pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncGithubAppsArgs', 'SyncGithubApps']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SyncVercelDestinationArgs', 'SyncVercelDestination']
|
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -4,37 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretBackendRoleAllowedUserKeyConfigArgs',
|
19
|
-
'SecretBackendRoleAllowedUserKeyConfigArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
26
|
-
lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
|
27
|
-
"""
|
28
|
-
List of allowed key lengths, vault-1.10 and above
|
29
|
-
"""
|
30
|
-
type: pulumi.Input[str]
|
31
|
-
"""
|
32
|
-
Key type, choices:
|
33
|
-
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
34
|
-
"""
|
35
|
-
elif False:
|
36
|
-
SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
|
37
|
-
|
38
16
|
@pulumi.input_type
|
39
17
|
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
40
18
|
def __init__(__self__, *,
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -25,7 +20,6 @@ class SecretBackendRoleArgs:
|
|
25
20
|
key_type: pulumi.Input[str],
|
26
21
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
27
22
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
28
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
29
23
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
30
24
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
31
25
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -38,8 +32,8 @@ class SecretBackendRoleArgs:
|
|
38
32
|
allowed_users: Optional[pulumi.Input[str]] = None,
|
39
33
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
40
34
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
41
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
42
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
35
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
36
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
43
37
|
default_user: Optional[pulumi.Input[str]] = None,
|
44
38
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
45
39
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -69,8 +63,8 @@ class SecretBackendRoleArgs:
|
|
69
63
|
:param pulumi.Input[str] allowed_users: Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
|
70
64
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
71
65
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
72
|
-
:param pulumi.Input[Mapping[str,
|
73
|
-
:param pulumi.Input[Mapping[str,
|
66
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
67
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
74
68
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
75
69
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
76
70
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -89,8 +83,6 @@ class SecretBackendRoleArgs:
|
|
89
83
|
pulumi.set(__self__, "algorithm_signer", algorithm_signer)
|
90
84
|
if allow_bare_domains is not None:
|
91
85
|
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
92
|
-
if allow_empty_principals is not None:
|
93
|
-
pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
|
94
86
|
if allow_host_certificates is not None:
|
95
87
|
pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
|
96
88
|
if allow_subdomains is not None:
|
@@ -184,15 +176,6 @@ class SecretBackendRoleArgs:
|
|
184
176
|
def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
|
185
177
|
pulumi.set(self, "allow_bare_domains", value)
|
186
178
|
|
187
|
-
@property
|
188
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
189
|
-
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
190
|
-
return pulumi.get(self, "allow_empty_principals")
|
191
|
-
|
192
|
-
@allow_empty_principals.setter
|
193
|
-
def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
|
194
|
-
pulumi.set(self, "allow_empty_principals", value)
|
195
|
-
|
196
179
|
@property
|
197
180
|
@pulumi.getter(name="allowHostCertificates")
|
198
181
|
def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
|
@@ -342,26 +325,26 @@ class SecretBackendRoleArgs:
|
|
342
325
|
|
343
326
|
@property
|
344
327
|
@pulumi.getter(name="defaultCriticalOptions")
|
345
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
328
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
346
329
|
"""
|
347
330
|
Specifies a map of critical options that certificates have when signed.
|
348
331
|
"""
|
349
332
|
return pulumi.get(self, "default_critical_options")
|
350
333
|
|
351
334
|
@default_critical_options.setter
|
352
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
335
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
353
336
|
pulumi.set(self, "default_critical_options", value)
|
354
337
|
|
355
338
|
@property
|
356
339
|
@pulumi.getter(name="defaultExtensions")
|
357
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
340
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
358
341
|
"""
|
359
342
|
Specifies a map of extensions that certificates have when signed.
|
360
343
|
"""
|
361
344
|
return pulumi.get(self, "default_extensions")
|
362
345
|
|
363
346
|
@default_extensions.setter
|
364
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
347
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
365
348
|
pulumi.set(self, "default_extensions", value)
|
366
349
|
|
367
350
|
@property
|
@@ -469,7 +452,6 @@ class _SecretBackendRoleState:
|
|
469
452
|
def __init__(__self__, *,
|
470
453
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
471
454
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
472
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
473
455
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
474
456
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
475
457
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -483,8 +465,8 @@ class _SecretBackendRoleState:
|
|
483
465
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
484
466
|
backend: Optional[pulumi.Input[str]] = None,
|
485
467
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
486
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
487
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
468
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
469
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
488
470
|
default_user: Optional[pulumi.Input[str]] = None,
|
489
471
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
490
472
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -514,8 +496,8 @@ class _SecretBackendRoleState:
|
|
514
496
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
515
497
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
516
498
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
517
|
-
:param pulumi.Input[Mapping[str,
|
518
|
-
:param pulumi.Input[Mapping[str,
|
499
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
500
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
519
501
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
520
502
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
521
503
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -533,8 +515,6 @@ class _SecretBackendRoleState:
|
|
533
515
|
pulumi.set(__self__, "algorithm_signer", algorithm_signer)
|
534
516
|
if allow_bare_domains is not None:
|
535
517
|
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
536
|
-
if allow_empty_principals is not None:
|
537
|
-
pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
|
538
518
|
if allow_host_certificates is not None:
|
539
519
|
pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
|
540
520
|
if allow_subdomains is not None:
|
@@ -608,15 +588,6 @@ class _SecretBackendRoleState:
|
|
608
588
|
def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
|
609
589
|
pulumi.set(self, "allow_bare_domains", value)
|
610
590
|
|
611
|
-
@property
|
612
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
613
|
-
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
614
|
-
return pulumi.get(self, "allow_empty_principals")
|
615
|
-
|
616
|
-
@allow_empty_principals.setter
|
617
|
-
def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
|
618
|
-
pulumi.set(self, "allow_empty_principals", value)
|
619
|
-
|
620
591
|
@property
|
621
592
|
@pulumi.getter(name="allowHostCertificates")
|
622
593
|
def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
|
@@ -778,26 +749,26 @@ class _SecretBackendRoleState:
|
|
778
749
|
|
779
750
|
@property
|
780
751
|
@pulumi.getter(name="defaultCriticalOptions")
|
781
|
-
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str,
|
752
|
+
def default_critical_options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
782
753
|
"""
|
783
754
|
Specifies a map of critical options that certificates have when signed.
|
784
755
|
"""
|
785
756
|
return pulumi.get(self, "default_critical_options")
|
786
757
|
|
787
758
|
@default_critical_options.setter
|
788
|
-
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str,
|
759
|
+
def default_critical_options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
789
760
|
pulumi.set(self, "default_critical_options", value)
|
790
761
|
|
791
762
|
@property
|
792
763
|
@pulumi.getter(name="defaultExtensions")
|
793
|
-
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str,
|
764
|
+
def default_extensions(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
794
765
|
"""
|
795
766
|
Specifies a map of extensions that certificates have when signed.
|
796
767
|
"""
|
797
768
|
return pulumi.get(self, "default_extensions")
|
798
769
|
|
799
770
|
@default_extensions.setter
|
800
|
-
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str,
|
771
|
+
def default_extensions(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
801
772
|
pulumi.set(self, "default_extensions", value)
|
802
773
|
|
803
774
|
@property
|
@@ -919,7 +890,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
919
890
|
opts: Optional[pulumi.ResourceOptions] = None,
|
920
891
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
921
892
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
922
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
923
893
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
924
894
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
925
895
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -933,8 +903,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
933
903
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
934
904
|
backend: Optional[pulumi.Input[str]] = None,
|
935
905
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
936
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
937
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
906
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
907
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
938
908
|
default_user: Optional[pulumi.Input[str]] = None,
|
939
909
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
940
910
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -998,8 +968,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
998
968
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
999
969
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
1000
970
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
1001
|
-
:param pulumi.Input[Mapping[str,
|
1002
|
-
:param pulumi.Input[Mapping[str,
|
971
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
972
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
1003
973
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
1004
974
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
1005
975
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1069,7 +1039,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1069
1039
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1070
1040
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
1071
1041
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
1072
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
1073
1042
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
1074
1043
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
1075
1044
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -1083,8 +1052,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1083
1052
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1084
1053
|
backend: Optional[pulumi.Input[str]] = None,
|
1085
1054
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1086
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1087
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1055
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1056
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1088
1057
|
default_user: Optional[pulumi.Input[str]] = None,
|
1089
1058
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1090
1059
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1105,7 +1074,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1105
1074
|
|
1106
1075
|
__props__.__dict__["algorithm_signer"] = algorithm_signer
|
1107
1076
|
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
1108
|
-
__props__.__dict__["allow_empty_principals"] = allow_empty_principals
|
1109
1077
|
__props__.__dict__["allow_host_certificates"] = allow_host_certificates
|
1110
1078
|
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
1111
1079
|
__props__.__dict__["allow_user_certificates"] = allow_user_certificates
|
@@ -1146,7 +1114,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1146
1114
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1147
1115
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
1148
1116
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
1149
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
1150
1117
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
1151
1118
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
1152
1119
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -1160,8 +1127,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1160
1127
|
allowed_users_template: Optional[pulumi.Input[bool]] = None,
|
1161
1128
|
backend: Optional[pulumi.Input[str]] = None,
|
1162
1129
|
cidr_list: Optional[pulumi.Input[str]] = None,
|
1163
|
-
default_critical_options: Optional[pulumi.Input[Mapping[str,
|
1164
|
-
default_extensions: Optional[pulumi.Input[Mapping[str,
|
1130
|
+
default_critical_options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1131
|
+
default_extensions: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1165
1132
|
default_user: Optional[pulumi.Input[str]] = None,
|
1166
1133
|
default_user_template: Optional[pulumi.Input[bool]] = None,
|
1167
1134
|
key_id_format: Optional[pulumi.Input[str]] = None,
|
@@ -1196,8 +1163,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1196
1163
|
:param pulumi.Input[bool] allowed_users_template: Specifies if `allowed_users` can be declared using identity template policies. Non-templated users are also permitted.
|
1197
1164
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted.
|
1198
1165
|
:param pulumi.Input[str] cidr_list: The comma-separated string of CIDR blocks for which this role is applicable.
|
1199
|
-
:param pulumi.Input[Mapping[str,
|
1200
|
-
:param pulumi.Input[Mapping[str,
|
1166
|
+
:param pulumi.Input[Mapping[str, Any]] default_critical_options: Specifies a map of critical options that certificates have when signed.
|
1167
|
+
:param pulumi.Input[Mapping[str, Any]] default_extensions: Specifies a map of extensions that certificates have when signed.
|
1201
1168
|
:param pulumi.Input[str] default_user: Specifies the default username for which a credential will be generated.
|
1202
1169
|
:param pulumi.Input[bool] default_user_template: If set, `default_users` can be specified using identity template values. A non-templated user is also permitted.
|
1203
1170
|
:param pulumi.Input[str] key_id_format: Specifies a custom format for the key id of a signed certificate.
|
@@ -1217,7 +1184,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1217
1184
|
|
1218
1185
|
__props__.__dict__["algorithm_signer"] = algorithm_signer
|
1219
1186
|
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
1220
|
-
__props__.__dict__["allow_empty_principals"] = allow_empty_principals
|
1221
1187
|
__props__.__dict__["allow_host_certificates"] = allow_host_certificates
|
1222
1188
|
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
1223
1189
|
__props__.__dict__["allow_user_certificates"] = allow_user_certificates
|
@@ -1260,11 +1226,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1260
1226
|
"""
|
1261
1227
|
return pulumi.get(self, "allow_bare_domains")
|
1262
1228
|
|
1263
|
-
@property
|
1264
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
1265
|
-
def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
|
1266
|
-
return pulumi.get(self, "allow_empty_principals")
|
1267
|
-
|
1268
1229
|
@property
|
1269
1230
|
@pulumi.getter(name="allowHostCertificates")
|
1270
1231
|
def allow_host_certificates(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1374,7 +1335,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1374
1335
|
|
1375
1336
|
@property
|
1376
1337
|
@pulumi.getter(name="defaultCriticalOptions")
|
1377
|
-
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str,
|
1338
|
+
def default_critical_options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1378
1339
|
"""
|
1379
1340
|
Specifies a map of critical options that certificates have when signed.
|
1380
1341
|
"""
|
@@ -1382,7 +1343,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1382
1343
|
|
1383
1344
|
@property
|
1384
1345
|
@pulumi.getter(name="defaultExtensions")
|
1385
|
-
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str,
|
1346
|
+
def default_extensions(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1386
1347
|
"""
|
1387
1348
|
Specifies a map of extensions that certificates have when signed.
|
1388
1349
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/token.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TokenArgs', 'Token']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
|
|
52
47
|
*Available only for Vault Enterprise*.
|
53
48
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
54
49
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
50
|
+
|
51
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
55
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
56
53
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
57
54
|
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
|
|
205
202
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
206
203
|
"""
|
207
204
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
205
|
+
|
206
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
208
207
|
"""
|
209
208
|
return pulumi.get(self, "path_suffix")
|
210
209
|
|
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
|
|
368
367
|
*Available only for Vault Enterprise*.
|
369
368
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
370
369
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
370
|
+
|
371
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
371
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
372
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
373
374
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
|
|
511
512
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
512
513
|
"""
|
513
514
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
515
|
+
|
516
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
514
517
|
"""
|
515
518
|
return pulumi.get(self, "path_suffix")
|
516
519
|
|
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
723
726
|
*Available only for Vault Enterprise*.
|
724
727
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
725
728
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
729
|
+
|
730
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
726
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
727
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
728
733
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
886
891
|
*Available only for Vault Enterprise*.
|
887
892
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
888
893
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
894
|
+
|
895
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
889
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
890
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
891
898
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
987
994
|
def path_suffix(self) -> pulumi.Output[Optional[str]]:
|
988
995
|
"""
|
989
996
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
997
|
+
|
998
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
990
999
|
"""
|
991
1000
|
return pulumi.get(self, "path_suffix")
|
992
1001
|
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AlphabetArgs', 'Alphabet']
|