pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -29,7 +24,7 @@ class SecretV2Args:
|
|
29
24
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
30
25
|
name: Optional[pulumi.Input[str]] = None,
|
31
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
options: Optional[pulumi.Input[Mapping[str,
|
27
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
33
28
|
"""
|
34
29
|
The set of arguments for constructing a SecretV2 resource.
|
35
30
|
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
@@ -54,7 +49,7 @@ class SecretV2Args:
|
|
54
49
|
The value should not contain leading or trailing forward slashes.
|
55
50
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
51
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
52
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
58
53
|
"""
|
59
54
|
pulumi.set(__self__, "data_json", data_json)
|
60
55
|
pulumi.set(__self__, "mount", mount)
|
@@ -185,14 +180,14 @@ class SecretV2Args:
|
|
185
180
|
|
186
181
|
@property
|
187
182
|
@pulumi.getter
|
188
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
183
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
189
184
|
"""
|
190
185
|
An object that holds option settings.
|
191
186
|
"""
|
192
187
|
return pulumi.get(self, "options")
|
193
188
|
|
194
189
|
@options.setter
|
195
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
190
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
196
191
|
pulumi.set(self, "options", value)
|
197
192
|
|
198
193
|
|
@@ -201,15 +196,15 @@ class _SecretV2State:
|
|
201
196
|
def __init__(__self__, *,
|
202
197
|
cas: Optional[pulumi.Input[int]] = None,
|
203
198
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
204
|
-
data: Optional[pulumi.Input[Mapping[str,
|
199
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
205
200
|
data_json: Optional[pulumi.Input[str]] = None,
|
206
201
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
207
202
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
208
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
203
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
209
204
|
mount: Optional[pulumi.Input[str]] = None,
|
210
205
|
name: Optional[pulumi.Input[str]] = None,
|
211
206
|
namespace: Optional[pulumi.Input[str]] = None,
|
212
|
-
options: Optional[pulumi.Input[Mapping[str,
|
207
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
213
208
|
path: Optional[pulumi.Input[str]] = None):
|
214
209
|
"""
|
215
210
|
Input properties used for looking up and filtering SecretV2 resources.
|
@@ -220,7 +215,7 @@ class _SecretV2State:
|
|
220
215
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
221
216
|
KV secret. Refer to the
|
222
217
|
Configuration Options for more info.
|
223
|
-
:param pulumi.Input[Mapping[str,
|
218
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
224
219
|
Vault and whose values are the corresponding values. This map can only
|
225
220
|
represent string data, so any non-string values returned from Vault are
|
226
221
|
serialized as JSON.
|
@@ -230,7 +225,7 @@ class _SecretV2State:
|
|
230
225
|
versions for the specified key.
|
231
226
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
232
227
|
note: drift won't be detected.
|
233
|
-
:param pulumi.Input[Mapping[str,
|
228
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
|
234
229
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
235
230
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
236
231
|
the name is the nested path excluding the mount and data
|
@@ -240,7 +235,7 @@ class _SecretV2State:
|
|
240
235
|
The value should not contain leading or trailing forward slashes.
|
241
236
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
242
237
|
*Available only for Vault Enterprise*.
|
243
|
-
:param pulumi.Input[Mapping[str,
|
238
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
244
239
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
245
240
|
"""
|
246
241
|
if cas is not None:
|
@@ -299,7 +294,7 @@ class _SecretV2State:
|
|
299
294
|
|
300
295
|
@property
|
301
296
|
@pulumi.getter
|
302
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
297
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
303
298
|
"""
|
304
299
|
A mapping whose keys are the top-level data keys returned from
|
305
300
|
Vault and whose values are the corresponding values. This map can only
|
@@ -309,7 +304,7 @@ class _SecretV2State:
|
|
309
304
|
return pulumi.get(self, "data")
|
310
305
|
|
311
306
|
@data.setter
|
312
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
307
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
313
308
|
pulumi.set(self, "data", value)
|
314
309
|
|
315
310
|
@property
|
@@ -353,14 +348,14 @@ class _SecretV2State:
|
|
353
348
|
|
354
349
|
@property
|
355
350
|
@pulumi.getter
|
356
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
351
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
357
352
|
"""
|
358
353
|
Metadata associated with this secret read from Vault.
|
359
354
|
"""
|
360
355
|
return pulumi.get(self, "metadata")
|
361
356
|
|
362
357
|
@metadata.setter
|
363
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
358
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
364
359
|
pulumi.set(self, "metadata", value)
|
365
360
|
|
366
361
|
@property
|
@@ -407,14 +402,14 @@ class _SecretV2State:
|
|
407
402
|
|
408
403
|
@property
|
409
404
|
@pulumi.getter
|
410
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
405
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
411
406
|
"""
|
412
407
|
An object that holds option settings.
|
413
408
|
"""
|
414
409
|
return pulumi.get(self, "options")
|
415
410
|
|
416
411
|
@options.setter
|
417
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
412
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
418
413
|
pulumi.set(self, "options", value)
|
419
414
|
|
420
415
|
@property
|
@@ -443,7 +438,7 @@ class SecretV2(pulumi.CustomResource):
|
|
443
438
|
mount: Optional[pulumi.Input[str]] = None,
|
444
439
|
name: Optional[pulumi.Input[str]] = None,
|
445
440
|
namespace: Optional[pulumi.Input[str]] = None,
|
446
|
-
options: Optional[pulumi.Input[Mapping[str,
|
441
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
447
442
|
__props__=None):
|
448
443
|
"""
|
449
444
|
Writes a KV-V2 secret to a given path in Vault.
|
@@ -534,7 +529,7 @@ class SecretV2(pulumi.CustomResource):
|
|
534
529
|
The value should not contain leading or trailing forward slashes.
|
535
530
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
536
531
|
*Available only for Vault Enterprise*.
|
537
|
-
:param pulumi.Input[Mapping[str,
|
532
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
538
533
|
"""
|
539
534
|
...
|
540
535
|
@overload
|
@@ -630,7 +625,7 @@ class SecretV2(pulumi.CustomResource):
|
|
630
625
|
mount: Optional[pulumi.Input[str]] = None,
|
631
626
|
name: Optional[pulumi.Input[str]] = None,
|
632
627
|
namespace: Optional[pulumi.Input[str]] = None,
|
633
|
-
options: Optional[pulumi.Input[Mapping[str,
|
628
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
634
629
|
__props__=None):
|
635
630
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
636
631
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -670,15 +665,15 @@ class SecretV2(pulumi.CustomResource):
|
|
670
665
|
opts: Optional[pulumi.ResourceOptions] = None,
|
671
666
|
cas: Optional[pulumi.Input[int]] = None,
|
672
667
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
673
|
-
data: Optional[pulumi.Input[Mapping[str,
|
668
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
674
669
|
data_json: Optional[pulumi.Input[str]] = None,
|
675
670
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
676
671
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
677
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
672
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
678
673
|
mount: Optional[pulumi.Input[str]] = None,
|
679
674
|
name: Optional[pulumi.Input[str]] = None,
|
680
675
|
namespace: Optional[pulumi.Input[str]] = None,
|
681
|
-
options: Optional[pulumi.Input[Mapping[str,
|
676
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
682
677
|
path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
|
683
678
|
"""
|
684
679
|
Get an existing SecretV2 resource's state with the given name, id, and optional extra
|
@@ -694,7 +689,7 @@ class SecretV2(pulumi.CustomResource):
|
|
694
689
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
695
690
|
KV secret. Refer to the
|
696
691
|
Configuration Options for more info.
|
697
|
-
:param pulumi.Input[Mapping[str,
|
692
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
698
693
|
Vault and whose values are the corresponding values. This map can only
|
699
694
|
represent string data, so any non-string values returned from Vault are
|
700
695
|
serialized as JSON.
|
@@ -704,7 +699,7 @@ class SecretV2(pulumi.CustomResource):
|
|
704
699
|
versions for the specified key.
|
705
700
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
706
701
|
note: drift won't be detected.
|
707
|
-
:param pulumi.Input[Mapping[str,
|
702
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
|
708
703
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
709
704
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
710
705
|
the name is the nested path excluding the mount and data
|
@@ -714,7 +709,7 @@ class SecretV2(pulumi.CustomResource):
|
|
714
709
|
The value should not contain leading or trailing forward slashes.
|
715
710
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
716
711
|
*Available only for Vault Enterprise*.
|
717
|
-
:param pulumi.Input[Mapping[str,
|
712
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
718
713
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
719
714
|
"""
|
720
715
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -758,7 +753,7 @@ class SecretV2(pulumi.CustomResource):
|
|
758
753
|
|
759
754
|
@property
|
760
755
|
@pulumi.getter
|
761
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
756
|
+
def data(self) -> pulumi.Output[Mapping[str, Any]]:
|
762
757
|
"""
|
763
758
|
A mapping whose keys are the top-level data keys returned from
|
764
759
|
Vault and whose values are the corresponding values. This map can only
|
@@ -796,7 +791,7 @@ class SecretV2(pulumi.CustomResource):
|
|
796
791
|
|
797
792
|
@property
|
798
793
|
@pulumi.getter
|
799
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
794
|
+
def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
|
800
795
|
"""
|
801
796
|
Metadata associated with this secret read from Vault.
|
802
797
|
"""
|
@@ -834,7 +829,7 @@ class SecretV2(pulumi.CustomResource):
|
|
834
829
|
|
835
830
|
@property
|
836
831
|
@pulumi.getter
|
837
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
832
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
838
833
|
"""
|
839
834
|
An object that holds option settings.
|
840
835
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
155
150
|
password=pulumi.get(__ret__, 'password'),
|
156
151
|
role_name=pulumi.get(__ret__, 'role_name'),
|
157
152
|
username=pulumi.get(__ret__, 'username'))
|
153
|
+
|
154
|
+
|
155
|
+
@_utilities.lift_output_func(get_dynamic_credentials)
|
158
156
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
159
157
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
158
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
162
160
|
"""
|
163
161
|
Use this data source to access information about an existing resource.
|
164
162
|
"""
|
165
|
-
|
166
|
-
__args__['mount'] = mount
|
167
|
-
__args__['namespace'] = namespace
|
168
|
-
__args__['roleName'] = role_name
|
169
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
-
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
-
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
-
mount=pulumi.get(__response__, 'mount'),
|
178
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
-
password=pulumi.get(__response__, 'password'),
|
180
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
-
username=pulumi.get(__response__, 'username')))
|
163
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
165
160
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
166
161
|
ttl=pulumi.get(__ret__, 'ttl'),
|
167
162
|
username=pulumi.get(__ret__, 'username'))
|
163
|
+
|
164
|
+
|
165
|
+
@_utilities.lift_output_func(get_static_credentials)
|
168
166
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
169
167
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
168
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
172
170
|
"""
|
173
171
|
Use this data source to access information about an existing resource.
|
174
172
|
"""
|
175
|
-
|
176
|
-
__args__['mount'] = mount
|
177
|
-
__args__['namespace'] = namespace
|
178
|
-
__args__['roleName'] = role_name
|
179
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
-
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
-
dn=pulumi.get(__response__, 'dn'),
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
-
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
-
mount=pulumi.get(__response__, 'mount'),
|
187
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
-
password=pulumi.get(__response__, 'password'),
|
189
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
-
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
-
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
-
username=pulumi.get(__response__, 'username')))
|
173
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -40,7 +35,7 @@ class SecretBackendArgs:
|
|
40
35
|
local: Optional[pulumi.Input[bool]] = None,
|
41
36
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
42
37
|
namespace: Optional[pulumi.Input[str]] = None,
|
43
|
-
options: Optional[pulumi.Input[Mapping[str,
|
38
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
44
39
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
45
40
|
password_policy: Optional[pulumi.Input[str]] = None,
|
46
41
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -84,7 +79,7 @@ class SecretBackendArgs:
|
|
84
79
|
The value should not contain leading or trailing forward slashes.
|
85
80
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
81
|
*Available only for Vault Enterprise*.
|
87
|
-
:param pulumi.Input[Mapping[str,
|
82
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
88
83
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
89
84
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
90
85
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -433,14 +428,14 @@ class SecretBackendArgs:
|
|
433
428
|
|
434
429
|
@property
|
435
430
|
@pulumi.getter
|
436
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
431
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
437
432
|
"""
|
438
433
|
Specifies mount type specific options that are passed to the backend
|
439
434
|
"""
|
440
435
|
return pulumi.get(self, "options")
|
441
436
|
|
442
437
|
@options.setter
|
443
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
438
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
444
439
|
pulumi.set(self, "options", value)
|
445
440
|
|
446
441
|
@property
|
@@ -629,7 +624,7 @@ class _SecretBackendState:
|
|
629
624
|
local: Optional[pulumi.Input[bool]] = None,
|
630
625
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
631
626
|
namespace: Optional[pulumi.Input[str]] = None,
|
632
|
-
options: Optional[pulumi.Input[Mapping[str,
|
627
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
633
628
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
634
629
|
password_policy: Optional[pulumi.Input[str]] = None,
|
635
630
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -674,7 +669,7 @@ class _SecretBackendState:
|
|
674
669
|
The value should not contain leading or trailing forward slashes.
|
675
670
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
676
671
|
*Available only for Vault Enterprise*.
|
677
|
-
:param pulumi.Input[Mapping[str,
|
672
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
678
673
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
679
674
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
680
675
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1039,14 +1034,14 @@ class _SecretBackendState:
|
|
1039
1034
|
|
1040
1035
|
@property
|
1041
1036
|
@pulumi.getter
|
1042
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1037
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
1043
1038
|
"""
|
1044
1039
|
Specifies mount type specific options that are passed to the backend
|
1045
1040
|
"""
|
1046
1041
|
return pulumi.get(self, "options")
|
1047
1042
|
|
1048
1043
|
@options.setter
|
1049
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1044
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
1050
1045
|
pulumi.set(self, "options", value)
|
1051
1046
|
|
1052
1047
|
@property
|
@@ -1236,7 +1231,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1236
1231
|
local: Optional[pulumi.Input[bool]] = None,
|
1237
1232
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1238
1233
|
namespace: Optional[pulumi.Input[str]] = None,
|
1239
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1234
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1240
1235
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1241
1236
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1242
1237
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1305,7 +1300,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1305
1300
|
The value should not contain leading or trailing forward slashes.
|
1306
1301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1307
1302
|
*Available only for Vault Enterprise*.
|
1308
|
-
:param pulumi.Input[Mapping[str,
|
1303
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1309
1304
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1310
1305
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1311
1306
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1390,7 +1385,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1390
1385
|
local: Optional[pulumi.Input[bool]] = None,
|
1391
1386
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1392
1387
|
namespace: Optional[pulumi.Input[str]] = None,
|
1393
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1388
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1394
1389
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1395
1390
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1396
1391
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1487,7 +1482,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1487
1482
|
local: Optional[pulumi.Input[bool]] = None,
|
1488
1483
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1489
1484
|
namespace: Optional[pulumi.Input[str]] = None,
|
1490
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1485
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1491
1486
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1492
1487
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1493
1488
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1537,7 +1532,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1537
1532
|
The value should not contain leading or trailing forward slashes.
|
1538
1533
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1539
1534
|
*Available only for Vault Enterprise*.
|
1540
|
-
:param pulumi.Input[Mapping[str,
|
1535
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1541
1536
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1542
1537
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1543
1538
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1783,7 +1778,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1783
1778
|
|
1784
1779
|
@property
|
1785
1780
|
@pulumi.getter
|
1786
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1781
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1787
1782
|
"""
|
1788
1783
|
Specifies mount type specific options that are passed to the backend
|
1789
1784
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|