pulumi-vault 6.4.0a1728368050__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +5 -0
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +5 -0
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +5 -0
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +5 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2019 -68
- pulumi_vault/database/outputs.py +5 -0
- pulumi_vault/database/secret_backend_connection.py +5 -0
- pulumi_vault/database/secret_backend_role.py +5 -0
- pulumi_vault/database/secret_backend_static_role.py +5 -0
- pulumi_vault/database/secrets_mount.py +5 -0
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +5 -0
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +5 -0
- pulumi_vault/gcp/secret_static_account.py +5 -0
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +24 -4
- pulumi_vault/generic/secret.py +5 -0
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +17 -4
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +18 -4
- pulumi_vault/get_policy_document.py +15 -4
- pulumi_vault/get_raft_autopilot_state.py +23 -4
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +5 -0
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +34 -4
- pulumi_vault/identity/get_group.py +40 -4
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +15 -4
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +5 -0
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +5 -0
- pulumi_vault/jwt/auth_backend_role.py +5 -0
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +5 -0
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +32 -0
- pulumi_vault/kv/get_secret.py +19 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
- pulumi_vault/kv/get_secret_v2.py +25 -4
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +5 -0
- pulumi_vault/kv/secret.py +5 -0
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +5 -0
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +5 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +5 -0
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +5 -0
- pulumi_vault/namespace.py +5 -0
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +5 -0
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +41 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +5 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +17 -4
- pulumi_vault/pkisecret/outputs.py +5 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +5 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +5 -0
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +5 -0
- pulumi_vault/secrets/sync_aws_destination.py +5 -0
- pulumi_vault/secrets/sync_azure_destination.py +5 -0
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +5 -0
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +5 -0
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -0
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +28 -4
- pulumi_vault/transform/get_encode.py +28 -4
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +5 -0
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +5 -0
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
- pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
- pulumi_vault-6.4.0a1728368050.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.4.0a1728368050.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -150,9 +155,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
150
155
|
namespace=pulumi.get(__ret__, 'namespace'),
|
151
156
|
role=pulumi.get(__ret__, 'role'),
|
152
157
|
secret_id=pulumi.get(__ret__, 'secret_id'))
|
153
|
-
|
154
|
-
|
155
|
-
@_utilities.lift_output_func(get_nomad_access_token)
|
156
158
|
def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
157
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
158
160
|
role: Optional[pulumi.Input[str]] = None,
|
@@ -193,4 +195,16 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
193
195
|
:param str role: The name of the Nomad secret backend role to generate
|
194
196
|
a token for, with no leading or trailing `/`s.
|
195
197
|
"""
|
196
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['namespace'] = namespace
|
201
|
+
__args__['role'] = role
|
202
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetNomadAccessTokenResult(
|
205
|
+
accessor_id=pulumi.get(__response__, 'accessor_id'),
|
206
|
+
backend=pulumi.get(__response__, 'backend'),
|
207
|
+
id=pulumi.get(__response__, 'id'),
|
208
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
209
|
+
role=pulumi.get(__response__, 'role'),
|
210
|
+
secret_id=pulumi.get(__response__, 'secret_id')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -115,9 +120,6 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
115
120
|
id=pulumi.get(__ret__, 'id'),
|
116
121
|
namespace=pulumi.get(__ret__, 'namespace'),
|
117
122
|
rules=pulumi.get(__ret__, 'rules'))
|
118
|
-
|
119
|
-
|
120
|
-
@_utilities.lift_output_func(get_policy_document)
|
121
123
|
def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
122
124
|
rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None,
|
123
125
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]:
|
@@ -146,4 +148,13 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
146
148
|
policy=example.hcl)
|
147
149
|
```
|
148
150
|
"""
|
149
|
-
|
151
|
+
__args__ = dict()
|
152
|
+
__args__['namespace'] = namespace
|
153
|
+
__args__['rules'] = rules
|
154
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
155
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult)
|
156
|
+
return __ret__.apply(lambda __response__: GetPolicyDocumentResult(
|
157
|
+
hcl=pulumi.get(__response__, 'hcl'),
|
158
|
+
id=pulumi.get(__response__, 'id'),
|
159
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
160
|
+
rules=pulumi.get(__response__, 'rules')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -223,9 +228,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
223
228
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
224
229
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
225
230
|
voters=pulumi.get(__ret__, 'voters'))
|
226
|
-
|
227
|
-
|
228
|
-
@_utilities.lift_output_func(get_raft_autopilot_state)
|
229
231
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
230
232
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
231
233
|
"""
|
@@ -245,4 +247,21 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
245
247
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
246
248
|
*Available only for Vault Enterprise*.
|
247
249
|
"""
|
248
|
-
|
250
|
+
__args__ = dict()
|
251
|
+
__args__['namespace'] = namespace
|
252
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
|
+
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
|
+
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
256
|
+
healthy=pulumi.get(__response__, 'healthy'),
|
257
|
+
id=pulumi.get(__response__, 'id'),
|
258
|
+
leader=pulumi.get(__response__, 'leader'),
|
259
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
260
|
+
optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
|
261
|
+
redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
|
262
|
+
redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
|
263
|
+
servers=pulumi.get(__response__, 'servers'),
|
264
|
+
servers_json=pulumi.get(__response__, 'servers_json'),
|
265
|
+
upgrade_info=pulumi.get(__response__, 'upgrade_info'),
|
266
|
+
upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
|
267
|
+
voters=pulumi.get(__response__, 'voters')))
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TeamArgs', 'Team']
|
pulumi_vault/github/user.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['UserArgs', 'User']
|
pulumi_vault/identity/entity.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityArgs', 'Entity']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityAliasArgs', 'EntityAlias']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityPoliciesArgs', 'EntityPolicies']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
@@ -311,9 +316,6 @@ def get_entity(alias_id: Optional[str] = None,
|
|
311
316
|
namespace=pulumi.get(__ret__, 'namespace'),
|
312
317
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
313
318
|
policies=pulumi.get(__ret__, 'policies'))
|
314
|
-
|
315
|
-
|
316
|
-
@_utilities.lift_output_func(get_entity)
|
317
319
|
def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
318
320
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
319
321
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -351,4 +353,32 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
351
353
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
352
354
|
*Available only for Vault Enterprise*.
|
353
355
|
"""
|
354
|
-
|
356
|
+
__args__ = dict()
|
357
|
+
__args__['aliasId'] = alias_id
|
358
|
+
__args__['aliasMountAccessor'] = alias_mount_accessor
|
359
|
+
__args__['aliasName'] = alias_name
|
360
|
+
__args__['entityId'] = entity_id
|
361
|
+
__args__['entityName'] = entity_name
|
362
|
+
__args__['namespace'] = namespace
|
363
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
364
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
|
365
|
+
return __ret__.apply(lambda __response__: GetEntityResult(
|
366
|
+
alias_id=pulumi.get(__response__, 'alias_id'),
|
367
|
+
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
368
|
+
alias_name=pulumi.get(__response__, 'alias_name'),
|
369
|
+
aliases=pulumi.get(__response__, 'aliases'),
|
370
|
+
creation_time=pulumi.get(__response__, 'creation_time'),
|
371
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
372
|
+
direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
|
373
|
+
disabled=pulumi.get(__response__, 'disabled'),
|
374
|
+
entity_id=pulumi.get(__response__, 'entity_id'),
|
375
|
+
entity_name=pulumi.get(__response__, 'entity_name'),
|
376
|
+
group_ids=pulumi.get(__response__, 'group_ids'),
|
377
|
+
id=pulumi.get(__response__, 'id'),
|
378
|
+
inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
|
379
|
+
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
380
|
+
merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
|
381
|
+
metadata=pulumi.get(__response__, 'metadata'),
|
382
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
383
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
384
|
+
policies=pulumi.get(__response__, 'policies')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -388,9 +393,6 @@ def get_group(alias_id: Optional[str] = None,
|
|
388
393
|
parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
|
389
394
|
policies=pulumi.get(__ret__, 'policies'),
|
390
395
|
type=pulumi.get(__ret__, 'type'))
|
391
|
-
|
392
|
-
|
393
|
-
@_utilities.lift_output_func(get_group)
|
394
396
|
def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
395
397
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
396
398
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -428,4 +430,38 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
428
430
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
429
431
|
*Available only for Vault Enterprise*.
|
430
432
|
"""
|
431
|
-
|
433
|
+
__args__ = dict()
|
434
|
+
__args__['aliasId'] = alias_id
|
435
|
+
__args__['aliasMountAccessor'] = alias_mount_accessor
|
436
|
+
__args__['aliasName'] = alias_name
|
437
|
+
__args__['groupId'] = group_id
|
438
|
+
__args__['groupName'] = group_name
|
439
|
+
__args__['namespace'] = namespace
|
440
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
441
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
|
442
|
+
return __ret__.apply(lambda __response__: GetGroupResult(
|
443
|
+
alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
|
444
|
+
alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
|
445
|
+
alias_id=pulumi.get(__response__, 'alias_id'),
|
446
|
+
alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
|
447
|
+
alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
|
448
|
+
alias_metadata=pulumi.get(__response__, 'alias_metadata'),
|
449
|
+
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
450
|
+
alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
|
451
|
+
alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
|
452
|
+
alias_name=pulumi.get(__response__, 'alias_name'),
|
453
|
+
creation_time=pulumi.get(__response__, 'creation_time'),
|
454
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
455
|
+
group_id=pulumi.get(__response__, 'group_id'),
|
456
|
+
group_name=pulumi.get(__response__, 'group_name'),
|
457
|
+
id=pulumi.get(__response__, 'id'),
|
458
|
+
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
459
|
+
member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
|
460
|
+
member_group_ids=pulumi.get(__response__, 'member_group_ids'),
|
461
|
+
metadata=pulumi.get(__response__, 'metadata'),
|
462
|
+
modify_index=pulumi.get(__response__, 'modify_index'),
|
463
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
464
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
465
|
+
parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
|
466
|
+
policies=pulumi.get(__response__, 'policies'),
|
467
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -128,9 +133,6 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
128
133
|
id=pulumi.get(__ret__, 'id'),
|
129
134
|
name=pulumi.get(__ret__, 'name'),
|
130
135
|
namespace=pulumi.get(__ret__, 'namespace'))
|
131
|
-
|
132
|
-
|
133
|
-
@_utilities.lift_output_func(get_oidc_client_creds)
|
134
136
|
def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
135
137
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
138
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
|
@@ -160,4 +162,14 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
160
162
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
163
|
*Available only for Vault Enterprise*.
|
162
164
|
"""
|
163
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['name'] = name
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
|
170
|
+
return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
|
171
|
+
client_id=pulumi.get(__response__, 'client_id'),
|
172
|
+
client_secret=pulumi.get(__response__, 'client_secret'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
name=pulumi.get(__response__, 'name'),
|
175
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -268,9 +273,6 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
268
273
|
token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
|
269
274
|
token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
|
270
275
|
userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
|
271
|
-
|
272
|
-
|
273
|
-
@_utilities.lift_output_func(get_oidc_openid_config)
|
274
276
|
def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
275
277
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
276
278
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
|
@@ -309,4 +311,24 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
309
311
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
310
312
|
*Available only for Vault Enterprise*.
|
311
313
|
"""
|
312
|
-
|
314
|
+
__args__ = dict()
|
315
|
+
__args__['name'] = name
|
316
|
+
__args__['namespace'] = namespace
|
317
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
318
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
|
319
|
+
return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
|
320
|
+
authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
|
321
|
+
grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
|
322
|
+
id=pulumi.get(__response__, 'id'),
|
323
|
+
id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
|
324
|
+
issuer=pulumi.get(__response__, 'issuer'),
|
325
|
+
jwks_uri=pulumi.get(__response__, 'jwks_uri'),
|
326
|
+
name=pulumi.get(__response__, 'name'),
|
327
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
328
|
+
request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
|
329
|
+
response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
|
330
|
+
scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
|
331
|
+
subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
|
332
|
+
token_endpoint=pulumi.get(__response__, 'token_endpoint'),
|
333
|
+
token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
|
334
|
+
userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -124,9 +129,6 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
124
129
|
keys=pulumi.get(__ret__, 'keys'),
|
125
130
|
name=pulumi.get(__ret__, 'name'),
|
126
131
|
namespace=pulumi.get(__ret__, 'namespace'))
|
127
|
-
|
128
|
-
|
129
|
-
@_utilities.lift_output_func(get_oidc_public_keys)
|
130
132
|
def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
131
133
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
132
134
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
|
@@ -165,4 +167,13 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
165
167
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
166
168
|
*Available only for Vault Enterprise*.
|
167
169
|
"""
|
168
|
-
|
170
|
+
__args__ = dict()
|
171
|
+
__args__['name'] = name
|
172
|
+
__args__['namespace'] = namespace
|
173
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
174
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
|
175
|
+
return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
|
176
|
+
id=pulumi.get(__response__, 'id'),
|
177
|
+
keys=pulumi.get(__response__, 'keys'),
|
178
|
+
name=pulumi.get(__response__, 'name'),
|
179
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
pulumi_vault/identity/group.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupArgs', 'Group']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupAliasArgs', 'GroupAlias']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupPoliciesArgs', 'GroupPolicies']
|
pulumi_vault/identity/mfa_duo.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|