pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/_inputs.py
CHANGED
@@ -4,17 +4,88 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'KeysAwArgs',
|
19
|
+
'KeysAwArgsDict',
|
14
20
|
'KeysAzureArgs',
|
21
|
+
'KeysAzureArgsDict',
|
15
22
|
'KeysPkcArgs',
|
23
|
+
'KeysPkcArgsDict',
|
16
24
|
]
|
17
25
|
|
26
|
+
MYPY = False
|
27
|
+
|
28
|
+
if not MYPY:
|
29
|
+
class KeysAwArgsDict(TypedDict):
|
30
|
+
access_key: pulumi.Input[str]
|
31
|
+
"""
|
32
|
+
The AWS access key to use
|
33
|
+
"""
|
34
|
+
key_bits: pulumi.Input[str]
|
35
|
+
"""
|
36
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
37
|
+
"""
|
38
|
+
key_type: pulumi.Input[str]
|
39
|
+
"""
|
40
|
+
The type of key to use
|
41
|
+
"""
|
42
|
+
kms_key: pulumi.Input[str]
|
43
|
+
"""
|
44
|
+
An identifier for the key
|
45
|
+
"""
|
46
|
+
name: pulumi.Input[str]
|
47
|
+
"""
|
48
|
+
A unique lowercase name that serves as identifying the key
|
49
|
+
"""
|
50
|
+
secret_key: pulumi.Input[str]
|
51
|
+
"""
|
52
|
+
The AWS secret key to use
|
53
|
+
"""
|
54
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
55
|
+
"""
|
56
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
57
|
+
"""
|
58
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
59
|
+
"""
|
60
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
61
|
+
"""
|
62
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
63
|
+
"""
|
64
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
65
|
+
"""
|
66
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
67
|
+
"""
|
68
|
+
Allow usage from any mount point within the namespace if 'true'
|
69
|
+
"""
|
70
|
+
curve: NotRequired[pulumi.Input[str]]
|
71
|
+
"""
|
72
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
73
|
+
"""
|
74
|
+
endpoint: NotRequired[pulumi.Input[str]]
|
75
|
+
"""
|
76
|
+
Used to specify a custom AWS endpoint
|
77
|
+
"""
|
78
|
+
region: NotRequired[pulumi.Input[str]]
|
79
|
+
"""
|
80
|
+
The AWS region where the keys are stored (or will be stored)
|
81
|
+
"""
|
82
|
+
uuid: NotRequired[pulumi.Input[str]]
|
83
|
+
"""
|
84
|
+
ID of the managed key read from Vault
|
85
|
+
"""
|
86
|
+
elif False:
|
87
|
+
KeysAwArgsDict: TypeAlias = Mapping[str, Any]
|
88
|
+
|
18
89
|
@pulumi.input_type
|
19
90
|
class KeysAwArgs:
|
20
91
|
def __init__(__self__, *,
|
@@ -240,6 +311,71 @@ class KeysAwArgs:
|
|
240
311
|
pulumi.set(self, "uuid", value)
|
241
312
|
|
242
313
|
|
314
|
+
if not MYPY:
|
315
|
+
class KeysAzureArgsDict(TypedDict):
|
316
|
+
client_id: pulumi.Input[str]
|
317
|
+
"""
|
318
|
+
The client id for credentials to query the Azure APIs
|
319
|
+
"""
|
320
|
+
client_secret: pulumi.Input[str]
|
321
|
+
"""
|
322
|
+
The client secret for credentials to query the Azure APIs
|
323
|
+
"""
|
324
|
+
key_name: pulumi.Input[str]
|
325
|
+
"""
|
326
|
+
The Key Vault key to use for encryption and decryption
|
327
|
+
"""
|
328
|
+
key_type: pulumi.Input[str]
|
329
|
+
"""
|
330
|
+
The type of key to use
|
331
|
+
"""
|
332
|
+
name: pulumi.Input[str]
|
333
|
+
"""
|
334
|
+
A unique lowercase name that serves as identifying the key
|
335
|
+
"""
|
336
|
+
tenant_id: pulumi.Input[str]
|
337
|
+
"""
|
338
|
+
The tenant id for the Azure Active Directory organization
|
339
|
+
"""
|
340
|
+
vault_name: pulumi.Input[str]
|
341
|
+
"""
|
342
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
343
|
+
"""
|
344
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
345
|
+
"""
|
346
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
347
|
+
"""
|
348
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
349
|
+
"""
|
350
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
351
|
+
"""
|
352
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
353
|
+
"""
|
354
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
355
|
+
"""
|
356
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
357
|
+
"""
|
358
|
+
Allow usage from any mount point within the namespace if 'true'
|
359
|
+
"""
|
360
|
+
environment: NotRequired[pulumi.Input[str]]
|
361
|
+
"""
|
362
|
+
The Azure Cloud environment API endpoints to use
|
363
|
+
"""
|
364
|
+
key_bits: NotRequired[pulumi.Input[str]]
|
365
|
+
"""
|
366
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
367
|
+
"""
|
368
|
+
resource: NotRequired[pulumi.Input[str]]
|
369
|
+
"""
|
370
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
371
|
+
"""
|
372
|
+
uuid: NotRequired[pulumi.Input[str]]
|
373
|
+
"""
|
374
|
+
ID of the managed key read from Vault
|
375
|
+
"""
|
376
|
+
elif False:
|
377
|
+
KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
|
378
|
+
|
243
379
|
@pulumi.input_type
|
244
380
|
class KeysAzureArgs:
|
245
381
|
def __init__(__self__, *,
|
@@ -480,6 +616,75 @@ class KeysAzureArgs:
|
|
480
616
|
pulumi.set(self, "uuid", value)
|
481
617
|
|
482
618
|
|
619
|
+
if not MYPY:
|
620
|
+
class KeysPkcArgsDict(TypedDict):
|
621
|
+
key_id: pulumi.Input[str]
|
622
|
+
"""
|
623
|
+
The id of a PKCS#11 key to use
|
624
|
+
"""
|
625
|
+
key_label: pulumi.Input[str]
|
626
|
+
"""
|
627
|
+
The label of the key to use
|
628
|
+
"""
|
629
|
+
library: pulumi.Input[str]
|
630
|
+
"""
|
631
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
632
|
+
"""
|
633
|
+
mechanism: pulumi.Input[str]
|
634
|
+
"""
|
635
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
636
|
+
"""
|
637
|
+
name: pulumi.Input[str]
|
638
|
+
"""
|
639
|
+
A unique lowercase name that serves as identifying the key
|
640
|
+
"""
|
641
|
+
pin: pulumi.Input[str]
|
642
|
+
"""
|
643
|
+
The PIN for login
|
644
|
+
"""
|
645
|
+
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
646
|
+
"""
|
647
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
648
|
+
"""
|
649
|
+
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
650
|
+
"""
|
651
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
652
|
+
"""
|
653
|
+
allow_store_key: NotRequired[pulumi.Input[bool]]
|
654
|
+
"""
|
655
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
656
|
+
"""
|
657
|
+
any_mount: NotRequired[pulumi.Input[bool]]
|
658
|
+
"""
|
659
|
+
Allow usage from any mount point within the namespace if 'true'
|
660
|
+
"""
|
661
|
+
curve: NotRequired[pulumi.Input[str]]
|
662
|
+
"""
|
663
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
664
|
+
"""
|
665
|
+
force_rw_session: NotRequired[pulumi.Input[str]]
|
666
|
+
"""
|
667
|
+
Force all operations to open up a read-write session to the HSM
|
668
|
+
"""
|
669
|
+
key_bits: NotRequired[pulumi.Input[str]]
|
670
|
+
"""
|
671
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
672
|
+
"""
|
673
|
+
slot: NotRequired[pulumi.Input[str]]
|
674
|
+
"""
|
675
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
676
|
+
"""
|
677
|
+
token_label: NotRequired[pulumi.Input[str]]
|
678
|
+
"""
|
679
|
+
The slot token label to use
|
680
|
+
"""
|
681
|
+
uuid: NotRequired[pulumi.Input[str]]
|
682
|
+
"""
|
683
|
+
ID of the managed key read from Vault
|
684
|
+
"""
|
685
|
+
elif False:
|
686
|
+
KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
|
687
|
+
|
483
688
|
@pulumi.input_type
|
484
689
|
class KeysPkcArgs:
|
485
690
|
def __init__(__self__, *,
|
pulumi_vault/managed/keys.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -162,10 +167,10 @@ class Keys(pulumi.CustomResource):
|
|
162
167
|
def __init__(__self__,
|
163
168
|
resource_name: str,
|
164
169
|
opts: Optional[pulumi.ResourceOptions] = None,
|
165
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
170
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
171
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
167
172
|
namespace: Optional[pulumi.Input[str]] = None,
|
168
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
173
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
|
169
174
|
__props__=None):
|
170
175
|
"""
|
171
176
|
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
@@ -182,10 +187,10 @@ class Keys(pulumi.CustomResource):
|
|
182
187
|
|
183
188
|
:param str resource_name: The name of the resource.
|
184
189
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
185
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
186
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
190
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
|
191
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
|
187
192
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
188
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
193
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
|
189
194
|
"""
|
190
195
|
...
|
191
196
|
@overload
|
@@ -221,10 +226,10 @@ class Keys(pulumi.CustomResource):
|
|
221
226
|
def _internal_init(__self__,
|
222
227
|
resource_name: str,
|
223
228
|
opts: Optional[pulumi.ResourceOptions] = None,
|
224
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
225
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
229
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
230
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
226
231
|
namespace: Optional[pulumi.Input[str]] = None,
|
227
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
232
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None,
|
228
233
|
__props__=None):
|
229
234
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
230
235
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -248,10 +253,10 @@ class Keys(pulumi.CustomResource):
|
|
248
253
|
def get(resource_name: str,
|
249
254
|
id: pulumi.Input[str],
|
250
255
|
opts: Optional[pulumi.ResourceOptions] = None,
|
251
|
-
aws: Optional[pulumi.Input[Sequence[pulumi.Input[
|
252
|
-
azures: Optional[pulumi.Input[Sequence[pulumi.Input[
|
256
|
+
aws: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]]] = None,
|
257
|
+
azures: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]]] = None,
|
253
258
|
namespace: Optional[pulumi.Input[str]] = None,
|
254
|
-
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
259
|
+
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]]] = None) -> 'Keys':
|
255
260
|
"""
|
256
261
|
Get an existing Keys resource's state with the given name, id, and optional extra
|
257
262
|
properties used to qualify the lookup.
|
@@ -259,10 +264,10 @@ class Keys(pulumi.CustomResource):
|
|
259
264
|
:param str resource_name: The unique name of the resulting resource.
|
260
265
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
261
266
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
262
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
263
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
267
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAwArgs', 'KeysAwArgsDict']]]] aws: Configuration block for AWS Managed Keys
|
268
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysAzureArgs', 'KeysAzureArgsDict']]]] azures: Configuration block for Azure Managed Keys
|
264
269
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
265
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
270
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['KeysPkcArgs', 'KeysPkcArgsDict']]]] pkcs: Configuration block for PKCS Managed Keys
|
266
271
|
"""
|
267
272
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
268
273
|
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/mount.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MountArgs', 'Mount']
|
@@ -29,7 +34,7 @@ class MountArgs:
|
|
29
34
|
local: Optional[pulumi.Input[bool]] = None,
|
30
35
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
31
36
|
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
options: Optional[pulumi.Input[Mapping[str,
|
37
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
33
38
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
39
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
35
40
|
seal_wrap: Optional[pulumi.Input[bool]] = None):
|
@@ -57,7 +62,7 @@ class MountArgs:
|
|
57
62
|
The value should not contain leading or trailing forward slashes.
|
58
63
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
59
64
|
*Available only for Vault Enterprise*.
|
60
|
-
:param pulumi.Input[Mapping[str,
|
65
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
61
66
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
62
67
|
the plugin.
|
63
68
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
@@ -291,14 +296,14 @@ class MountArgs:
|
|
291
296
|
|
292
297
|
@property
|
293
298
|
@pulumi.getter
|
294
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
299
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
295
300
|
"""
|
296
301
|
Specifies mount type specific options that are passed to the backend
|
297
302
|
"""
|
298
303
|
return pulumi.get(self, "options")
|
299
304
|
|
300
305
|
@options.setter
|
301
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
306
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
302
307
|
pulumi.set(self, "options", value)
|
303
308
|
|
304
309
|
@property
|
@@ -358,7 +363,7 @@ class _MountState:
|
|
358
363
|
local: Optional[pulumi.Input[bool]] = None,
|
359
364
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
360
365
|
namespace: Optional[pulumi.Input[str]] = None,
|
361
|
-
options: Optional[pulumi.Input[Mapping[str,
|
366
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
362
367
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
363
368
|
path: Optional[pulumi.Input[str]] = None,
|
364
369
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -387,7 +392,7 @@ class _MountState:
|
|
387
392
|
The value should not contain leading or trailing forward slashes.
|
388
393
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
389
394
|
*Available only for Vault Enterprise*.
|
390
|
-
:param pulumi.Input[Mapping[str,
|
395
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
391
396
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
392
397
|
the plugin.
|
393
398
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -615,14 +620,14 @@ class _MountState:
|
|
615
620
|
|
616
621
|
@property
|
617
622
|
@pulumi.getter
|
618
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
623
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
619
624
|
"""
|
620
625
|
Specifies mount type specific options that are passed to the backend
|
621
626
|
"""
|
622
627
|
return pulumi.get(self, "options")
|
623
628
|
|
624
629
|
@options.setter
|
625
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
630
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
626
631
|
pulumi.set(self, "options", value)
|
627
632
|
|
628
633
|
@property
|
@@ -707,7 +712,7 @@ class Mount(pulumi.CustomResource):
|
|
707
712
|
local: Optional[pulumi.Input[bool]] = None,
|
708
713
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
709
714
|
namespace: Optional[pulumi.Input[str]] = None,
|
710
|
-
options: Optional[pulumi.Input[Mapping[str,
|
715
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
711
716
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
712
717
|
path: Optional[pulumi.Input[str]] = None,
|
713
718
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -752,7 +757,7 @@ class Mount(pulumi.CustomResource):
|
|
752
757
|
type="transit",
|
753
758
|
description="This is an example transit secret engine mount",
|
754
759
|
options={
|
755
|
-
"convergent_encryption":
|
760
|
+
"convergent_encryption": "false",
|
756
761
|
})
|
757
762
|
```
|
758
763
|
|
@@ -798,7 +803,7 @@ class Mount(pulumi.CustomResource):
|
|
798
803
|
The value should not contain leading or trailing forward slashes.
|
799
804
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
800
805
|
*Available only for Vault Enterprise*.
|
801
|
-
:param pulumi.Input[Mapping[str,
|
806
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
802
807
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
803
808
|
the plugin.
|
804
809
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -852,7 +857,7 @@ class Mount(pulumi.CustomResource):
|
|
852
857
|
type="transit",
|
853
858
|
description="This is an example transit secret engine mount",
|
854
859
|
options={
|
855
|
-
"convergent_encryption":
|
860
|
+
"convergent_encryption": "false",
|
856
861
|
})
|
857
862
|
```
|
858
863
|
|
@@ -904,7 +909,7 @@ class Mount(pulumi.CustomResource):
|
|
904
909
|
local: Optional[pulumi.Input[bool]] = None,
|
905
910
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
906
911
|
namespace: Optional[pulumi.Input[str]] = None,
|
907
|
-
options: Optional[pulumi.Input[Mapping[str,
|
912
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
908
913
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
909
914
|
path: Optional[pulumi.Input[str]] = None,
|
910
915
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -967,7 +972,7 @@ class Mount(pulumi.CustomResource):
|
|
967
972
|
local: Optional[pulumi.Input[bool]] = None,
|
968
973
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
969
974
|
namespace: Optional[pulumi.Input[str]] = None,
|
970
|
-
options: Optional[pulumi.Input[Mapping[str,
|
975
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
971
976
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
972
977
|
path: Optional[pulumi.Input[str]] = None,
|
973
978
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1001,7 +1006,7 @@ class Mount(pulumi.CustomResource):
|
|
1001
1006
|
The value should not contain leading or trailing forward slashes.
|
1002
1007
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1003
1008
|
*Available only for Vault Enterprise*.
|
1004
|
-
:param pulumi.Input[Mapping[str,
|
1009
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1005
1010
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1006
1011
|
the plugin.
|
1007
1012
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -1158,7 +1163,7 @@ class Mount(pulumi.CustomResource):
|
|
1158
1163
|
|
1159
1164
|
@property
|
1160
1165
|
@pulumi.getter
|
1161
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1166
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1162
1167
|
"""
|
1163
1168
|
Specifies mount type specific options that are passed to the backend
|
1164
1169
|
"""
|