pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/_inputs.py
CHANGED
@@ -4,88 +4,17 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'KeysAwArgs',
|
19
|
-
'KeysAwArgsDict',
|
20
14
|
'KeysAzureArgs',
|
21
|
-
'KeysAzureArgsDict',
|
22
15
|
'KeysPkcArgs',
|
23
|
-
'KeysPkcArgsDict',
|
24
16
|
]
|
25
17
|
|
26
|
-
MYPY = False
|
27
|
-
|
28
|
-
if not MYPY:
|
29
|
-
class KeysAwArgsDict(TypedDict):
|
30
|
-
access_key: pulumi.Input[str]
|
31
|
-
"""
|
32
|
-
The AWS access key to use
|
33
|
-
"""
|
34
|
-
key_bits: pulumi.Input[str]
|
35
|
-
"""
|
36
|
-
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
37
|
-
"""
|
38
|
-
key_type: pulumi.Input[str]
|
39
|
-
"""
|
40
|
-
The type of key to use
|
41
|
-
"""
|
42
|
-
kms_key: pulumi.Input[str]
|
43
|
-
"""
|
44
|
-
An identifier for the key
|
45
|
-
"""
|
46
|
-
name: pulumi.Input[str]
|
47
|
-
"""
|
48
|
-
A unique lowercase name that serves as identifying the key
|
49
|
-
"""
|
50
|
-
secret_key: pulumi.Input[str]
|
51
|
-
"""
|
52
|
-
The AWS secret key to use
|
53
|
-
"""
|
54
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
55
|
-
"""
|
56
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
57
|
-
"""
|
58
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
59
|
-
"""
|
60
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
61
|
-
"""
|
62
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
63
|
-
"""
|
64
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
65
|
-
"""
|
66
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
67
|
-
"""
|
68
|
-
Allow usage from any mount point within the namespace if 'true'
|
69
|
-
"""
|
70
|
-
curve: NotRequired[pulumi.Input[str]]
|
71
|
-
"""
|
72
|
-
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
73
|
-
"""
|
74
|
-
endpoint: NotRequired[pulumi.Input[str]]
|
75
|
-
"""
|
76
|
-
Used to specify a custom AWS endpoint
|
77
|
-
"""
|
78
|
-
region: NotRequired[pulumi.Input[str]]
|
79
|
-
"""
|
80
|
-
The AWS region where the keys are stored (or will be stored)
|
81
|
-
"""
|
82
|
-
uuid: NotRequired[pulumi.Input[str]]
|
83
|
-
"""
|
84
|
-
ID of the managed key read from Vault
|
85
|
-
"""
|
86
|
-
elif False:
|
87
|
-
KeysAwArgsDict: TypeAlias = Mapping[str, Any]
|
88
|
-
|
89
18
|
@pulumi.input_type
|
90
19
|
class KeysAwArgs:
|
91
20
|
def __init__(__self__, *,
|
@@ -311,71 +240,6 @@ class KeysAwArgs:
|
|
311
240
|
pulumi.set(self, "uuid", value)
|
312
241
|
|
313
242
|
|
314
|
-
if not MYPY:
|
315
|
-
class KeysAzureArgsDict(TypedDict):
|
316
|
-
client_id: pulumi.Input[str]
|
317
|
-
"""
|
318
|
-
The client id for credentials to query the Azure APIs
|
319
|
-
"""
|
320
|
-
client_secret: pulumi.Input[str]
|
321
|
-
"""
|
322
|
-
The client secret for credentials to query the Azure APIs
|
323
|
-
"""
|
324
|
-
key_name: pulumi.Input[str]
|
325
|
-
"""
|
326
|
-
The Key Vault key to use for encryption and decryption
|
327
|
-
"""
|
328
|
-
key_type: pulumi.Input[str]
|
329
|
-
"""
|
330
|
-
The type of key to use
|
331
|
-
"""
|
332
|
-
name: pulumi.Input[str]
|
333
|
-
"""
|
334
|
-
A unique lowercase name that serves as identifying the key
|
335
|
-
"""
|
336
|
-
tenant_id: pulumi.Input[str]
|
337
|
-
"""
|
338
|
-
The tenant id for the Azure Active Directory organization
|
339
|
-
"""
|
340
|
-
vault_name: pulumi.Input[str]
|
341
|
-
"""
|
342
|
-
The Key Vault vault to use the encryption keys for encryption and decryption
|
343
|
-
"""
|
344
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
345
|
-
"""
|
346
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
347
|
-
"""
|
348
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
349
|
-
"""
|
350
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
351
|
-
"""
|
352
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
353
|
-
"""
|
354
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
355
|
-
"""
|
356
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
357
|
-
"""
|
358
|
-
Allow usage from any mount point within the namespace if 'true'
|
359
|
-
"""
|
360
|
-
environment: NotRequired[pulumi.Input[str]]
|
361
|
-
"""
|
362
|
-
The Azure Cloud environment API endpoints to use
|
363
|
-
"""
|
364
|
-
key_bits: NotRequired[pulumi.Input[str]]
|
365
|
-
"""
|
366
|
-
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
367
|
-
"""
|
368
|
-
resource: NotRequired[pulumi.Input[str]]
|
369
|
-
"""
|
370
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
371
|
-
"""
|
372
|
-
uuid: NotRequired[pulumi.Input[str]]
|
373
|
-
"""
|
374
|
-
ID of the managed key read from Vault
|
375
|
-
"""
|
376
|
-
elif False:
|
377
|
-
KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
|
378
|
-
|
379
243
|
@pulumi.input_type
|
380
244
|
class KeysAzureArgs:
|
381
245
|
def __init__(__self__, *,
|
@@ -616,75 +480,6 @@ class KeysAzureArgs:
|
|
616
480
|
pulumi.set(self, "uuid", value)
|
617
481
|
|
618
482
|
|
619
|
-
if not MYPY:
|
620
|
-
class KeysPkcArgsDict(TypedDict):
|
621
|
-
key_id: pulumi.Input[str]
|
622
|
-
"""
|
623
|
-
The id of a PKCS#11 key to use
|
624
|
-
"""
|
625
|
-
key_label: pulumi.Input[str]
|
626
|
-
"""
|
627
|
-
The label of the key to use
|
628
|
-
"""
|
629
|
-
library: pulumi.Input[str]
|
630
|
-
"""
|
631
|
-
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
632
|
-
"""
|
633
|
-
mechanism: pulumi.Input[str]
|
634
|
-
"""
|
635
|
-
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
636
|
-
"""
|
637
|
-
name: pulumi.Input[str]
|
638
|
-
"""
|
639
|
-
A unique lowercase name that serves as identifying the key
|
640
|
-
"""
|
641
|
-
pin: pulumi.Input[str]
|
642
|
-
"""
|
643
|
-
The PIN for login
|
644
|
-
"""
|
645
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
646
|
-
"""
|
647
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
648
|
-
"""
|
649
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
650
|
-
"""
|
651
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
652
|
-
"""
|
653
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
654
|
-
"""
|
655
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
656
|
-
"""
|
657
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
658
|
-
"""
|
659
|
-
Allow usage from any mount point within the namespace if 'true'
|
660
|
-
"""
|
661
|
-
curve: NotRequired[pulumi.Input[str]]
|
662
|
-
"""
|
663
|
-
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
664
|
-
"""
|
665
|
-
force_rw_session: NotRequired[pulumi.Input[str]]
|
666
|
-
"""
|
667
|
-
Force all operations to open up a read-write session to the HSM
|
668
|
-
"""
|
669
|
-
key_bits: NotRequired[pulumi.Input[str]]
|
670
|
-
"""
|
671
|
-
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
672
|
-
"""
|
673
|
-
slot: NotRequired[pulumi.Input[str]]
|
674
|
-
"""
|
675
|
-
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
676
|
-
"""
|
677
|
-
token_label: NotRequired[pulumi.Input[str]]
|
678
|
-
"""
|
679
|
-
The slot token label to use
|
680
|
-
"""
|
681
|
-
uuid: NotRequired[pulumi.Input[str]]
|
682
|
-
"""
|
683
|
-
ID of the managed key read from Vault
|
684
|
-
"""
|
685
|
-
elif False:
|
686
|
-
KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
|
687
|
-
|
688
483
|
@pulumi.input_type
|
689
484
|
class KeysPkcArgs:
|
690
485
|
def __init__(__self__, *,
|
pulumi_vault/managed/keys.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/mount.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MountArgs', 'Mount']
|
@@ -34,7 +29,7 @@ class MountArgs:
|
|
34
29
|
local: Optional[pulumi.Input[bool]] = None,
|
35
30
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
36
31
|
namespace: Optional[pulumi.Input[str]] = None,
|
37
|
-
options: Optional[pulumi.Input[Mapping[str,
|
32
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
38
33
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
34
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
40
35
|
seal_wrap: Optional[pulumi.Input[bool]] = None):
|
@@ -62,7 +57,7 @@ class MountArgs:
|
|
62
57
|
The value should not contain leading or trailing forward slashes.
|
63
58
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
64
59
|
*Available only for Vault Enterprise*.
|
65
|
-
:param pulumi.Input[Mapping[str,
|
60
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
66
61
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
67
62
|
the plugin.
|
68
63
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. "v1.0.0".
|
@@ -296,14 +291,14 @@ class MountArgs:
|
|
296
291
|
|
297
292
|
@property
|
298
293
|
@pulumi.getter
|
299
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
294
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
300
295
|
"""
|
301
296
|
Specifies mount type specific options that are passed to the backend
|
302
297
|
"""
|
303
298
|
return pulumi.get(self, "options")
|
304
299
|
|
305
300
|
@options.setter
|
306
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
301
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
307
302
|
pulumi.set(self, "options", value)
|
308
303
|
|
309
304
|
@property
|
@@ -363,7 +358,7 @@ class _MountState:
|
|
363
358
|
local: Optional[pulumi.Input[bool]] = None,
|
364
359
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
365
360
|
namespace: Optional[pulumi.Input[str]] = None,
|
366
|
-
options: Optional[pulumi.Input[Mapping[str,
|
361
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
367
362
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
368
363
|
path: Optional[pulumi.Input[str]] = None,
|
369
364
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -392,7 +387,7 @@ class _MountState:
|
|
392
387
|
The value should not contain leading or trailing forward slashes.
|
393
388
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
394
389
|
*Available only for Vault Enterprise*.
|
395
|
-
:param pulumi.Input[Mapping[str,
|
390
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
396
391
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
397
392
|
the plugin.
|
398
393
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -620,14 +615,14 @@ class _MountState:
|
|
620
615
|
|
621
616
|
@property
|
622
617
|
@pulumi.getter
|
623
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
618
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
624
619
|
"""
|
625
620
|
Specifies mount type specific options that are passed to the backend
|
626
621
|
"""
|
627
622
|
return pulumi.get(self, "options")
|
628
623
|
|
629
624
|
@options.setter
|
630
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
625
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
631
626
|
pulumi.set(self, "options", value)
|
632
627
|
|
633
628
|
@property
|
@@ -712,7 +707,7 @@ class Mount(pulumi.CustomResource):
|
|
712
707
|
local: Optional[pulumi.Input[bool]] = None,
|
713
708
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
714
709
|
namespace: Optional[pulumi.Input[str]] = None,
|
715
|
-
options: Optional[pulumi.Input[Mapping[str,
|
710
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
716
711
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
717
712
|
path: Optional[pulumi.Input[str]] = None,
|
718
713
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -757,7 +752,7 @@ class Mount(pulumi.CustomResource):
|
|
757
752
|
type="transit",
|
758
753
|
description="This is an example transit secret engine mount",
|
759
754
|
options={
|
760
|
-
"convergent_encryption":
|
755
|
+
"convergent_encryption": False,
|
761
756
|
})
|
762
757
|
```
|
763
758
|
|
@@ -803,7 +798,7 @@ class Mount(pulumi.CustomResource):
|
|
803
798
|
The value should not contain leading or trailing forward slashes.
|
804
799
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
805
800
|
*Available only for Vault Enterprise*.
|
806
|
-
:param pulumi.Input[Mapping[str,
|
801
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
807
802
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
808
803
|
the plugin.
|
809
804
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -857,7 +852,7 @@ class Mount(pulumi.CustomResource):
|
|
857
852
|
type="transit",
|
858
853
|
description="This is an example transit secret engine mount",
|
859
854
|
options={
|
860
|
-
"convergent_encryption":
|
855
|
+
"convergent_encryption": False,
|
861
856
|
})
|
862
857
|
```
|
863
858
|
|
@@ -909,7 +904,7 @@ class Mount(pulumi.CustomResource):
|
|
909
904
|
local: Optional[pulumi.Input[bool]] = None,
|
910
905
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
911
906
|
namespace: Optional[pulumi.Input[str]] = None,
|
912
|
-
options: Optional[pulumi.Input[Mapping[str,
|
907
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
913
908
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
914
909
|
path: Optional[pulumi.Input[str]] = None,
|
915
910
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -972,7 +967,7 @@ class Mount(pulumi.CustomResource):
|
|
972
967
|
local: Optional[pulumi.Input[bool]] = None,
|
973
968
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
974
969
|
namespace: Optional[pulumi.Input[str]] = None,
|
975
|
-
options: Optional[pulumi.Input[Mapping[str,
|
970
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
976
971
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
977
972
|
path: Optional[pulumi.Input[str]] = None,
|
978
973
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1006,7 +1001,7 @@ class Mount(pulumi.CustomResource):
|
|
1006
1001
|
The value should not contain leading or trailing forward slashes.
|
1007
1002
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1008
1003
|
*Available only for Vault Enterprise*.
|
1009
|
-
:param pulumi.Input[Mapping[str,
|
1004
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1010
1005
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to
|
1011
1006
|
the plugin.
|
1012
1007
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
@@ -1163,7 +1158,7 @@ class Mount(pulumi.CustomResource):
|
|
1163
1158
|
|
1164
1159
|
@property
|
1165
1160
|
@pulumi.getter
|
1166
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1161
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1167
1162
|
"""
|
1168
1163
|
Specifies mount type specific options that are passed to the backend
|
1169
1164
|
"""
|
pulumi_vault/namespace.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NamespaceArgs', 'Namespace']
|
@@ -20,13 +15,13 @@ __all__ = ['NamespaceArgs', 'Namespace']
|
|
20
15
|
class NamespaceArgs:
|
21
16
|
def __init__(__self__, *,
|
22
17
|
path: pulumi.Input[str],
|
23
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
18
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
24
19
|
namespace: Optional[pulumi.Input[str]] = None,
|
25
20
|
path_fq: Optional[pulumi.Input[str]] = None):
|
26
21
|
"""
|
27
22
|
The set of arguments for constructing a Namespace resource.
|
28
23
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
29
|
-
:param pulumi.Input[Mapping[str,
|
24
|
+
:param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
|
30
25
|
is `map[string]string`. Requires Vault version 1.12+.
|
31
26
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
27
|
The value should not contain leading or trailing forward slashes.
|
@@ -57,7 +52,7 @@ class NamespaceArgs:
|
|
57
52
|
|
58
53
|
@property
|
59
54
|
@pulumi.getter(name="customMetadata")
|
60
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
55
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
61
56
|
"""
|
62
57
|
Custom metadata describing this namespace. Value type
|
63
58
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -65,7 +60,7 @@ class NamespaceArgs:
|
|
65
60
|
return pulumi.get(self, "custom_metadata")
|
66
61
|
|
67
62
|
@custom_metadata.setter
|
68
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
63
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
69
64
|
pulumi.set(self, "custom_metadata", value)
|
70
65
|
|
71
66
|
@property
|
@@ -100,14 +95,14 @@ class NamespaceArgs:
|
|
100
95
|
@pulumi.input_type
|
101
96
|
class _NamespaceState:
|
102
97
|
def __init__(__self__, *,
|
103
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
98
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
104
99
|
namespace: Optional[pulumi.Input[str]] = None,
|
105
100
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
106
101
|
path: Optional[pulumi.Input[str]] = None,
|
107
102
|
path_fq: Optional[pulumi.Input[str]] = None):
|
108
103
|
"""
|
109
104
|
Input properties used for looking up and filtering Namespace resources.
|
110
|
-
:param pulumi.Input[Mapping[str,
|
105
|
+
:param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
|
111
106
|
is `map[string]string`. Requires Vault version 1.12+.
|
112
107
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
113
108
|
The value should not contain leading or trailing forward slashes.
|
@@ -131,7 +126,7 @@ class _NamespaceState:
|
|
131
126
|
|
132
127
|
@property
|
133
128
|
@pulumi.getter(name="customMetadata")
|
134
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
129
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
135
130
|
"""
|
136
131
|
Custom metadata describing this namespace. Value type
|
137
132
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -139,7 +134,7 @@ class _NamespaceState:
|
|
139
134
|
return pulumi.get(self, "custom_metadata")
|
140
135
|
|
141
136
|
@custom_metadata.setter
|
142
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
137
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
143
138
|
pulumi.set(self, "custom_metadata", value)
|
144
139
|
|
145
140
|
@property
|
@@ -200,7 +195,7 @@ class Namespace(pulumi.CustomResource):
|
|
200
195
|
def __init__(__self__,
|
201
196
|
resource_name: str,
|
202
197
|
opts: Optional[pulumi.ResourceOptions] = None,
|
203
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
198
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
204
199
|
namespace: Optional[pulumi.Input[str]] = None,
|
205
200
|
path: Optional[pulumi.Input[str]] = None,
|
206
201
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -258,7 +253,7 @@ class Namespace(pulumi.CustomResource):
|
|
258
253
|
|
259
254
|
:param str resource_name: The name of the resource.
|
260
255
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
261
|
-
:param pulumi.Input[Mapping[str,
|
256
|
+
:param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
|
262
257
|
is `map[string]string`. Requires Vault version 1.12+.
|
263
258
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
264
259
|
The value should not contain leading or trailing forward slashes.
|
@@ -340,7 +335,7 @@ class Namespace(pulumi.CustomResource):
|
|
340
335
|
def _internal_init(__self__,
|
341
336
|
resource_name: str,
|
342
337
|
opts: Optional[pulumi.ResourceOptions] = None,
|
343
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
338
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
344
339
|
namespace: Optional[pulumi.Input[str]] = None,
|
345
340
|
path: Optional[pulumi.Input[str]] = None,
|
346
341
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -370,7 +365,7 @@ class Namespace(pulumi.CustomResource):
|
|
370
365
|
def get(resource_name: str,
|
371
366
|
id: pulumi.Input[str],
|
372
367
|
opts: Optional[pulumi.ResourceOptions] = None,
|
373
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
368
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
374
369
|
namespace: Optional[pulumi.Input[str]] = None,
|
375
370
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
376
371
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -382,7 +377,7 @@ class Namespace(pulumi.CustomResource):
|
|
382
377
|
:param str resource_name: The unique name of the resulting resource.
|
383
378
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
384
379
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
385
|
-
:param pulumi.Input[Mapping[str,
|
380
|
+
:param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
|
386
381
|
is `map[string]string`. Requires Vault version 1.12+.
|
387
382
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
388
383
|
The value should not contain leading or trailing forward slashes.
|
@@ -406,7 +401,7 @@ class Namespace(pulumi.CustomResource):
|
|
406
401
|
|
407
402
|
@property
|
408
403
|
@pulumi.getter(name="customMetadata")
|
409
|
-
def custom_metadata(self) -> pulumi.Output[Mapping[str,
|
404
|
+
def custom_metadata(self) -> pulumi.Output[Mapping[str, Any]]:
|
410
405
|
"""
|
411
406
|
Custom metadata describing this namespace. Value type
|
412
407
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|