pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
|
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -4,37 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretBackendRoleAllowedUserKeyConfigArgs',
|
19
|
-
'SecretBackendRoleAllowedUserKeyConfigArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
26
|
-
lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
|
27
|
-
"""
|
28
|
-
List of allowed key lengths, vault-1.10 and above
|
29
|
-
"""
|
30
|
-
type: pulumi.Input[str]
|
31
|
-
"""
|
32
|
-
Key type, choices:
|
33
|
-
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
34
|
-
"""
|
35
|
-
elif False:
|
36
|
-
SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
|
37
|
-
|
38
16
|
@pulumi.input_type
|
39
17
|
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
40
18
|
def __init__(__self__, *,
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -37,8 +32,8 @@ class SecretBackendRoleArgs:
|
|
37
32
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
38
33
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
39
34
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
40
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
41
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
35
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
36
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
42
37
|
default_user: Optional[pulumi.Input[str]] = None,
|
43
38
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
44
39
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -68,8 +63,8 @@ class SecretBackendRoleArgs:
|
|
68
63
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
69
64
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
70
65
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
71
|
-
:param pulumi.Input[Mapping[str,
|
72
|
-
:param pulumi.Input[Mapping[str,
|
66
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
67
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
73
68
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
74
69
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
75
70
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -330,26 +325,26 @@ class SecretBackendRoleArgs:
|
|
330
325
|
|
331
326
|
@property
|
332
327
|
@pulumi.getter(name="defaultCriticalOptions")
|
333
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
328
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
334
329
|
"""
|
335
330
|
Specifies a map of critical options that certificates have when signed.
|
336
331
|
"""
|
337
332
|
return pulumi.get(self, "default_critical_options")
|
338
333
|
|
339
334
|
@default_critical_options.setter
|
340
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
335
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
341
336
|
pulumi.set(self, "default_critical_options", value)
|
342
337
|
|
343
338
|
@property
|
344
339
|
@pulumi.getter(name="defaultExtensions")
|
345
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
340
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
346
341
|
"""
|
347
342
|
Specifies a map of extensions that certificates have when signed.
|
348
343
|
"""
|
349
344
|
return pulumi.get(self, "default_extensions")
|
350
345
|
|
351
346
|
@default_extensions.setter
|
352
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
347
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
353
348
|
pulumi.set(self, "default_extensions", value)
|
354
349
|
|
355
350
|
@property
|
@@ -470,8 +465,8 @@ class _SecretBackendRoleState:
|
|
470
465
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
471
466
|
backend: Optional[pulumi.Input[str]] = None,
|
472
467
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
473
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
474
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
468
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
469
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
475
470
|
default_user: Optional[pulumi.Input[str]] = None,
|
476
471
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
477
472
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -501,8 +496,8 @@ class _SecretBackendRoleState:
|
|
501
496
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
502
497
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
503
498
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
504
|
-
:param pulumi.Input[Mapping[str,
|
505
|
-
:param pulumi.Input[Mapping[str,
|
499
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
500
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
506
501
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
507
502
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
508
503
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -754,26 +749,26 @@ class _SecretBackendRoleState:
|
|
754
749
|
|
755
750
|
@property
|
756
751
|
@pulumi.getter(name="defaultCriticalOptions")
|
757
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
752
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
758
753
|
"""
|
759
754
|
Specifies a map of critical options that certificates have when signed.
|
760
755
|
"""
|
761
756
|
return pulumi.get(self, "default_critical_options")
|
762
757
|
|
763
758
|
@default_critical_options.setter
|
764
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
759
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
765
760
|
pulumi.set(self, "default_critical_options", value)
|
766
761
|
|
767
762
|
@property
|
768
763
|
@pulumi.getter(name="defaultExtensions")
|
769
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
764
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
770
765
|
"""
|
771
766
|
Specifies a map of extensions that certificates have when signed.
|
772
767
|
"""
|
773
768
|
return pulumi.get(self, "default_extensions")
|
774
769
|
|
775
770
|
@default_extensions.setter
|
776
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
771
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
777
772
|
pulumi.set(self, "default_extensions", value)
|
778
773
|
|
779
774
|
@property
|
@@ -908,8 +903,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
908
903
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
909
904
|
backend: Optional[pulumi.Input[str]] = None,
|
910
905
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
911
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
912
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
906
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
907
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
913
908
|
default_user: Optional[pulumi.Input[str]] = None,
|
914
909
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
915
910
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -973,8 +968,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
973
968
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
974
969
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
975
970
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
976
|
-
:param pulumi.Input[Mapping[str,
|
977
|
-
:param pulumi.Input[Mapping[str,
|
971
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
972
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
978
973
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
979
974
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
980
975
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1057,8 +1052,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1057
1052
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1058
1053
|
backend: Optional[pulumi.Input[str]] = None,
|
1059
1054
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1060
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1061
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1055
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1056
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1062
1057
|
default_user: Optional[pulumi.Input[str]] = None,
|
1063
1058
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1064
1059
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1132,8 +1127,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1132
1127
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1133
1128
|
backend: Optional[pulumi.Input[str]] = None,
|
1134
1129
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1135
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1136
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1130
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1131
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1137
1132
|
default_user: Optional[pulumi.Input[str]] = None,
|
1138
1133
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1139
1134
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1168,8 +1163,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1168
1163
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
1169
1164
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
1170
1165
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
1171
|
-
:param pulumi.Input[Mapping[str,
|
1172
|
-
:param pulumi.Input[Mapping[str,
|
1166
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
1167
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
1173
1168
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
1174
1169
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
1175
1170
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1340,7 +1335,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1340
1335
|
|
1341
1336
|
@property
|
1342
1337
|
@pulumi.getter(name="defaultCriticalOptions")
|
1343
|
-
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str,
|
1338
|
+
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1344
1339
|
"""
|
1345
1340
|
Specifies a map of critical options that certificates have when signed.
|
1346
1341
|
"""
|
@@ -1348,7 +1343,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1348
1343
|
|
1349
1344
|
@property
|
1350
1345
|
@pulumi.getter(name="defaultExtensions")
|
1351
|
-
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str,
|
1346
|
+
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1352
1347
|
"""
|
1353
1348
|
Specifies a map of extensions that certificates have when signed.
|
1354
1349
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/token.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TokenArgs', 'Token']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
|
|
52
47
|
*Available only for Vault Enterprise*.
|
53
48
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
54
49
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
50
|
+
|
51
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
55
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
56
53
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
57
54
|
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
|
|
205
202
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
206
203
|
"""
|
207
204
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
205
|
+
|
206
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
208
207
|
"""
|
209
208
|
return pulumi.get(self, "path_suffix")
|
210
209
|
|
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
|
|
368
367
|
*Available only for Vault Enterprise*.
|
369
368
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
370
369
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
370
|
+
|
371
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
371
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
372
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
373
374
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
|
|
511
512
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
512
513
|
"""
|
513
514
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
515
|
+
|
516
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
514
517
|
"""
|
515
518
|
return pulumi.get(self, "path_suffix")
|
516
519
|
|
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
723
726
|
*Available only for Vault Enterprise*.
|
724
727
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
725
728
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
729
|
+
|
730
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
726
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
727
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
728
733
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
886
891
|
*Available only for Vault Enterprise*.
|
887
892
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
888
893
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
894
|
+
|
895
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
889
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
890
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
891
898
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
987
994
|
def path_suffix(self) -> pulumi.Output[Optional[str]]:
|
988
995
|
"""
|
989
996
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
997
|
+
|
998
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
990
999
|
"""
|
991
1000
|
return pulumi.get(self, "path_suffix")
|
992
1001
|
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AlphabetArgs', 'Alphabet']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -60,12 +55,12 @@ class GetDecodeResult:
|
|
60
55
|
|
61
56
|
@property
|
62
57
|
@pulumi.getter(name="batchInputs")
|
63
|
-
def batch_inputs(self) -> Optional[Sequence[Mapping[str,
|
58
|
+
def batch_inputs(self) -> Optional[Sequence[Mapping[str, Any]]]:
|
64
59
|
return pulumi.get(self, "batch_inputs")
|
65
60
|
|
66
61
|
@property
|
67
62
|
@pulumi.getter(name="batchResults")
|
68
|
-
def batch_results(self) -> Sequence[Mapping[str,
|
63
|
+
def batch_results(self) -> Sequence[Mapping[str, Any]]:
|
69
64
|
return pulumi.get(self, "batch_results")
|
70
65
|
|
71
66
|
@property
|
@@ -130,8 +125,8 @@ class AwaitableGetDecodeResult(GetDecodeResult):
|
|
130
125
|
value=self.value)
|
131
126
|
|
132
127
|
|
133
|
-
def get_decode(batch_inputs: Optional[Sequence[Mapping[str,
|
134
|
-
batch_results: Optional[Sequence[Mapping[str,
|
128
|
+
def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
129
|
+
batch_results: Optional[Sequence[Mapping[str, Any]]] = None,
|
135
130
|
decoded_value: Optional[str] = None,
|
136
131
|
namespace: Optional[str] = None,
|
137
132
|
path: Optional[str] = None,
|
@@ -171,8 +166,8 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
171
166
|
```
|
172
167
|
|
173
168
|
|
174
|
-
:param Sequence[Mapping[str,
|
175
|
-
:param Sequence[Mapping[str,
|
169
|
+
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
170
|
+
:param Sequence[Mapping[str, Any]] batch_results: The result of decoding a batch.
|
176
171
|
:param str decoded_value: The result of decoding a value.
|
177
172
|
:param str namespace: The namespace of the target resource.
|
178
173
|
The value should not contain leading or trailing forward slashes.
|
@@ -208,8 +203,11 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
208
203
|
transformation=pulumi.get(__ret__, 'transformation'),
|
209
204
|
tweak=pulumi.get(__ret__, 'tweak'),
|
210
205
|
value=pulumi.get(__ret__, 'value'))
|
211
|
-
|
212
|
-
|
206
|
+
|
207
|
+
|
208
|
+
@_utilities.lift_output_func(get_decode)
|
209
|
+
def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, Any]]]]] = None,
|
210
|
+
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, Any]]]]] = None,
|
213
211
|
decoded_value: Optional[pulumi.Input[Optional[str]]] = None,
|
214
212
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
213
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -249,8 +247,8 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
249
247
|
```
|
250
248
|
|
251
249
|
|
252
|
-
:param Sequence[Mapping[str,
|
253
|
-
:param Sequence[Mapping[str,
|
250
|
+
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
251
|
+
:param Sequence[Mapping[str, Any]] batch_results: The result of decoding a batch.
|
254
252
|
:param str decoded_value: The result of decoding a value.
|
255
253
|
:param str namespace: The namespace of the target resource.
|
256
254
|
The value should not contain leading or trailing forward slashes.
|
@@ -262,26 +260,4 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
262
260
|
:param str tweak: The tweak value to use. Only applicable for FPE transformations
|
263
261
|
:param str value: The value in which to decode.
|
264
262
|
"""
|
265
|
-
|
266
|
-
__args__['batchInputs'] = batch_inputs
|
267
|
-
__args__['batchResults'] = batch_results
|
268
|
-
__args__['decodedValue'] = decoded_value
|
269
|
-
__args__['namespace'] = namespace
|
270
|
-
__args__['path'] = path
|
271
|
-
__args__['roleName'] = role_name
|
272
|
-
__args__['transformation'] = transformation
|
273
|
-
__args__['tweak'] = tweak
|
274
|
-
__args__['value'] = value
|
275
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
276
|
-
__ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
|
277
|
-
return __ret__.apply(lambda __response__: GetDecodeResult(
|
278
|
-
batch_inputs=pulumi.get(__response__, 'batch_inputs'),
|
279
|
-
batch_results=pulumi.get(__response__, 'batch_results'),
|
280
|
-
decoded_value=pulumi.get(__response__, 'decoded_value'),
|
281
|
-
id=pulumi.get(__response__, 'id'),
|
282
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
283
|
-
path=pulumi.get(__response__, 'path'),
|
284
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
285
|
-
transformation=pulumi.get(__response__, 'transformation'),
|
286
|
-
tweak=pulumi.get(__response__, 'tweak'),
|
287
|
-
value=pulumi.get(__response__, 'value')))
|
263
|
+
...
|