pulumi-vault 6.7.0a1745304689__tar.gz → 6.8.0a1745477458__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/PKG-INFO +1 -1
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/_inputs.py +33 -13
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/backend_role.py +47 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_namespaces.py +60 -11
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/outputs.py +21 -9
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pyproject.toml +1 -1
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/README.md +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/get_static_access_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/cert_auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/__init__.pyi +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/ui_custom_message.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_auth_backends.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_namespace.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_raft_autopilot_state.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/get_dynamic_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/get_static_credentials.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_acme_eab.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_config_acme.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_config_auto_tidy.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_config_cluster.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/backend_config_est.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_cert_metadata.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_config_est.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_issuer.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_issuers.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_key.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/get_backend_keys.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/plugin.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/plugin_pinned_version.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/quota_lease_count.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/quota_rate_limit.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/saml/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/saml/auth_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/saml/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_association.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_aws_destination.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_azure_destination.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_gcp_destination.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_gh_destination.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_github_apps.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/secrets/sync_vercel_destination.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/get_secret_backend_sign.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/token.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/get_sign.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/get_verify.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/setup.cfg +0 -0
@@ -2238,6 +2238,10 @@ if not MYPY:
|
|
2238
2238
|
"""
|
2239
2239
|
A list of parameters that must be specified.
|
2240
2240
|
"""
|
2241
|
+
subscribe_event_types: NotRequired[Sequence[builtins.str]]
|
2242
|
+
"""
|
2243
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
2244
|
+
"""
|
2241
2245
|
elif False:
|
2242
2246
|
GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
|
2243
2247
|
|
@@ -2251,7 +2255,8 @@ class GetPolicyDocumentRuleArgs:
|
|
2251
2255
|
description: Optional[builtins.str] = None,
|
2252
2256
|
max_wrapping_ttl: Optional[builtins.str] = None,
|
2253
2257
|
min_wrapping_ttl: Optional[builtins.str] = None,
|
2254
|
-
required_parameters: Optional[Sequence[builtins.str]] = None
|
2258
|
+
required_parameters: Optional[Sequence[builtins.str]] = None,
|
2259
|
+
subscribe_event_types: Optional[Sequence[builtins.str]] = None):
|
2255
2260
|
"""
|
2256
2261
|
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2257
2262
|
:param builtins.str path: A path in Vault that this rule applies to.
|
@@ -2261,6 +2266,7 @@ class GetPolicyDocumentRuleArgs:
|
|
2261
2266
|
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
2262
2267
|
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
2263
2268
|
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
2269
|
+
:param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
2264
2270
|
"""
|
2265
2271
|
pulumi.set(__self__, "capabilities", capabilities)
|
2266
2272
|
pulumi.set(__self__, "path", path)
|
@@ -2276,6 +2282,8 @@ class GetPolicyDocumentRuleArgs:
|
|
2276
2282
|
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
2277
2283
|
if required_parameters is not None:
|
2278
2284
|
pulumi.set(__self__, "required_parameters", required_parameters)
|
2285
|
+
if subscribe_event_types is not None:
|
2286
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
2279
2287
|
|
2280
2288
|
@property
|
2281
2289
|
@pulumi.getter
|
@@ -2373,16 +2381,28 @@ class GetPolicyDocumentRuleArgs:
|
|
2373
2381
|
def required_parameters(self, value: Optional[Sequence[builtins.str]]):
|
2374
2382
|
pulumi.set(self, "required_parameters", value)
|
2375
2383
|
|
2384
|
+
@property
|
2385
|
+
@pulumi.getter(name="subscribeEventTypes")
|
2386
|
+
def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
|
2387
|
+
"""
|
2388
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
2389
|
+
"""
|
2390
|
+
return pulumi.get(self, "subscribe_event_types")
|
2391
|
+
|
2392
|
+
@subscribe_event_types.setter
|
2393
|
+
def subscribe_event_types(self, value: Optional[Sequence[builtins.str]]):
|
2394
|
+
pulumi.set(self, "subscribe_event_types", value)
|
2395
|
+
|
2376
2396
|
|
2377
2397
|
if not MYPY:
|
2378
2398
|
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
2379
2399
|
key: builtins.str
|
2380
2400
|
"""
|
2381
|
-
|
2401
|
+
Name of permitted key.
|
2382
2402
|
"""
|
2383
2403
|
values: Sequence[builtins.str]
|
2384
2404
|
"""
|
2385
|
-
list of values what are permitted
|
2405
|
+
A list of values what are permitted by policy rule.
|
2386
2406
|
"""
|
2387
2407
|
elif False:
|
2388
2408
|
GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -2393,8 +2413,8 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
2393
2413
|
key: builtins.str,
|
2394
2414
|
values: Sequence[builtins.str]):
|
2395
2415
|
"""
|
2396
|
-
:param builtins.str key:
|
2397
|
-
:param Sequence[builtins.str] values: list of values what are permitted
|
2416
|
+
:param builtins.str key: Name of permitted key.
|
2417
|
+
:param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
|
2398
2418
|
"""
|
2399
2419
|
pulumi.set(__self__, "key", key)
|
2400
2420
|
pulumi.set(__self__, "values", values)
|
@@ -2403,7 +2423,7 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
2403
2423
|
@pulumi.getter
|
2404
2424
|
def key(self) -> builtins.str:
|
2405
2425
|
"""
|
2406
|
-
|
2426
|
+
Name of permitted key.
|
2407
2427
|
"""
|
2408
2428
|
return pulumi.get(self, "key")
|
2409
2429
|
|
@@ -2415,7 +2435,7 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
2415
2435
|
@pulumi.getter
|
2416
2436
|
def values(self) -> Sequence[builtins.str]:
|
2417
2437
|
"""
|
2418
|
-
list of values what are permitted
|
2438
|
+
A list of values what are permitted by policy rule.
|
2419
2439
|
"""
|
2420
2440
|
return pulumi.get(self, "values")
|
2421
2441
|
|
@@ -2428,11 +2448,11 @@ if not MYPY:
|
|
2428
2448
|
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
2429
2449
|
key: builtins.str
|
2430
2450
|
"""
|
2431
|
-
|
2451
|
+
Name of denied key.
|
2432
2452
|
"""
|
2433
2453
|
values: Sequence[builtins.str]
|
2434
2454
|
"""
|
2435
|
-
list of values what are
|
2455
|
+
A list of values what are denied by policy rule.
|
2436
2456
|
"""
|
2437
2457
|
elif False:
|
2438
2458
|
GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -2443,8 +2463,8 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
2443
2463
|
key: builtins.str,
|
2444
2464
|
values: Sequence[builtins.str]):
|
2445
2465
|
"""
|
2446
|
-
:param builtins.str key:
|
2447
|
-
:param Sequence[builtins.str] values: list of values what are
|
2466
|
+
:param builtins.str key: Name of denied key.
|
2467
|
+
:param Sequence[builtins.str] values: A list of values what are denied by policy rule.
|
2448
2468
|
"""
|
2449
2469
|
pulumi.set(__self__, "key", key)
|
2450
2470
|
pulumi.set(__self__, "values", values)
|
@@ -2453,7 +2473,7 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
2453
2473
|
@pulumi.getter
|
2454
2474
|
def key(self) -> builtins.str:
|
2455
2475
|
"""
|
2456
|
-
|
2476
|
+
Name of denied key.
|
2457
2477
|
"""
|
2458
2478
|
return pulumi.get(self, "key")
|
2459
2479
|
|
@@ -2465,7 +2485,7 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
2465
2485
|
@pulumi.getter
|
2466
2486
|
def values(self) -> Sequence[builtins.str]:
|
2467
2487
|
"""
|
2468
|
-
list of values what are
|
2488
|
+
A list of values what are denied by policy rule.
|
2469
2489
|
"""
|
2470
2490
|
return pulumi.get(self, "values")
|
2471
2491
|
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/azure/backend_role.py
RENAMED
@@ -28,6 +28,7 @@ class BackendRoleArgs:
|
|
28
28
|
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]]] = None,
|
29
29
|
backend: Optional[pulumi.Input[builtins.str]] = None,
|
30
30
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
explicit_max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
31
32
|
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
32
33
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
33
34
|
permanently_delete: Optional[pulumi.Input[builtins.bool]] = None,
|
@@ -43,6 +44,7 @@ class BackendRoleArgs:
|
|
43
44
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
44
45
|
:param pulumi.Input[builtins.str] backend: Path to the mounted Azure auth backend
|
45
46
|
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
|
47
|
+
:param pulumi.Input[builtins.str] explicit_max_ttl: Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
46
48
|
:param pulumi.Input[builtins.str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
47
49
|
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time.
|
48
50
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
@@ -68,6 +70,8 @@ class BackendRoleArgs:
|
|
68
70
|
pulumi.set(__self__, "backend", backend)
|
69
71
|
if description is not None:
|
70
72
|
pulumi.set(__self__, "description", description)
|
73
|
+
if explicit_max_ttl is not None:
|
74
|
+
pulumi.set(__self__, "explicit_max_ttl", explicit_max_ttl)
|
71
75
|
if max_ttl is not None:
|
72
76
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
73
77
|
if namespace is not None:
|
@@ -154,6 +158,18 @@ class BackendRoleArgs:
|
|
154
158
|
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
155
159
|
pulumi.set(self, "description", value)
|
156
160
|
|
161
|
+
@property
|
162
|
+
@pulumi.getter(name="explicitMaxTtl")
|
163
|
+
def explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
164
|
+
"""
|
165
|
+
Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "explicit_max_ttl")
|
168
|
+
|
169
|
+
@explicit_max_ttl.setter
|
170
|
+
def explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
171
|
+
pulumi.set(self, "explicit_max_ttl", value)
|
172
|
+
|
157
173
|
@property
|
158
174
|
@pulumi.getter(name="maxTtl")
|
159
175
|
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
@@ -242,6 +258,7 @@ class _BackendRoleState:
|
|
242
258
|
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]]] = None,
|
243
259
|
backend: Optional[pulumi.Input[builtins.str]] = None,
|
244
260
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
261
|
+
explicit_max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
245
262
|
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
246
263
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
247
264
|
permanently_delete: Optional[pulumi.Input[builtins.bool]] = None,
|
@@ -257,6 +274,7 @@ class _BackendRoleState:
|
|
257
274
|
:param pulumi.Input[Sequence[pulumi.Input['BackendRoleAzureRoleArgs']]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
258
275
|
:param pulumi.Input[builtins.str] backend: Path to the mounted Azure auth backend
|
259
276
|
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
|
277
|
+
:param pulumi.Input[builtins.str] explicit_max_ttl: Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
260
278
|
:param pulumi.Input[builtins.str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
261
279
|
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time.
|
262
280
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
@@ -282,6 +300,8 @@ class _BackendRoleState:
|
|
282
300
|
pulumi.set(__self__, "backend", backend)
|
283
301
|
if description is not None:
|
284
302
|
pulumi.set(__self__, "description", description)
|
303
|
+
if explicit_max_ttl is not None:
|
304
|
+
pulumi.set(__self__, "explicit_max_ttl", explicit_max_ttl)
|
285
305
|
if max_ttl is not None:
|
286
306
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
287
307
|
if namespace is not None:
|
@@ -358,6 +378,18 @@ class _BackendRoleState:
|
|
358
378
|
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
359
379
|
pulumi.set(self, "description", value)
|
360
380
|
|
381
|
+
@property
|
382
|
+
@pulumi.getter(name="explicitMaxTtl")
|
383
|
+
def explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
384
|
+
"""
|
385
|
+
Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
386
|
+
"""
|
387
|
+
return pulumi.get(self, "explicit_max_ttl")
|
388
|
+
|
389
|
+
@explicit_max_ttl.setter
|
390
|
+
def explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
391
|
+
pulumi.set(self, "explicit_max_ttl", value)
|
392
|
+
|
361
393
|
@property
|
362
394
|
@pulumi.getter(name="maxTtl")
|
363
395
|
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
@@ -460,6 +492,7 @@ class BackendRole(pulumi.CustomResource):
|
|
460
492
|
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
461
493
|
backend: Optional[pulumi.Input[builtins.str]] = None,
|
462
494
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
495
|
+
explicit_max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
463
496
|
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
464
497
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
465
498
|
permanently_delete: Optional[pulumi.Input[builtins.bool]] = None,
|
@@ -510,6 +543,7 @@ class BackendRole(pulumi.CustomResource):
|
|
510
543
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
511
544
|
:param pulumi.Input[builtins.str] backend: Path to the mounted Azure auth backend
|
512
545
|
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
|
546
|
+
:param pulumi.Input[builtins.str] explicit_max_ttl: Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
513
547
|
:param pulumi.Input[builtins.str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
514
548
|
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time.
|
515
549
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
@@ -585,6 +619,7 @@ class BackendRole(pulumi.CustomResource):
|
|
585
619
|
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
586
620
|
backend: Optional[pulumi.Input[builtins.str]] = None,
|
587
621
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
622
|
+
explicit_max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
588
623
|
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
589
624
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
590
625
|
permanently_delete: Optional[pulumi.Input[builtins.bool]] = None,
|
@@ -606,6 +641,7 @@ class BackendRole(pulumi.CustomResource):
|
|
606
641
|
__props__.__dict__["azure_roles"] = azure_roles
|
607
642
|
__props__.__dict__["backend"] = backend
|
608
643
|
__props__.__dict__["description"] = description
|
644
|
+
__props__.__dict__["explicit_max_ttl"] = explicit_max_ttl
|
609
645
|
__props__.__dict__["max_ttl"] = max_ttl
|
610
646
|
__props__.__dict__["namespace"] = namespace
|
611
647
|
__props__.__dict__["permanently_delete"] = permanently_delete
|
@@ -630,6 +666,7 @@ class BackendRole(pulumi.CustomResource):
|
|
630
666
|
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
631
667
|
backend: Optional[pulumi.Input[builtins.str]] = None,
|
632
668
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
669
|
+
explicit_max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
633
670
|
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
634
671
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
635
672
|
permanently_delete: Optional[pulumi.Input[builtins.bool]] = None,
|
@@ -650,6 +687,7 @@ class BackendRole(pulumi.CustomResource):
|
|
650
687
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
651
688
|
:param pulumi.Input[builtins.str] backend: Path to the mounted Azure auth backend
|
652
689
|
:param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
|
690
|
+
:param pulumi.Input[builtins.str] explicit_max_ttl: Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
653
691
|
:param pulumi.Input[builtins.str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
654
692
|
suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine max TTL time.
|
655
693
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
@@ -674,6 +712,7 @@ class BackendRole(pulumi.CustomResource):
|
|
674
712
|
__props__.__dict__["azure_roles"] = azure_roles
|
675
713
|
__props__.__dict__["backend"] = backend
|
676
714
|
__props__.__dict__["description"] = description
|
715
|
+
__props__.__dict__["explicit_max_ttl"] = explicit_max_ttl
|
677
716
|
__props__.__dict__["max_ttl"] = max_ttl
|
678
717
|
__props__.__dict__["namespace"] = namespace
|
679
718
|
__props__.__dict__["permanently_delete"] = permanently_delete
|
@@ -724,6 +763,14 @@ class BackendRole(pulumi.CustomResource):
|
|
724
763
|
"""
|
725
764
|
return pulumi.get(self, "description")
|
726
765
|
|
766
|
+
@property
|
767
|
+
@pulumi.getter(name="explicitMaxTtl")
|
768
|
+
def explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
769
|
+
"""
|
770
|
+
Specifies the explicit maximum lifetime of the lease and service principal generated using this role. If not set or set to 0, will use the system default (10 years). Requires Vault 1.18+.
|
771
|
+
"""
|
772
|
+
return pulumi.get(self, "explicit_max_ttl")
|
773
|
+
|
727
774
|
@property
|
728
775
|
@pulumi.getter(name="maxTtl")
|
729
776
|
def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/get_namespaces.py
RENAMED
@@ -27,7 +27,7 @@ class GetNamespacesResult:
|
|
27
27
|
"""
|
28
28
|
A collection of values returned by getNamespaces.
|
29
29
|
"""
|
30
|
-
def __init__(__self__, id=None, namespace=None, paths=None):
|
30
|
+
def __init__(__self__, id=None, namespace=None, paths=None, paths_fqs=None, recursive=None):
|
31
31
|
if id and not isinstance(id, str):
|
32
32
|
raise TypeError("Expected argument 'id' to be a str")
|
33
33
|
pulumi.set(__self__, "id", id)
|
@@ -37,6 +37,12 @@ class GetNamespacesResult:
|
|
37
37
|
if paths and not isinstance(paths, list):
|
38
38
|
raise TypeError("Expected argument 'paths' to be a list")
|
39
39
|
pulumi.set(__self__, "paths", paths)
|
40
|
+
if paths_fqs and not isinstance(paths_fqs, list):
|
41
|
+
raise TypeError("Expected argument 'paths_fqs' to be a list")
|
42
|
+
pulumi.set(__self__, "paths_fqs", paths_fqs)
|
43
|
+
if recursive and not isinstance(recursive, bool):
|
44
|
+
raise TypeError("Expected argument 'recursive' to be a bool")
|
45
|
+
pulumi.set(__self__, "recursive", recursive)
|
40
46
|
|
41
47
|
@property
|
42
48
|
@pulumi.getter
|
@@ -55,10 +61,23 @@ class GetNamespacesResult:
|
|
55
61
|
@pulumi.getter
|
56
62
|
def paths(self) -> Sequence[builtins.str]:
|
57
63
|
"""
|
58
|
-
Set of the paths of
|
64
|
+
Set of the paths of child namespaces.
|
59
65
|
"""
|
60
66
|
return pulumi.get(self, "paths")
|
61
67
|
|
68
|
+
@property
|
69
|
+
@pulumi.getter(name="pathsFqs")
|
70
|
+
def paths_fqs(self) -> Sequence[builtins.str]:
|
71
|
+
"""
|
72
|
+
Set of the fully qualified paths of child namespaces.
|
73
|
+
"""
|
74
|
+
return pulumi.get(self, "paths_fqs")
|
75
|
+
|
76
|
+
@property
|
77
|
+
@pulumi.getter
|
78
|
+
def recursive(self) -> Optional[builtins.bool]:
|
79
|
+
return pulumi.get(self, "recursive")
|
80
|
+
|
62
81
|
|
63
82
|
class AwaitableGetNamespacesResult(GetNamespacesResult):
|
64
83
|
# pylint: disable=using-constant-test
|
@@ -68,15 +87,18 @@ class AwaitableGetNamespacesResult(GetNamespacesResult):
|
|
68
87
|
return GetNamespacesResult(
|
69
88
|
id=self.id,
|
70
89
|
namespace=self.namespace,
|
71
|
-
paths=self.paths
|
90
|
+
paths=self.paths,
|
91
|
+
paths_fqs=self.paths_fqs,
|
92
|
+
recursive=self.recursive)
|
72
93
|
|
73
94
|
|
74
95
|
def get_namespaces(namespace: Optional[builtins.str] = None,
|
96
|
+
recursive: Optional[builtins.bool] = None,
|
75
97
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNamespacesResult:
|
76
98
|
"""
|
77
99
|
## Example Usage
|
78
100
|
|
79
|
-
###
|
101
|
+
### Direct child namespaces
|
80
102
|
|
81
103
|
```python
|
82
104
|
import pulumi
|
@@ -85,9 +107,18 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
|
|
85
107
|
children = vault.get_namespaces()
|
86
108
|
```
|
87
109
|
|
88
|
-
###
|
110
|
+
### All child namespaces
|
89
111
|
|
90
|
-
|
112
|
+
```python
|
113
|
+
import pulumi
|
114
|
+
import pulumi_vault as vault
|
115
|
+
|
116
|
+
children = vault.get_namespaces(recursive=True)
|
117
|
+
```
|
118
|
+
|
119
|
+
### Child namespace details
|
120
|
+
|
121
|
+
To fetch the details of child namespaces:
|
91
122
|
|
92
123
|
```python
|
93
124
|
import pulumi
|
@@ -102,22 +133,27 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
|
|
102
133
|
:param builtins.str namespace: The namespace to provision the resource in.
|
103
134
|
The value should not contain leading or trailing forward slashes.
|
104
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
136
|
+
:param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
|
105
137
|
"""
|
106
138
|
__args__ = dict()
|
107
139
|
__args__['namespace'] = namespace
|
140
|
+
__args__['recursive'] = recursive
|
108
141
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
109
142
|
__ret__ = pulumi.runtime.invoke('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult).value
|
110
143
|
|
111
144
|
return AwaitableGetNamespacesResult(
|
112
145
|
id=pulumi.get(__ret__, 'id'),
|
113
146
|
namespace=pulumi.get(__ret__, 'namespace'),
|
114
|
-
paths=pulumi.get(__ret__, 'paths')
|
147
|
+
paths=pulumi.get(__ret__, 'paths'),
|
148
|
+
paths_fqs=pulumi.get(__ret__, 'paths_fqs'),
|
149
|
+
recursive=pulumi.get(__ret__, 'recursive'))
|
115
150
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
151
|
+
recursive: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
116
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNamespacesResult]:
|
117
153
|
"""
|
118
154
|
## Example Usage
|
119
155
|
|
120
|
-
###
|
156
|
+
### Direct child namespaces
|
121
157
|
|
122
158
|
```python
|
123
159
|
import pulumi
|
@@ -126,9 +162,18 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
|
|
126
162
|
children = vault.get_namespaces()
|
127
163
|
```
|
128
164
|
|
129
|
-
###
|
165
|
+
### All child namespaces
|
166
|
+
|
167
|
+
```python
|
168
|
+
import pulumi
|
169
|
+
import pulumi_vault as vault
|
170
|
+
|
171
|
+
children = vault.get_namespaces(recursive=True)
|
172
|
+
```
|
173
|
+
|
174
|
+
### Child namespace details
|
130
175
|
|
131
|
-
To fetch the details of
|
176
|
+
To fetch the details of child namespaces:
|
132
177
|
|
133
178
|
```python
|
134
179
|
import pulumi
|
@@ -143,12 +188,16 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
|
|
143
188
|
:param builtins.str namespace: The namespace to provision the resource in.
|
144
189
|
The value should not contain leading or trailing forward slashes.
|
145
190
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
191
|
+
:param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
|
146
192
|
"""
|
147
193
|
__args__ = dict()
|
148
194
|
__args__['namespace'] = namespace
|
195
|
+
__args__['recursive'] = recursive
|
149
196
|
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
150
197
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
151
198
|
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
152
199
|
id=pulumi.get(__response__, 'id'),
|
153
200
|
namespace=pulumi.get(__response__, 'namespace'),
|
154
|
-
paths=pulumi.get(__response__, 'paths')
|
201
|
+
paths=pulumi.get(__response__, 'paths'),
|
202
|
+
paths_fqs=pulumi.get(__response__, 'paths_fqs'),
|
203
|
+
recursive=pulumi.get(__response__, 'recursive')))
|
@@ -187,7 +187,8 @@ class GetPolicyDocumentRuleResult(dict):
|
|
187
187
|
description: Optional[builtins.str] = None,
|
188
188
|
max_wrapping_ttl: Optional[builtins.str] = None,
|
189
189
|
min_wrapping_ttl: Optional[builtins.str] = None,
|
190
|
-
required_parameters: Optional[Sequence[builtins.str]] = None
|
190
|
+
required_parameters: Optional[Sequence[builtins.str]] = None,
|
191
|
+
subscribe_event_types: Optional[Sequence[builtins.str]] = None):
|
191
192
|
"""
|
192
193
|
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
193
194
|
:param builtins.str path: A path in Vault that this rule applies to.
|
@@ -197,6 +198,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
197
198
|
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
198
199
|
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
199
200
|
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
201
|
+
:param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
200
202
|
"""
|
201
203
|
pulumi.set(__self__, "capabilities", capabilities)
|
202
204
|
pulumi.set(__self__, "path", path)
|
@@ -212,6 +214,8 @@ class GetPolicyDocumentRuleResult(dict):
|
|
212
214
|
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
213
215
|
if required_parameters is not None:
|
214
216
|
pulumi.set(__self__, "required_parameters", required_parameters)
|
217
|
+
if subscribe_event_types is not None:
|
218
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
215
219
|
|
216
220
|
@property
|
217
221
|
@pulumi.getter
|
@@ -277,6 +281,14 @@ class GetPolicyDocumentRuleResult(dict):
|
|
277
281
|
"""
|
278
282
|
return pulumi.get(self, "required_parameters")
|
279
283
|
|
284
|
+
@property
|
285
|
+
@pulumi.getter(name="subscribeEventTypes")
|
286
|
+
def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
|
287
|
+
"""
|
288
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
289
|
+
"""
|
290
|
+
return pulumi.get(self, "subscribe_event_types")
|
291
|
+
|
280
292
|
|
281
293
|
@pulumi.output_type
|
282
294
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
@@ -284,8 +296,8 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
284
296
|
key: builtins.str,
|
285
297
|
values: Sequence[builtins.str]):
|
286
298
|
"""
|
287
|
-
:param builtins.str key:
|
288
|
-
:param Sequence[builtins.str] values: list of values what are permitted
|
299
|
+
:param builtins.str key: Name of permitted key.
|
300
|
+
:param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
|
289
301
|
"""
|
290
302
|
pulumi.set(__self__, "key", key)
|
291
303
|
pulumi.set(__self__, "values", values)
|
@@ -294,7 +306,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
294
306
|
@pulumi.getter
|
295
307
|
def key(self) -> builtins.str:
|
296
308
|
"""
|
297
|
-
|
309
|
+
Name of permitted key.
|
298
310
|
"""
|
299
311
|
return pulumi.get(self, "key")
|
300
312
|
|
@@ -302,7 +314,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
302
314
|
@pulumi.getter
|
303
315
|
def values(self) -> Sequence[builtins.str]:
|
304
316
|
"""
|
305
|
-
list of values what are permitted
|
317
|
+
A list of values what are permitted by policy rule.
|
306
318
|
"""
|
307
319
|
return pulumi.get(self, "values")
|
308
320
|
|
@@ -313,8 +325,8 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
313
325
|
key: builtins.str,
|
314
326
|
values: Sequence[builtins.str]):
|
315
327
|
"""
|
316
|
-
:param builtins.str key:
|
317
|
-
:param Sequence[builtins.str] values: list of values what are
|
328
|
+
:param builtins.str key: Name of denied key.
|
329
|
+
:param Sequence[builtins.str] values: A list of values what are denied by policy rule.
|
318
330
|
"""
|
319
331
|
pulumi.set(__self__, "key", key)
|
320
332
|
pulumi.set(__self__, "values", values)
|
@@ -323,7 +335,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
323
335
|
@pulumi.getter
|
324
336
|
def key(self) -> builtins.str:
|
325
337
|
"""
|
326
|
-
|
338
|
+
Name of denied key.
|
327
339
|
"""
|
328
340
|
return pulumi.get(self, "key")
|
329
341
|
|
@@ -331,7 +343,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
331
343
|
@pulumi.getter
|
332
344
|
def values(self) -> Sequence[builtins.str]:
|
333
345
|
"""
|
334
|
-
list of values what are
|
346
|
+
A list of values what are denied by policy rule.
|
335
347
|
"""
|
336
348
|
return pulumi.get(self, "values")
|
337
349
|
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_backend.py
RENAMED
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_library.py
RENAMED
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/ad/secret_role.py
RENAMED
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/alicloud/__init__.py
RENAMED
File without changes
|
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/approle/__init__.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/audit_request_header.py
RENAMED
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/auth_backend.py
RENAMED
File without changes
|
{pulumi_vault-6.7.0a1745304689 → pulumi_vault-6.8.0a1745477458}/pulumi_vault/aws/__init__.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|