pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
pulumi_vault/gcp/_inputs.py
CHANGED
@@ -4,53 +4,18 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendCustomEndpointArgs',
|
19
|
-
'AuthBackendCustomEndpointArgsDict',
|
20
14
|
'AuthBackendTuneArgs',
|
21
|
-
'AuthBackendTuneArgsDict',
|
22
15
|
'SecretRolesetBindingArgs',
|
23
|
-
'SecretRolesetBindingArgsDict',
|
24
16
|
'SecretStaticAccountBindingArgs',
|
25
|
-
'SecretStaticAccountBindingArgsDict',
|
26
17
|
]
|
27
18
|
|
28
|
-
MYPY = False
|
29
|
-
|
30
|
-
if not MYPY:
|
31
|
-
class AuthBackendCustomEndpointArgsDict(TypedDict):
|
32
|
-
api: NotRequired[pulumi.Input[str]]
|
33
|
-
"""
|
34
|
-
Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
|
35
|
-
"""
|
36
|
-
compute: NotRequired[pulumi.Input[str]]
|
37
|
-
"""
|
38
|
-
Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
|
39
|
-
|
40
|
-
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
41
|
-
The `scheme://` and `:port` portions of the endpoint value are optional.
|
42
|
-
"""
|
43
|
-
crm: NotRequired[pulumi.Input[str]]
|
44
|
-
"""
|
45
|
-
Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
46
|
-
"""
|
47
|
-
iam: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
50
|
-
"""
|
51
|
-
elif False:
|
52
|
-
AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
|
53
|
-
|
54
19
|
@pulumi.input_type
|
55
20
|
class AuthBackendCustomEndpointArgs:
|
56
21
|
def __init__(__self__, *,
|
@@ -128,56 +93,6 @@ class AuthBackendCustomEndpointArgs:
|
|
128
93
|
pulumi.set(self, "iam", value)
|
129
94
|
|
130
95
|
|
131
|
-
if not MYPY:
|
132
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
133
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
134
|
-
"""
|
135
|
-
List of headers to whitelist and allowing
|
136
|
-
a plugin to include them in the response.
|
137
|
-
"""
|
138
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
139
|
-
"""
|
140
|
-
Specifies the list of keys that will
|
141
|
-
not be HMAC'd by audit devices in the request data object.
|
142
|
-
"""
|
143
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
144
|
-
"""
|
145
|
-
Specifies the list of keys that will
|
146
|
-
not be HMAC'd by audit devices in the response data object.
|
147
|
-
"""
|
148
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
149
|
-
"""
|
150
|
-
Specifies the default time-to-live.
|
151
|
-
If set, this overrides the global default.
|
152
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
153
|
-
"""
|
154
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
155
|
-
"""
|
156
|
-
Specifies whether to show this mount in
|
157
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
158
|
-
"""
|
159
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
160
|
-
"""
|
161
|
-
Specifies the maximum time-to-live.
|
162
|
-
If set, this overrides the global default.
|
163
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
164
|
-
"""
|
165
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
166
|
-
"""
|
167
|
-
List of headers to whitelist and
|
168
|
-
pass from the request to the backend.
|
169
|
-
"""
|
170
|
-
token_type: NotRequired[pulumi.Input[str]]
|
171
|
-
"""
|
172
|
-
Specifies the type of tokens that should be returned by
|
173
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
174
|
-
|
175
|
-
|
176
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
177
|
-
"""
|
178
|
-
elif False:
|
179
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
180
|
-
|
181
96
|
@pulumi.input_type
|
182
97
|
class AuthBackendTuneArgs:
|
183
98
|
def __init__(__self__, *,
|
@@ -339,19 +254,6 @@ class AuthBackendTuneArgs:
|
|
339
254
|
pulumi.set(self, "token_type", value)
|
340
255
|
|
341
256
|
|
342
|
-
if not MYPY:
|
343
|
-
class SecretRolesetBindingArgsDict(TypedDict):
|
344
|
-
resource: pulumi.Input[str]
|
345
|
-
"""
|
346
|
-
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
|
347
|
-
"""
|
348
|
-
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
349
|
-
"""
|
350
|
-
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
351
|
-
"""
|
352
|
-
elif False:
|
353
|
-
SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
|
354
|
-
|
355
257
|
@pulumi.input_type
|
356
258
|
class SecretRolesetBindingArgs:
|
357
259
|
def __init__(__self__, *,
|
@@ -389,19 +291,6 @@ class SecretRolesetBindingArgs:
|
|
389
291
|
pulumi.set(self, "roles", value)
|
390
292
|
|
391
293
|
|
392
|
-
if not MYPY:
|
393
|
-
class SecretStaticAccountBindingArgsDict(TypedDict):
|
394
|
-
resource: pulumi.Input[str]
|
395
|
-
"""
|
396
|
-
Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
|
397
|
-
"""
|
398
|
-
roles: pulumi.Input[Sequence[pulumi.Input[str]]]
|
399
|
-
"""
|
400
|
-
List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
|
401
|
-
"""
|
402
|
-
elif False:
|
403
|
-
SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
|
404
|
-
|
405
294
|
@pulumi.input_type
|
406
295
|
class SecretStaticAccountBindingArgs:
|
407
296
|
def __init__(__self__, *,
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -398,6 +393,9 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
398
393
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
399
394
|
token_type=pulumi.get(__ret__, 'token_type'),
|
400
395
|
type=pulumi.get(__ret__, 'type'))
|
396
|
+
|
397
|
+
|
398
|
+
@_utilities.lift_output_func(get_auth_backend_role)
|
401
399
|
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
402
400
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
403
401
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -460,40 +458,4 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
460
458
|
`default-service` and `default-batch` which specify the type to return unless the client
|
461
459
|
requests a different type at generation time.
|
462
460
|
"""
|
463
|
-
|
464
|
-
__args__['backend'] = backend
|
465
|
-
__args__['namespace'] = namespace
|
466
|
-
__args__['roleName'] = role_name
|
467
|
-
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
468
|
-
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
469
|
-
__args__['tokenMaxTtl'] = token_max_ttl
|
470
|
-
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
471
|
-
__args__['tokenNumUses'] = token_num_uses
|
472
|
-
__args__['tokenPeriod'] = token_period
|
473
|
-
__args__['tokenPolicies'] = token_policies
|
474
|
-
__args__['tokenTtl'] = token_ttl
|
475
|
-
__args__['tokenType'] = token_type
|
476
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
477
|
-
__ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
478
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
479
|
-
backend=pulumi.get(__response__, 'backend'),
|
480
|
-
bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
|
481
|
-
bound_labels=pulumi.get(__response__, 'bound_labels'),
|
482
|
-
bound_projects=pulumi.get(__response__, 'bound_projects'),
|
483
|
-
bound_regions=pulumi.get(__response__, 'bound_regions'),
|
484
|
-
bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
|
485
|
-
bound_zones=pulumi.get(__response__, 'bound_zones'),
|
486
|
-
id=pulumi.get(__response__, 'id'),
|
487
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
488
|
-
role_id=pulumi.get(__response__, 'role_id'),
|
489
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
490
|
-
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
491
|
-
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
492
|
-
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
493
|
-
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
494
|
-
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
495
|
-
token_period=pulumi.get(__response__, 'token_period'),
|
496
|
-
token_policies=pulumi.get(__response__, 'token_policies'),
|
497
|
-
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
498
|
-
token_type=pulumi.get(__response__, 'token_type'),
|
499
|
-
type=pulumi.get(__response__, 'type')))
|
461
|
+
...
|
pulumi_vault/gcp/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
|
@@ -23,8 +18,7 @@ class SecretImpersonatedAccountArgs:
|
|
23
18
|
impersonated_account: pulumi.Input[str],
|
24
19
|
service_account_email: pulumi.Input[str],
|
25
20
|
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
27
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
21
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
28
22
|
"""
|
29
23
|
The set of arguments for constructing a SecretImpersonatedAccount resource.
|
30
24
|
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
@@ -32,8 +26,6 @@ class SecretImpersonatedAccountArgs:
|
|
32
26
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
33
27
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
34
28
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
35
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
36
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
37
29
|
"""
|
38
30
|
pulumi.set(__self__, "backend", backend)
|
39
31
|
pulumi.set(__self__, "impersonated_account", impersonated_account)
|
@@ -42,8 +34,6 @@ class SecretImpersonatedAccountArgs:
|
|
42
34
|
pulumi.set(__self__, "namespace", namespace)
|
43
35
|
if token_scopes is not None:
|
44
36
|
pulumi.set(__self__, "token_scopes", token_scopes)
|
45
|
-
if ttl is not None:
|
46
|
-
pulumi.set(__self__, "ttl", ttl)
|
47
37
|
|
48
38
|
@property
|
49
39
|
@pulumi.getter
|
@@ -105,19 +95,6 @@ class SecretImpersonatedAccountArgs:
|
|
105
95
|
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
106
96
|
pulumi.set(self, "token_scopes", value)
|
107
97
|
|
108
|
-
@property
|
109
|
-
@pulumi.getter
|
110
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
111
|
-
"""
|
112
|
-
Specifies the default TTL for service principals generated using this role.
|
113
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
114
|
-
"""
|
115
|
-
return pulumi.get(self, "ttl")
|
116
|
-
|
117
|
-
@ttl.setter
|
118
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
119
|
-
pulumi.set(self, "ttl", value)
|
120
|
-
|
121
98
|
|
122
99
|
@pulumi.input_type
|
123
100
|
class _SecretImpersonatedAccountState:
|
@@ -127,8 +104,7 @@ class _SecretImpersonatedAccountState:
|
|
127
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
128
105
|
service_account_email: Optional[pulumi.Input[str]] = None,
|
129
106
|
service_account_project: Optional[pulumi.Input[str]] = None,
|
130
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
131
|
-
ttl: Optional[pulumi.Input[str]] = None):
|
107
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
132
108
|
"""
|
133
109
|
Input properties used for looking up and filtering SecretImpersonatedAccount resources.
|
134
110
|
:param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
|
@@ -137,8 +113,6 @@ class _SecretImpersonatedAccountState:
|
|
137
113
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
138
114
|
:param pulumi.Input[str] service_account_project: Project the service account belongs to.
|
139
115
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
140
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
141
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
142
116
|
"""
|
143
117
|
if backend is not None:
|
144
118
|
pulumi.set(__self__, "backend", backend)
|
@@ -152,8 +126,6 @@ class _SecretImpersonatedAccountState:
|
|
152
126
|
pulumi.set(__self__, "service_account_project", service_account_project)
|
153
127
|
if token_scopes is not None:
|
154
128
|
pulumi.set(__self__, "token_scopes", token_scopes)
|
155
|
-
if ttl is not None:
|
156
|
-
pulumi.set(__self__, "ttl", ttl)
|
157
129
|
|
158
130
|
@property
|
159
131
|
@pulumi.getter
|
@@ -227,19 +199,6 @@ class _SecretImpersonatedAccountState:
|
|
227
199
|
def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
228
200
|
pulumi.set(self, "token_scopes", value)
|
229
201
|
|
230
|
-
@property
|
231
|
-
@pulumi.getter
|
232
|
-
def ttl(self) -> Optional[pulumi.Input[str]]:
|
233
|
-
"""
|
234
|
-
Specifies the default TTL for service principals generated using this role.
|
235
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
236
|
-
"""
|
237
|
-
return pulumi.get(self, "ttl")
|
238
|
-
|
239
|
-
@ttl.setter
|
240
|
-
def ttl(self, value: Optional[pulumi.Input[str]]):
|
241
|
-
pulumi.set(self, "ttl", value)
|
242
|
-
|
243
202
|
|
244
203
|
class SecretImpersonatedAccount(pulumi.CustomResource):
|
245
204
|
@overload
|
@@ -251,7 +210,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
251
210
|
namespace: Optional[pulumi.Input[str]] = None,
|
252
211
|
service_account_email: Optional[pulumi.Input[str]] = None,
|
253
212
|
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
254
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
255
213
|
__props__=None):
|
256
214
|
"""
|
257
215
|
Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
|
@@ -293,8 +251,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
293
251
|
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
294
252
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
295
253
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
296
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
297
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
298
254
|
"""
|
299
255
|
...
|
300
256
|
@overload
|
@@ -355,7 +311,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
355
311
|
namespace: Optional[pulumi.Input[str]] = None,
|
356
312
|
service_account_email: Optional[pulumi.Input[str]] = None,
|
357
313
|
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
358
|
-
ttl: Optional[pulumi.Input[str]] = None,
|
359
314
|
__props__=None):
|
360
315
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
361
316
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -376,7 +331,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
376
331
|
raise TypeError("Missing required property 'service_account_email'")
|
377
332
|
__props__.__dict__["service_account_email"] = service_account_email
|
378
333
|
__props__.__dict__["token_scopes"] = token_scopes
|
379
|
-
__props__.__dict__["ttl"] = ttl
|
380
334
|
__props__.__dict__["service_account_project"] = None
|
381
335
|
super(SecretImpersonatedAccount, __self__).__init__(
|
382
336
|
'vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount',
|
@@ -393,8 +347,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
393
347
|
namespace: Optional[pulumi.Input[str]] = None,
|
394
348
|
service_account_email: Optional[pulumi.Input[str]] = None,
|
395
349
|
service_account_project: Optional[pulumi.Input[str]] = None,
|
396
|
-
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None
|
397
|
-
ttl: Optional[pulumi.Input[str]] = None) -> 'SecretImpersonatedAccount':
|
350
|
+
token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretImpersonatedAccount':
|
398
351
|
"""
|
399
352
|
Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
|
400
353
|
properties used to qualify the lookup.
|
@@ -408,8 +361,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
408
361
|
:param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
|
409
362
|
:param pulumi.Input[str] service_account_project: Project the service account belongs to.
|
410
363
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
|
411
|
-
:param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
|
412
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
413
364
|
"""
|
414
365
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
415
366
|
|
@@ -421,7 +372,6 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
421
372
|
__props__.__dict__["service_account_email"] = service_account_email
|
422
373
|
__props__.__dict__["service_account_project"] = service_account_project
|
423
374
|
__props__.__dict__["token_scopes"] = token_scopes
|
424
|
-
__props__.__dict__["ttl"] = ttl
|
425
375
|
return SecretImpersonatedAccount(resource_name, opts=opts, __props__=__props__)
|
426
376
|
|
427
377
|
@property
|
@@ -472,12 +422,3 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
472
422
|
"""
|
473
423
|
return pulumi.get(self, "token_scopes")
|
474
424
|
|
475
|
-
@property
|
476
|
-
@pulumi.getter
|
477
|
-
def ttl(self) -> pulumi.Output[str]:
|
478
|
-
"""
|
479
|
-
Specifies the default TTL for service principals generated using this role.
|
480
|
-
Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
|
481
|
-
"""
|
482
|
-
return pulumi.get(self, "ttl")
|
483
|
-
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['EndpointArgs', 'Endpoint']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -231,6 +226,9 @@ def get_secret(namespace: Optional[str] = None,
|
|
231
226
|
path=pulumi.get(__ret__, 'path'),
|
232
227
|
version=pulumi.get(__ret__, 'version'),
|
233
228
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
229
|
+
|
230
|
+
|
231
|
+
@_utilities.lift_output_func(get_secret)
|
234
232
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
235
233
|
path: Optional[pulumi.Input[str]] = None,
|
236
234
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
@@ -285,22 +283,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
285
283
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
286
284
|
on every `pulumi preview` and will require a `pulumi up`.
|
287
285
|
"""
|
288
|
-
|
289
|
-
__args__['namespace'] = namespace
|
290
|
-
__args__['path'] = path
|
291
|
-
__args__['version'] = version
|
292
|
-
__args__['withLeaseStartTime'] = with_lease_start_time
|
293
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
294
|
-
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
295
|
-
return __ret__.apply(lambda __response__: GetSecretResult(
|
296
|
-
data=pulumi.get(__response__, 'data'),
|
297
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
298
|
-
id=pulumi.get(__response__, 'id'),
|
299
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
300
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
301
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
302
|
-
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
303
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
304
|
-
path=pulumi.get(__response__, 'path'),
|
305
|
-
version=pulumi.get(__response__, 'version'),
|
306
|
-
with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
|
286
|
+
...
|
pulumi_vault/generic/secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretArgs', 'Secret']
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -188,6 +183,9 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
188
183
|
namespace=pulumi.get(__ret__, 'namespace'),
|
189
184
|
path=pulumi.get(__ret__, 'path'),
|
190
185
|
type=pulumi.get(__ret__, 'type'))
|
186
|
+
|
187
|
+
|
188
|
+
@_utilities.lift_output_func(get_auth_backend)
|
191
189
|
def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
192
190
|
path: Optional[pulumi.Input[str]] = None,
|
193
191
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]:
|
@@ -208,19 +206,4 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
208
206
|
*Available only for Vault Enterprise*.
|
209
207
|
:param str path: The auth backend mount point.
|
210
208
|
"""
|
211
|
-
|
212
|
-
__args__['namespace'] = namespace
|
213
|
-
__args__['path'] = path
|
214
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult)
|
216
|
-
return __ret__.apply(lambda __response__: GetAuthBackendResult(
|
217
|
-
accessor=pulumi.get(__response__, 'accessor'),
|
218
|
-
default_lease_ttl_seconds=pulumi.get(__response__, 'default_lease_ttl_seconds'),
|
219
|
-
description=pulumi.get(__response__, 'description'),
|
220
|
-
id=pulumi.get(__response__, 'id'),
|
221
|
-
listing_visibility=pulumi.get(__response__, 'listing_visibility'),
|
222
|
-
local=pulumi.get(__response__, 'local'),
|
223
|
-
max_lease_ttl_seconds=pulumi.get(__response__, 'max_lease_ttl_seconds'),
|
224
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
225
|
-
path=pulumi.get(__response__, 'path'),
|
226
|
-
type=pulumi.get(__response__, 'type')))
|
209
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -130,6 +125,9 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
130
125
|
namespace=pulumi.get(__ret__, 'namespace'),
|
131
126
|
paths=pulumi.get(__ret__, 'paths'),
|
132
127
|
type=pulumi.get(__ret__, 'type'))
|
128
|
+
|
129
|
+
|
130
|
+
@_utilities.lift_output_func(get_auth_backends)
|
133
131
|
def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
132
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
135
133
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
@@ -157,14 +155,4 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
157
155
|
*Available only for Vault Enterprise*.
|
158
156
|
:param str type: The name of the auth method type. Allows filtering of backends returned by type.
|
159
157
|
"""
|
160
|
-
|
161
|
-
__args__['namespace'] = namespace
|
162
|
-
__args__['type'] = type
|
163
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
164
|
-
__ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult)
|
165
|
-
return __ret__.apply(lambda __response__: GetAuthBackendsResult(
|
166
|
-
accessors=pulumi.get(__response__, 'accessors'),
|
167
|
-
id=pulumi.get(__response__, 'id'),
|
168
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
169
|
-
paths=pulumi.get(__response__, 'paths'),
|
170
|
-
type=pulumi.get(__response__, 'type')))
|
158
|
+
...
|