pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -20,7 +15,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
20
15
|
class AuthBackendRoleArgs:
|
21
16
|
def __init__(__self__, *,
|
22
17
|
path: pulumi.Input[str],
|
23
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
18
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
24
19
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
25
20
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
21
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -39,7 +34,7 @@ class AuthBackendRoleArgs:
|
|
39
34
|
"""
|
40
35
|
The set of arguments for constructing a AuthBackendRole resource.
|
41
36
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
42
|
-
:param pulumi.Input[Mapping[str,
|
37
|
+
:param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
|
43
38
|
exist in the SAML assertion.
|
44
39
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
45
40
|
`bound_attributes_type`.
|
@@ -110,7 +105,7 @@ class AuthBackendRoleArgs:
|
|
110
105
|
|
111
106
|
@property
|
112
107
|
@pulumi.getter(name="boundAttributes")
|
113
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
108
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
114
109
|
"""
|
115
110
|
Mapping of attribute names to values that are expected to
|
116
111
|
exist in the SAML assertion.
|
@@ -118,7 +113,7 @@ class AuthBackendRoleArgs:
|
|
118
113
|
return pulumi.get(self, "bound_attributes")
|
119
114
|
|
120
115
|
@bound_attributes.setter
|
121
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
116
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
122
117
|
pulumi.set(self, "bound_attributes", value)
|
123
118
|
|
124
119
|
@property
|
@@ -310,7 +305,7 @@ class AuthBackendRoleArgs:
|
|
310
305
|
@pulumi.input_type
|
311
306
|
class _AuthBackendRoleState:
|
312
307
|
def __init__(__self__, *,
|
313
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
308
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
314
309
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
315
310
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
316
311
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -329,7 +324,7 @@ class _AuthBackendRoleState:
|
|
329
324
|
token_type: Optional[pulumi.Input[str]] = None):
|
330
325
|
"""
|
331
326
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
332
|
-
:param pulumi.Input[Mapping[str,
|
327
|
+
:param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
|
333
328
|
exist in the SAML assertion.
|
334
329
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
335
330
|
`bound_attributes_type`.
|
@@ -390,7 +385,7 @@ class _AuthBackendRoleState:
|
|
390
385
|
|
391
386
|
@property
|
392
387
|
@pulumi.getter(name="boundAttributes")
|
393
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
388
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
394
389
|
"""
|
395
390
|
Mapping of attribute names to values that are expected to
|
396
391
|
exist in the SAML assertion.
|
@@ -398,7 +393,7 @@ class _AuthBackendRoleState:
|
|
398
393
|
return pulumi.get(self, "bound_attributes")
|
399
394
|
|
400
395
|
@bound_attributes.setter
|
401
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
396
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
402
397
|
pulumi.set(self, "bound_attributes", value)
|
403
398
|
|
404
399
|
@property
|
@@ -604,7 +599,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
604
599
|
def __init__(__self__,
|
605
600
|
resource_name: str,
|
606
601
|
opts: Optional[pulumi.ResourceOptions] = None,
|
607
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
602
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
608
603
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
609
604
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
610
605
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -661,7 +656,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
661
656
|
|
662
657
|
:param str resource_name: The name of the resource.
|
663
658
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
664
|
-
:param pulumi.Input[Mapping[str,
|
659
|
+
:param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
|
665
660
|
exist in the SAML assertion.
|
666
661
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
667
662
|
`bound_attributes_type`.
|
@@ -743,7 +738,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
743
738
|
def _internal_init(__self__,
|
744
739
|
resource_name: str,
|
745
740
|
opts: Optional[pulumi.ResourceOptions] = None,
|
746
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
741
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
747
742
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
748
743
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
744
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -798,7 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
798
793
|
def get(resource_name: str,
|
799
794
|
id: pulumi.Input[str],
|
800
795
|
opts: Optional[pulumi.ResourceOptions] = None,
|
801
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
796
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
802
797
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
803
798
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
799
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -822,7 +817,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
822
817
|
:param str resource_name: The unique name of the resulting resource.
|
823
818
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
824
819
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
825
|
-
:param pulumi.Input[Mapping[str,
|
820
|
+
:param pulumi.Input[Mapping[str, Any]] bound_attributes: Mapping of attribute names to values that are expected to
|
826
821
|
exist in the SAML assertion.
|
827
822
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
828
823
|
`bound_attributes_type`.
|
@@ -871,7 +866,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
871
866
|
|
872
867
|
@property
|
873
868
|
@pulumi.getter(name="boundAttributes")
|
874
|
-
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str,
|
869
|
+
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
875
870
|
"""
|
876
871
|
Mapping of attribute names to values that are expected to
|
877
872
|
exist in the SAML assertion.
|
pulumi_vault/secrets/_inputs.py
CHANGED
@@ -4,45 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SyncAssociationMetadataArgs',
|
19
|
-
'SyncAssociationMetadataArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SyncAssociationMetadataArgsDict(TypedDict):
|
26
|
-
sub_key: NotRequired[pulumi.Input[str]]
|
27
|
-
"""
|
28
|
-
Subkey of the associated secret.
|
29
|
-
"""
|
30
|
-
sync_status: NotRequired[pulumi.Input[str]]
|
31
|
-
"""
|
32
|
-
A map of sync statuses for each subkey of the associated secret
|
33
|
-
(for ex. `{kv_624bea/aws-token/dev: "SYNCED", kv_624bea/aws-token/prod: "SYNCED"}`).
|
34
|
-
"""
|
35
|
-
updated_at: NotRequired[pulumi.Input[str]]
|
36
|
-
"""
|
37
|
-
A map of duration strings specifying when each subkey of the associated
|
38
|
-
secret was last updated.
|
39
|
-
(for ex.
|
40
|
-
`{kv_624bea/aws-token/dev: "2024-03-21T12:42:02.558533-07:00",
|
41
|
-
kv_624bea/aws-token/prod: "2024-03-21T12:42:02.558533-07:00"}`).
|
42
|
-
"""
|
43
|
-
elif False:
|
44
|
-
SyncAssociationMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
45
|
-
|
46
16
|
@pulumi.input_type
|
47
17
|
class SyncAssociationMetadataArgs:
|
48
18
|
def __init__(__self__, *,
|
pulumi_vault/secrets/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
@@ -20,7 +15,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
|
20
15
|
class SyncAwsDestinationArgs:
|
21
16
|
def __init__(__self__, *,
|
22
17
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
23
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
18
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
24
19
|
external_id: Optional[pulumi.Input[str]] = None,
|
25
20
|
granularity: Optional[pulumi.Input[str]] = None,
|
26
21
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -34,7 +29,7 @@ class SyncAwsDestinationArgs:
|
|
34
29
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
35
30
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
36
31
|
variable.
|
37
|
-
:param pulumi.Input[Mapping[str,
|
32
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
38
33
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
39
34
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
40
35
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -97,14 +92,14 @@ class SyncAwsDestinationArgs:
|
|
97
92
|
|
98
93
|
@property
|
99
94
|
@pulumi.getter(name="customTags")
|
100
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
95
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
101
96
|
"""
|
102
97
|
Custom tags to set on the secret managed at the destination.
|
103
98
|
"""
|
104
99
|
return pulumi.get(self, "custom_tags")
|
105
100
|
|
106
101
|
@custom_tags.setter
|
107
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
102
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
108
103
|
pulumi.set(self, "custom_tags", value)
|
109
104
|
|
110
105
|
@property
|
@@ -224,7 +219,7 @@ class SyncAwsDestinationArgs:
|
|
224
219
|
class _SyncAwsDestinationState:
|
225
220
|
def __init__(__self__, *,
|
226
221
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
227
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
222
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
228
223
|
external_id: Optional[pulumi.Input[str]] = None,
|
229
224
|
granularity: Optional[pulumi.Input[str]] = None,
|
230
225
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -239,7 +234,7 @@ class _SyncAwsDestinationState:
|
|
239
234
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
240
235
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
241
236
|
variable.
|
242
|
-
:param pulumi.Input[Mapping[str,
|
237
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
243
238
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
244
239
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
245
240
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -305,14 +300,14 @@ class _SyncAwsDestinationState:
|
|
305
300
|
|
306
301
|
@property
|
307
302
|
@pulumi.getter(name="customTags")
|
308
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
303
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
309
304
|
"""
|
310
305
|
Custom tags to set on the secret managed at the destination.
|
311
306
|
"""
|
312
307
|
return pulumi.get(self, "custom_tags")
|
313
308
|
|
314
309
|
@custom_tags.setter
|
315
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
310
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
316
311
|
pulumi.set(self, "custom_tags", value)
|
317
312
|
|
318
313
|
@property
|
@@ -446,7 +441,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
446
441
|
resource_name: str,
|
447
442
|
opts: Optional[pulumi.ResourceOptions] = None,
|
448
443
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
449
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
444
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
450
445
|
external_id: Optional[pulumi.Input[str]] = None,
|
451
446
|
granularity: Optional[pulumi.Input[str]] = None,
|
452
447
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -489,7 +484,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
489
484
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
490
485
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
491
486
|
variable.
|
492
|
-
:param pulumi.Input[Mapping[str,
|
487
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
493
488
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
494
489
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
495
490
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -565,7 +560,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
565
560
|
resource_name: str,
|
566
561
|
opts: Optional[pulumi.ResourceOptions] = None,
|
567
562
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
568
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
563
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
569
564
|
external_id: Optional[pulumi.Input[str]] = None,
|
570
565
|
granularity: Optional[pulumi.Input[str]] = None,
|
571
566
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -607,7 +602,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
607
602
|
id: pulumi.Input[str],
|
608
603
|
opts: Optional[pulumi.ResourceOptions] = None,
|
609
604
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
610
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
605
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
611
606
|
external_id: Optional[pulumi.Input[str]] = None,
|
612
607
|
granularity: Optional[pulumi.Input[str]] = None,
|
613
608
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -627,7 +622,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
627
622
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
628
623
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
629
624
|
variable.
|
630
|
-
:param pulumi.Input[Mapping[str,
|
625
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
631
626
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
632
627
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
633
628
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -683,7 +678,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
683
678
|
|
684
679
|
@property
|
685
680
|
@pulumi.getter(name="customTags")
|
686
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
681
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
687
682
|
"""
|
688
683
|
Custom tags to set on the secret managed at the destination.
|
689
684
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncAzureDestinationArgs', 'SyncAzureDestination']
|
@@ -22,7 +17,7 @@ class SyncAzureDestinationArgs:
|
|
22
17
|
client_id: Optional[pulumi.Input[str]] = None,
|
23
18
|
client_secret: Optional[pulumi.Input[str]] = None,
|
24
19
|
cloud: Optional[pulumi.Input[str]] = None,
|
25
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
20
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
26
21
|
granularity: Optional[pulumi.Input[str]] = None,
|
27
22
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
28
23
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -38,7 +33,7 @@ class SyncAzureDestinationArgs:
|
|
38
33
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
39
34
|
variable.
|
40
35
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
41
|
-
:param pulumi.Input[Mapping[str,
|
36
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
42
37
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
43
38
|
at the destination. Supports `secret-path` and `secret-key`.
|
44
39
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -117,14 +112,14 @@ class SyncAzureDestinationArgs:
|
|
117
112
|
|
118
113
|
@property
|
119
114
|
@pulumi.getter(name="customTags")
|
120
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
115
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
121
116
|
"""
|
122
117
|
Custom tags to set on the secret managed at the destination.
|
123
118
|
"""
|
124
119
|
return pulumi.get(self, "custom_tags")
|
125
120
|
|
126
121
|
@custom_tags.setter
|
127
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
122
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
128
123
|
pulumi.set(self, "custom_tags", value)
|
129
124
|
|
130
125
|
@property
|
@@ -214,7 +209,7 @@ class _SyncAzureDestinationState:
|
|
214
209
|
client_id: Optional[pulumi.Input[str]] = None,
|
215
210
|
client_secret: Optional[pulumi.Input[str]] = None,
|
216
211
|
cloud: Optional[pulumi.Input[str]] = None,
|
217
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
212
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
218
213
|
granularity: Optional[pulumi.Input[str]] = None,
|
219
214
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
220
215
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -231,7 +226,7 @@ class _SyncAzureDestinationState:
|
|
231
226
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
232
227
|
variable.
|
233
228
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
234
|
-
:param pulumi.Input[Mapping[str,
|
229
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
235
230
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
236
231
|
at the destination. Supports `secret-path` and `secret-key`.
|
237
232
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -313,14 +308,14 @@ class _SyncAzureDestinationState:
|
|
313
308
|
|
314
309
|
@property
|
315
310
|
@pulumi.getter(name="customTags")
|
316
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
311
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
317
312
|
"""
|
318
313
|
Custom tags to set on the secret managed at the destination.
|
319
314
|
"""
|
320
315
|
return pulumi.get(self, "custom_tags")
|
321
316
|
|
322
317
|
@custom_tags.setter
|
323
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
318
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
324
319
|
pulumi.set(self, "custom_tags", value)
|
325
320
|
|
326
321
|
@property
|
@@ -424,7 +419,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
424
419
|
client_id: Optional[pulumi.Input[str]] = None,
|
425
420
|
client_secret: Optional[pulumi.Input[str]] = None,
|
426
421
|
cloud: Optional[pulumi.Input[str]] = None,
|
427
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
422
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
428
423
|
granularity: Optional[pulumi.Input[str]] = None,
|
429
424
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
430
425
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -468,7 +463,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
468
463
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
469
464
|
variable.
|
470
465
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
471
|
-
:param pulumi.Input[Mapping[str,
|
466
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
472
467
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
473
468
|
at the destination. Supports `secret-path` and `secret-key`.
|
474
469
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -535,7 +530,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
535
530
|
client_id: Optional[pulumi.Input[str]] = None,
|
536
531
|
client_secret: Optional[pulumi.Input[str]] = None,
|
537
532
|
cloud: Optional[pulumi.Input[str]] = None,
|
538
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
533
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
539
534
|
granularity: Optional[pulumi.Input[str]] = None,
|
540
535
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
541
536
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -577,7 +572,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
577
572
|
client_id: Optional[pulumi.Input[str]] = None,
|
578
573
|
client_secret: Optional[pulumi.Input[str]] = None,
|
579
574
|
cloud: Optional[pulumi.Input[str]] = None,
|
580
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
575
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
581
576
|
granularity: Optional[pulumi.Input[str]] = None,
|
582
577
|
key_vault_uri: Optional[pulumi.Input[str]] = None,
|
583
578
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -599,7 +594,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
599
594
|
Can be omitted and directly provided to Vault using the `AZURE_CLIENT_SECRET` environment
|
600
595
|
variable.
|
601
596
|
:param pulumi.Input[str] cloud: Specifies a cloud for the client. The default is Azure Public Cloud.
|
602
|
-
:param pulumi.Input[Mapping[str,
|
597
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
603
598
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
604
599
|
at the destination. Supports `secret-path` and `secret-key`.
|
605
600
|
:param pulumi.Input[str] key_vault_uri: URI of an existing Azure Key Vault instance.
|
@@ -663,7 +658,7 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
663
658
|
|
664
659
|
@property
|
665
660
|
@pulumi.getter(name="customTags")
|
666
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
661
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
667
662
|
"""
|
668
663
|
Custom tags to set on the secret managed at the destination.
|
669
664
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncConfigArgs', 'SyncConfig']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
@@ -20,7 +15,7 @@ __all__ = ['SyncGcpDestinationArgs', 'SyncGcpDestination']
|
|
20
15
|
class SyncGcpDestinationArgs:
|
21
16
|
def __init__(__self__, *,
|
22
17
|
credentials: Optional[pulumi.Input[str]] = None,
|
23
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
18
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
24
19
|
granularity: Optional[pulumi.Input[str]] = None,
|
25
20
|
name: Optional[pulumi.Input[str]] = None,
|
26
21
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -31,7 +26,7 @@ class SyncGcpDestinationArgs:
|
|
31
26
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
32
27
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
33
28
|
variable.
|
34
|
-
:param pulumi.Input[Mapping[str,
|
29
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
35
30
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
36
31
|
at the destination. Supports `secret-path` and `secret-key`.
|
37
32
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -76,14 +71,14 @@ class SyncGcpDestinationArgs:
|
|
76
71
|
|
77
72
|
@property
|
78
73
|
@pulumi.getter(name="customTags")
|
79
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
74
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
80
75
|
"""
|
81
76
|
Custom tags to set on the secret managed at the destination.
|
82
77
|
"""
|
83
78
|
return pulumi.get(self, "custom_tags")
|
84
79
|
|
85
80
|
@custom_tags.setter
|
86
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
81
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
87
82
|
pulumi.set(self, "custom_tags", value)
|
88
83
|
|
89
84
|
@property
|
@@ -158,7 +153,7 @@ class SyncGcpDestinationArgs:
|
|
158
153
|
class _SyncGcpDestinationState:
|
159
154
|
def __init__(__self__, *,
|
160
155
|
credentials: Optional[pulumi.Input[str]] = None,
|
161
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
156
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
162
157
|
granularity: Optional[pulumi.Input[str]] = None,
|
163
158
|
name: Optional[pulumi.Input[str]] = None,
|
164
159
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -170,7 +165,7 @@ class _SyncGcpDestinationState:
|
|
170
165
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
171
166
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
172
167
|
variable.
|
173
|
-
:param pulumi.Input[Mapping[str,
|
168
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
174
169
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
175
170
|
at the destination. Supports `secret-path` and `secret-key`.
|
176
171
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -218,14 +213,14 @@ class _SyncGcpDestinationState:
|
|
218
213
|
|
219
214
|
@property
|
220
215
|
@pulumi.getter(name="customTags")
|
221
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
216
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
222
217
|
"""
|
223
218
|
Custom tags to set on the secret managed at the destination.
|
224
219
|
"""
|
225
220
|
return pulumi.get(self, "custom_tags")
|
226
221
|
|
227
222
|
@custom_tags.setter
|
228
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
223
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
229
224
|
pulumi.set(self, "custom_tags", value)
|
230
225
|
|
231
226
|
@property
|
@@ -314,7 +309,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
314
309
|
resource_name: str,
|
315
310
|
opts: Optional[pulumi.ResourceOptions] = None,
|
316
311
|
credentials: Optional[pulumi.Input[str]] = None,
|
317
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
312
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
318
313
|
granularity: Optional[pulumi.Input[str]] = None,
|
319
314
|
name: Optional[pulumi.Input[str]] = None,
|
320
315
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -352,7 +347,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
352
347
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
353
348
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
354
349
|
variable.
|
355
|
-
:param pulumi.Input[Mapping[str,
|
350
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
356
351
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
357
352
|
at the destination. Supports `secret-path` and `secret-key`.
|
358
353
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -414,7 +409,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
414
409
|
resource_name: str,
|
415
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
416
411
|
credentials: Optional[pulumi.Input[str]] = None,
|
417
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
412
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
418
413
|
granularity: Optional[pulumi.Input[str]] = None,
|
419
414
|
name: Optional[pulumi.Input[str]] = None,
|
420
415
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -450,7 +445,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
450
445
|
id: pulumi.Input[str],
|
451
446
|
opts: Optional[pulumi.ResourceOptions] = None,
|
452
447
|
credentials: Optional[pulumi.Input[str]] = None,
|
453
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
448
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
454
449
|
granularity: Optional[pulumi.Input[str]] = None,
|
455
450
|
name: Optional[pulumi.Input[str]] = None,
|
456
451
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -467,7 +462,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
467
462
|
:param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP.
|
468
463
|
Can be omitted and directly provided to Vault using the `GOOGLE_APPLICATION_CREDENTIALS` environment
|
469
464
|
variable.
|
470
|
-
:param pulumi.Input[Mapping[str,
|
465
|
+
:param pulumi.Input[Mapping[str, Any]] custom_tags: Custom tags to set on the secret managed at the destination.
|
471
466
|
:param pulumi.Input[str] granularity: Determines what level of information is synced as a distinct resource
|
472
467
|
at the destination. Supports `secret-path` and `secret-key`.
|
473
468
|
:param pulumi.Input[str] name: Unique name of the GCP destination.
|
@@ -508,7 +503,7 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
508
503
|
|
509
504
|
@property
|
510
505
|
@pulumi.getter(name="customTags")
|
511
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
506
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
512
507
|
"""
|
513
508
|
Custom tags to set on the secret managed at the destination.
|
514
509
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncGhDestinationArgs', 'SyncGhDestination']
|