pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -4,37 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretBackendRoleAllowedUserKeyConfigArgs',
|
19
|
-
'SecretBackendRoleAllowedUserKeyConfigArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
26
|
-
lengths: pulumi.Input[Sequence[pulumi.Input[int]]]
|
27
|
-
"""
|
28
|
-
List of allowed key lengths, vault-1.10 and above
|
29
|
-
"""
|
30
|
-
type: pulumi.Input[str]
|
31
|
-
"""
|
32
|
-
Key type, choices:
|
33
|
-
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
34
|
-
"""
|
35
|
-
elif False:
|
36
|
-
SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
|
37
|
-
|
38
16
|
@pulumi.input_type
|
39
17
|
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
40
18
|
def __init__(__self__, *,
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -25,7 +20,6 @@ class SecretBackendRoleArgs:
|
|
25
20
|
key_type: pulumi.Input[str],
|
26
21
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
27
22
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
28
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
29
23
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
30
24
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
31
25
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -89,8 +83,6 @@ class SecretBackendRoleArgs:
|
|
89
83
|
pulumi.set(__self__, "algorithm_signer", algorithm_signer)
|
90
84
|
if allow_bare_domains is not None:
|
91
85
|
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
92
|
-
if allow_empty_principals is not None:
|
93
|
-
pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
|
94
86
|
if allow_host_certificates is not None:
|
95
87
|
pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
|
96
88
|
if allow_subdomains is not None:
|
@@ -184,15 +176,6 @@ class SecretBackendRoleArgs:
|
|
184
176
|
def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
|
185
177
|
pulumi.set(self, "allow_bare_domains", value)
|
186
178
|
|
187
|
-
@property
|
188
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
189
|
-
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
190
|
-
return pulumi.get(self, "allow_empty_principals")
|
191
|
-
|
192
|
-
@allow_empty_principals.setter
|
193
|
-
def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
|
194
|
-
pulumi.set(self, "allow_empty_principals", value)
|
195
|
-
|
196
179
|
@property
|
197
180
|
@pulumi.getter(name="allowHostCertificates")
|
198
181
|
def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
|
@@ -469,7 +452,6 @@ class _SecretBackendRoleState:
|
|
469
452
|
def __init__(__self__, *,
|
470
453
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
471
454
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
472
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
473
455
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
474
456
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
475
457
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -533,8 +515,6 @@ class _SecretBackendRoleState:
|
|
533
515
|
pulumi.set(__self__, "algorithm_signer", algorithm_signer)
|
534
516
|
if allow_bare_domains is not None:
|
535
517
|
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
536
|
-
if allow_empty_principals is not None:
|
537
|
-
pulumi.set(__self__, "allow_empty_principals", allow_empty_principals)
|
538
518
|
if allow_host_certificates is not None:
|
539
519
|
pulumi.set(__self__, "allow_host_certificates", allow_host_certificates)
|
540
520
|
if allow_subdomains is not None:
|
@@ -608,15 +588,6 @@ class _SecretBackendRoleState:
|
|
608
588
|
def allow_bare_domains(self, value: Optional[pulumi.Input[bool]]):
|
609
589
|
pulumi.set(self, "allow_bare_domains", value)
|
610
590
|
|
611
|
-
@property
|
612
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
613
|
-
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
614
|
-
return pulumi.get(self, "allow_empty_principals")
|
615
|
-
|
616
|
-
@allow_empty_principals.setter
|
617
|
-
def allow_empty_principals(self, value: Optional[pulumi.Input[bool]]):
|
618
|
-
pulumi.set(self, "allow_empty_principals", value)
|
619
|
-
|
620
591
|
@property
|
621
592
|
@pulumi.getter(name="allowHostCertificates")
|
622
593
|
def allow_host_certificates(self) -> Optional[pulumi.Input[bool]]:
|
@@ -919,7 +890,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
919
890
|
opts: Optional[pulumi.ResourceOptions] = None,
|
920
891
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
921
892
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
922
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
923
893
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
924
894
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
925
895
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -1069,7 +1039,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1069
1039
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1070
1040
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
1071
1041
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
1072
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
1073
1042
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
1074
1043
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
1075
1044
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -1105,7 +1074,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1105
1074
|
|
1106
1075
|
__props__.__dict__["algorithm_signer"] = algorithm_signer
|
1107
1076
|
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
1108
|
-
__props__.__dict__["allow_empty_principals"] = allow_empty_principals
|
1109
1077
|
__props__.__dict__["allow_host_certificates"] = allow_host_certificates
|
1110
1078
|
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
1111
1079
|
__props__.__dict__["allow_user_certificates"] = allow_user_certificates
|
@@ -1146,7 +1114,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1146
1114
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1147
1115
|
algorithm_signer: Optional[pulumi.Input[str]] = None,
|
1148
1116
|
allow_bare_domains: Optional[pulumi.Input[bool]] = None,
|
1149
|
-
allow_empty_principals: Optional[pulumi.Input[bool]] = None,
|
1150
1117
|
allow_host_certificates: Optional[pulumi.Input[bool]] = None,
|
1151
1118
|
allow_subdomains: Optional[pulumi.Input[bool]] = None,
|
1152
1119
|
allow_user_certificates: Optional[pulumi.Input[bool]] = None,
|
@@ -1217,7 +1184,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1217
1184
|
|
1218
1185
|
__props__.__dict__["algorithm_signer"] = algorithm_signer
|
1219
1186
|
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
1220
|
-
__props__.__dict__["allow_empty_principals"] = allow_empty_principals
|
1221
1187
|
__props__.__dict__["allow_host_certificates"] = allow_host_certificates
|
1222
1188
|
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
1223
1189
|
__props__.__dict__["allow_user_certificates"] = allow_user_certificates
|
@@ -1260,11 +1226,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1260
1226
|
"""
|
1261
1227
|
return pulumi.get(self, "allow_bare_domains")
|
1262
1228
|
|
1263
|
-
@property
|
1264
|
-
@pulumi.getter(name="allowEmptyPrincipals")
|
1265
|
-
def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
|
1266
|
-
return pulumi.get(self, "allow_empty_principals")
|
1267
|
-
|
1268
1229
|
@property
|
1269
1230
|
@pulumi.getter(name="allowHostCertificates")
|
1270
1231
|
def allow_host_certificates(self) -> pulumi.Output[Optional[bool]]:
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretCredsArgs', 'SecretCreds']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
pulumi_vault/token.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TokenArgs', 'Token']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -52,6 +47,8 @@ class AuthBackendRoleArgs:
|
|
52
47
|
*Available only for Vault Enterprise*.
|
53
48
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
54
49
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
50
|
+
|
51
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
55
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
56
53
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
57
54
|
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
@@ -205,6 +202,8 @@ class AuthBackendRoleArgs:
|
|
205
202
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
206
203
|
"""
|
207
204
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
205
|
+
|
206
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
208
207
|
"""
|
209
208
|
return pulumi.get(self, "path_suffix")
|
210
209
|
|
@@ -368,6 +367,8 @@ class _AuthBackendRoleState:
|
|
368
367
|
*Available only for Vault Enterprise*.
|
369
368
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
370
369
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
370
|
+
|
371
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
371
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
372
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
373
374
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -511,6 +512,8 @@ class _AuthBackendRoleState:
|
|
511
512
|
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
512
513
|
"""
|
513
514
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
515
|
+
|
516
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
514
517
|
"""
|
515
518
|
return pulumi.get(self, "path_suffix")
|
516
519
|
|
@@ -723,6 +726,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
723
726
|
*Available only for Vault Enterprise*.
|
724
727
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
725
728
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
729
|
+
|
730
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
726
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
727
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
728
733
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -886,6 +891,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
886
891
|
*Available only for Vault Enterprise*.
|
887
892
|
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
888
893
|
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
894
|
+
|
895
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
889
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
890
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
891
898
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
@@ -987,6 +994,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
987
994
|
def path_suffix(self) -> pulumi.Output[Optional[str]]:
|
988
995
|
"""
|
989
996
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
997
|
+
|
998
|
+
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
990
999
|
"""
|
991
1000
|
return pulumi.get(self, "path_suffix")
|
992
1001
|
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AlphabetArgs', 'Alphabet']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -208,6 +203,9 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
208
203
|
transformation=pulumi.get(__ret__, 'transformation'),
|
209
204
|
tweak=pulumi.get(__ret__, 'tweak'),
|
210
205
|
value=pulumi.get(__ret__, 'value'))
|
206
|
+
|
207
|
+
|
208
|
+
@_utilities.lift_output_func(get_decode)
|
211
209
|
def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
212
210
|
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
213
211
|
decoded_value: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -262,26 +260,4 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
262
260
|
:param str tweak: The tweak value to use. Only applicable for FPE transformations
|
263
261
|
:param str value: The value in which to decode.
|
264
262
|
"""
|
265
|
-
|
266
|
-
__args__['batchInputs'] = batch_inputs
|
267
|
-
__args__['batchResults'] = batch_results
|
268
|
-
__args__['decodedValue'] = decoded_value
|
269
|
-
__args__['namespace'] = namespace
|
270
|
-
__args__['path'] = path
|
271
|
-
__args__['roleName'] = role_name
|
272
|
-
__args__['transformation'] = transformation
|
273
|
-
__args__['tweak'] = tweak
|
274
|
-
__args__['value'] = value
|
275
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
276
|
-
__ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
|
277
|
-
return __ret__.apply(lambda __response__: GetDecodeResult(
|
278
|
-
batch_inputs=pulumi.get(__response__, 'batch_inputs'),
|
279
|
-
batch_results=pulumi.get(__response__, 'batch_results'),
|
280
|
-
decoded_value=pulumi.get(__response__, 'decoded_value'),
|
281
|
-
id=pulumi.get(__response__, 'id'),
|
282
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
283
|
-
path=pulumi.get(__response__, 'path'),
|
284
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
285
|
-
transformation=pulumi.get(__response__, 'transformation'),
|
286
|
-
tweak=pulumi.get(__response__, 'tweak'),
|
287
|
-
value=pulumi.get(__response__, 'value')))
|
263
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -210,6 +205,9 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
210
205
|
transformation=pulumi.get(__ret__, 'transformation'),
|
211
206
|
tweak=pulumi.get(__ret__, 'tweak'),
|
212
207
|
value=pulumi.get(__ret__, 'value'))
|
208
|
+
|
209
|
+
|
210
|
+
@_utilities.lift_output_func(get_encode)
|
213
211
|
def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
214
212
|
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
215
213
|
encoded_value: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -266,26 +264,4 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
266
264
|
:param str tweak: The tweak value to use. Only applicable for FPE transformations
|
267
265
|
:param str value: The value in which to encode.
|
268
266
|
"""
|
269
|
-
|
270
|
-
__args__['batchInputs'] = batch_inputs
|
271
|
-
__args__['batchResults'] = batch_results
|
272
|
-
__args__['encodedValue'] = encoded_value
|
273
|
-
__args__['namespace'] = namespace
|
274
|
-
__args__['path'] = path
|
275
|
-
__args__['roleName'] = role_name
|
276
|
-
__args__['transformation'] = transformation
|
277
|
-
__args__['tweak'] = tweak
|
278
|
-
__args__['value'] = value
|
279
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
280
|
-
__ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult)
|
281
|
-
return __ret__.apply(lambda __response__: GetEncodeResult(
|
282
|
-
batch_inputs=pulumi.get(__response__, 'batch_inputs'),
|
283
|
-
batch_results=pulumi.get(__response__, 'batch_results'),
|
284
|
-
encoded_value=pulumi.get(__response__, 'encoded_value'),
|
285
|
-
id=pulumi.get(__response__, 'id'),
|
286
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
287
|
-
path=pulumi.get(__response__, 'path'),
|
288
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
289
|
-
transformation=pulumi.get(__response__, 'transformation'),
|
290
|
-
tweak=pulumi.get(__response__, 'tweak'),
|
291
|
-
value=pulumi.get(__response__, 'value')))
|
267
|
+
...
|
pulumi_vault/transform/role.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['RoleArgs', 'Role']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TemplateArgs', 'Template']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['TransformationArgs', 'Transformation']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -143,6 +138,9 @@ def get_decrypt(backend: Optional[str] = None,
|
|
143
138
|
key=pulumi.get(__ret__, 'key'),
|
144
139
|
namespace=pulumi.get(__ret__, 'namespace'),
|
145
140
|
plaintext=pulumi.get(__ret__, 'plaintext'))
|
141
|
+
|
142
|
+
|
143
|
+
@_utilities.lift_output_func(get_decrypt)
|
146
144
|
def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
147
145
|
ciphertext: Optional[pulumi.Input[str]] = None,
|
148
146
|
context: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -163,19 +161,4 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
163
161
|
ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
|
164
162
|
```
|
165
163
|
"""
|
166
|
-
|
167
|
-
__args__['backend'] = backend
|
168
|
-
__args__['ciphertext'] = ciphertext
|
169
|
-
__args__['context'] = context
|
170
|
-
__args__['key'] = key
|
171
|
-
__args__['namespace'] = namespace
|
172
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
173
|
-
__ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult)
|
174
|
-
return __ret__.apply(lambda __response__: GetDecryptResult(
|
175
|
-
backend=pulumi.get(__response__, 'backend'),
|
176
|
-
ciphertext=pulumi.get(__response__, 'ciphertext'),
|
177
|
-
context=pulumi.get(__response__, 'context'),
|
178
|
-
id=pulumi.get(__response__, 'id'),
|
179
|
-
key=pulumi.get(__response__, 'key'),
|
180
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
181
|
-
plaintext=pulumi.get(__response__, 'plaintext')))
|
164
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -144,6 +139,9 @@ def get_encrypt(backend: Optional[str] = None,
|
|
144
139
|
key_version=pulumi.get(__ret__, 'key_version'),
|
145
140
|
namespace=pulumi.get(__ret__, 'namespace'),
|
146
141
|
plaintext=pulumi.get(__ret__, 'plaintext'))
|
142
|
+
|
143
|
+
|
144
|
+
@_utilities.lift_output_func(get_encrypt)
|
147
145
|
def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
148
146
|
context: Optional[pulumi.Input[Optional[str]]] = None,
|
149
147
|
key: Optional[pulumi.Input[str]] = None,
|
@@ -154,21 +152,4 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
154
152
|
"""
|
155
153
|
This is a data source which can be used to encrypt plaintext using a Vault Transit key.
|
156
154
|
"""
|
157
|
-
|
158
|
-
__args__['backend'] = backend
|
159
|
-
__args__['context'] = context
|
160
|
-
__args__['key'] = key
|
161
|
-
__args__['keyVersion'] = key_version
|
162
|
-
__args__['namespace'] = namespace
|
163
|
-
__args__['plaintext'] = plaintext
|
164
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
165
|
-
__ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult)
|
166
|
-
return __ret__.apply(lambda __response__: GetEncryptResult(
|
167
|
-
backend=pulumi.get(__response__, 'backend'),
|
168
|
-
ciphertext=pulumi.get(__response__, 'ciphertext'),
|
169
|
-
context=pulumi.get(__response__, 'context'),
|
170
|
-
id=pulumi.get(__response__, 'id'),
|
171
|
-
key=pulumi.get(__response__, 'key'),
|
172
|
-
key_version=pulumi.get(__response__, 'key_version'),
|
173
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
174
|
-
plaintext=pulumi.get(__response__, 'plaintext')))
|
155
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_vault
|
3
|
-
Version: 6.4.
|
3
|
+
Version: 6.4.0a1723820369
|
4
4
|
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
@@ -9,9 +9,8 @@ Keywords: pulumi,vault
|
|
9
9
|
Requires-Python: >=3.8
|
10
10
|
Description-Content-Type: text/markdown
|
11
11
|
Requires-Dist: parver >=0.2.1
|
12
|
-
Requires-Dist: pulumi <4.0.0,>=3.
|
12
|
+
Requires-Dist: pulumi <4.0.0,>=3.0.0
|
13
13
|
Requires-Dist: semver >=2.8.1
|
14
|
-
Requires-Dist: typing-extensions >=4.11 ; python_version < "3.11"
|
15
14
|
|
16
15
|
[](https://travis-ci.com/pulumi/pulumi-vault)
|
17
16
|
|