pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -26,7 +21,6 @@ class AuthBackendArgs:
|
|
26
21
|
certificate: Optional[pulumi.Input[str]] = None,
|
27
22
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
28
23
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
29
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
30
24
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
31
25
|
description: Optional[pulumi.Input[str]] = None,
|
32
26
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -64,7 +58,6 @@ class AuthBackendArgs:
|
|
64
58
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
65
59
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
66
60
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
67
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
68
61
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
69
62
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
70
63
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -114,8 +107,6 @@ class AuthBackendArgs:
|
|
114
107
|
pulumi.set(__self__, "client_tls_cert", client_tls_cert)
|
115
108
|
if client_tls_key is not None:
|
116
109
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
117
|
-
if connection_timeout is not None:
|
118
|
-
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
119
110
|
if deny_null_bind is not None:
|
120
111
|
pulumi.set(__self__, "deny_null_bind", deny_null_bind)
|
121
112
|
if description is not None:
|
@@ -255,18 +246,6 @@ class AuthBackendArgs:
|
|
255
246
|
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
256
247
|
pulumi.set(self, "client_tls_key", value)
|
257
248
|
|
258
|
-
@property
|
259
|
-
@pulumi.getter(name="connectionTimeout")
|
260
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
261
|
-
"""
|
262
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
263
|
-
"""
|
264
|
-
return pulumi.get(self, "connection_timeout")
|
265
|
-
|
266
|
-
@connection_timeout.setter
|
267
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
268
|
-
pulumi.set(self, "connection_timeout", value)
|
269
|
-
|
270
249
|
@property
|
271
250
|
@pulumi.getter(name="denyNullBind")
|
272
251
|
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
@@ -643,7 +622,6 @@ class _AuthBackendState:
|
|
643
622
|
certificate: Optional[pulumi.Input[str]] = None,
|
644
623
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
645
624
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
646
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
647
625
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
648
626
|
description: Optional[pulumi.Input[str]] = None,
|
649
627
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -682,7 +660,6 @@ class _AuthBackendState:
|
|
682
660
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
683
661
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
684
662
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
685
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
686
663
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
687
664
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
688
665
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -734,8 +711,6 @@ class _AuthBackendState:
|
|
734
711
|
pulumi.set(__self__, "client_tls_cert", client_tls_cert)
|
735
712
|
if client_tls_key is not None:
|
736
713
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
737
|
-
if connection_timeout is not None:
|
738
|
-
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
739
714
|
if deny_null_bind is not None:
|
740
715
|
pulumi.set(__self__, "deny_null_bind", deny_null_bind)
|
741
716
|
if description is not None:
|
@@ -877,18 +852,6 @@ class _AuthBackendState:
|
|
877
852
|
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
878
853
|
pulumi.set(self, "client_tls_key", value)
|
879
854
|
|
880
|
-
@property
|
881
|
-
@pulumi.getter(name="connectionTimeout")
|
882
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
883
|
-
"""
|
884
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
885
|
-
"""
|
886
|
-
return pulumi.get(self, "connection_timeout")
|
887
|
-
|
888
|
-
@connection_timeout.setter
|
889
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
890
|
-
pulumi.set(self, "connection_timeout", value)
|
891
|
-
|
892
855
|
@property
|
893
856
|
@pulumi.getter(name="denyNullBind")
|
894
857
|
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1278,7 +1241,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1278
1241
|
certificate: Optional[pulumi.Input[str]] = None,
|
1279
1242
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1280
1243
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1281
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1282
1244
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1283
1245
|
description: Optional[pulumi.Input[str]] = None,
|
1284
1246
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1345,7 +1307,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1345
1307
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1346
1308
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1347
1309
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1348
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1349
1310
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1350
1311
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1351
1312
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -1438,7 +1399,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1438
1399
|
certificate: Optional[pulumi.Input[str]] = None,
|
1439
1400
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1440
1401
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1441
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1442
1402
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1443
1403
|
description: Optional[pulumi.Input[str]] = None,
|
1444
1404
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1485,7 +1445,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1485
1445
|
__props__.__dict__["certificate"] = certificate
|
1486
1446
|
__props__.__dict__["client_tls_cert"] = client_tls_cert
|
1487
1447
|
__props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
|
1488
|
-
__props__.__dict__["connection_timeout"] = connection_timeout
|
1489
1448
|
__props__.__dict__["deny_null_bind"] = deny_null_bind
|
1490
1449
|
__props__.__dict__["description"] = description
|
1491
1450
|
__props__.__dict__["disable_remount"] = disable_remount
|
@@ -1539,7 +1498,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1539
1498
|
certificate: Optional[pulumi.Input[str]] = None,
|
1540
1499
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1541
1500
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1542
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1543
1501
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1544
1502
|
description: Optional[pulumi.Input[str]] = None,
|
1545
1503
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1583,7 +1541,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1583
1541
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1584
1542
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1585
1543
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1586
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1587
1544
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1588
1545
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1589
1546
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -1632,7 +1589,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1632
1589
|
__props__.__dict__["certificate"] = certificate
|
1633
1590
|
__props__.__dict__["client_tls_cert"] = client_tls_cert
|
1634
1591
|
__props__.__dict__["client_tls_key"] = client_tls_key
|
1635
|
-
__props__.__dict__["connection_timeout"] = connection_timeout
|
1636
1592
|
__props__.__dict__["deny_null_bind"] = deny_null_bind
|
1637
1593
|
__props__.__dict__["description"] = description
|
1638
1594
|
__props__.__dict__["disable_remount"] = disable_remount
|
@@ -1716,14 +1672,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1716
1672
|
def client_tls_key(self) -> pulumi.Output[str]:
|
1717
1673
|
return pulumi.get(self, "client_tls_key")
|
1718
1674
|
|
1719
|
-
@property
|
1720
|
-
@pulumi.getter(name="connectionTimeout")
|
1721
|
-
def connection_timeout(self) -> pulumi.Output[int]:
|
1722
|
-
"""
|
1723
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1724
|
-
"""
|
1725
|
-
return pulumi.get(self, "connection_timeout")
|
1726
|
-
|
1727
1675
|
@property
|
1728
1676
|
@pulumi.getter(name="denyNullBind")
|
1729
1677
|
def deny_null_bind(self) -> pulumi.Output[bool]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
155
150
|
password=pulumi.get(__ret__, 'password'),
|
156
151
|
role_name=pulumi.get(__ret__, 'role_name'),
|
157
152
|
username=pulumi.get(__ret__, 'username'))
|
153
|
+
|
154
|
+
|
155
|
+
@_utilities.lift_output_func(get_dynamic_credentials)
|
158
156
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
159
157
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
158
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
162
160
|
"""
|
163
161
|
Use this data source to access information about an existing resource.
|
164
162
|
"""
|
165
|
-
|
166
|
-
__args__['mount'] = mount
|
167
|
-
__args__['namespace'] = namespace
|
168
|
-
__args__['roleName'] = role_name
|
169
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
-
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
-
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
-
mount=pulumi.get(__response__, 'mount'),
|
178
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
-
password=pulumi.get(__response__, 'password'),
|
180
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
-
username=pulumi.get(__response__, 'username')))
|
163
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
165
160
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
166
161
|
ttl=pulumi.get(__ret__, 'ttl'),
|
167
162
|
username=pulumi.get(__ret__, 'username'))
|
163
|
+
|
164
|
+
|
165
|
+
@_utilities.lift_output_func(get_static_credentials)
|
168
166
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
169
167
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
168
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
172
170
|
"""
|
173
171
|
Use this data source to access information about an existing resource.
|
174
172
|
"""
|
175
|
-
|
176
|
-
__args__['mount'] = mount
|
177
|
-
__args__['namespace'] = namespace
|
178
|
-
__args__['roleName'] = role_name
|
179
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
-
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
-
dn=pulumi.get(__response__, 'dn'),
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
-
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
-
mount=pulumi.get(__response__, 'mount'),
|
187
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
-
password=pulumi.get(__response__, 'password'),
|
189
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
-
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
-
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
-
username=pulumi.get(__response__, 'username')))
|
173
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -40,7 +35,7 @@ class SecretBackendArgs:
|
|
40
35
|
local: Optional[pulumi.Input[bool]] = None,
|
41
36
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
42
37
|
namespace: Optional[pulumi.Input[str]] = None,
|
43
|
-
options: Optional[pulumi.Input[Mapping[str,
|
38
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
44
39
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
45
40
|
password_policy: Optional[pulumi.Input[str]] = None,
|
46
41
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -84,7 +79,7 @@ class SecretBackendArgs:
|
|
84
79
|
The value should not contain leading or trailing forward slashes.
|
85
80
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
81
|
*Available only for Vault Enterprise*.
|
87
|
-
:param pulumi.Input[Mapping[str,
|
82
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
88
83
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
89
84
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
90
85
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -433,14 +428,14 @@ class SecretBackendArgs:
|
|
433
428
|
|
434
429
|
@property
|
435
430
|
@pulumi.getter
|
436
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
431
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
437
432
|
"""
|
438
433
|
Specifies mount type specific options that are passed to the backend
|
439
434
|
"""
|
440
435
|
return pulumi.get(self, "options")
|
441
436
|
|
442
437
|
@options.setter
|
443
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
438
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
444
439
|
pulumi.set(self, "options", value)
|
445
440
|
|
446
441
|
@property
|
@@ -629,7 +624,7 @@ class _SecretBackendState:
|
|
629
624
|
local: Optional[pulumi.Input[bool]] = None,
|
630
625
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
631
626
|
namespace: Optional[pulumi.Input[str]] = None,
|
632
|
-
options: Optional[pulumi.Input[Mapping[str,
|
627
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
633
628
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
634
629
|
password_policy: Optional[pulumi.Input[str]] = None,
|
635
630
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -674,7 +669,7 @@ class _SecretBackendState:
|
|
674
669
|
The value should not contain leading or trailing forward slashes.
|
675
670
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
676
671
|
*Available only for Vault Enterprise*.
|
677
|
-
:param pulumi.Input[Mapping[str,
|
672
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
678
673
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
679
674
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
680
675
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1039,14 +1034,14 @@ class _SecretBackendState:
|
|
1039
1034
|
|
1040
1035
|
@property
|
1041
1036
|
@pulumi.getter
|
1042
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
1037
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
1043
1038
|
"""
|
1044
1039
|
Specifies mount type specific options that are passed to the backend
|
1045
1040
|
"""
|
1046
1041
|
return pulumi.get(self, "options")
|
1047
1042
|
|
1048
1043
|
@options.setter
|
1049
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
1044
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
1050
1045
|
pulumi.set(self, "options", value)
|
1051
1046
|
|
1052
1047
|
@property
|
@@ -1236,7 +1231,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1236
1231
|
local: Optional[pulumi.Input[bool]] = None,
|
1237
1232
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1238
1233
|
namespace: Optional[pulumi.Input[str]] = None,
|
1239
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1234
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1240
1235
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1241
1236
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1242
1237
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1305,7 +1300,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1305
1300
|
The value should not contain leading or trailing forward slashes.
|
1306
1301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1307
1302
|
*Available only for Vault Enterprise*.
|
1308
|
-
:param pulumi.Input[Mapping[str,
|
1303
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1309
1304
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1310
1305
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1311
1306
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1390,7 +1385,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1390
1385
|
local: Optional[pulumi.Input[bool]] = None,
|
1391
1386
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1392
1387
|
namespace: Optional[pulumi.Input[str]] = None,
|
1393
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1388
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1394
1389
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1395
1390
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1396
1391
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1487,7 +1482,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1487
1482
|
local: Optional[pulumi.Input[bool]] = None,
|
1488
1483
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1489
1484
|
namespace: Optional[pulumi.Input[str]] = None,
|
1490
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1485
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1491
1486
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1492
1487
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1493
1488
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -1537,7 +1532,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1537
1532
|
The value should not contain leading or trailing forward slashes.
|
1538
1533
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1539
1534
|
*Available only for Vault Enterprise*.
|
1540
|
-
:param pulumi.Input[Mapping[str,
|
1535
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1541
1536
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1542
1537
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1543
1538
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
@@ -1783,7 +1778,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1783
1778
|
|
1784
1779
|
@property
|
1785
1780
|
@pulumi.getter
|
1786
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1781
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1787
1782
|
"""
|
1788
1783
|
Specifies mount type specific options that are passed to the backend
|
1789
1784
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|