str,
|
432
437
|
opts: Optional[pulumi.ResourceOptions] = None,
|
433
438
|
cas: Optional[pulumi.Input[int]] = None,
|
434
|
-
custom_metadata: Optional[pulumi.Input[
|
439
|
+
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
435
440
|
data_json: Optional[pulumi.Input[str]] = None,
|
436
441
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
437
442
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
438
443
|
mount: Optional[pulumi.Input[str]] = None,
|
439
444
|
name: Optional[pulumi.Input[str]] = None,
|
440
445
|
namespace: Optional[pulumi.Input[str]] = None,
|
441
|
-
options: Optional[pulumi.Input[Mapping[str,
|
446
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
442
447
|
__props__=None):
|
443
448
|
"""
|
444
449
|
Writes a KV-V2 secret to a given path in Vault.
|
@@ -469,13 +474,13 @@ class SecretV2(pulumi.CustomResource):
|
|
469
474
|
"zip": "zap",
|
470
475
|
"foo": "bar",
|
471
476
|
}),
|
472
|
-
custom_metadata=
|
473
|
-
max_versions
|
474
|
-
data
|
477
|
+
custom_metadata={
|
478
|
+
"max_versions": 5,
|
479
|
+
"data": {
|
475
480
|
"foo": "vault@example.com",
|
476
481
|
"bar": "12345",
|
477
482
|
},
|
478
|
-
)
|
483
|
+
})
|
479
484
|
```
|
480
485
|
|
481
486
|
## Required Vault Capabilities
|
@@ -511,7 +516,7 @@ class SecretV2(pulumi.CustomResource):
|
|
511
516
|
on either the secret or the engine's config. In order for a
|
512
517
|
write operation to be successful, cas must be set to the current version
|
513
518
|
of the secret.
|
514
|
-
:param pulumi.Input[
|
519
|
+
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
515
520
|
KV secret. Refer to the
|
516
521
|
Configuration Options for more info.
|
517
522
|
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
@@ -529,7 +534,7 @@ class SecretV2(pulumi.CustomResource):
|
|
529
534
|
The value should not contain leading or trailing forward slashes.
|
530
535
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
531
536
|
*Available only for Vault Enterprise*.
|
532
|
-
:param pulumi.Input[Mapping[str,
|
537
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
533
538
|
"""
|
534
539
|
...
|
535
540
|
@overload
|
@@ -566,13 +571,13 @@ class SecretV2(pulumi.CustomResource):
|
|
566
571
|
"zip": "zap",
|
567
572
|
"foo": "bar",
|
568
573
|
}),
|
569
|
-
custom_metadata=
|
570
|
-
max_versions
|
571
|
-
data
|
574
|
+
custom_metadata={
|
575
|
+
"max_versions": 5,
|
576
|
+
"data": {
|
572
577
|
"foo": "vault@example.com",
|
573
578
|
"bar": "12345",
|
574
579
|
},
|
575
|
-
)
|
580
|
+
})
|
576
581
|
```
|
577
582
|
|
578
583
|
## Required Vault Capabilities
|
@@ -618,14 +623,14 @@ class SecretV2(pulumi.CustomResource):
|
|
618
623
|
resource_name: str,
|
619
624
|
opts: Optional[pulumi.ResourceOptions] = None,
|
620
625
|
cas: Optional[pulumi.Input[int]] = None,
|
621
|
-
custom_metadata: Optional[pulumi.Input[
|
626
|
+
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
622
627
|
data_json: Optional[pulumi.Input[str]] = None,
|
623
628
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
624
629
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
625
630
|
mount: Optional[pulumi.Input[str]] = None,
|
626
631
|
name: Optional[pulumi.Input[str]] = None,
|
627
632
|
namespace: Optional[pulumi.Input[str]] = None,
|
628
|
-
options: Optional[pulumi.Input[Mapping[str,
|
633
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
629
634
|
__props__=None):
|
630
635
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
631
636
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -664,16 +669,16 @@ class SecretV2(pulumi.CustomResource):
|
|
664
669
|
id: pulumi.Input[str],
|
665
670
|
opts: Optional[pulumi.ResourceOptions] = None,
|
666
671
|
cas: Optional[pulumi.Input[int]] = None,
|
667
|
-
custom_metadata: Optional[pulumi.Input[
|
668
|
-
data: Optional[pulumi.Input[Mapping[str,
|
672
|
+
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
673
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
669
674
|
data_json: Optional[pulumi.Input[str]] = None,
|
670
675
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
671
676
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
672
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
677
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
673
678
|
mount: Optional[pulumi.Input[str]] = None,
|
674
679
|
name: Optional[pulumi.Input[str]] = None,
|
675
680
|
namespace: Optional[pulumi.Input[str]] = None,
|
676
|
-
options: Optional[pulumi.Input[Mapping[str,
|
681
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
677
682
|
path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
|
678
683
|
"""
|
679
684
|
Get an existing SecretV2 resource's state with the given name, id, and optional extra
|
@@ -686,10 +691,10 @@ class SecretV2(pulumi.CustomResource):
|
|
686
691
|
on either the secret or the engine's config. In order for a
|
687
692
|
write operation to be successful, cas must be set to the current version
|
688
693
|
of the secret.
|
689
|
-
:param pulumi.Input[
|
694
|
+
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
690
695
|
KV secret. Refer to the
|
691
696
|
Configuration Options for more info.
|
692
|
-
:param pulumi.Input[Mapping[str,
|
697
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
693
698
|
Vault and whose values are the corresponding values. This map can only
|
694
699
|
represent string data, so any non-string values returned from Vault are
|
695
700
|
serialized as JSON.
|
@@ -699,7 +704,7 @@ class SecretV2(pulumi.CustomResource):
|
|
699
704
|
versions for the specified key.
|
700
705
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
701
706
|
note: drift won't be detected.
|
702
|
-
:param pulumi.Input[Mapping[str,
|
707
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
|
703
708
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
704
709
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
705
710
|
the name is the nested path excluding the mount and data
|
@@ -709,7 +714,7 @@ class SecretV2(pulumi.CustomResource):
|
|
709
714
|
The value should not contain leading or trailing forward slashes.
|
710
715
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
711
716
|
*Available only for Vault Enterprise*.
|
712
|
-
:param pulumi.Input[Mapping[str,
|
717
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
713
718
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
714
719
|
"""
|
715
720
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -753,7 +758,7 @@ class SecretV2(pulumi.CustomResource):
|
|
753
758
|
|
754
759
|
@property
|
755
760
|
@pulumi.getter
|
756
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
761
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
757
762
|
"""
|
758
763
|
A mapping whose keys are the top-level data keys returned from
|
759
764
|
Vault and whose values are the corresponding values. This map can only
|
@@ -791,7 +796,7 @@ class SecretV2(pulumi.CustomResource):
|
|
791
796
|
|
792
797
|
@property
|
793
798
|
@pulumi.getter
|
794
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
799
|
+
def metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
795
800
|
"""
|
796
801
|
Metadata associated with this secret read from Vault.
|
797
802
|
"""
|
@@ -829,7 +834,7 @@ class SecretV2(pulumi.CustomResource):
|
|
829
834
|
|
830
835
|
@property
|
831
836
|
@pulumi.getter
|
832
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
837
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
833
838
|
"""
|
834
839
|
An object that holds option settings.
|
835
840
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -150,9 +155,6 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
150
155
|
password=pulumi.get(__ret__, 'password'),
|
151
156
|
role_name=pulumi.get(__ret__, 'role_name'),
|
152
157
|
username=pulumi.get(__ret__, 'username'))
|
153
|
-
|
154
|
-
|
155
|
-
@_utilities.lift_output_func(get_dynamic_credentials)
|
156
158
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
157
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
158
160
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -160,4 +162,20 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
160
162
|
"""
|
161
163
|
Use this data source to access information about an existing resource.
|
162
164
|
"""
|
163
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['mount'] = mount
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
__args__['roleName'] = role_name
|
169
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
+
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
+
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
+
mount=pulumi.get(__response__, 'mount'),
|
178
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
+
password=pulumi.get(__response__, 'password'),
|
180
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -160,9 +165,6 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
160
165
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
161
166
|
ttl=pulumi.get(__ret__, 'ttl'),
|
162
167
|
username=pulumi.get(__ret__, 'username'))
|
163
|
-
|
164
|
-
|
165
|
-
@_utilities.lift_output_func(get_static_credentials)
|
166
168
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
167
169
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -170,4 +172,21 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
170
172
|
"""
|
171
173
|
Use this data source to access information about an existing resource.
|
172
174
|
"""
|
173
|
-
|
175
|
+
__args__ = dict()
|
176
|
+
__args__['mount'] = mount
|
177
|
+
__args__['namespace'] = namespace
|
178
|
+
__args__['roleName'] = role_name
|
179
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
+
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
+
dn=pulumi.get(__response__, 'dn'),
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
+
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
+
mount=pulumi.get(__response__, 'mount'),
|
187
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
+
password=pulumi.get(__response__, 'password'),
|
189
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
+
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -35,7 +40,7 @@ class SecretBackendArgs:
|
|
35
40
|
local: Optional[pulumi.Input[bool]] = None,
|
36
41
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
37
42
|
namespace: Optional[pulumi.Input[str]] = None,
|
38
|
-
options: Optional[pulumi.Input[Mapping[str,
|
43
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
39
44
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
45
|
password_policy: Optional[pulumi.Input[str]] = None,
|
41
46
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -79,7 +84,7 @@ class SecretBackendArgs:
|
|
79
84
|
The value should not contain leading or trailing forward slashes.
|
80
85
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
81
86
|
*Available only for Vault Enterprise*.
|
82
|
-
:param pulumi.Input[Mapping[str,
|
87
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
83
88
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
84
89
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
85
90
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -428,14 +433,14 @@ class SecretBackendArgs:
|
|
428
433
|
|
429
434
|
@property
|
430
435
|
@pulumi.getter
|
431
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
436
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
432
437
|
"""
|
433
438
|
Specifies mount type specific options that are passed to the backend
|
434
439
|
"""
|
435
440
|
return pulumi.get(self, "options")
|
436
441
|
|
437
442
|
@options.setter
|
438
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
443
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
439
444
|
pulumi.set(self, "options", value)
|
440
445
|
|
441
446
|
@property
|
@@ -624,7 +629,7 @@ class _SecretBackendState:
|
|
624
629
|
local: Optional[pulumi.Input[bool]] = None,
|
625
630
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
626
631
|
namespace: Optional[pulumi.Input[str]] = None,
|
627
|
-
options: Optional[pulumi.Input[Mapping[str,
|
632
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
628
633
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
629
634
|
password_policy: Optional[pulumi.Input[str]] = None,
|
630
635
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -669,7 +674,7 @@ class _SecretBackendState:
|
|
669
674
|
The value should not contain leading or trailing forward slashes.
|
670
675
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
671
676
|
*Available only for Vault Enterprise*.
|
672
|
-
:param pulumi.Input[Mapping[str,
|
677
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
673
678
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
674
679
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
675
680
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1034,14 +1039,14 @@ class _SecretBackendState:
|
|
1034
1039
|
|
1035
1040
|
@property
|
1036
1041
|
@pulumi.getter
|
1037
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1042
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
1038
1043
|
"""
|
1039
1044
|
Specifies mount type specific options that are passed to the backend
|
1040
1045
|
"""
|
1041
1046
|
return pulumi.get(self, "options")
|
1042
1047
|
|
1043
1048
|
@options.setter
|
1044
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1049
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
1045
1050
|
pulumi.set(self, "options", value)
|
1046
1051
|
|
1047
1052
|
@property
|
@@ -1231,7 +1236,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1231
1236
|
local: Optional[pulumi.Input[bool]] = None,
|
1232
1237
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1233
1238
|
namespace: Optional[pulumi.Input[str]] = None,
|
1234
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1239
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1235
1240
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1236
1241
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1237
1242
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1300,7 +1305,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1300
1305
|
The value should not contain leading or trailing forward slashes.
|
1301
1306
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1302
1307
|
*Available only for Vault Enterprise*.
|
1303
|
-
:param pulumi.Input[Mapping[str,
|
1308
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1304
1309
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1305
1310
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1306
1311
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1385,7 +1390,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1385
1390
|
local: Optional[pulumi.Input[bool]] = None,
|
1386
1391
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1387
1392
|
namespace: Optional[pulumi.Input[str]] = None,
|
1388
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1393
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1389
1394
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1390
1395
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1391
1396
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1482,7 +1487,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1482
1487
|
local: Optional[pulumi.Input[bool]] = None,
|
1483
1488
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1484
1489
|
namespace: Optional[pulumi.Input[str]] = None,
|
1485
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1490
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1486
1491
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1487
1492
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1488
1493
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1532,7 +1537,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1532
1537
|
The value should not contain leading or trailing forward slashes.
|
1533
1538
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1534
1539
|
*Available only for Vault Enterprise*.
|
1535
|
-
:param pulumi.Input[Mapping[str,
|
1540
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1536
1541
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1537
1542
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1538
1543
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1778,7 +1783,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1778
1783
|
|
1779
1784
|
@property
|
1780
1785
|
@pulumi.getter
|
1781
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1786
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1782
1787
|
"""
|
1783
1788
|
Specifies mount type specific options that are passed to the backend
|
1784
1789
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|