pulumi-vault 6.5.0__tar.gz → 6.5.0a1732603022__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/PKG-INFO +4 -4
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/__init__.py +0 -24
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/get_access_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_sts_role.py +0 -47
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/get_access_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/get_static_access_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend.py +0 -141
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/get_access_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/_inputs.py +0 -40
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/outputs.py +0 -28
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/get_auth_backend_role.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/get_secret.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_auth_backend.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_auth_backends.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_namespace.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_namespaces.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_nomad_access_token.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_policy_document.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/get_raft_autopilot_state.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_entity.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_group.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secret_v2.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secrets_list.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/get_static_credentials.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/__init__.py +0 -4
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/_inputs.py +0 -34
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_key.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/outputs.py +0 -40
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_role.py +0 -47
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/secret_backend_role.py +0 -27
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/get_decode.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/get_encode.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/get_decrypt.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/get_encrypt.py +2 -2
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/PKG-INFO +4 -4
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/SOURCES.txt +0 -4
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/requires.txt +1 -1
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pyproject.toml +3 -3
- pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
- pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_config_acme.py +0 -642
- pulumi_vault-6.5.0/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
- pulumi_vault-6.5.0/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/README.md +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/token.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/setup.cfg +0 -0
@@ -1,15 +1,15 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_vault
|
3
|
-
Version: 6.5.
|
3
|
+
Version: 6.5.0a1732603022
|
4
4
|
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-vault
|
8
8
|
Keywords: pulumi,vault
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.8
|
10
10
|
Description-Content-Type: text/markdown
|
11
11
|
Requires-Dist: parver>=0.2.1
|
12
|
-
Requires-Dist: pulumi<4.0.0,>=3.
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.136.0
|
13
13
|
Requires-Dist: semver>=2.8.1
|
14
14
|
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
15
15
|
|
@@ -1013,22 +1013,6 @@ _utilities.register(
|
|
1013
1013
|
"vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
|
1014
1014
|
}
|
1015
1015
|
},
|
1016
|
-
{
|
1017
|
-
"pkg": "vault",
|
1018
|
-
"mod": "pkiSecret/backendAcmeEab",
|
1019
|
-
"fqn": "pulumi_vault.pkisecret",
|
1020
|
-
"classes": {
|
1021
|
-
"vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
|
1022
|
-
}
|
1023
|
-
},
|
1024
|
-
{
|
1025
|
-
"pkg": "vault",
|
1026
|
-
"mod": "pkiSecret/backendConfigAcme",
|
1027
|
-
"fqn": "pulumi_vault.pkisecret",
|
1028
|
-
"classes": {
|
1029
|
-
"vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
|
1030
|
-
}
|
1031
|
-
},
|
1032
1016
|
{
|
1033
1017
|
"pkg": "vault",
|
1034
1018
|
"mod": "pkiSecret/backendConfigCluster",
|
@@ -1037,14 +1021,6 @@ _utilities.register(
|
|
1037
1021
|
"vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
|
1038
1022
|
}
|
1039
1023
|
},
|
1040
|
-
{
|
1041
|
-
"pkg": "vault",
|
1042
|
-
"mod": "pkiSecret/backendConfigCmpv2",
|
1043
|
-
"fqn": "pulumi_vault.pkisecret",
|
1044
|
-
"classes": {
|
1045
|
-
"vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
|
1046
|
-
}
|
1047
|
-
},
|
1048
1024
|
{
|
1049
1025
|
"pkg": "vault",
|
1050
1026
|
"mod": "pkiSecret/backendConfigEst",
|
{pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/ad/get_access_credentials.py
RENAMED
@@ -147,7 +147,7 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
147
147
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
148
148
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
149
149
|
role: Optional[pulumi.Input[str]] = None,
|
150
|
-
opts: Optional[
|
150
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
151
151
|
"""
|
152
152
|
## Example Usage
|
153
153
|
|
@@ -165,7 +165,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
165
165
|
__args__['backend'] = backend
|
166
166
|
__args__['namespace'] = namespace
|
167
167
|
__args__['role'] = role
|
168
|
-
opts = pulumi.
|
168
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
169
|
__ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
170
170
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
171
171
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -131,7 +131,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
|
|
131
131
|
def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
132
132
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
133
133
|
role_name: Optional[pulumi.Input[str]] = None,
|
134
|
-
opts: Optional[
|
134
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
|
135
135
|
"""
|
136
136
|
Reads the Role ID of an AppRole from a Vault server.
|
137
137
|
|
@@ -159,7 +159,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
|
|
159
159
|
__args__['backend'] = backend
|
160
160
|
__args__['namespace'] = namespace
|
161
161
|
__args__['roleName'] = role_name
|
162
|
-
opts = pulumi.
|
162
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
163
163
|
__ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
|
164
164
|
return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
|
165
165
|
backend=pulumi.get(__response__, 'backend'),
|
{pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/auth_backend_sts_role.py
RENAMED
@@ -22,7 +22,6 @@ class AuthBackendStsRoleArgs:
|
|
22
22
|
account_id: pulumi.Input[str],
|
23
23
|
sts_role: pulumi.Input[str],
|
24
24
|
backend: Optional[pulumi.Input[str]] = None,
|
25
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
26
25
|
namespace: Optional[pulumi.Input[str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendStsRole resource.
|
@@ -31,7 +30,6 @@ class AuthBackendStsRoleArgs:
|
|
31
30
|
by EC2 instances in the account specified by `account_id`.
|
32
31
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
33
32
|
mounted at. Defaults to `aws`.
|
34
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
35
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
34
|
The value should not contain leading or trailing forward slashes.
|
37
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -41,8 +39,6 @@ class AuthBackendStsRoleArgs:
|
|
41
39
|
pulumi.set(__self__, "sts_role", sts_role)
|
42
40
|
if backend is not None:
|
43
41
|
pulumi.set(__self__, "backend", backend)
|
44
|
-
if external_id is not None:
|
45
|
-
pulumi.set(__self__, "external_id", external_id)
|
46
42
|
if namespace is not None:
|
47
43
|
pulumi.set(__self__, "namespace", namespace)
|
48
44
|
|
@@ -84,18 +80,6 @@ class AuthBackendStsRoleArgs:
|
|
84
80
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
85
81
|
pulumi.set(self, "backend", value)
|
86
82
|
|
87
|
-
@property
|
88
|
-
@pulumi.getter(name="externalId")
|
89
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
90
|
-
"""
|
91
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
92
|
-
"""
|
93
|
-
return pulumi.get(self, "external_id")
|
94
|
-
|
95
|
-
@external_id.setter
|
96
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
97
|
-
pulumi.set(self, "external_id", value)
|
98
|
-
|
99
83
|
@property
|
100
84
|
@pulumi.getter
|
101
85
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -117,7 +101,6 @@ class _AuthBackendStsRoleState:
|
|
117
101
|
def __init__(__self__, *,
|
118
102
|
account_id: Optional[pulumi.Input[str]] = None,
|
119
103
|
backend: Optional[pulumi.Input[str]] = None,
|
120
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
121
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
122
105
|
sts_role: Optional[pulumi.Input[str]] = None):
|
123
106
|
"""
|
@@ -125,7 +108,6 @@ class _AuthBackendStsRoleState:
|
|
125
108
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
126
109
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
127
110
|
mounted at. Defaults to `aws`.
|
128
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
129
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
130
112
|
The value should not contain leading or trailing forward slashes.
|
131
113
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -137,8 +119,6 @@ class _AuthBackendStsRoleState:
|
|
137
119
|
pulumi.set(__self__, "account_id", account_id)
|
138
120
|
if backend is not None:
|
139
121
|
pulumi.set(__self__, "backend", backend)
|
140
|
-
if external_id is not None:
|
141
|
-
pulumi.set(__self__, "external_id", external_id)
|
142
122
|
if namespace is not None:
|
143
123
|
pulumi.set(__self__, "namespace", namespace)
|
144
124
|
if sts_role is not None:
|
@@ -169,18 +149,6 @@ class _AuthBackendStsRoleState:
|
|
169
149
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
170
150
|
pulumi.set(self, "backend", value)
|
171
151
|
|
172
|
-
@property
|
173
|
-
@pulumi.getter(name="externalId")
|
174
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
175
|
-
"""
|
176
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
177
|
-
"""
|
178
|
-
return pulumi.get(self, "external_id")
|
179
|
-
|
180
|
-
@external_id.setter
|
181
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
182
|
-
pulumi.set(self, "external_id", value)
|
183
|
-
|
184
152
|
@property
|
185
153
|
@pulumi.getter
|
186
154
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -217,7 +185,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
217
185
|
opts: Optional[pulumi.ResourceOptions] = None,
|
218
186
|
account_id: Optional[pulumi.Input[str]] = None,
|
219
187
|
backend: Optional[pulumi.Input[str]] = None,
|
220
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
221
188
|
namespace: Optional[pulumi.Input[str]] = None,
|
222
189
|
sts_role: Optional[pulumi.Input[str]] = None,
|
223
190
|
__props__=None):
|
@@ -248,7 +215,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
248
215
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
249
216
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
250
217
|
mounted at. Defaults to `aws`.
|
251
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
252
218
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
253
219
|
The value should not contain leading or trailing forward slashes.
|
254
220
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -301,7 +267,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
301
267
|
opts: Optional[pulumi.ResourceOptions] = None,
|
302
268
|
account_id: Optional[pulumi.Input[str]] = None,
|
303
269
|
backend: Optional[pulumi.Input[str]] = None,
|
304
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
305
270
|
namespace: Optional[pulumi.Input[str]] = None,
|
306
271
|
sts_role: Optional[pulumi.Input[str]] = None,
|
307
272
|
__props__=None):
|
@@ -317,7 +282,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
317
282
|
raise TypeError("Missing required property 'account_id'")
|
318
283
|
__props__.__dict__["account_id"] = account_id
|
319
284
|
__props__.__dict__["backend"] = backend
|
320
|
-
__props__.__dict__["external_id"] = external_id
|
321
285
|
__props__.__dict__["namespace"] = namespace
|
322
286
|
if sts_role is None and not opts.urn:
|
323
287
|
raise TypeError("Missing required property 'sts_role'")
|
@@ -334,7 +298,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
334
298
|
opts: Optional[pulumi.ResourceOptions] = None,
|
335
299
|
account_id: Optional[pulumi.Input[str]] = None,
|
336
300
|
backend: Optional[pulumi.Input[str]] = None,
|
337
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
338
301
|
namespace: Optional[pulumi.Input[str]] = None,
|
339
302
|
sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
|
340
303
|
"""
|
@@ -347,7 +310,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
347
310
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
348
311
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
349
312
|
mounted at. Defaults to `aws`.
|
350
|
-
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
351
313
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
352
314
|
The value should not contain leading or trailing forward slashes.
|
353
315
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -361,7 +323,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
361
323
|
|
362
324
|
__props__.__dict__["account_id"] = account_id
|
363
325
|
__props__.__dict__["backend"] = backend
|
364
|
-
__props__.__dict__["external_id"] = external_id
|
365
326
|
__props__.__dict__["namespace"] = namespace
|
366
327
|
__props__.__dict__["sts_role"] = sts_role
|
367
328
|
return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
|
@@ -383,14 +344,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
383
344
|
"""
|
384
345
|
return pulumi.get(self, "backend")
|
385
346
|
|
386
|
-
@property
|
387
|
-
@pulumi.getter(name="externalId")
|
388
|
-
def external_id(self) -> pulumi.Output[Optional[str]]:
|
389
|
-
"""
|
390
|
-
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
391
|
-
"""
|
392
|
-
return pulumi.get(self, "external_id")
|
393
|
-
|
394
347
|
@property
|
395
348
|
@pulumi.getter
|
396
349
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
{pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/aws/get_access_credentials.py
RENAMED
@@ -258,7 +258,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
258
258
|
role_arn: Optional[pulumi.Input[Optional[str]]] = None,
|
259
259
|
ttl: Optional[pulumi.Input[Optional[str]]] = None,
|
260
260
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
261
|
-
opts: Optional[
|
261
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
262
262
|
"""
|
263
263
|
## Example Usage
|
264
264
|
|
@@ -291,7 +291,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
291
291
|
__args__['roleArn'] = role_arn
|
292
292
|
__args__['ttl'] = ttl
|
293
293
|
__args__['type'] = type
|
294
|
-
opts = pulumi.
|
294
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
295
295
|
__ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
296
296
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
297
297
|
access_key=pulumi.get(__response__, 'access_key'),
|
@@ -118,7 +118,7 @@ def get_static_access_credentials(backend: Optional[str] = None,
|
|
118
118
|
def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
119
119
|
name: Optional[pulumi.Input[str]] = None,
|
120
120
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
121
|
-
opts: Optional[
|
121
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
|
122
122
|
"""
|
123
123
|
Use this data source to access information about an existing resource.
|
124
124
|
"""
|
@@ -126,7 +126,7 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] =
|
|
126
126
|
__args__['backend'] = backend
|
127
127
|
__args__['name'] = name
|
128
128
|
__args__['namespace'] = namespace
|
129
|
-
opts = pulumi.
|
129
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
130
130
|
__ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
|
131
131
|
return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
|
132
132
|
access_key=pulumi.get(__response__, 'access_key'),
|
@@ -35,9 +35,6 @@ class SecretBackendArgs:
|
|
35
35
|
role_arn: Optional[pulumi.Input[str]] = None,
|
36
36
|
secret_key: Optional[pulumi.Input[str]] = None,
|
37
37
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
38
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
41
38
|
username_template: Optional[pulumi.Input[str]] = None):
|
42
39
|
"""
|
43
40
|
The set of arguments for constructing a SecretBackend resource.
|
@@ -74,9 +71,6 @@ class SecretBackendArgs:
|
|
74
71
|
```
|
75
72
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
76
73
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
77
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
79
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
80
74
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
81
75
|
"""
|
82
76
|
if access_key is not None:
|
@@ -111,12 +105,6 @@ class SecretBackendArgs:
|
|
111
105
|
pulumi.set(__self__, "secret_key", secret_key)
|
112
106
|
if sts_endpoint is not None:
|
113
107
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
114
|
-
if sts_fallback_endpoints is not None:
|
115
|
-
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
116
|
-
if sts_fallback_regions is not None:
|
117
|
-
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
118
|
-
if sts_region is not None:
|
119
|
-
pulumi.set(__self__, "sts_region", sts_region)
|
120
108
|
if username_template is not None:
|
121
109
|
pulumi.set(__self__, "username_template", username_template)
|
122
110
|
|
@@ -329,42 +317,6 @@ class SecretBackendArgs:
|
|
329
317
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
330
318
|
pulumi.set(self, "sts_endpoint", value)
|
331
319
|
|
332
|
-
@property
|
333
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
334
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
335
|
-
"""
|
336
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
337
|
-
"""
|
338
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
339
|
-
|
340
|
-
@sts_fallback_endpoints.setter
|
341
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
342
|
-
pulumi.set(self, "sts_fallback_endpoints", value)
|
343
|
-
|
344
|
-
@property
|
345
|
-
@pulumi.getter(name="stsFallbackRegions")
|
346
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
347
|
-
"""
|
348
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
349
|
-
"""
|
350
|
-
return pulumi.get(self, "sts_fallback_regions")
|
351
|
-
|
352
|
-
@sts_fallback_regions.setter
|
353
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
354
|
-
pulumi.set(self, "sts_fallback_regions", value)
|
355
|
-
|
356
|
-
@property
|
357
|
-
@pulumi.getter(name="stsRegion")
|
358
|
-
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
359
|
-
"""
|
360
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
361
|
-
"""
|
362
|
-
return pulumi.get(self, "sts_region")
|
363
|
-
|
364
|
-
@sts_region.setter
|
365
|
-
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
366
|
-
pulumi.set(self, "sts_region", value)
|
367
|
-
|
368
320
|
@property
|
369
321
|
@pulumi.getter(name="usernameTemplate")
|
370
322
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -397,9 +349,6 @@ class _SecretBackendState:
|
|
397
349
|
role_arn: Optional[pulumi.Input[str]] = None,
|
398
350
|
secret_key: Optional[pulumi.Input[str]] = None,
|
399
351
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
400
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
401
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
402
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
403
352
|
username_template: Optional[pulumi.Input[str]] = None):
|
404
353
|
"""
|
405
354
|
Input properties used for looking up and filtering SecretBackend resources.
|
@@ -436,9 +385,6 @@ class _SecretBackendState:
|
|
436
385
|
```
|
437
386
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
438
387
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
439
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
440
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
441
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
442
388
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
443
389
|
"""
|
444
390
|
if access_key is not None:
|
@@ -473,12 +419,6 @@ class _SecretBackendState:
|
|
473
419
|
pulumi.set(__self__, "secret_key", secret_key)
|
474
420
|
if sts_endpoint is not None:
|
475
421
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
476
|
-
if sts_fallback_endpoints is not None:
|
477
|
-
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
478
|
-
if sts_fallback_regions is not None:
|
479
|
-
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
480
|
-
if sts_region is not None:
|
481
|
-
pulumi.set(__self__, "sts_region", sts_region)
|
482
422
|
if username_template is not None:
|
483
423
|
pulumi.set(__self__, "username_template", username_template)
|
484
424
|
|
@@ -691,42 +631,6 @@ class _SecretBackendState:
|
|
691
631
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
692
632
|
pulumi.set(self, "sts_endpoint", value)
|
693
633
|
|
694
|
-
@property
|
695
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
696
|
-
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
697
|
-
"""
|
698
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
699
|
-
"""
|
700
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
701
|
-
|
702
|
-
@sts_fallback_endpoints.setter
|
703
|
-
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
704
|
-
pulumi.set(self, "sts_fallback_endpoints", value)
|
705
|
-
|
706
|
-
@property
|
707
|
-
@pulumi.getter(name="stsFallbackRegions")
|
708
|
-
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
709
|
-
"""
|
710
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
711
|
-
"""
|
712
|
-
return pulumi.get(self, "sts_fallback_regions")
|
713
|
-
|
714
|
-
@sts_fallback_regions.setter
|
715
|
-
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
716
|
-
pulumi.set(self, "sts_fallback_regions", value)
|
717
|
-
|
718
|
-
@property
|
719
|
-
@pulumi.getter(name="stsRegion")
|
720
|
-
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
721
|
-
"""
|
722
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
723
|
-
"""
|
724
|
-
return pulumi.get(self, "sts_region")
|
725
|
-
|
726
|
-
@sts_region.setter
|
727
|
-
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
728
|
-
pulumi.set(self, "sts_region", value)
|
729
|
-
|
730
634
|
@property
|
731
635
|
@pulumi.getter(name="usernameTemplate")
|
732
636
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -761,9 +665,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
761
665
|
role_arn: Optional[pulumi.Input[str]] = None,
|
762
666
|
secret_key: Optional[pulumi.Input[str]] = None,
|
763
667
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
764
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
765
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
766
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
767
668
|
username_template: Optional[pulumi.Input[str]] = None,
|
768
669
|
__props__=None):
|
769
670
|
"""
|
@@ -810,9 +711,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
810
711
|
```
|
811
712
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
812
713
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
813
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
814
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
815
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
816
714
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
817
715
|
"""
|
818
716
|
...
|
@@ -861,9 +759,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
861
759
|
role_arn: Optional[pulumi.Input[str]] = None,
|
862
760
|
secret_key: Optional[pulumi.Input[str]] = None,
|
863
761
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
864
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
865
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
866
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
867
762
|
username_template: Optional[pulumi.Input[str]] = None,
|
868
763
|
__props__=None):
|
869
764
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -890,9 +785,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
890
785
|
__props__.__dict__["role_arn"] = role_arn
|
891
786
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
892
787
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
893
|
-
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
894
|
-
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
895
|
-
__props__.__dict__["sts_region"] = sts_region
|
896
788
|
__props__.__dict__["username_template"] = username_template
|
897
789
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
|
898
790
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
@@ -922,9 +814,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
922
814
|
role_arn: Optional[pulumi.Input[str]] = None,
|
923
815
|
secret_key: Optional[pulumi.Input[str]] = None,
|
924
816
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
925
|
-
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
926
|
-
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
927
|
-
sts_region: Optional[pulumi.Input[str]] = None,
|
928
817
|
username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
929
818
|
"""
|
930
819
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
@@ -966,9 +855,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
966
855
|
```
|
967
856
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
968
857
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
969
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
970
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
971
|
-
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
972
858
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
973
859
|
"""
|
974
860
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -991,9 +877,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
991
877
|
__props__.__dict__["role_arn"] = role_arn
|
992
878
|
__props__.__dict__["secret_key"] = secret_key
|
993
879
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
994
|
-
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
995
|
-
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
996
|
-
__props__.__dict__["sts_region"] = sts_region
|
997
880
|
__props__.__dict__["username_template"] = username_template
|
998
881
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
999
882
|
|
@@ -1142,30 +1025,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1142
1025
|
"""
|
1143
1026
|
return pulumi.get(self, "sts_endpoint")
|
1144
1027
|
|
1145
|
-
@property
|
1146
|
-
@pulumi.getter(name="stsFallbackEndpoints")
|
1147
|
-
def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1148
|
-
"""
|
1149
|
-
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
1150
|
-
"""
|
1151
|
-
return pulumi.get(self, "sts_fallback_endpoints")
|
1152
|
-
|
1153
|
-
@property
|
1154
|
-
@pulumi.getter(name="stsFallbackRegions")
|
1155
|
-
def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1156
|
-
"""
|
1157
|
-
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
1158
|
-
"""
|
1159
|
-
return pulumi.get(self, "sts_fallback_regions")
|
1160
|
-
|
1161
|
-
@property
|
1162
|
-
@pulumi.getter(name="stsRegion")
|
1163
|
-
def sts_region(self) -> pulumi.Output[Optional[str]]:
|
1164
|
-
"""
|
1165
|
-
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
1166
|
-
"""
|
1167
|
-
return pulumi.get(self, "sts_region")
|
1168
|
-
|
1169
1028
|
@property
|
1170
1029
|
@pulumi.getter(name="usernameTemplate")
|
1171
1030
|
def username_template(self) -> pulumi.Output[str]:
|
{pulumi_vault-6.5.0 → pulumi_vault-6.5.0a1732603022}/pulumi_vault/azure/get_access_credentials.py
RENAMED
@@ -313,7 +313,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
313
313
|
subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
|
314
314
|
tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
|
315
315
|
validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
|
316
|
-
opts: Optional[
|
316
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
317
317
|
"""
|
318
318
|
## Example Usage
|
319
319
|
|
@@ -378,7 +378,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
378
378
|
__args__['subscriptionId'] = subscription_id
|
379
379
|
__args__['tenantId'] = tenant_id
|
380
380
|
__args__['validateCreds'] = validate_creds
|
381
|
-
opts = pulumi.
|
381
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
382
382
|
__ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
383
383
|
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
384
384
|
backend=pulumi.get(__response__, 'backend'),
|