pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -26,7 +21,6 @@ class AuthBackendArgs:
|
|
26
21
|
certificate: Optional[pulumi.Input[str]] = None,
|
27
22
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
28
23
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
29
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
30
24
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
31
25
|
description: Optional[pulumi.Input[str]] = None,
|
32
26
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -64,7 +58,6 @@ class AuthBackendArgs:
|
|
64
58
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
65
59
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
66
60
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
67
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
68
61
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
69
62
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
70
63
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -114,8 +107,6 @@ class AuthBackendArgs:
|
|
114
107
|
pulumi.set(__self__, "client_tls_cert", client_tls_cert)
|
115
108
|
if client_tls_key is not None:
|
116
109
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
117
|
-
if connection_timeout is not None:
|
118
|
-
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
119
110
|
if deny_null_bind is not None:
|
120
111
|
pulumi.set(__self__, "deny_null_bind", deny_null_bind)
|
121
112
|
if description is not None:
|
@@ -255,18 +246,6 @@ class AuthBackendArgs:
|
|
255
246
|
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
256
247
|
pulumi.set(self, "client_tls_key", value)
|
257
248
|
|
258
|
-
@property
|
259
|
-
@pulumi.getter(name="connectionTimeout")
|
260
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
261
|
-
"""
|
262
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
263
|
-
"""
|
264
|
-
return pulumi.get(self, "connection_timeout")
|
265
|
-
|
266
|
-
@connection_timeout.setter
|
267
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
268
|
-
pulumi.set(self, "connection_timeout", value)
|
269
|
-
|
270
249
|
@property
|
271
250
|
@pulumi.getter(name="denyNullBind")
|
272
251
|
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
@@ -643,7 +622,6 @@ class _AuthBackendState:
|
|
643
622
|
certificate: Optional[pulumi.Input[str]] = None,
|
644
623
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
645
624
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
646
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
647
625
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
648
626
|
description: Optional[pulumi.Input[str]] = None,
|
649
627
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -682,7 +660,6 @@ class _AuthBackendState:
|
|
682
660
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
683
661
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
684
662
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
685
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
686
663
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
687
664
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
688
665
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -734,8 +711,6 @@ class _AuthBackendState:
|
|
734
711
|
pulumi.set(__self__, "client_tls_cert", client_tls_cert)
|
735
712
|
if client_tls_key is not None:
|
736
713
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
737
|
-
if connection_timeout is not None:
|
738
|
-
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
739
714
|
if deny_null_bind is not None:
|
740
715
|
pulumi.set(__self__, "deny_null_bind", deny_null_bind)
|
741
716
|
if description is not None:
|
@@ -877,18 +852,6 @@ class _AuthBackendState:
|
|
877
852
|
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
878
853
|
pulumi.set(self, "client_tls_key", value)
|
879
854
|
|
880
|
-
@property
|
881
|
-
@pulumi.getter(name="connectionTimeout")
|
882
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
883
|
-
"""
|
884
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
885
|
-
"""
|
886
|
-
return pulumi.get(self, "connection_timeout")
|
887
|
-
|
888
|
-
@connection_timeout.setter
|
889
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
890
|
-
pulumi.set(self, "connection_timeout", value)
|
891
|
-
|
892
855
|
@property
|
893
856
|
@pulumi.getter(name="denyNullBind")
|
894
857
|
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1278,7 +1241,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1278
1241
|
certificate: Optional[pulumi.Input[str]] = None,
|
1279
1242
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1280
1243
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1281
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1282
1244
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1283
1245
|
description: Optional[pulumi.Input[str]] = None,
|
1284
1246
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1345,7 +1307,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1345
1307
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1346
1308
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1347
1309
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1348
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1349
1310
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1350
1311
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1351
1312
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -1438,7 +1399,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1438
1399
|
certificate: Optional[pulumi.Input[str]] = None,
|
1439
1400
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1440
1401
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1441
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1442
1402
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1443
1403
|
description: Optional[pulumi.Input[str]] = None,
|
1444
1404
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1485,7 +1445,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1485
1445
|
__props__.__dict__["certificate"] = certificate
|
1486
1446
|
__props__.__dict__["client_tls_cert"] = client_tls_cert
|
1487
1447
|
__props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
|
1488
|
-
__props__.__dict__["connection_timeout"] = connection_timeout
|
1489
1448
|
__props__.__dict__["deny_null_bind"] = deny_null_bind
|
1490
1449
|
__props__.__dict__["description"] = description
|
1491
1450
|
__props__.__dict__["disable_remount"] = disable_remount
|
@@ -1539,7 +1498,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1539
1498
|
certificate: Optional[pulumi.Input[str]] = None,
|
1540
1499
|
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1541
1500
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1542
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1543
1501
|
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1544
1502
|
description: Optional[pulumi.Input[str]] = None,
|
1545
1503
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
@@ -1583,7 +1541,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1583
1541
|
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1584
1542
|
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1585
1543
|
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1586
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1587
1544
|
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1588
1545
|
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1589
1546
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -1632,7 +1589,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1632
1589
|
__props__.__dict__["certificate"] = certificate
|
1633
1590
|
__props__.__dict__["client_tls_cert"] = client_tls_cert
|
1634
1591
|
__props__.__dict__["client_tls_key"] = client_tls_key
|
1635
|
-
__props__.__dict__["connection_timeout"] = connection_timeout
|
1636
1592
|
__props__.__dict__["deny_null_bind"] = deny_null_bind
|
1637
1593
|
__props__.__dict__["description"] = description
|
1638
1594
|
__props__.__dict__["disable_remount"] = disable_remount
|
@@ -1716,14 +1672,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1716
1672
|
def client_tls_key(self) -> pulumi.Output[str]:
|
1717
1673
|
return pulumi.get(self, "client_tls_key")
|
1718
1674
|
|
1719
|
-
@property
|
1720
|
-
@pulumi.getter(name="connectionTimeout")
|
1721
|
-
def connection_timeout(self) -> pulumi.Output[int]:
|
1722
|
-
"""
|
1723
|
-
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1724
|
-
"""
|
1725
|
-
return pulumi.get(self, "connection_timeout")
|
1726
|
-
|
1727
1675
|
@property
|
1728
1676
|
@pulumi.getter(name="denyNullBind")
|
1729
1677
|
def deny_null_bind(self) -> pulumi.Output[bool]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -155,6 +150,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
155
150
|
password=pulumi.get(__ret__, 'password'),
|
156
151
|
role_name=pulumi.get(__ret__, 'role_name'),
|
157
152
|
username=pulumi.get(__ret__, 'username'))
|
153
|
+
|
154
|
+
|
155
|
+
@_utilities.lift_output_func(get_dynamic_credentials)
|
158
156
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
159
157
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
160
158
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -162,20 +160,4 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
162
160
|
"""
|
163
161
|
Use this data source to access information about an existing resource.
|
164
162
|
"""
|
165
|
-
|
166
|
-
__args__['mount'] = mount
|
167
|
-
__args__['namespace'] = namespace
|
168
|
-
__args__['roleName'] = role_name
|
169
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
-
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
-
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
-
id=pulumi.get(__response__, 'id'),
|
174
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
-
mount=pulumi.get(__response__, 'mount'),
|
178
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
-
password=pulumi.get(__response__, 'password'),
|
180
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
-
username=pulumi.get(__response__, 'username')))
|
163
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -165,6 +160,9 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
165
160
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
166
161
|
ttl=pulumi.get(__ret__, 'ttl'),
|
167
162
|
username=pulumi.get(__ret__, 'username'))
|
163
|
+
|
164
|
+
|
165
|
+
@_utilities.lift_output_func(get_static_credentials)
|
168
166
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
169
167
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
170
168
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -172,21 +170,4 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
172
170
|
"""
|
173
171
|
Use this data source to access information about an existing resource.
|
174
172
|
"""
|
175
|
-
|
176
|
-
__args__['mount'] = mount
|
177
|
-
__args__['namespace'] = namespace
|
178
|
-
__args__['roleName'] = role_name
|
179
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
-
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
-
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
-
dn=pulumi.get(__response__, 'dn'),
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
-
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
-
mount=pulumi.get(__response__, 'mount'),
|
187
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
-
password=pulumi.get(__response__, 'password'),
|
189
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
-
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
-
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
-
username=pulumi.get(__response__, 'username')))
|
173
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
pulumi_vault/managed/_inputs.py
CHANGED
@@ -4,88 +4,17 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'KeysAwArgs',
|
19
|
-
'KeysAwArgsDict',
|
20
14
|
'KeysAzureArgs',
|
21
|
-
'KeysAzureArgsDict',
|
22
15
|
'KeysPkcArgs',
|
23
|
-
'KeysPkcArgsDict',
|
24
16
|
]
|
25
17
|
|
26
|
-
MYPY = False
|
27
|
-
|
28
|
-
if not MYPY:
|
29
|
-
class KeysAwArgsDict(TypedDict):
|
30
|
-
access_key: pulumi.Input[str]
|
31
|
-
"""
|
32
|
-
The AWS access key to use
|
33
|
-
"""
|
34
|
-
key_bits: pulumi.Input[str]
|
35
|
-
"""
|
36
|
-
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
37
|
-
"""
|
38
|
-
key_type: pulumi.Input[str]
|
39
|
-
"""
|
40
|
-
The type of key to use
|
41
|
-
"""
|
42
|
-
kms_key: pulumi.Input[str]
|
43
|
-
"""
|
44
|
-
An identifier for the key
|
45
|
-
"""
|
46
|
-
name: pulumi.Input[str]
|
47
|
-
"""
|
48
|
-
A unique lowercase name that serves as identifying the key
|
49
|
-
"""
|
50
|
-
secret_key: pulumi.Input[str]
|
51
|
-
"""
|
52
|
-
The AWS secret key to use
|
53
|
-
"""
|
54
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
55
|
-
"""
|
56
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
57
|
-
"""
|
58
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
59
|
-
"""
|
60
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
61
|
-
"""
|
62
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
63
|
-
"""
|
64
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
65
|
-
"""
|
66
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
67
|
-
"""
|
68
|
-
Allow usage from any mount point within the namespace if 'true'
|
69
|
-
"""
|
70
|
-
curve: NotRequired[pulumi.Input[str]]
|
71
|
-
"""
|
72
|
-
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
73
|
-
"""
|
74
|
-
endpoint: NotRequired[pulumi.Input[str]]
|
75
|
-
"""
|
76
|
-
Used to specify a custom AWS endpoint
|
77
|
-
"""
|
78
|
-
region: NotRequired[pulumi.Input[str]]
|
79
|
-
"""
|
80
|
-
The AWS region where the keys are stored (or will be stored)
|
81
|
-
"""
|
82
|
-
uuid: NotRequired[pulumi.Input[str]]
|
83
|
-
"""
|
84
|
-
ID of the managed key read from Vault
|
85
|
-
"""
|
86
|
-
elif False:
|
87
|
-
KeysAwArgsDict: TypeAlias = Mapping[str, Any]
|
88
|
-
|
89
18
|
@pulumi.input_type
|
90
19
|
class KeysAwArgs:
|
91
20
|
def __init__(__self__, *,
|
@@ -311,71 +240,6 @@ class KeysAwArgs:
|
|
311
240
|
pulumi.set(self, "uuid", value)
|
312
241
|
|
313
242
|
|
314
|
-
if not MYPY:
|
315
|
-
class KeysAzureArgsDict(TypedDict):
|
316
|
-
client_id: pulumi.Input[str]
|
317
|
-
"""
|
318
|
-
The client id for credentials to query the Azure APIs
|
319
|
-
"""
|
320
|
-
client_secret: pulumi.Input[str]
|
321
|
-
"""
|
322
|
-
The client secret for credentials to query the Azure APIs
|
323
|
-
"""
|
324
|
-
key_name: pulumi.Input[str]
|
325
|
-
"""
|
326
|
-
The Key Vault key to use for encryption and decryption
|
327
|
-
"""
|
328
|
-
key_type: pulumi.Input[str]
|
329
|
-
"""
|
330
|
-
The type of key to use
|
331
|
-
"""
|
332
|
-
name: pulumi.Input[str]
|
333
|
-
"""
|
334
|
-
A unique lowercase name that serves as identifying the key
|
335
|
-
"""
|
336
|
-
tenant_id: pulumi.Input[str]
|
337
|
-
"""
|
338
|
-
The tenant id for the Azure Active Directory organization
|
339
|
-
"""
|
340
|
-
vault_name: pulumi.Input[str]
|
341
|
-
"""
|
342
|
-
The Key Vault vault to use the encryption keys for encryption and decryption
|
343
|
-
"""
|
344
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
345
|
-
"""
|
346
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
347
|
-
"""
|
348
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
349
|
-
"""
|
350
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
351
|
-
"""
|
352
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
353
|
-
"""
|
354
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
355
|
-
"""
|
356
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
357
|
-
"""
|
358
|
-
Allow usage from any mount point within the namespace if 'true'
|
359
|
-
"""
|
360
|
-
environment: NotRequired[pulumi.Input[str]]
|
361
|
-
"""
|
362
|
-
The Azure Cloud environment API endpoints to use
|
363
|
-
"""
|
364
|
-
key_bits: NotRequired[pulumi.Input[str]]
|
365
|
-
"""
|
366
|
-
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
367
|
-
"""
|
368
|
-
resource: NotRequired[pulumi.Input[str]]
|
369
|
-
"""
|
370
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
371
|
-
"""
|
372
|
-
uuid: NotRequired[pulumi.Input[str]]
|
373
|
-
"""
|
374
|
-
ID of the managed key read from Vault
|
375
|
-
"""
|
376
|
-
elif False:
|
377
|
-
KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
|
378
|
-
|
379
243
|
@pulumi.input_type
|
380
244
|
class KeysAzureArgs:
|
381
245
|
def __init__(__self__, *,
|
@@ -616,75 +480,6 @@ class KeysAzureArgs:
|
|
616
480
|
pulumi.set(self, "uuid", value)
|
617
481
|
|
618
482
|
|
619
|
-
if not MYPY:
|
620
|
-
class KeysPkcArgsDict(TypedDict):
|
621
|
-
key_id: pulumi.Input[str]
|
622
|
-
"""
|
623
|
-
The id of a PKCS#11 key to use
|
624
|
-
"""
|
625
|
-
key_label: pulumi.Input[str]
|
626
|
-
"""
|
627
|
-
The label of the key to use
|
628
|
-
"""
|
629
|
-
library: pulumi.Input[str]
|
630
|
-
"""
|
631
|
-
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
632
|
-
"""
|
633
|
-
mechanism: pulumi.Input[str]
|
634
|
-
"""
|
635
|
-
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
636
|
-
"""
|
637
|
-
name: pulumi.Input[str]
|
638
|
-
"""
|
639
|
-
A unique lowercase name that serves as identifying the key
|
640
|
-
"""
|
641
|
-
pin: pulumi.Input[str]
|
642
|
-
"""
|
643
|
-
The PIN for login
|
644
|
-
"""
|
645
|
-
allow_generate_key: NotRequired[pulumi.Input[bool]]
|
646
|
-
"""
|
647
|
-
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
648
|
-
"""
|
649
|
-
allow_replace_key: NotRequired[pulumi.Input[bool]]
|
650
|
-
"""
|
651
|
-
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
652
|
-
"""
|
653
|
-
allow_store_key: NotRequired[pulumi.Input[bool]]
|
654
|
-
"""
|
655
|
-
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
656
|
-
"""
|
657
|
-
any_mount: NotRequired[pulumi.Input[bool]]
|
658
|
-
"""
|
659
|
-
Allow usage from any mount point within the namespace if 'true'
|
660
|
-
"""
|
661
|
-
curve: NotRequired[pulumi.Input[str]]
|
662
|
-
"""
|
663
|
-
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
664
|
-
"""
|
665
|
-
force_rw_session: NotRequired[pulumi.Input[str]]
|
666
|
-
"""
|
667
|
-
Force all operations to open up a read-write session to the HSM
|
668
|
-
"""
|
669
|
-
key_bits: NotRequired[pulumi.Input[str]]
|
670
|
-
"""
|
671
|
-
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
672
|
-
"""
|
673
|
-
slot: NotRequired[pulumi.Input[str]]
|
674
|
-
"""
|
675
|
-
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
676
|
-
"""
|
677
|
-
token_label: NotRequired[pulumi.Input[str]]
|
678
|
-
"""
|
679
|
-
The slot token label to use
|
680
|
-
"""
|
681
|
-
uuid: NotRequired[pulumi.Input[str]]
|
682
|
-
"""
|
683
|
-
ID of the managed key read from Vault
|
684
|
-
"""
|
685
|
-
elif False:
|
686
|
-
KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
|
687
|
-
|
688
483
|
@pulumi.input_type
|
689
484
|
class KeysPkcArgs:
|
690
485
|
def __init__(__self__, *,
|
pulumi_vault/managed/keys.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|