pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -22,7 +17,7 @@ class SecretBackendRoleArgs:
|
|
22
17
|
backend: pulumi.Input[str],
|
23
18
|
creation_statements: pulumi.Input[Sequence[pulumi.Input[str]]],
|
24
19
|
db_name: pulumi.Input[str],
|
25
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
20
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
26
21
|
credential_type: Optional[pulumi.Input[str]] = None,
|
27
22
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
28
23
|
max_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -38,7 +33,7 @@ class SecretBackendRoleArgs:
|
|
38
33
|
creating a user.
|
39
34
|
:param pulumi.Input[str] db_name: The unique name of the database connection to use for
|
40
35
|
the role.
|
41
|
-
:param pulumi.Input[Mapping[str,
|
36
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
42
37
|
for the given `credential_type`.
|
43
38
|
|
44
39
|
The following options are available for each `credential_type` value:
|
@@ -123,7 +118,7 @@ class SecretBackendRoleArgs:
|
|
123
118
|
|
124
119
|
@property
|
125
120
|
@pulumi.getter(name="credentialConfig")
|
126
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
121
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
127
122
|
"""
|
128
123
|
Specifies the configuration
|
129
124
|
for the given `credential_type`.
|
@@ -133,7 +128,7 @@ class SecretBackendRoleArgs:
|
|
133
128
|
return pulumi.get(self, "credential_config")
|
134
129
|
|
135
130
|
@credential_config.setter
|
136
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
131
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
137
132
|
pulumi.set(self, "credential_config", value)
|
138
133
|
|
139
134
|
@property
|
@@ -248,7 +243,7 @@ class _SecretBackendRoleState:
|
|
248
243
|
def __init__(__self__, *,
|
249
244
|
backend: Optional[pulumi.Input[str]] = None,
|
250
245
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
251
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
246
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
252
247
|
credential_type: Optional[pulumi.Input[str]] = None,
|
253
248
|
db_name: Optional[pulumi.Input[str]] = None,
|
254
249
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -263,7 +258,7 @@ class _SecretBackendRoleState:
|
|
263
258
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
264
259
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
265
260
|
creating a user.
|
266
|
-
:param pulumi.Input[Mapping[str,
|
261
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
267
262
|
for the given `credential_type`.
|
268
263
|
|
269
264
|
The following options are available for each `credential_type` value:
|
@@ -340,7 +335,7 @@ class _SecretBackendRoleState:
|
|
340
335
|
|
341
336
|
@property
|
342
337
|
@pulumi.getter(name="credentialConfig")
|
343
|
-
def credential_config(self) -> Optional[pulumi.Input[Mapping[str,
|
338
|
+
def credential_config(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
344
339
|
"""
|
345
340
|
Specifies the configuration
|
346
341
|
for the given `credential_type`.
|
@@ -350,7 +345,7 @@ class _SecretBackendRoleState:
|
|
350
345
|
return pulumi.get(self, "credential_config")
|
351
346
|
|
352
347
|
@credential_config.setter
|
353
|
-
def credential_config(self, value: Optional[pulumi.Input[Mapping[str,
|
348
|
+
def credential_config(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
354
349
|
pulumi.set(self, "credential_config", value)
|
355
350
|
|
356
351
|
@property
|
@@ -480,7 +475,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
480
475
|
opts: Optional[pulumi.ResourceOptions] = None,
|
481
476
|
backend: Optional[pulumi.Input[str]] = None,
|
482
477
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
483
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
478
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
484
479
|
credential_type: Optional[pulumi.Input[str]] = None,
|
485
480
|
db_name: Optional[pulumi.Input[str]] = None,
|
486
481
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -531,7 +526,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
531
526
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
532
527
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
533
528
|
creating a user.
|
534
|
-
:param pulumi.Input[Mapping[str,
|
529
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
535
530
|
for the given `credential_type`.
|
536
531
|
|
537
532
|
The following options are available for each `credential_type` value:
|
@@ -614,7 +609,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
614
609
|
opts: Optional[pulumi.ResourceOptions] = None,
|
615
610
|
backend: Optional[pulumi.Input[str]] = None,
|
616
611
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
617
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
612
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
618
613
|
credential_type: Optional[pulumi.Input[str]] = None,
|
619
614
|
db_name: Optional[pulumi.Input[str]] = None,
|
620
615
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -663,7 +658,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
663
658
|
opts: Optional[pulumi.ResourceOptions] = None,
|
664
659
|
backend: Optional[pulumi.Input[str]] = None,
|
665
660
|
creation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
666
|
-
credential_config: Optional[pulumi.Input[Mapping[str,
|
661
|
+
credential_config: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
667
662
|
credential_type: Optional[pulumi.Input[str]] = None,
|
668
663
|
db_name: Optional[pulumi.Input[str]] = None,
|
669
664
|
default_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -683,7 +678,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
678
|
:param pulumi.Input[str] backend: The unique name of the Vault mount to configure.
|
684
679
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] creation_statements: The database statements to execute when
|
685
680
|
creating a user.
|
686
|
-
:param pulumi.Input[Mapping[str,
|
681
|
+
:param pulumi.Input[Mapping[str, Any]] credential_config: Specifies the configuration
|
687
682
|
for the given `credential_type`.
|
688
683
|
|
689
684
|
The following options are available for each `credential_type` value:
|
@@ -745,7 +740,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
740
|
|
746
741
|
@property
|
747
742
|
@pulumi.getter(name="credentialConfig")
|
748
|
-
def credential_config(self) -> pulumi.Output[Optional[Mapping[str,
|
743
|
+
def credential_config(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
749
744
|
"""
|
750
745
|
Specifies the configuration
|
751
746
|
for the given `credential_type`.
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -47,7 +42,7 @@ class SecretsMountArgs:
|
|
47
42
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
48
43
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
49
44
|
namespace: Optional[pulumi.Input[str]] = None,
|
50
|
-
options: Optional[pulumi.Input[Mapping[str,
|
45
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
51
46
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
52
47
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
53
48
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -99,7 +94,7 @@ class SecretsMountArgs:
|
|
99
94
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
100
95
|
*See Configuration Options for more info*
|
101
96
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
102
|
-
:param pulumi.Input[Mapping[str,
|
97
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
103
98
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
104
99
|
*See Configuration Options for more info*
|
105
100
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -516,14 +511,14 @@ class SecretsMountArgs:
|
|
516
511
|
|
517
512
|
@property
|
518
513
|
@pulumi.getter
|
519
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
514
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
520
515
|
"""
|
521
516
|
Specifies mount type specific options that are passed to the backend
|
522
517
|
"""
|
523
518
|
return pulumi.get(self, "options")
|
524
519
|
|
525
520
|
@options.setter
|
526
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
521
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
527
522
|
pulumi.set(self, "options", value)
|
528
523
|
|
529
524
|
@property
|
@@ -671,7 +666,7 @@ class _SecretsMountState:
|
|
671
666
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
|
672
667
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
|
673
668
|
namespace: Optional[pulumi.Input[str]] = None,
|
674
|
-
options: Optional[pulumi.Input[Mapping[str,
|
669
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
675
670
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
676
671
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
677
672
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -725,7 +720,7 @@ class _SecretsMountState:
|
|
725
720
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
|
726
721
|
*See Configuration Options for more info*
|
727
722
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
728
|
-
:param pulumi.Input[Mapping[str,
|
723
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
729
724
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
730
725
|
*See Configuration Options for more info*
|
731
726
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1160,14 +1155,14 @@ class _SecretsMountState:
|
|
1160
1155
|
|
1161
1156
|
@property
|
1162
1157
|
@pulumi.getter
|
1163
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1158
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
1164
1159
|
"""
|
1165
1160
|
Specifies mount type specific options that are passed to the backend
|
1166
1161
|
"""
|
1167
1162
|
return pulumi.get(self, "options")
|
1168
1163
|
|
1169
1164
|
@options.setter
|
1170
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1165
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
1171
1166
|
pulumi.set(self, "options", value)
|
1172
1167
|
|
1173
1168
|
@property
|
@@ -1327,7 +1322,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1327
1322
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1328
1323
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1329
1324
|
namespace: Optional[pulumi.Input[str]] = None,
|
1330
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1325
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1331
1326
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1332
1327
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1333
1328
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1431,7 +1426,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1431
1426
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1432
1427
|
*See Configuration Options for more info*
|
1433
1428
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1434
|
-
:param pulumi.Input[Mapping[str,
|
1429
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1435
1430
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1436
1431
|
*See Configuration Options for more info*
|
1437
1432
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1546,7 +1541,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1546
1541
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1547
1542
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1548
1543
|
namespace: Optional[pulumi.Input[str]] = None,
|
1549
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1544
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1550
1545
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1551
1546
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1552
1547
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1643,7 +1638,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1643
1638
|
mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
|
1644
1639
|
mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
|
1645
1640
|
namespace: Optional[pulumi.Input[str]] = None,
|
1646
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1641
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1647
1642
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
|
1648
1643
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1649
1644
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1702,7 +1697,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1702
1697
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
|
1703
1698
|
*See Configuration Options for more info*
|
1704
1699
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
1705
|
-
:param pulumi.Input[Mapping[str,
|
1700
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1706
1701
|
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1707
1702
|
*See Configuration Options for more info*
|
1708
1703
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
@@ -1996,7 +1991,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1996
1991
|
|
1997
1992
|
@property
|
1998
1993
|
@pulumi.getter
|
1999
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1994
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
2000
1995
|
"""
|
2001
1996
|
Specifies mount type specific options that are passed to the backend
|
2002
1997
|
"""
|
pulumi_vault/egp_policy.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EgpPolicyArgs', 'EgpPolicy']
|
pulumi_vault/gcp/_inputs.py
CHANGED
@@ -4,53 +4,18 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendCustomEndpointArgs',
|
19
|
-
'AuthBackendCustomEndpointArgsDict',
|
20
14
|
'AuthBackendTuneArgs',
|
21
|
-
'AuthBackendTuneArgsDict',
|
22
15
|
'SecretRolesetBindingArgs',
|
23
|
-
'SecretRolesetBindingArgsDict',
|
24
16
|
'SecretStaticAccountBindingArgs',
|
25
|
-
'SecretStaticAccountBindingArgsDict',
|
26
17
|
]
|
27
18
|
|
28
|
-
MYPY = False
|
29
|
-
|
30
|
-
if not MYPY:
|
31
|
-
class AuthBackendCustomEndpointArgsDict(TypedDict):
|
32
|
-
api: NotRequired[pulumi.Input[str]]
|
33
|
-
"""
|
34
|
-
Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
35
|
-
"""
|
36
|
-
compute: NotRequired[pulumi.Input[str]]
|
37
|
-
"""
|
38
|
-
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
39
|
-
|
40
|
-
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
41
|
-
The `scheme://` and `:port` portions of the endpoint value are optional.
|
42
|
-
"""
|
43
|
-
crm: NotRequired[pulumi.Input[str]]
|
44
|
-
"""
|
45
|
-
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
46
|
-
"""
|
47
|
-
iam: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
50
|
-
"""
|
51
|
-
elif False:
|
52
|
-
AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
|
53
|
-
|
54
19
|
@pulumi.input_type
|
55
20
|
class AuthBackendCustomEndpointArgs:
|
56
21
|
def __init__(__self__, *,
|
@@ -128,56 +93,6 @@ class AuthBackendCustomEndpointArgs:
|
|
128
93
|
pulumi.set(self, "iam", value)
|
129
94
|
|
130
95
|
|
131
|
-
if not MYPY:
|
132
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
133
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
134
|
-
"""
|
135
|
-
List of headers to whitelist and allowing
|
136
|
-
a plugin to include them in the response.
|
137
|
-
"""
|
138
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
139
|
-
"""
|
140
|
-
Specifies the list of keys that will
|
141
|
-
not be HMAC'd by audit devices in the request data object.
|
142
|
-
"""
|
143
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
144
|
-
"""
|
145
|
-
Specifies the list of keys that will
|
146
|
-
not be HMAC'd by audit devices in the response data object.
|
147
|
-
"""
|
148
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
149
|
-
"""
|
150
|
-
Specifies the default time-to-live.
|
151
|
-
If set, this overrides the global default.
|
152
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
153
|
-
"""
|
154
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
155
|
-
"""
|
156
|
-
Specifies whether to show this mount in
|
157
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
158
|
-
"""
|
159
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
160
|
-
"""
|
161
|
-
Specifies the maximum time-to-live.
|
162
|
-
If set, this overrides the global default.
|
163
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
164
|
-
"""
|
165
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
166
|
-
"""
|
167
|
-
List of headers to whitelist and
|
168
|
-
pass from the request to the backend.
|
169
|
-
"""
|
170
|
-
token_type: NotRequired[pulumi.Input[str]]
|
171
|
-
"""
|
172
|
-
Specifies the type of tokens that should be returned by
|
173
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
174
|
-
|
175
|
-
|
176
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
177
|
-
"""
|
178
|
-
elif False:
|
179
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
180
|
-
|
181
96
|
@pulumi.input_type
|
182
97
|
class AuthBackendTuneArgs:
|
183
98
|
def __init__(__self__, *,
|
@@ -339,19 +254,6 @@ class AuthBackendTuneArgs:
|
|
339
254
|
pulumi.set(self, "token_type", value)
|
340
255
|
|
341
256
|
|
342
|
-
if not MYPY:
|
343
|
-
class SecretRolesetBindingArgsDict(TypedDict):
|
344
|
-
resource: pulumi.Input[str]
|
345
|
-
"""
|
346
|
-
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
347
|
-
"""
|
348
|
-
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
349
|
-
"""
|
350
|
-
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
351
|
-
"""
|
352
|
-
elif False:
|
353
|
-
SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
|
354
|
-
|
355
257
|
@pulumi.input_type
|
356
258
|
class SecretRolesetBindingArgs:
|
357
259
|
def __init__(__self__, *,
|
@@ -389,19 +291,6 @@ class SecretRolesetBindingArgs:
|
|
389
291
|
pulumi.set(self, "roles", value)
|
390
292
|
|
391
293
|
|
392
|
-
if not MYPY:
|
393
|
-
class SecretStaticAccountBindingArgsDict(TypedDict):
|
394
|
-
resource: pulumi.Input[str]
|
395
|
-
"""
|
396
|
-
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
397
|
-
"""
|
398
|
-
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
399
|
-
"""
|
400
|
-
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
401
|
-
"""
|
402
|
-
elif False:
|
403
|
-
SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
|
404
|
-
|
405
294
|
@pulumi.input_type
|
406
295
|
class SecretStaticAccountBindingArgs:
|
407
296
|
def __init__(__self__, *,
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -398,6 +393,9 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
398
393
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
399
394
|
token_type=pulumi.get(__ret__, 'token_type'),
|
400
395
|
type=pulumi.get(__ret__, 'type'))
|
396
|
+
|
397
|
+
|
398
|
+
@_utilities.lift_output_func(get_auth_backend_role)
|
401
399
|
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
402
400
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
403
401
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -460,40 +458,4 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
460
458
|
`default-service` and `default-batch` which specify the type to return unless the client
|
461
459
|
requests a different type at generation time.
|
462
460
|
"""
|
463
|
-
|
464
|
-
__args__['backend'] = backend
|
465
|
-
__args__['namespace'] = namespace
|
466
|
-
__args__['roleName'] = role_name
|
467
|
-
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
468
|
-
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
469
|
-
__args__['tokenMaxTtl'] = token_max_ttl
|
470
|
-
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
471
|
-
__args__['tokenNumUses'] = token_num_uses
|
472
|
-
__args__['tokenPeriod'] = token_period
|
473
|
-
__args__['tokenPolicies'] = token_policies
|
474
|
-
__args__['tokenTtl'] = token_ttl
|
475
|
-
__args__['tokenType'] = token_type
|
476
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
477
|
-
__ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
478
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
479
|
-
backend=pulumi.get(__response__, 'backend'),
|
480
|
-
bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
|
481
|
-
bound_labels=pulumi.get(__response__, 'bound_labels'),
|
482
|
-
bound_projects=pulumi.get(__response__, 'bound_projects'),
|
483
|
-
bound_regions=pulumi.get(__response__, 'bound_regions'),
|
484
|
-
bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
|
485
|
-
bound_zones=pulumi.get(__response__, 'bound_zones'),
|
486
|
-
id=pulumi.get(__response__, 'id'),
|
487
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
488
|
-
role_id=pulumi.get(__response__, 'role_id'),
|
489
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
490
|
-
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
491
|
-
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
492
|
-
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
493
|
-
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
494
|
-
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
495
|
-
token_period=pulumi.get(__response__, 'token_period'),
|
496
|
-
token_policies=pulumi.get(__response__, 'token_policies'),
|
497
|
-
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
498
|
-
token_type=pulumi.get(__response__, 'token_type'),
|
499
|
-
type=pulumi.get(__response__, 'type')))
|
461
|
+
...
|
pulumi_vault/gcp/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EndpointArgs', 'Endpoint']
|