pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
@@ -15,7 +20,7 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
|
15
20
|
class SyncGcpDestinationArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
credentials: Optional[pulumi.Input[str]] = None,
|
18
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
23
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
granularity: Optional[pulumi.Input[str]] = None,
|
20
25
|
name: Optional[pulumi.Input[str]] = None,
|
21
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -26,7 +31,7 @@ class SyncGcpDestinationArgs:
|
|
26
31
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
27
32
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
28
33
|
variable.
|
29
|
-
:param pulumi.Input[Mapping[str,
|
34
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
30
35
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
31
36
|
at the destination. Supports `secret-path` and `secret-key`.
|
32
37
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -71,14 +76,14 @@ class SyncGcpDestinationArgs:
|
|
71
76
|
|
72
77
|
@property
|
73
78
|
@pulumi.getter(name="customTags")
|
74
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
79
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
75
80
|
"""
|
76
81
|
Custom tags to set on the secret managed at the destination.
|
77
82
|
"""
|
78
83
|
return pulumi.get(self, "custom_tags")
|
79
84
|
|
80
85
|
@custom_tags.setter
|
81
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
86
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
82
87
|
pulumi.set(self, "custom_tags", value)
|
83
88
|
|
84
89
|
@property
|
@@ -153,7 +158,7 @@ class SyncGcpDestinationArgs:
|
|
153
158
|
class _SyncGcpDestinationState:
|
154
159
|
def __init__(__self__, *,
|
155
160
|
credentials: Optional[pulumi.Input[str]] = None,
|
156
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
161
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
157
162
|
granularity: Optional[pulumi.Input[str]] = None,
|
158
163
|
name: Optional[pulumi.Input[str]] = None,
|
159
164
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -165,7 +170,7 @@ class _SyncGcpDestinationState:
|
|
165
170
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
166
171
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
167
172
|
variable.
|
168
|
-
:param pulumi.Input[Mapping[str,
|
173
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
169
174
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
170
175
|
at the destination. Supports `secret-path` and `secret-key`.
|
171
176
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -213,14 +218,14 @@ class _SyncGcpDestinationState:
|
|
213
218
|
|
214
219
|
@property
|
215
220
|
@pulumi.getter(name="customTags")
|
216
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
221
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
217
222
|
"""
|
218
223
|
Custom tags to set on the secret managed at the destination.
|
219
224
|
"""
|
220
225
|
return pulumi.get(self, "custom_tags")
|
221
226
|
|
222
227
|
@custom_tags.setter
|
223
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
228
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
224
229
|
pulumi.set(self, "custom_tags", value)
|
225
230
|
|
226
231
|
@property
|
@@ -309,7 +314,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
309
314
|
resource_name: str,
|
310
315
|
opts: Optional[pulumi.ResourceOptions] = None,
|
311
316
|
credentials: Optional[pulumi.Input[str]] = None,
|
312
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
317
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
313
318
|
granularity: Optional[pulumi.Input[str]] = None,
|
314
319
|
name: Optional[pulumi.Input[str]] = None,
|
315
320
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -347,7 +352,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
347
352
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
348
353
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
349
354
|
variable.
|
350
|
-
:param pulumi.Input[Mapping[str,
|
355
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
351
356
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
352
357
|
at the destination. Supports `secret-path` and `secret-key`.
|
353
358
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -409,7 +414,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
409
414
|
resource_name: str,
|
410
415
|
opts: Optional[pulumi.ResourceOptions] = None,
|
411
416
|
credentials: Optional[pulumi.Input[str]] = None,
|
412
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
417
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
413
418
|
granularity: Optional[pulumi.Input[str]] = None,
|
414
419
|
name: Optional[pulumi.Input[str]] = None,
|
415
420
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -445,7 +450,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
445
450
|
id: pulumi.Input[str],
|
446
451
|
opts: Optional[pulumi.ResourceOptions] = None,
|
447
452
|
credentials: Optional[pulumi.Input[str]] = None,
|
448
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
453
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
449
454
|
granularity: Optional[pulumi.Input[str]] = None,
|
450
455
|
name: Optional[pulumi.Input[str]] = None,
|
451
456
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -462,7 +467,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
462
467
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
463
468
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
464
469
|
variable.
|
465
|
-
:param pulumi.Input[Mapping[str,
|
470
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
466
471
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
467
472
|
at the destination. Supports `secret-path` and `secret-key`.
|
468
473
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -503,7 +508,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
503
508
|
|
504
509
|
@property
|
505
510
|
@pulumi.getter(name="customTags")
|
506
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
511
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
507
512
|
"""
|
508
513
|
Custom tags to set on the secret managed at the destination.
|
509
514
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncGhDestinationArgs', 'SyncGhDestination']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
|
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -4,15 +4,37 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretBackendRoleAllowedUserKeyConfigArgs',
|
19
|
+
'SecretBackendRoleAllowedUserKeyConfigArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
26
|
+
lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
|
27
|
+
"""
|
28
|
+
List of allowed key lengths, vault-1.10 and above
|
29
|
+
"""
|
30
|
+
type: pulumi.Input[str]
|
31
|
+
"""
|
32
|
+
Key type, choices:
|
33
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
34
|
+
"""
|
35
|
+
elif False:
|
36
|
+
SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
|
37
|
+
|
16
38
|
@pulumi.input_type
|
17
39
|
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
18
40
|
def __init__(__self__, *,
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -32,8 +37,8 @@ class SecretBackendRoleArgs:
|
|
32
37
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
33
38
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
34
39
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
35
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
36
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
40
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
41
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
37
42
|
default_user: Optional[pulumi.Input[str]] = None,
|
38
43
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
39
44
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -63,8 +68,8 @@ class SecretBackendRoleArgs:
|
|
63
68
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
64
69
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
65
70
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
66
|
-
:param pulumi.Input[Mapping[str,
|
67
|
-
:param pulumi.Input[Mapping[str,
|
71
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
72
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
68
73
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
69
74
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
70
75
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -325,26 +330,26 @@ class SecretBackendRoleArgs:
|
|
325
330
|
|
326
331
|
@property
|
327
332
|
@pulumi.getter(name="defaultCriticalOptions")
|
328
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
333
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
329
334
|
"""
|
330
335
|
Specifies a map of critical options that certificates have when signed.
|
331
336
|
"""
|
332
337
|
return pulumi.get(self, "default_critical_options")
|
333
338
|
|
334
339
|
@default_critical_options.setter
|
335
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
340
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
336
341
|
pulumi.set(self, "default_critical_options", value)
|
337
342
|
|
338
343
|
@property
|
339
344
|
@pulumi.getter(name="defaultExtensions")
|
340
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
345
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
341
346
|
"""
|
342
347
|
Specifies a map of extensions that certificates have when signed.
|
343
348
|
"""
|
344
349
|
return pulumi.get(self, "default_extensions")
|
345
350
|
|
346
351
|
@default_extensions.setter
|
347
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
352
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
348
353
|
pulumi.set(self, "default_extensions", value)
|
349
354
|
|
350
355
|
@property
|
@@ -465,8 +470,8 @@ class _SecretBackendRoleState:
|
|
465
470
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
466
471
|
backend: Optional[pulumi.Input[str]] = None,
|
467
472
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
468
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
469
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
473
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
474
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
470
475
|
default_user: Optional[pulumi.Input[str]] = None,
|
471
476
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
472
477
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -496,8 +501,8 @@ class _SecretBackendRoleState:
|
|
496
501
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
497
502
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
498
503
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
499
|
-
:param pulumi.Input[Mapping[str,
|
500
|
-
:param pulumi.Input[Mapping[str,
|
504
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
505
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
501
506
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
502
507
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
503
508
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -749,26 +754,26 @@ class _SecretBackendRoleState:
|
|
749
754
|
|
750
755
|
@property
|
751
756
|
@pulumi.getter(name="defaultCriticalOptions")
|
752
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
757
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
753
758
|
"""
|
754
759
|
Specifies a map of critical options that certificates have when signed.
|
755
760
|
"""
|
756
761
|
return pulumi.get(self, "default_critical_options")
|
757
762
|
|
758
763
|
@default_critical_options.setter
|
759
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
764
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
760
765
|
pulumi.set(self, "default_critical_options", value)
|
761
766
|
|
762
767
|
@property
|
763
768
|
@pulumi.getter(name="defaultExtensions")
|
764
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
769
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
765
770
|
"""
|
766
771
|
Specifies a map of extensions that certificates have when signed.
|
767
772
|
"""
|
768
773
|
return pulumi.get(self, "default_extensions")
|
769
774
|
|
770
775
|
@default_extensions.setter
|
771
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
776
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
772
777
|
pulumi.set(self, "default_extensions", value)
|
773
778
|
|
774
779
|
@property
|
@@ -898,13 +903,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
898
903
|
allowed_domains: Optional[pulumi.Input[str]] = None,
|
899
904
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
900
905
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
901
|
-
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
906
|
+
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
|
902
907
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
903
908
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
904
909
|
backend: Optional[pulumi.Input[str]] = None,
|
905
910
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
906
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
907
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
911
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
912
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
908
913
|
default_user: Optional[pulumi.Input[str]] = None,
|
909
914
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
910
915
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -961,15 +966,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
961
966
|
:param pulumi.Input[bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
|
962
967
|
identity template policies. Non-templated domains are also permitted.
|
963
968
|
:param pulumi.Input[str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
|
964
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
969
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
965
970
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
966
971
|
*See Configuration-Options for more info*
|
967
972
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
968
973
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
969
974
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
970
975
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
971
|
-
:param pulumi.Input[Mapping[str,
|
972
|
-
:param pulumi.Input[Mapping[str,
|
976
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
977
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
973
978
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
974
979
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
975
980
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1047,13 +1052,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1047
1052
|
allowed_domains: Optional[pulumi.Input[str]] = None,
|
1048
1053
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
1049
1054
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
1050
|
-
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1055
|
+
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
|
1051
1056
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
1052
1057
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1053
1058
|
backend: Optional[pulumi.Input[str]] = None,
|
1054
1059
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1055
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1056
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1060
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1061
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1057
1062
|
default_user: Optional[pulumi.Input[str]] = None,
|
1058
1063
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1059
1064
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1122,13 +1127,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1122
1127
|
allowed_domains: Optional[pulumi.Input[str]] = None,
|
1123
1128
|
allowed_domains_template: Optional[pulumi.Input[bool]] = None,
|
1124
1129
|
allowed_extensions: Optional[pulumi.Input[str]] = None,
|
1125
|
-
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1130
|
+
allowed_user_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]]] = None,
|
1126
1131
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
1127
1132
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1128
1133
|
backend: Optional[pulumi.Input[str]] = None,
|
1129
1134
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1130
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1131
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1135
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1136
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1132
1137
|
default_user: Optional[pulumi.Input[str]] = None,
|
1133
1138
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1134
1139
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1156,15 +1161,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1156
1161
|
:param pulumi.Input[bool] allowed_domains_template: Specifies if `allowed_domains` can be declared using
|
1157
1162
|
identity template policies. Non-templated domains are also permitted.
|
1158
1163
|
:param pulumi.Input[str] allowed_extensions: Specifies a comma-separated list of extensions that certificates can have when signed.
|
1159
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1164
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleAllowedUserKeyConfigArgs', 'SecretBackendRoleAllowedUserKeyConfigArgsDict']]]] allowed_user_key_configs: Set of configuration blocks to define allowed
|
1160
1165
|
user key configuration, like key type and their lengths. Can be specified multiple times.
|
1161
1166
|
*See Configuration-Options for more info*
|
1162
1167
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
1163
1168
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
1164
1169
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
1165
1170
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
1166
|
-
:param pulumi.Input[Mapping[str,
|
1167
|
-
:param pulumi.Input[Mapping[str,
|
1171
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
1172
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
1168
1173
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
1169
1174
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
1170
1175
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1335,7 +1340,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1335
1340
|
|
1336
1341
|
@property
|
1337
1342
|
@pulumi.getter(name="defaultCriticalOptions")
|
1338
|
-
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str,
|
1343
|
+
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1339
1344
|
"""
|
1340
1345
|
Specifies a map of critical options that certificates have when signed.
|
1341
1346
|
"""
|
@@ -1343,7 +1348,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1343
1348
|
|
1344
1349
|
@property
|
1345
1350
|
@pulumi.getter(name="defaultExtensions")
|
1346
|
-
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str,
|
1351
|
+
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1347
1352
|
"""
|
1348
1353
|
Specifies a map of extensions that certificates have when signed.
|
1349
1354
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/token.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TokenArgs', 'Token']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -47,8 +52,6 @@ class AuthBackendRoleArgs:
|
|
47
52
|
*Available only for Vault Enterprise*.
|
48
53
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
49
54
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
50
|
-
|
51
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
52
55
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
53
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
54
57
|
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
@@ -202,8 +205,6 @@ class AuthBackendRoleArgs:
|
|
202
205
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
203
206
|
"""
|
204
207
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
205
|
-
|
206
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
207
208
|
"""
|
208
209
|
return pulumi.get(self, "path_suffix")
|
209
210
|
|
@@ -367,8 +368,6 @@ class _AuthBackendRoleState:
|
|
367
368
|
*Available only for Vault Enterprise*.
|
368
369
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
369
370
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
370
|
-
|
371
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
372
371
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
373
372
|
:param pulumi.Input[str] role_name: The name of the role.
|
374
373
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -512,8 +511,6 @@ class _AuthBackendRoleState:
|
|
512
511
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
513
512
|
"""
|
514
513
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
515
|
-
|
516
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
517
514
|
"""
|
518
515
|
return pulumi.get(self, "path_suffix")
|
519
516
|
|
@@ -726,8 +723,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
726
723
|
*Available only for Vault Enterprise*.
|
727
724
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
728
725
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
729
|
-
|
730
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
731
726
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
732
727
|
:param pulumi.Input[str] role_name: The name of the role.
|
733
728
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -891,8 +886,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
891
886
|
*Available only for Vault Enterprise*.
|
892
887
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
893
888
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
894
|
-
|
895
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
896
889
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
897
890
|
:param pulumi.Input[str] role_name: The name of the role.
|
898
891
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -994,8 +987,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
994
987
|
def path_suffix(self) -> pulumi.Output[Optional[str]]:
|
995
988
|
"""
|
996
989
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
997
|
-
|
998
|
-
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
999
990
|
"""
|
1000
991
|
return pulumi.get(self, "path_suffix")
|
1001
992
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AlphabetArgs', 'Alphabet']
|