pulumi-vault 6.5.0a1736850018__tar.gz → 6.5.0a1737047276__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/PKG-INFO +1 -1
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/__init__.py +24 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_sts_role.py +47 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/secret_backend.py +141 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/_inputs.py +40 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/outputs.py +28 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/__init__.py +4 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/_inputs.py +34 -0
- pulumi_vault-6.5.0a1737047276/pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault-6.5.0a1737047276/pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault-6.5.0a1737047276/pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault-6.5.0a1737047276/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/outputs.py +40 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_role.py +47 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ssh/secret_backend_role.py +27 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault.egg-info/SOURCES.txt +4 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pyproject.toml +1 -1
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/README.md +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_auth_backends.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_namespace.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_namespaces.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/get_raft_autopilot_state.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/get_static_credentials.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/token.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/setup.cfg +0 -0
@@ -1013,6 +1013,22 @@ _utilities.register(
|
|
1013
1013
|
"vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
|
1014
1014
|
}
|
1015
1015
|
},
|
1016
|
+
{
|
1017
|
+
"pkg": "vault",
|
1018
|
+
"mod": "pkiSecret/backendAcmeEab",
|
1019
|
+
"fqn": "pulumi_vault.pkisecret",
|
1020
|
+
"classes": {
|
1021
|
+
"vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
|
1022
|
+
}
|
1023
|
+
},
|
1024
|
+
{
|
1025
|
+
"pkg": "vault",
|
1026
|
+
"mod": "pkiSecret/backendConfigAcme",
|
1027
|
+
"fqn": "pulumi_vault.pkisecret",
|
1028
|
+
"classes": {
|
1029
|
+
"vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
|
1030
|
+
}
|
1031
|
+
},
|
1016
1032
|
{
|
1017
1033
|
"pkg": "vault",
|
1018
1034
|
"mod": "pkiSecret/backendConfigCluster",
|
@@ -1021,6 +1037,14 @@ _utilities.register(
|
|
1021
1037
|
"vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
|
1022
1038
|
}
|
1023
1039
|
},
|
1040
|
+
{
|
1041
|
+
"pkg": "vault",
|
1042
|
+
"mod": "pkiSecret/backendConfigCmpv2",
|
1043
|
+
"fqn": "pulumi_vault.pkisecret",
|
1044
|
+
"classes": {
|
1045
|
+
"vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
|
1046
|
+
}
|
1047
|
+
},
|
1024
1048
|
{
|
1025
1049
|
"pkg": "vault",
|
1026
1050
|
"mod": "pkiSecret/backendConfigEst",
|
@@ -22,6 +22,7 @@ class AuthBackendStsRoleArgs:
|
|
22
22
|
account_id: pulumi.Input[str],
|
23
23
|
sts_role: pulumi.Input[str],
|
24
24
|
backend: Optional[pulumi.Input[str]] = None,
|
25
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
25
26
|
namespace: Optional[pulumi.Input[str]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a AuthBackendStsRole resource.
|
@@ -30,6 +31,7 @@ class AuthBackendStsRoleArgs:
|
|
30
31
|
by EC2 instances in the account specified by `account_id`.
|
31
32
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
32
33
|
mounted at. Defaults to `aws`.
|
34
|
+
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
33
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
36
|
The value should not contain leading or trailing forward slashes.
|
35
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -39,6 +41,8 @@ class AuthBackendStsRoleArgs:
|
|
39
41
|
pulumi.set(__self__, "sts_role", sts_role)
|
40
42
|
if backend is not None:
|
41
43
|
pulumi.set(__self__, "backend", backend)
|
44
|
+
if external_id is not None:
|
45
|
+
pulumi.set(__self__, "external_id", external_id)
|
42
46
|
if namespace is not None:
|
43
47
|
pulumi.set(__self__, "namespace", namespace)
|
44
48
|
|
@@ -80,6 +84,18 @@ class AuthBackendStsRoleArgs:
|
|
80
84
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
81
85
|
pulumi.set(self, "backend", value)
|
82
86
|
|
87
|
+
@property
|
88
|
+
@pulumi.getter(name="externalId")
|
89
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
90
|
+
"""
|
91
|
+
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
92
|
+
"""
|
93
|
+
return pulumi.get(self, "external_id")
|
94
|
+
|
95
|
+
@external_id.setter
|
96
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
97
|
+
pulumi.set(self, "external_id", value)
|
98
|
+
|
83
99
|
@property
|
84
100
|
@pulumi.getter
|
85
101
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -101,6 +117,7 @@ class _AuthBackendStsRoleState:
|
|
101
117
|
def __init__(__self__, *,
|
102
118
|
account_id: Optional[pulumi.Input[str]] = None,
|
103
119
|
backend: Optional[pulumi.Input[str]] = None,
|
120
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
104
121
|
namespace: Optional[pulumi.Input[str]] = None,
|
105
122
|
sts_role: Optional[pulumi.Input[str]] = None):
|
106
123
|
"""
|
@@ -108,6 +125,7 @@ class _AuthBackendStsRoleState:
|
|
108
125
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
109
126
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
110
127
|
mounted at. Defaults to `aws`.
|
128
|
+
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
111
129
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
112
130
|
The value should not contain leading or trailing forward slashes.
|
113
131
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -119,6 +137,8 @@ class _AuthBackendStsRoleState:
|
|
119
137
|
pulumi.set(__self__, "account_id", account_id)
|
120
138
|
if backend is not None:
|
121
139
|
pulumi.set(__self__, "backend", backend)
|
140
|
+
if external_id is not None:
|
141
|
+
pulumi.set(__self__, "external_id", external_id)
|
122
142
|
if namespace is not None:
|
123
143
|
pulumi.set(__self__, "namespace", namespace)
|
124
144
|
if sts_role is not None:
|
@@ -149,6 +169,18 @@ class _AuthBackendStsRoleState:
|
|
149
169
|
def backend(self, value: Optional[pulumi.Input[str]]):
|
150
170
|
pulumi.set(self, "backend", value)
|
151
171
|
|
172
|
+
@property
|
173
|
+
@pulumi.getter(name="externalId")
|
174
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
175
|
+
"""
|
176
|
+
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
177
|
+
"""
|
178
|
+
return pulumi.get(self, "external_id")
|
179
|
+
|
180
|
+
@external_id.setter
|
181
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
182
|
+
pulumi.set(self, "external_id", value)
|
183
|
+
|
152
184
|
@property
|
153
185
|
@pulumi.getter
|
154
186
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -185,6 +217,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
185
217
|
opts: Optional[pulumi.ResourceOptions] = None,
|
186
218
|
account_id: Optional[pulumi.Input[str]] = None,
|
187
219
|
backend: Optional[pulumi.Input[str]] = None,
|
220
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
188
221
|
namespace: Optional[pulumi.Input[str]] = None,
|
189
222
|
sts_role: Optional[pulumi.Input[str]] = None,
|
190
223
|
__props__=None):
|
@@ -215,6 +248,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
215
248
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
216
249
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
217
250
|
mounted at. Defaults to `aws`.
|
251
|
+
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
218
252
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
219
253
|
The value should not contain leading or trailing forward slashes.
|
220
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -267,6 +301,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
267
301
|
opts: Optional[pulumi.ResourceOptions] = None,
|
268
302
|
account_id: Optional[pulumi.Input[str]] = None,
|
269
303
|
backend: Optional[pulumi.Input[str]] = None,
|
304
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
270
305
|
namespace: Optional[pulumi.Input[str]] = None,
|
271
306
|
sts_role: Optional[pulumi.Input[str]] = None,
|
272
307
|
__props__=None):
|
@@ -282,6 +317,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
282
317
|
raise TypeError("Missing required property 'account_id'")
|
283
318
|
__props__.__dict__["account_id"] = account_id
|
284
319
|
__props__.__dict__["backend"] = backend
|
320
|
+
__props__.__dict__["external_id"] = external_id
|
285
321
|
__props__.__dict__["namespace"] = namespace
|
286
322
|
if sts_role is None and not opts.urn:
|
287
323
|
raise TypeError("Missing required property 'sts_role'")
|
@@ -298,6 +334,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
298
334
|
opts: Optional[pulumi.ResourceOptions] = None,
|
299
335
|
account_id: Optional[pulumi.Input[str]] = None,
|
300
336
|
backend: Optional[pulumi.Input[str]] = None,
|
337
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
301
338
|
namespace: Optional[pulumi.Input[str]] = None,
|
302
339
|
sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
|
303
340
|
"""
|
@@ -310,6 +347,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
310
347
|
:param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
|
311
348
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
312
349
|
mounted at. Defaults to `aws`.
|
350
|
+
:param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
313
351
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
314
352
|
The value should not contain leading or trailing forward slashes.
|
315
353
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -323,6 +361,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
323
361
|
|
324
362
|
__props__.__dict__["account_id"] = account_id
|
325
363
|
__props__.__dict__["backend"] = backend
|
364
|
+
__props__.__dict__["external_id"] = external_id
|
326
365
|
__props__.__dict__["namespace"] = namespace
|
327
366
|
__props__.__dict__["sts_role"] = sts_role
|
328
367
|
return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
|
@@ -344,6 +383,14 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
344
383
|
"""
|
345
384
|
return pulumi.get(self, "backend")
|
346
385
|
|
386
|
+
@property
|
387
|
+
@pulumi.getter(name="externalId")
|
388
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
389
|
+
"""
|
390
|
+
External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
|
391
|
+
"""
|
392
|
+
return pulumi.get(self, "external_id")
|
393
|
+
|
347
394
|
@property
|
348
395
|
@pulumi.getter
|
349
396
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
{pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/aws/secret_backend.py
RENAMED
@@ -35,6 +35,9 @@ class SecretBackendArgs:
|
|
35
35
|
role_arn: Optional[pulumi.Input[str]] = None,
|
36
36
|
secret_key: Optional[pulumi.Input[str]] = None,
|
37
37
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
38
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
38
41
|
username_template: Optional[pulumi.Input[str]] = None):
|
39
42
|
"""
|
40
43
|
The set of arguments for constructing a SecretBackend resource.
|
@@ -71,6 +74,9 @@ class SecretBackendArgs:
|
|
71
74
|
```
|
72
75
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
73
76
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
77
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
79
|
+
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
74
80
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
75
81
|
"""
|
76
82
|
if access_key is not None:
|
@@ -105,6 +111,12 @@ class SecretBackendArgs:
|
|
105
111
|
pulumi.set(__self__, "secret_key", secret_key)
|
106
112
|
if sts_endpoint is not None:
|
107
113
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
114
|
+
if sts_fallback_endpoints is not None:
|
115
|
+
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
116
|
+
if sts_fallback_regions is not None:
|
117
|
+
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
118
|
+
if sts_region is not None:
|
119
|
+
pulumi.set(__self__, "sts_region", sts_region)
|
108
120
|
if username_template is not None:
|
109
121
|
pulumi.set(__self__, "username_template", username_template)
|
110
122
|
|
@@ -317,6 +329,42 @@ class SecretBackendArgs:
|
|
317
329
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
318
330
|
pulumi.set(self, "sts_endpoint", value)
|
319
331
|
|
332
|
+
@property
|
333
|
+
@pulumi.getter(name="stsFallbackEndpoints")
|
334
|
+
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
335
|
+
"""
|
336
|
+
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
337
|
+
"""
|
338
|
+
return pulumi.get(self, "sts_fallback_endpoints")
|
339
|
+
|
340
|
+
@sts_fallback_endpoints.setter
|
341
|
+
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
342
|
+
pulumi.set(self, "sts_fallback_endpoints", value)
|
343
|
+
|
344
|
+
@property
|
345
|
+
@pulumi.getter(name="stsFallbackRegions")
|
346
|
+
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
347
|
+
"""
|
348
|
+
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
349
|
+
"""
|
350
|
+
return pulumi.get(self, "sts_fallback_regions")
|
351
|
+
|
352
|
+
@sts_fallback_regions.setter
|
353
|
+
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
354
|
+
pulumi.set(self, "sts_fallback_regions", value)
|
355
|
+
|
356
|
+
@property
|
357
|
+
@pulumi.getter(name="stsRegion")
|
358
|
+
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
359
|
+
"""
|
360
|
+
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
361
|
+
"""
|
362
|
+
return pulumi.get(self, "sts_region")
|
363
|
+
|
364
|
+
@sts_region.setter
|
365
|
+
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
366
|
+
pulumi.set(self, "sts_region", value)
|
367
|
+
|
320
368
|
@property
|
321
369
|
@pulumi.getter(name="usernameTemplate")
|
322
370
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -349,6 +397,9 @@ class _SecretBackendState:
|
|
349
397
|
role_arn: Optional[pulumi.Input[str]] = None,
|
350
398
|
secret_key: Optional[pulumi.Input[str]] = None,
|
351
399
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
400
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
401
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
402
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
352
403
|
username_template: Optional[pulumi.Input[str]] = None):
|
353
404
|
"""
|
354
405
|
Input properties used for looking up and filtering SecretBackend resources.
|
@@ -385,6 +436,9 @@ class _SecretBackendState:
|
|
385
436
|
```
|
386
437
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
387
438
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
439
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
440
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
441
|
+
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
388
442
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
389
443
|
"""
|
390
444
|
if access_key is not None:
|
@@ -419,6 +473,12 @@ class _SecretBackendState:
|
|
419
473
|
pulumi.set(__self__, "secret_key", secret_key)
|
420
474
|
if sts_endpoint is not None:
|
421
475
|
pulumi.set(__self__, "sts_endpoint", sts_endpoint)
|
476
|
+
if sts_fallback_endpoints is not None:
|
477
|
+
pulumi.set(__self__, "sts_fallback_endpoints", sts_fallback_endpoints)
|
478
|
+
if sts_fallback_regions is not None:
|
479
|
+
pulumi.set(__self__, "sts_fallback_regions", sts_fallback_regions)
|
480
|
+
if sts_region is not None:
|
481
|
+
pulumi.set(__self__, "sts_region", sts_region)
|
422
482
|
if username_template is not None:
|
423
483
|
pulumi.set(__self__, "username_template", username_template)
|
424
484
|
|
@@ -631,6 +691,42 @@ class _SecretBackendState:
|
|
631
691
|
def sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
632
692
|
pulumi.set(self, "sts_endpoint", value)
|
633
693
|
|
694
|
+
@property
|
695
|
+
@pulumi.getter(name="stsFallbackEndpoints")
|
696
|
+
def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
697
|
+
"""
|
698
|
+
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
699
|
+
"""
|
700
|
+
return pulumi.get(self, "sts_fallback_endpoints")
|
701
|
+
|
702
|
+
@sts_fallback_endpoints.setter
|
703
|
+
def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
704
|
+
pulumi.set(self, "sts_fallback_endpoints", value)
|
705
|
+
|
706
|
+
@property
|
707
|
+
@pulumi.getter(name="stsFallbackRegions")
|
708
|
+
def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
709
|
+
"""
|
710
|
+
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
711
|
+
"""
|
712
|
+
return pulumi.get(self, "sts_fallback_regions")
|
713
|
+
|
714
|
+
@sts_fallback_regions.setter
|
715
|
+
def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
716
|
+
pulumi.set(self, "sts_fallback_regions", value)
|
717
|
+
|
718
|
+
@property
|
719
|
+
@pulumi.getter(name="stsRegion")
|
720
|
+
def sts_region(self) -> Optional[pulumi.Input[str]]:
|
721
|
+
"""
|
722
|
+
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
723
|
+
"""
|
724
|
+
return pulumi.get(self, "sts_region")
|
725
|
+
|
726
|
+
@sts_region.setter
|
727
|
+
def sts_region(self, value: Optional[pulumi.Input[str]]):
|
728
|
+
pulumi.set(self, "sts_region", value)
|
729
|
+
|
634
730
|
@property
|
635
731
|
@pulumi.getter(name="usernameTemplate")
|
636
732
|
def username_template(self) -> Optional[pulumi.Input[str]]:
|
@@ -665,6 +761,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
665
761
|
role_arn: Optional[pulumi.Input[str]] = None,
|
666
762
|
secret_key: Optional[pulumi.Input[str]] = None,
|
667
763
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
764
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
765
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
766
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
668
767
|
username_template: Optional[pulumi.Input[str]] = None,
|
669
768
|
__props__=None):
|
670
769
|
"""
|
@@ -711,6 +810,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
711
810
|
```
|
712
811
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
713
812
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
813
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
814
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
815
|
+
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
714
816
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
715
817
|
"""
|
716
818
|
...
|
@@ -759,6 +861,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
759
861
|
role_arn: Optional[pulumi.Input[str]] = None,
|
760
862
|
secret_key: Optional[pulumi.Input[str]] = None,
|
761
863
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
864
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
865
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
866
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
762
867
|
username_template: Optional[pulumi.Input[str]] = None,
|
763
868
|
__props__=None):
|
764
869
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -785,6 +890,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
785
890
|
__props__.__dict__["role_arn"] = role_arn
|
786
891
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
787
892
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
893
|
+
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
894
|
+
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
895
|
+
__props__.__dict__["sts_region"] = sts_region
|
788
896
|
__props__.__dict__["username_template"] = username_template
|
789
897
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["accessKey", "secretKey"])
|
790
898
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
@@ -814,6 +922,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
814
922
|
role_arn: Optional[pulumi.Input[str]] = None,
|
815
923
|
secret_key: Optional[pulumi.Input[str]] = None,
|
816
924
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
925
|
+
sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
926
|
+
sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
927
|
+
sts_region: Optional[pulumi.Input[str]] = None,
|
817
928
|
username_template: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
|
818
929
|
"""
|
819
930
|
Get an existing SecretBackend resource's state with the given name, id, and optional extra
|
@@ -855,6 +966,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
855
966
|
```
|
856
967
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
857
968
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
969
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
970
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
971
|
+
:param pulumi.Input[str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
858
972
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
859
973
|
"""
|
860
974
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -877,6 +991,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
877
991
|
__props__.__dict__["role_arn"] = role_arn
|
878
992
|
__props__.__dict__["secret_key"] = secret_key
|
879
993
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
994
|
+
__props__.__dict__["sts_fallback_endpoints"] = sts_fallback_endpoints
|
995
|
+
__props__.__dict__["sts_fallback_regions"] = sts_fallback_regions
|
996
|
+
__props__.__dict__["sts_region"] = sts_region
|
880
997
|
__props__.__dict__["username_template"] = username_template
|
881
998
|
return SecretBackend(resource_name, opts=opts, __props__=__props__)
|
882
999
|
|
@@ -1025,6 +1142,30 @@ class SecretBackend(pulumi.CustomResource):
|
|
1025
1142
|
"""
|
1026
1143
|
return pulumi.get(self, "sts_endpoint")
|
1027
1144
|
|
1145
|
+
@property
|
1146
|
+
@pulumi.getter(name="stsFallbackEndpoints")
|
1147
|
+
def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1148
|
+
"""
|
1149
|
+
Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
|
1150
|
+
"""
|
1151
|
+
return pulumi.get(self, "sts_fallback_endpoints")
|
1152
|
+
|
1153
|
+
@property
|
1154
|
+
@pulumi.getter(name="stsFallbackRegions")
|
1155
|
+
def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1156
|
+
"""
|
1157
|
+
Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
|
1158
|
+
"""
|
1159
|
+
return pulumi.get(self, "sts_fallback_regions")
|
1160
|
+
|
1161
|
+
@property
|
1162
|
+
@pulumi.getter(name="stsRegion")
|
1163
|
+
def sts_region(self) -> pulumi.Output[Optional[str]]:
|
1164
|
+
"""
|
1165
|
+
Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
|
1166
|
+
"""
|
1167
|
+
return pulumi.get(self, "sts_region")
|
1168
|
+
|
1028
1169
|
@property
|
1029
1170
|
@pulumi.getter(name="usernameTemplate")
|
1030
1171
|
def username_template(self) -> pulumi.Output[str]:
|
{pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/_inputs.py
RENAMED
@@ -2625,6 +2625,10 @@ if not MYPY:
|
|
2625
2625
|
"""
|
2626
2626
|
The root credential password used in the connection URL
|
2627
2627
|
"""
|
2628
|
+
password_authentication: NotRequired[pulumi.Input[str]]
|
2629
|
+
"""
|
2630
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2631
|
+
"""
|
2628
2632
|
private_key: NotRequired[pulumi.Input[str]]
|
2629
2633
|
"""
|
2630
2634
|
The secret key used for the x509 client certificate. Must be PEM encoded.
|
@@ -2666,6 +2670,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2666
2670
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
2667
2671
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
2668
2672
|
password: Optional[pulumi.Input[str]] = None,
|
2673
|
+
password_authentication: Optional[pulumi.Input[str]] = None,
|
2669
2674
|
private_key: Optional[pulumi.Input[str]] = None,
|
2670
2675
|
self_managed: Optional[pulumi.Input[bool]] = None,
|
2671
2676
|
service_account_json: Optional[pulumi.Input[str]] = None,
|
@@ -2681,6 +2686,7 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2681
2686
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
2682
2687
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
2683
2688
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
2689
|
+
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2684
2690
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
2685
2691
|
:param pulumi.Input[bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
2686
2692
|
:param pulumi.Input[str] service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -2703,6 +2709,8 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2703
2709
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
2704
2710
|
if password is not None:
|
2705
2711
|
pulumi.set(__self__, "password", password)
|
2712
|
+
if password_authentication is not None:
|
2713
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
2706
2714
|
if private_key is not None:
|
2707
2715
|
pulumi.set(__self__, "private_key", private_key)
|
2708
2716
|
if self_managed is not None:
|
@@ -2802,6 +2810,18 @@ class SecretBackendConnectionPostgresqlArgs:
|
|
2802
2810
|
def password(self, value: Optional[pulumi.Input[str]]):
|
2803
2811
|
pulumi.set(self, "password", value)
|
2804
2812
|
|
2813
|
+
@property
|
2814
|
+
@pulumi.getter(name="passwordAuthentication")
|
2815
|
+
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
2816
|
+
"""
|
2817
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2818
|
+
"""
|
2819
|
+
return pulumi.get(self, "password_authentication")
|
2820
|
+
|
2821
|
+
@password_authentication.setter
|
2822
|
+
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
2823
|
+
pulumi.set(self, "password_authentication", value)
|
2824
|
+
|
2805
2825
|
@property
|
2806
2826
|
@pulumi.getter(name="privateKey")
|
2807
2827
|
def private_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -7703,6 +7723,10 @@ if not MYPY:
|
|
7703
7723
|
"""
|
7704
7724
|
The root credential password used in the connection URL
|
7705
7725
|
"""
|
7726
|
+
password_authentication: NotRequired[pulumi.Input[str]]
|
7727
|
+
"""
|
7728
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7729
|
+
"""
|
7706
7730
|
plugin_name: NotRequired[pulumi.Input[str]]
|
7707
7731
|
"""
|
7708
7732
|
Specifies the name of the plugin to use.
|
@@ -7760,6 +7784,7 @@ class SecretsMountPostgresqlArgs:
|
|
7760
7784
|
max_idle_connections: Optional[pulumi.Input[int]] = None,
|
7761
7785
|
max_open_connections: Optional[pulumi.Input[int]] = None,
|
7762
7786
|
password: Optional[pulumi.Input[str]] = None,
|
7787
|
+
password_authentication: Optional[pulumi.Input[str]] = None,
|
7763
7788
|
plugin_name: Optional[pulumi.Input[str]] = None,
|
7764
7789
|
private_key: Optional[pulumi.Input[str]] = None,
|
7765
7790
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -7784,6 +7809,7 @@ class SecretsMountPostgresqlArgs:
|
|
7784
7809
|
:param pulumi.Input[int] max_idle_connections: Maximum number of idle connections to the database.
|
7785
7810
|
:param pulumi.Input[int] max_open_connections: Maximum number of open connections to the database.
|
7786
7811
|
:param pulumi.Input[str] password: The root credential password used in the connection URL
|
7812
|
+
:param pulumi.Input[str] password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7787
7813
|
:param pulumi.Input[str] plugin_name: Specifies the name of the plugin to use.
|
7788
7814
|
:param pulumi.Input[str] private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
7789
7815
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
@@ -7815,6 +7841,8 @@ class SecretsMountPostgresqlArgs:
|
|
7815
7841
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
7816
7842
|
if password is not None:
|
7817
7843
|
pulumi.set(__self__, "password", password)
|
7844
|
+
if password_authentication is not None:
|
7845
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
7818
7846
|
if plugin_name is not None:
|
7819
7847
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7820
7848
|
if private_key is not None:
|
@@ -7959,6 +7987,18 @@ class SecretsMountPostgresqlArgs:
|
|
7959
7987
|
def password(self, value: Optional[pulumi.Input[str]]):
|
7960
7988
|
pulumi.set(self, "password", value)
|
7961
7989
|
|
7990
|
+
@property
|
7991
|
+
@pulumi.getter(name="passwordAuthentication")
|
7992
|
+
def password_authentication(self) -> Optional[pulumi.Input[str]]:
|
7993
|
+
"""
|
7994
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
7995
|
+
"""
|
7996
|
+
return pulumi.get(self, "password_authentication")
|
7997
|
+
|
7998
|
+
@password_authentication.setter
|
7999
|
+
def password_authentication(self, value: Optional[pulumi.Input[str]]):
|
8000
|
+
pulumi.set(self, "password_authentication", value)
|
8001
|
+
|
7962
8002
|
@property
|
7963
8003
|
@pulumi.getter(name="pluginName")
|
7964
8004
|
def plugin_name(self) -> Optional[pulumi.Input[str]]:
|
{pulumi_vault-6.5.0a1736850018 → pulumi_vault-6.5.0a1737047276}/pulumi_vault/database/outputs.py
RENAMED
@@ -1928,6 +1928,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1928
1928
|
suggest = "max_idle_connections"
|
1929
1929
|
elif key == "maxOpenConnections":
|
1930
1930
|
suggest = "max_open_connections"
|
1931
|
+
elif key == "passwordAuthentication":
|
1932
|
+
suggest = "password_authentication"
|
1931
1933
|
elif key == "privateKey":
|
1932
1934
|
suggest = "private_key"
|
1933
1935
|
elif key == "selfManaged":
|
@@ -1960,6 +1962,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1960
1962
|
max_idle_connections: Optional[int] = None,
|
1961
1963
|
max_open_connections: Optional[int] = None,
|
1962
1964
|
password: Optional[str] = None,
|
1965
|
+
password_authentication: Optional[str] = None,
|
1963
1966
|
private_key: Optional[str] = None,
|
1964
1967
|
self_managed: Optional[bool] = None,
|
1965
1968
|
service_account_json: Optional[str] = None,
|
@@ -1975,6 +1978,7 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1975
1978
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
1976
1979
|
:param int max_open_connections: Maximum number of open connections to the database.
|
1977
1980
|
:param str password: The root credential password used in the connection URL
|
1981
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
1978
1982
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
1979
1983
|
:param bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
1980
1984
|
:param str service_account_json: A JSON encoded credential for use with IAM authorization
|
@@ -1997,6 +2001,8 @@ class SecretBackendConnectionPostgresql(dict):
|
|
1997
2001
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
1998
2002
|
if password is not None:
|
1999
2003
|
pulumi.set(__self__, "password", password)
|
2004
|
+
if password_authentication is not None:
|
2005
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
2000
2006
|
if private_key is not None:
|
2001
2007
|
pulumi.set(__self__, "private_key", private_key)
|
2002
2008
|
if self_managed is not None:
|
@@ -2068,6 +2074,14 @@ class SecretBackendConnectionPostgresql(dict):
|
|
2068
2074
|
"""
|
2069
2075
|
return pulumi.get(self, "password")
|
2070
2076
|
|
2077
|
+
@property
|
2078
|
+
@pulumi.getter(name="passwordAuthentication")
|
2079
|
+
def password_authentication(self) -> Optional[str]:
|
2080
|
+
"""
|
2081
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
2082
|
+
"""
|
2083
|
+
return pulumi.get(self, "password_authentication")
|
2084
|
+
|
2071
2085
|
@property
|
2072
2086
|
@pulumi.getter(name="privateKey")
|
2073
2087
|
def private_key(self) -> Optional[str]:
|
@@ -5540,6 +5554,8 @@ class SecretsMountPostgresql(dict):
|
|
5540
5554
|
suggest = "max_idle_connections"
|
5541
5555
|
elif key == "maxOpenConnections":
|
5542
5556
|
suggest = "max_open_connections"
|
5557
|
+
elif key == "passwordAuthentication":
|
5558
|
+
suggest = "password_authentication"
|
5543
5559
|
elif key == "pluginName":
|
5544
5560
|
suggest = "plugin_name"
|
5545
5561
|
elif key == "privateKey":
|
@@ -5581,6 +5597,7 @@ class SecretsMountPostgresql(dict):
|
|
5581
5597
|
max_idle_connections: Optional[int] = None,
|
5582
5598
|
max_open_connections: Optional[int] = None,
|
5583
5599
|
password: Optional[str] = None,
|
5600
|
+
password_authentication: Optional[str] = None,
|
5584
5601
|
plugin_name: Optional[str] = None,
|
5585
5602
|
private_key: Optional[str] = None,
|
5586
5603
|
root_rotation_statements: Optional[Sequence[str]] = None,
|
@@ -5605,6 +5622,7 @@ class SecretsMountPostgresql(dict):
|
|
5605
5622
|
:param int max_idle_connections: Maximum number of idle connections to the database.
|
5606
5623
|
:param int max_open_connections: Maximum number of open connections to the database.
|
5607
5624
|
:param str password: The root credential password used in the connection URL
|
5625
|
+
:param str password_authentication: When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5608
5626
|
:param str plugin_name: Specifies the name of the plugin to use.
|
5609
5627
|
:param str private_key: The secret key used for the x509 client certificate. Must be PEM encoded.
|
5610
5628
|
:param Sequence[str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
@@ -5636,6 +5654,8 @@ class SecretsMountPostgresql(dict):
|
|
5636
5654
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
5637
5655
|
if password is not None:
|
5638
5656
|
pulumi.set(__self__, "password", password)
|
5657
|
+
if password_authentication is not None:
|
5658
|
+
pulumi.set(__self__, "password_authentication", password_authentication)
|
5639
5659
|
if plugin_name is not None:
|
5640
5660
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
5641
5661
|
if private_key is not None:
|
@@ -5740,6 +5760,14 @@ class SecretsMountPostgresql(dict):
|
|
5740
5760
|
"""
|
5741
5761
|
return pulumi.get(self, "password")
|
5742
5762
|
|
5763
|
+
@property
|
5764
|
+
@pulumi.getter(name="passwordAuthentication")
|
5765
|
+
def password_authentication(self) -> Optional[str]:
|
5766
|
+
"""
|
5767
|
+
When set to `scram-sha-256`, passwords will be hashed by Vault before being sent to PostgreSQL.
|
5768
|
+
"""
|
5769
|
+
return pulumi.get(self, "password_authentication")
|
5770
|
+
|
5743
5771
|
@property
|
5744
5772
|
@pulumi.getter(name="pluginName")
|
5745
5773
|
def plugin_name(self) -> Optional[str]:
|