pulumi-vault 6.4.0a1723454543__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/aws/auth_backend_login.py +7 -7
- pulumi_vault/config/ui_custom_message.py +14 -14
- pulumi_vault/database/_inputs.py +72 -72
- pulumi_vault/database/outputs.py +54 -54
- pulumi_vault/database/secret_backend_connection.py +14 -14
- pulumi_vault/database/secret_backend_role.py +14 -14
- pulumi_vault/database/secrets_mount.py +14 -14
- pulumi_vault/generic/get_secret.py +1 -1
- pulumi_vault/generic/secret.py +7 -7
- pulumi_vault/get_namespace.py +1 -1
- pulumi_vault/get_nomad_access_token.py +10 -4
- pulumi_vault/get_raft_autopilot_state.py +3 -3
- pulumi_vault/identity/get_entity.py +1 -1
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +1 -1
- pulumi_vault/identity/outputs.py +3 -3
- pulumi_vault/jwt/auth_backend_role.py +28 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -14
- pulumi_vault/kv/_inputs.py +4 -4
- pulumi_vault/kv/get_secret.py +1 -1
- pulumi_vault/kv/get_secret_subkeys_v2.py +1 -1
- pulumi_vault/kv/get_secret_v2.py +2 -2
- pulumi_vault/kv/outputs.py +3 -3
- pulumi_vault/kv/secret.py +7 -7
- pulumi_vault/kv/secret_v2.py +28 -28
- pulumi_vault/ldap/secret_backend.py +14 -14
- pulumi_vault/mount.py +16 -16
- pulumi_vault/namespace.py +14 -14
- pulumi_vault/pkisecret/_inputs.py +8 -8
- pulumi_vault/pkisecret/backend_config_est.py +14 -14
- pulumi_vault/pkisecret/get_backend_config_est.py +1 -1
- pulumi_vault/pkisecret/get_backend_issuers.py +1 -1
- pulumi_vault/pkisecret/get_backend_keys.py +1 -1
- pulumi_vault/pkisecret/outputs.py +12 -12
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/saml/auth_backend_role.py +14 -14
- pulumi_vault/secrets/sync_aws_destination.py +14 -14
- pulumi_vault/secrets/sync_azure_destination.py +14 -14
- pulumi_vault/secrets/sync_gcp_destination.py +14 -14
- pulumi_vault/ssh/secret_backend_role.py +28 -28
- pulumi_vault/transform/get_decode.py +10 -10
- pulumi_vault/transform/get_encode.py +10 -10
- pulumi_vault/transform/template.py +14 -14
- pulumi_vault/transit/secret_backend_key.py +7 -7
- {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +1 -1
- {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/RECORD +48 -48
- {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.4.0a1723454543.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -17,11 +17,11 @@ __all__ = [
|
|
17
17
|
@pulumi.input_type
|
18
18
|
class BackendConfigEstAuthenticatorsArgs:
|
19
19
|
def __init__(__self__, *,
|
20
|
-
cert: Optional[pulumi.Input[Mapping[str,
|
21
|
-
userpass: Optional[pulumi.Input[Mapping[str,
|
20
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
22
22
|
"""
|
23
|
-
:param pulumi.Input[Mapping[str,
|
24
|
-
:param pulumi.Input[Mapping[str,
|
23
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
24
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
|
25
25
|
"""
|
26
26
|
if cert is not None:
|
27
27
|
pulumi.set(__self__, "cert", cert)
|
@@ -30,26 +30,26 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
30
30
|
|
31
31
|
@property
|
32
32
|
@pulumi.getter
|
33
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str,
|
33
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
34
34
|
"""
|
35
35
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
36
36
|
"""
|
37
37
|
return pulumi.get(self, "cert")
|
38
38
|
|
39
39
|
@cert.setter
|
40
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str,
|
40
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
41
41
|
pulumi.set(self, "cert", value)
|
42
42
|
|
43
43
|
@property
|
44
44
|
@pulumi.getter
|
45
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str,
|
45
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
46
46
|
"""
|
47
47
|
"The accessor (required) property for user pass auth backends".
|
48
48
|
"""
|
49
49
|
return pulumi.get(self, "userpass")
|
50
50
|
|
51
51
|
@userpass.setter
|
52
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str,
|
52
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
53
53
|
pulumi.set(self, "userpass", value)
|
54
54
|
|
55
55
|
|
@@ -23,7 +23,7 @@ class BackendConfigEstArgs:
|
|
23
23
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
24
24
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
25
25
|
enabled: Optional[pulumi.Input[bool]] = None,
|
26
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
26
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
27
27
|
namespace: Optional[pulumi.Input[str]] = None):
|
28
28
|
"""
|
29
29
|
The set of arguments for constructing a BackendConfigEst resource.
|
@@ -37,7 +37,7 @@ class BackendConfigEstArgs:
|
|
37
37
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
38
38
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
39
39
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
40
|
-
:param pulumi.Input[Mapping[str,
|
40
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
41
41
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
42
42
|
The value should not contain leading or trailing forward slashes.
|
43
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -150,14 +150,14 @@ class BackendConfigEstArgs:
|
|
150
150
|
|
151
151
|
@property
|
152
152
|
@pulumi.getter(name="labelToPathPolicy")
|
153
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
153
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
154
154
|
"""
|
155
155
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
156
156
|
"""
|
157
157
|
return pulumi.get(self, "label_to_path_policy")
|
158
158
|
|
159
159
|
@label_to_path_policy.setter
|
160
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
160
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
161
161
|
pulumi.set(self, "label_to_path_policy", value)
|
162
162
|
|
163
163
|
@property
|
@@ -186,7 +186,7 @@ class _BackendConfigEstState:
|
|
186
186
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
187
187
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
188
188
|
enabled: Optional[pulumi.Input[bool]] = None,
|
189
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
189
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
190
190
|
last_updated: Optional[pulumi.Input[str]] = None,
|
191
191
|
namespace: Optional[pulumi.Input[str]] = None):
|
192
192
|
"""
|
@@ -201,7 +201,7 @@ class _BackendConfigEstState:
|
|
201
201
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
202
202
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
203
203
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
204
|
-
:param pulumi.Input[Mapping[str,
|
204
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
205
205
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
206
206
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
207
207
|
The value should not contain leading or trailing forward slashes.
|
@@ -318,14 +318,14 @@ class _BackendConfigEstState:
|
|
318
318
|
|
319
319
|
@property
|
320
320
|
@pulumi.getter(name="labelToPathPolicy")
|
321
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
321
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
322
322
|
"""
|
323
323
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
324
324
|
"""
|
325
325
|
return pulumi.get(self, "label_to_path_policy")
|
326
326
|
|
327
327
|
@label_to_path_policy.setter
|
328
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
328
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
329
329
|
pulumi.set(self, "label_to_path_policy", value)
|
330
330
|
|
331
331
|
@property
|
@@ -368,7 +368,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
368
368
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
369
369
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
370
370
|
enabled: Optional[pulumi.Input[bool]] = None,
|
371
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
371
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
372
372
|
namespace: Optional[pulumi.Input[str]] = None,
|
373
373
|
__props__=None):
|
374
374
|
"""
|
@@ -396,7 +396,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
396
396
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
397
397
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
398
398
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
399
|
-
:param pulumi.Input[Mapping[str,
|
399
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
400
400
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
401
401
|
The value should not contain leading or trailing forward slashes.
|
402
402
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -443,7 +443,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
443
443
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
444
444
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
445
445
|
enabled: Optional[pulumi.Input[bool]] = None,
|
446
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
446
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
447
447
|
namespace: Optional[pulumi.Input[str]] = None,
|
448
448
|
__props__=None):
|
449
449
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -483,7 +483,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
483
483
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
484
484
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
485
485
|
enabled: Optional[pulumi.Input[bool]] = None,
|
486
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
486
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
487
487
|
last_updated: Optional[pulumi.Input[str]] = None,
|
488
488
|
namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
|
489
489
|
"""
|
@@ -503,7 +503,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
503
503
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
504
504
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
505
505
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
506
|
-
:param pulumi.Input[Mapping[str,
|
506
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
507
507
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
508
508
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
509
509
|
The value should not contain leading or trailing forward slashes.
|
@@ -587,7 +587,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
587
587
|
|
588
588
|
@property
|
589
589
|
@pulumi.getter(name="labelToPathPolicy")
|
590
|
-
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str,
|
590
|
+
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
591
591
|
"""
|
592
592
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
593
593
|
"""
|
@@ -120,7 +120,7 @@ class GetBackendConfigEstResult:
|
|
120
120
|
|
121
121
|
@property
|
122
122
|
@pulumi.getter(name="labelToPathPolicy")
|
123
|
-
def label_to_path_policy(self) -> Mapping[str,
|
123
|
+
def label_to_path_policy(self) -> Mapping[str, str]:
|
124
124
|
"""
|
125
125
|
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
126
126
|
"""
|
@@ -18,11 +18,11 @@ __all__ = [
|
|
18
18
|
@pulumi.output_type
|
19
19
|
class BackendConfigEstAuthenticators(dict):
|
20
20
|
def __init__(__self__, *,
|
21
|
-
cert: Optional[Mapping[str,
|
22
|
-
userpass: Optional[Mapping[str,
|
21
|
+
cert: Optional[Mapping[str, str]] = None,
|
22
|
+
userpass: Optional[Mapping[str, str]] = None):
|
23
23
|
"""
|
24
|
-
:param Mapping[str,
|
25
|
-
:param Mapping[str,
|
24
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
25
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
26
26
|
"""
|
27
27
|
if cert is not None:
|
28
28
|
pulumi.set(__self__, "cert", cert)
|
@@ -31,7 +31,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
31
31
|
|
32
32
|
@property
|
33
33
|
@pulumi.getter
|
34
|
-
def cert(self) -> Optional[Mapping[str,
|
34
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
35
35
|
"""
|
36
36
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
37
37
|
"""
|
@@ -39,7 +39,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
39
39
|
|
40
40
|
@property
|
41
41
|
@pulumi.getter
|
42
|
-
def userpass(self) -> Optional[Mapping[str,
|
42
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
43
43
|
"""
|
44
44
|
"The accessor (required) property for user pass auth backends".
|
45
45
|
"""
|
@@ -95,11 +95,11 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
95
95
|
@pulumi.output_type
|
96
96
|
class GetBackendConfigEstAuthenticatorResult(dict):
|
97
97
|
def __init__(__self__, *,
|
98
|
-
cert: Optional[Mapping[str,
|
99
|
-
userpass: Optional[Mapping[str,
|
98
|
+
cert: Optional[Mapping[str, str]] = None,
|
99
|
+
userpass: Optional[Mapping[str, str]] = None):
|
100
100
|
"""
|
101
|
-
:param Mapping[str,
|
102
|
-
:param Mapping[str,
|
101
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
102
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
103
103
|
"""
|
104
104
|
if cert is not None:
|
105
105
|
pulumi.set(__self__, "cert", cert)
|
@@ -108,7 +108,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
108
108
|
|
109
109
|
@property
|
110
110
|
@pulumi.getter
|
111
|
-
def cert(self) -> Optional[Mapping[str,
|
111
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
112
112
|
"""
|
113
113
|
"The accessor and cert_role properties for cert auth backends".
|
114
114
|
"""
|
@@ -116,7 +116,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
116
116
|
|
117
117
|
@property
|
118
118
|
@pulumi.getter
|
119
|
-
def userpass(self) -> Optional[Mapping[str,
|
119
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
120
120
|
"""
|
121
121
|
"The accessor property for user pass auth backends".
|
122
122
|
"""
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -15,7 +15,7 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
15
15
|
class AuthBackendRoleArgs:
|
16
16
|
def __init__(__self__, *,
|
17
17
|
path: pulumi.Input[str],
|
18
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
18
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
19
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
20
20
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
21
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -34,7 +34,7 @@ class AuthBackendRoleArgs:
|
|
34
34
|
"""
|
35
35
|
The set of arguments for constructing a AuthBackendRole resource.
|
36
36
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
37
|
-
:param pulumi.Input[Mapping[str,
|
37
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
38
38
|
exist in the SAML assertion.
|
39
39
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
40
40
|
`bound_attributes_type`.
|
@@ -105,7 +105,7 @@ class AuthBackendRoleArgs:
|
|
105
105
|
|
106
106
|
@property
|
107
107
|
@pulumi.getter(name="boundAttributes")
|
108
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
108
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
109
109
|
"""
|
110
110
|
Mapping of attribute names to values that are expected to
|
111
111
|
exist in the SAML assertion.
|
@@ -113,7 +113,7 @@ class AuthBackendRoleArgs:
|
|
113
113
|
return pulumi.get(self, "bound_attributes")
|
114
114
|
|
115
115
|
@bound_attributes.setter
|
116
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
116
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
117
117
|
pulumi.set(self, "bound_attributes", value)
|
118
118
|
|
119
119
|
@property
|
@@ -305,7 +305,7 @@ class AuthBackendRoleArgs:
|
|
305
305
|
@pulumi.input_type
|
306
306
|
class _AuthBackendRoleState:
|
307
307
|
def __init__(__self__, *,
|
308
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
308
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
309
309
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
310
310
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
311
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -324,7 +324,7 @@ class _AuthBackendRoleState:
|
|
324
324
|
token_type: Optional[pulumi.Input[str]] = None):
|
325
325
|
"""
|
326
326
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
327
|
-
:param pulumi.Input[Mapping[str,
|
327
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
328
328
|
exist in the SAML assertion.
|
329
329
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
330
330
|
`bound_attributes_type`.
|
@@ -385,7 +385,7 @@ class _AuthBackendRoleState:
|
|
385
385
|
|
386
386
|
@property
|
387
387
|
@pulumi.getter(name="boundAttributes")
|
388
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str,
|
388
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
389
389
|
"""
|
390
390
|
Mapping of attribute names to values that are expected to
|
391
391
|
exist in the SAML assertion.
|
@@ -393,7 +393,7 @@ class _AuthBackendRoleState:
|
|
393
393
|
return pulumi.get(self, "bound_attributes")
|
394
394
|
|
395
395
|
@bound_attributes.setter
|
396
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str,
|
396
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
397
397
|
pulumi.set(self, "bound_attributes", value)
|
398
398
|
|
399
399
|
@property
|
@@ -599,7 +599,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
599
599
|
def __init__(__self__,
|
600
600
|
resource_name: str,
|
601
601
|
opts: Optional[pulumi.ResourceOptions] = None,
|
602
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
602
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
603
603
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
604
604
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
605
605
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -656,7 +656,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
656
656
|
|
657
657
|
:param str resource_name: The name of the resource.
|
658
658
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
659
|
-
:param pulumi.Input[Mapping[str,
|
659
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
660
660
|
exist in the SAML assertion.
|
661
661
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
662
662
|
`bound_attributes_type`.
|
@@ -738,7 +738,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
738
738
|
def _internal_init(__self__,
|
739
739
|
resource_name: str,
|
740
740
|
opts: Optional[pulumi.ResourceOptions] = None,
|
741
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
741
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
742
742
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
743
743
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
744
744
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -793,7 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
793
793
|
def get(resource_name: str,
|
794
794
|
id: pulumi.Input[str],
|
795
795
|
opts: Optional[pulumi.ResourceOptions] = None,
|
796
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str,
|
796
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
797
797
|
bound_attributes_type: Optional[pulumi.Input[str]] = None,
|
798
798
|
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
799
799
|
bound_subjects_type: Optional[pulumi.Input[str]] = None,
|
@@ -817,7 +817,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
817
817
|
:param str resource_name: The unique name of the resulting resource.
|
818
818
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
819
819
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
820
|
-
:param pulumi.Input[Mapping[str,
|
820
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
821
821
|
exist in the SAML assertion.
|
822
822
|
:param pulumi.Input[str] bound_attributes_type: The type of matching assertion to perform on
|
823
823
|
`bound_attributes_type`.
|
@@ -866,7 +866,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
866
866
|
|
867
867
|
@property
|
868
868
|
@pulumi.getter(name="boundAttributes")
|
869
|
-
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str,
|
869
|
+
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
870
870
|
"""
|
871
871
|
Mapping of attribute names to values that are expected to
|
872
872
|
exist in the SAML assertion.
|
@@ -15,7 +15,7 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
|
15
15
|
class SyncAwsDestinationArgs:
|
16
16
|
def __init__(__self__, *,
|
17
17
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
18
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
18
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
19
|
external_id: Optional[pulumi.Input[str]] = None,
|
20
20
|
granularity: Optional[pulumi.Input[str]] = None,
|
21
21
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -29,7 +29,7 @@ class SyncAwsDestinationArgs:
|
|
29
29
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
30
30
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
31
31
|
variable.
|
32
|
-
:param pulumi.Input[Mapping[str,
|
32
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
33
33
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
34
34
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
35
35
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -92,14 +92,14 @@ class SyncAwsDestinationArgs:
|
|
92
92
|
|
93
93
|
@property
|
94
94
|
@pulumi.getter(name="customTags")
|
95
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
95
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
96
96
|
"""
|
97
97
|
Custom tags to set on the secret managed at the destination.
|
98
98
|
"""
|
99
99
|
return pulumi.get(self, "custom_tags")
|
100
100
|
|
101
101
|
@custom_tags.setter
|
102
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
102
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
103
103
|
pulumi.set(self, "custom_tags", value)
|
104
104
|
|
105
105
|
@property
|
@@ -219,7 +219,7 @@ class SyncAwsDestinationArgs:
|
|
219
219
|
class _SyncAwsDestinationState:
|
220
220
|
def __init__(__self__, *,
|
221
221
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
222
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
222
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
223
223
|
external_id: Optional[pulumi.Input[str]] = None,
|
224
224
|
granularity: Optional[pulumi.Input[str]] = None,
|
225
225
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -234,7 +234,7 @@ class _SyncAwsDestinationState:
|
|
234
234
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
235
235
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
236
236
|
variable.
|
237
|
-
:param pulumi.Input[Mapping[str,
|
237
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
238
238
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
239
239
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
240
240
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -300,14 +300,14 @@ class _SyncAwsDestinationState:
|
|
300
300
|
|
301
301
|
@property
|
302
302
|
@pulumi.getter(name="customTags")
|
303
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str,
|
303
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
304
304
|
"""
|
305
305
|
Custom tags to set on the secret managed at the destination.
|
306
306
|
"""
|
307
307
|
return pulumi.get(self, "custom_tags")
|
308
308
|
|
309
309
|
@custom_tags.setter
|
310
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str,
|
310
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
311
311
|
pulumi.set(self, "custom_tags", value)
|
312
312
|
|
313
313
|
@property
|
@@ -441,7 +441,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
441
441
|
resource_name: str,
|
442
442
|
opts: Optional[pulumi.ResourceOptions] = None,
|
443
443
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
444
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
444
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
445
445
|
external_id: Optional[pulumi.Input[str]] = None,
|
446
446
|
granularity: Optional[pulumi.Input[str]] = None,
|
447
447
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -484,7 +484,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
484
484
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
485
485
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
486
486
|
variable.
|
487
|
-
:param pulumi.Input[Mapping[str,
|
487
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
488
488
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
489
489
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
490
490
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -560,7 +560,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
560
560
|
resource_name: str,
|
561
561
|
opts: Optional[pulumi.ResourceOptions] = None,
|
562
562
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
563
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
563
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
564
564
|
external_id: Optional[pulumi.Input[str]] = None,
|
565
565
|
granularity: Optional[pulumi.Input[str]] = None,
|
566
566
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -602,7 +602,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
602
602
|
id: pulumi.Input[str],
|
603
603
|
opts: Optional[pulumi.ResourceOptions] = None,
|
604
604
|
access_key_id: Optional[pulumi.Input[str]] = None,
|
605
|
-
custom_tags: Optional[pulumi.Input[Mapping[str,
|
605
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
606
606
|
external_id: Optional[pulumi.Input[str]] = None,
|
607
607
|
granularity: Optional[pulumi.Input[str]] = None,
|
608
608
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -622,7 +622,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
622
622
|
:param pulumi.Input[str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
623
623
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
624
624
|
variable.
|
625
|
-
:param pulumi.Input[Mapping[str,
|
625
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
626
626
|
:param pulumi.Input[str] external_id: Optional extra protection that must match the trust policy granting access to the
|
627
627
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
628
628
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
@@ -678,7 +678,7 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
678
678
|
|
679
679
|
@property
|
680
680
|
@pulumi.getter(name="customTags")
|
681
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
681
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
682
682
|
"""
|
683
683
|
Custom tags to set on the secret managed at the destination.
|
684
684
|
"""
|