pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RgpPolicyArgs', 'RgpPolicy']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -15,7 +20,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
15
20
|
class AuthBackendRoleArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
path: pulumi.Input[str],
|
18
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
23
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
20
25
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
26
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -34,7 +39,7 @@ class AuthBackendRoleArgs:
|
|
34
39
|
"""
|
35
40
|
The set of arguments for constructing a AuthBackendRole resource.
|
36
41
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
37
|
-
:param pulumi.Input[Mapping[str,
|
42
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
38
43
|
exist in the SAML assertion.
|
39
44
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
40
45
|
`bound_attributes_type`.
|
@@ -105,7 +110,7 @@ class AuthBackendRoleArgs:
|
|
105
110
|
|
106
111
|
@property
|
107
112
|
@pulumi.getter(name="boundAttributes")
|
108
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
113
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
109
114
|
"""
|
110
115
|
Mapping of attribute names to values that are expected to
|
111
116
|
exist in the SAML assertion.
|
@@ -113,7 +118,7 @@ class AuthBackendRoleArgs:
|
|
113
118
|
return pulumi.get(self, "bound_attributes")
|
114
119
|
|
115
120
|
@bound_attributes.setter
|
116
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
121
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
117
122
|
pulumi.set(self, "bound_attributes", value)
|
118
123
|
|
119
124
|
@property
|
@@ -305,7 +310,7 @@ class AuthBackendRoleArgs:
|
|
305
310
|
@pulumi.input_type
|
306
311
|
class _AuthBackendRoleState:
|
307
312
|
def __init__(__self__, *,
|
308
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
313
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
309
314
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
310
315
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
316
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -324,7 +329,7 @@ class _AuthBackendRoleState:
|
|
324
329
|
token_type: Optional[pulumi.Input[str]] = None):
|
325
330
|
"""
|
326
331
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
327
|
-
:param pulumi.Input[Mapping[str,
|
332
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
328
333
|
exist in the SAML assertion.
|
329
334
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
330
335
|
`bound_attributes_type`.
|
@@ -385,7 +390,7 @@ class _AuthBackendRoleState:
|
|
385
390
|
|
386
391
|
@property
|
387
392
|
@pulumi.getter(name="boundAttributes")
|
388
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
393
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
389
394
|
"""
|
390
395
|
Mapping of attribute names to values that are expected to
|
391
396
|
exist in the SAML assertion.
|
@@ -393,7 +398,7 @@ class _AuthBackendRoleState:
|
|
393
398
|
return pulumi.get(self, "bound_attributes")
|
394
399
|
|
395
400
|
@bound_attributes.setter
|
396
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
401
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
397
402
|
pulumi.set(self, "bound_attributes", value)
|
398
403
|
|
399
404
|
@property
|
@@ -599,7 +604,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
599
604
|
def __init__(__self__,
|
600
605
|
resource_name: str,
|
601
606
|
opts: Optional[pulumi.ResourceOptions] = None,
|
602
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
607
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
603
608
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
604
609
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
605
610
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -656,7 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
656
661
|
|
657
662
|
:param str resource_name: The name of the resource.
|
658
663
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
659
|
-
:param pulumi.Input[Mapping[str,
|
664
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
660
665
|
exist in the SAML assertion.
|
661
666
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
662
667
|
`bound_attributes_type`.
|
@@ -738,7 +743,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
738
743
|
def _internal_init(__self__,
|
739
744
|
resource_name: str,
|
740
745
|
opts: Optional[pulumi.ResourceOptions] = None,
|
741
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
746
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
742
747
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
743
748
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
744
749
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -793,7 +798,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
793
798
|
def get(resource_name: str,
|
794
799
|
id: pulumi.Input[str],
|
795
800
|
opts: Optional[pulumi.ResourceOptions] = None,
|
796
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
801
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
797
802
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
798
803
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
799
804
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -817,7 +822,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
817
822
|
:param str resource_name: The unique name of the resulting resource.
|
818
823
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
819
824
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
820
|
-
:param pulumi.Input[Mapping[str,
|
825
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
821
826
|
exist in the SAML assertion.
|
822
827
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
823
828
|
`bound_attributes_type`.
|
@@ -866,7 +871,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
866
871
|
|
867
872
|
@property
|
868
873
|
@pulumi.getter(name="boundAttributes")
|
869
|
-
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str,
|
874
|
+
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
870
875
|
"""
|
871
876
|
Mapping of attribute names to values that are expected to
|
872
877
|
exist in the SAML assertion.
|
pulumi_vault/secrets/_inputs.py
CHANGED
@@ -4,15 +4,45 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SyncAssociationMetadataArgs',
|
19
|
+
'SyncAssociationMetadataArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class SyncAssociationMetadataArgsDict(TypedDict):
|
26
|
+
sub_key: NotRequired[pulumi.Input[str]]
|
27
|
+
"""
|
28
|
+
Subkey of the associated secret.
|
29
|
+
"""
|
30
|
+
sync_status: NotRequired[pulumi.Input[str]]
|
31
|
+
"""
|
32
|
+
A map of sync statuses for each subkey of the associated secret
|
33
|
+
(for ex. `{kv_624bea/aws-token/dev: "SYNCED", kv_624bea/aws-token/prod: "SYNCED"}`).
|
34
|
+
"""
|
35
|
+
updated_at: NotRequired[pulumi.Input[str]]
|
36
|
+
"""
|
37
|
+
A map of duration strings specifying when each subkey of the associated
|
38
|
+
secret was last updated.
|
39
|
+
(for ex.
|
40
|
+
`{kv_624bea/aws-token/dev: "2024-03-21T12:42:02.558533-07:00",
|
41
|
+
kv_624bea/aws-token/prod: "2024-03-21T12:42:02.558533-07:00"}`).
|
42
|
+
"""
|
43
|
+
elif False:
|
44
|
+
SyncAssociationMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
45
|
+
|
16
46
|
@pulumi.input_type
|
17
47
|
class SyncAssociationMetadataArgs:
|
18
48
|
def __init__(__self__, *,
|
pulumi_vault/secrets/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -358,7 +363,7 @@ class SyncAssociation(pulumi.CustomResource):
|
|
358
363
|
def get(resource_name: str,
|
359
364
|
id: pulumi.Input[str],
|
360
365
|
opts: Optional[pulumi.ResourceOptions] = None,
|
361
|
-
metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
366
|
+
metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SyncAssociationMetadataArgs', 'SyncAssociationMetadataArgsDict']]]]] = None,
|
362
367
|
mount: Optional[pulumi.Input[str]] = None,
|
363
368
|
name: Optional[pulumi.Input[str]] = None,
|
364
369
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -371,7 +376,7 @@ class SyncAssociation(pulumi.CustomResource):
|
|
371
376
|
:param str resource_name: The unique name of the resulting resource.
|
372
377
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
373
378
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
374
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
379
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SyncAssociationMetadataArgs', 'SyncAssociationMetadataArgsDict']]]] metadatas: Metadata for each subkey of the associated secret.
|
375
380
|
:param pulumi.Input[str] mount: Specifies the mount where the secret is located.
|
376
381
|
:param pulumi.Input[str] name: Specifies the name of the destination.
|
377
382
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
@@ -15,7 +20,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
|
15
20
|
class SyncAwsDestinationArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
18
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
23
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
external_id: Optional[pulumi.Input[str]] = None,
|
20
25
|
granularity: Optional[pulumi.Input[str]] = None,
|
21
26
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -29,7 +34,7 @@ class SyncAwsDestinationArgs:
|
|
29
34
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
30
35
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
31
36
|
variable.
|
32
|
-
:param pulumi.Input[Mapping[str,
|
37
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
33
38
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
34
39
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
35
40
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -92,14 +97,14 @@ class SyncAwsDestinationArgs:
|
|
92
97
|
|
93
98
|
@property
|
94
99
|
@pulumi.getter(name="customTags")
|
95
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
100
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
96
101
|
"""
|
97
102
|
Custom tags to set on the secret managed at the destination.
|
98
103
|
"""
|
99
104
|
return pulumi.get(self, "custom_tags")
|
100
105
|
|
101
106
|
@custom_tags.setter
|
102
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
107
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
103
108
|
pulumi.set(self, "custom_tags", value)
|
104
109
|
|
105
110
|
@property
|
@@ -219,7 +224,7 @@ class SyncAwsDestinationArgs:
|
|
219
224
|
class _SyncAwsDestinationState:
|
220
225
|
def __init__(__self__, *,
|
221
226
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
222
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
227
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
223
228
|
external_id: Optional[pulumi.Input[str]] = None,
|
224
229
|
granularity: Optional[pulumi.Input[str]] = None,
|
225
230
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -234,7 +239,7 @@ class _SyncAwsDestinationState:
|
|
234
239
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
235
240
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
236
241
|
variable.
|
237
|
-
:param pulumi.Input[Mapping[str,
|
242
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
238
243
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
239
244
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
240
245
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -300,14 +305,14 @@ class _SyncAwsDestinationState:
|
|
300
305
|
|
301
306
|
@property
|
302
307
|
@pulumi.getter(name="customTags")
|
303
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
308
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
304
309
|
"""
|
305
310
|
Custom tags to set on the secret managed at the destination.
|
306
311
|
"""
|
307
312
|
return pulumi.get(self, "custom_tags")
|
308
313
|
|
309
314
|
@custom_tags.setter
|
310
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
315
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
311
316
|
pulumi.set(self, "custom_tags", value)
|
312
317
|
|
313
318
|
@property
|
@@ -441,7 +446,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
441
446
|
resource_name: str,
|
442
447
|
opts: Optional[pulumi.ResourceOptions] = None,
|
443
448
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
444
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
449
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
445
450
|
external_id: Optional[pulumi.Input[str]] = None,
|
446
451
|
granularity: Optional[pulumi.Input[str]] = None,
|
447
452
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -484,7 +489,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
484
489
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
485
490
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
486
491
|
variable.
|
487
|
-
:param pulumi.Input[Mapping[str,
|
492
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
488
493
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
489
494
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
490
495
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -560,7 +565,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
560
565
|
resource_name: str,
|
561
566
|
opts: Optional[pulumi.ResourceOptions] = None,
|
562
567
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
563
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
568
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
564
569
|
external_id: Optional[pulumi.Input[str]] = None,
|
565
570
|
granularity: Optional[pulumi.Input[str]] = None,
|
566
571
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -602,7 +607,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
602
607
|
id: pulumi.Input[str],
|
603
608
|
opts: Optional[pulumi.ResourceOptions] = None,
|
604
609
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
605
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
610
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
606
611
|
external_id: Optional[pulumi.Input[str]] = None,
|
607
612
|
granularity: Optional[pulumi.Input[str]] = None,
|
608
613
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -622,7 +627,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
622
627
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
623
628
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
624
629
|
variable.
|
625
|
-
:param pulumi.Input[Mapping[str,
|
630
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
626
631
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
627
632
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
628
633
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -678,7 +683,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
678
683
|
|
679
684
|
@property
|
680
685
|
@pulumi.getter(name="customTags")
|
681
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
686
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
682
687
|
"""
|
683
688
|
Custom tags to set on the secret managed at the destination.
|
684
689
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination']
|
@@ -17,7 +22,7 @@ class SyncAzureDestinationArgs:
|
|
17
22
|
client_id: Optional[pulumi.Input[str]] = None,
|
18
23
|
client_secret: Optional[pulumi.Input[str]] = None,
|
19
24
|
cloud: Optional[pulumi.Input[str]] = None,
|
20
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
25
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
26
|
granularity: Optional[pulumi.Input[str]] = None,
|
22
27
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
23
28
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -33,7 +38,7 @@ class SyncAzureDestinationArgs:
|
|
33
38
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
34
39
|
variable.
|
35
40
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
36
|
-
:param pulumi.Input[Mapping[str,
|
41
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
37
42
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
38
43
|
at the destination. Supports `secret-path` and `secret-key`.
|
39
44
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -112,14 +117,14 @@ class SyncAzureDestinationArgs:
|
|
112
117
|
|
113
118
|
@property
|
114
119
|
@pulumi.getter(name="customTags")
|
115
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
120
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
116
121
|
"""
|
117
122
|
Custom tags to set on the secret managed at the destination.
|
118
123
|
"""
|
119
124
|
return pulumi.get(self, "custom_tags")
|
120
125
|
|
121
126
|
@custom_tags.setter
|
122
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
127
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
123
128
|
pulumi.set(self, "custom_tags", value)
|
124
129
|
|
125
130
|
@property
|
@@ -209,7 +214,7 @@ class _SyncAzureDestinationState:
|
|
209
214
|
client_id: Optional[pulumi.Input[str]] = None,
|
210
215
|
client_secret: Optional[pulumi.Input[str]] = None,
|
211
216
|
cloud: Optional[pulumi.Input[str]] = None,
|
212
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
217
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
213
218
|
granularity: Optional[pulumi.Input[str]] = None,
|
214
219
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
215
220
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -226,7 +231,7 @@ class _SyncAzureDestinationState:
|
|
226
231
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
227
232
|
variable.
|
228
233
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
229
|
-
:param pulumi.Input[Mapping[str,
|
234
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
230
235
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
231
236
|
at the destination. Supports `secret-path` and `secret-key`.
|
232
237
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -308,14 +313,14 @@ class _SyncAzureDestinationState:
|
|
308
313
|
|
309
314
|
@property
|
310
315
|
@pulumi.getter(name="customTags")
|
311
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
316
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
312
317
|
"""
|
313
318
|
Custom tags to set on the secret managed at the destination.
|
314
319
|
"""
|
315
320
|
return pulumi.get(self, "custom_tags")
|
316
321
|
|
317
322
|
@custom_tags.setter
|
318
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
323
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
319
324
|
pulumi.set(self, "custom_tags", value)
|
320
325
|
|
321
326
|
@property
|
@@ -419,7 +424,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
419
424
|
client_id: Optional[pulumi.Input[str]] = None,
|
420
425
|
client_secret: Optional[pulumi.Input[str]] = None,
|
421
426
|
cloud: Optional[pulumi.Input[str]] = None,
|
422
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
427
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
423
428
|
granularity: Optional[pulumi.Input[str]] = None,
|
424
429
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
425
430
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -463,7 +468,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
463
468
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
464
469
|
variable.
|
465
470
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
466
|
-
:param pulumi.Input[Mapping[str,
|
471
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
467
472
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
468
473
|
at the destination. Supports `secret-path` and `secret-key`.
|
469
474
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -530,7 +535,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
530
535
|
client_id: Optional[pulumi.Input[str]] = None,
|
531
536
|
client_secret: Optional[pulumi.Input[str]] = None,
|
532
537
|
cloud: Optional[pulumi.Input[str]] = None,
|
533
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
538
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
534
539
|
granularity: Optional[pulumi.Input[str]] = None,
|
535
540
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
536
541
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -572,7 +577,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
572
577
|
client_id: Optional[pulumi.Input[str]] = None,
|
573
578
|
client_secret: Optional[pulumi.Input[str]] = None,
|
574
579
|
cloud: Optional[pulumi.Input[str]] = None,
|
575
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
580
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
576
581
|
granularity: Optional[pulumi.Input[str]] = None,
|
577
582
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
578
583
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -594,7 +599,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
594
599
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
595
600
|
variable.
|
596
601
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
597
|
-
:param pulumi.Input[Mapping[str,
|
602
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
598
603
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
599
604
|
at the destination. Supports `secret-path` and `secret-key`.
|
600
605
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -658,7 +663,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
658
663
|
|
659
664
|
@property
|
660
665
|
@pulumi.getter(name="customTags")
|
661
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
666
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
662
667
|
"""
|
663
668
|
Custom tags to set on the secret managed at the destination.
|
664
669
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SyncConfigArgs', 'SyncConfig']
|