pulumi-vault 6.8.0a1746427746__py3-none-any.whl → 6.8.0a1746773222__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +1 -3
- pulumi_vault/ad/secret_library.py +1 -3
- pulumi_vault/ad/secret_role.py +1 -3
- pulumi_vault/alicloud/auth_backend_role.py +1 -3
- pulumi_vault/approle/auth_backend_login.py +1 -3
- pulumi_vault/approle/auth_backend_role.py +1 -3
- pulumi_vault/approle/auth_backend_role_secret_id.py +1 -3
- pulumi_vault/audit.py +1 -3
- pulumi_vault/audit_request_header.py +1 -3
- pulumi_vault/auth_backend.py +1 -3
- pulumi_vault/aws/auth_backend_cert.py +1 -3
- pulumi_vault/aws/auth_backend_client.py +1 -3
- pulumi_vault/aws/auth_backend_config_identity.py +1 -3
- pulumi_vault/aws/auth_backend_identity_whitelist.py +1 -3
- pulumi_vault/aws/auth_backend_login.py +1 -3
- pulumi_vault/aws/auth_backend_role.py +1 -3
- pulumi_vault/aws/auth_backend_role_tag.py +1 -3
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +1 -3
- pulumi_vault/aws/auth_backend_sts_role.py +1 -3
- pulumi_vault/aws/secret_backend.py +1 -3
- pulumi_vault/aws/secret_backend_role.py +1 -3
- pulumi_vault/aws/secret_backend_static_role.py +1 -3
- pulumi_vault/azure/auth_backend_config.py +1 -3
- pulumi_vault/azure/auth_backend_role.py +1 -3
- pulumi_vault/azure/backend.py +1 -3
- pulumi_vault/azure/backend_role.py +1 -3
- pulumi_vault/cert_auth_backend_role.py +1 -3
- pulumi_vault/config/ui_custom_message.py +1 -3
- pulumi_vault/consul/secret_backend.py +1 -3
- pulumi_vault/consul/secret_backend_role.py +1 -3
- pulumi_vault/database/secret_backend_connection.py +1 -3
- pulumi_vault/database/secret_backend_role.py +1 -3
- pulumi_vault/database/secret_backend_static_role.py +1 -3
- pulumi_vault/database/secrets_mount.py +1 -3
- pulumi_vault/egp_policy.py +1 -3
- pulumi_vault/gcp/auth_backend.py +1 -3
- pulumi_vault/gcp/auth_backend_role.py +1 -3
- pulumi_vault/gcp/secret_backend.py +1 -3
- pulumi_vault/gcp/secret_impersonated_account.py +1 -3
- pulumi_vault/gcp/secret_roleset.py +1 -3
- pulumi_vault/gcp/secret_static_account.py +1 -3
- pulumi_vault/generic/endpoint.py +1 -3
- pulumi_vault/generic/secret.py +1 -3
- pulumi_vault/github/auth_backend.py +1 -3
- pulumi_vault/github/team.py +1 -3
- pulumi_vault/github/user.py +1 -3
- pulumi_vault/identity/entity.py +1 -3
- pulumi_vault/identity/entity_alias.py +1 -3
- pulumi_vault/identity/entity_policies.py +1 -3
- pulumi_vault/identity/group.py +1 -3
- pulumi_vault/identity/group_alias.py +1 -3
- pulumi_vault/identity/group_member_entity_ids.py +1 -3
- pulumi_vault/identity/group_member_group_ids.py +1 -3
- pulumi_vault/identity/group_policies.py +1 -3
- pulumi_vault/identity/mfa_duo.py +1 -3
- pulumi_vault/identity/mfa_login_enforcement.py +1 -3
- pulumi_vault/identity/mfa_okta.py +1 -3
- pulumi_vault/identity/mfa_pingid.py +1 -3
- pulumi_vault/identity/mfa_totp.py +1 -3
- pulumi_vault/identity/oidc.py +1 -3
- pulumi_vault/identity/oidc_assignment.py +1 -3
- pulumi_vault/identity/oidc_client.py +1 -3
- pulumi_vault/identity/oidc_key.py +1 -3
- pulumi_vault/identity/oidc_key_allowed_client_id.py +1 -3
- pulumi_vault/identity/oidc_provider.py +1 -3
- pulumi_vault/identity/oidc_role.py +1 -3
- pulumi_vault/identity/oidc_scope.py +1 -3
- pulumi_vault/jwt/auth_backend.py +1 -3
- pulumi_vault/jwt/auth_backend_role.py +1 -3
- pulumi_vault/kmip/secret_backend.py +1 -3
- pulumi_vault/kmip/secret_role.py +1 -3
- pulumi_vault/kmip/secret_scope.py +1 -3
- pulumi_vault/kubernetes/auth_backend_config.py +1 -3
- pulumi_vault/kubernetes/auth_backend_role.py +1 -3
- pulumi_vault/kubernetes/secret_backend.py +1 -3
- pulumi_vault/kubernetes/secret_backend_role.py +1 -3
- pulumi_vault/kv/secret.py +1 -3
- pulumi_vault/kv/secret_backend_v2.py +1 -3
- pulumi_vault/kv/secret_v2.py +1 -3
- pulumi_vault/ldap/auth_backend.py +1 -3
- pulumi_vault/ldap/auth_backend_group.py +1 -3
- pulumi_vault/ldap/auth_backend_user.py +1 -3
- pulumi_vault/ldap/secret_backend.py +1 -3
- pulumi_vault/ldap/secret_backend_dynamic_role.py +1 -3
- pulumi_vault/ldap/secret_backend_library_set.py +1 -3
- pulumi_vault/ldap/secret_backend_static_role.py +1 -3
- pulumi_vault/managed/keys.py +1 -3
- pulumi_vault/mfa_duo.py +1 -3
- pulumi_vault/mfa_okta.py +1 -3
- pulumi_vault/mfa_pingid.py +1 -3
- pulumi_vault/mfa_totp.py +1 -3
- pulumi_vault/mongodbatlas/secret_backend.py +1 -3
- pulumi_vault/mongodbatlas/secret_role.py +1 -3
- pulumi_vault/mount.py +1 -3
- pulumi_vault/namespace.py +1 -3
- pulumi_vault/nomad_secret_backend.py +1 -3
- pulumi_vault/nomad_secret_role.py +1 -3
- pulumi_vault/okta/auth_backend.py +1 -3
- pulumi_vault/okta/auth_backend_group.py +1 -3
- pulumi_vault/okta/auth_backend_user.py +1 -3
- pulumi_vault/password_policy.py +1 -3
- pulumi_vault/pkisecret/backend_acme_eab.py +1 -3
- pulumi_vault/pkisecret/backend_config_acme.py +1 -3
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1 -3
- pulumi_vault/pkisecret/backend_config_cluster.py +1 -3
- pulumi_vault/pkisecret/backend_config_cmpv2.py +1 -3
- pulumi_vault/pkisecret/backend_config_est.py +1 -3
- pulumi_vault/pkisecret/secret_backend_cert.py +1 -3
- pulumi_vault/pkisecret/secret_backend_config_ca.py +1 -3
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +1 -3
- pulumi_vault/pkisecret/secret_backend_config_urls.py +1 -3
- pulumi_vault/pkisecret/secret_backend_crl_config.py +1 -3
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1 -3
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +1 -3
- pulumi_vault/pkisecret/secret_backend_issuer.py +1 -3
- pulumi_vault/pkisecret/secret_backend_key.py +1 -3
- pulumi_vault/pkisecret/secret_backend_role.py +1 -3
- pulumi_vault/pkisecret/secret_backend_root_cert.py +1 -3
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +1 -3
- pulumi_vault/pkisecret/secret_backend_sign.py +1 -3
- pulumi_vault/plugin.py +1 -3
- pulumi_vault/plugin_pinned_version.py +1 -3
- pulumi_vault/policy.py +1 -3
- pulumi_vault/provider.py +21 -3
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +1 -3
- pulumi_vault/quota_rate_limit.py +1 -3
- pulumi_vault/rabbitmq/secret_backend.py +1 -3
- pulumi_vault/rabbitmq/secret_backend_role.py +1 -3
- pulumi_vault/raft_autopilot.py +1 -3
- pulumi_vault/raft_snapshot_agent_config.py +1 -3
- pulumi_vault/rgp_policy.py +1 -3
- pulumi_vault/saml/auth_backend.py +1 -3
- pulumi_vault/saml/auth_backend_role.py +1 -3
- pulumi_vault/secrets/sync_association.py +1 -3
- pulumi_vault/secrets/sync_aws_destination.py +1 -3
- pulumi_vault/secrets/sync_azure_destination.py +1 -3
- pulumi_vault/secrets/sync_config.py +1 -3
- pulumi_vault/secrets/sync_gcp_destination.py +1 -3
- pulumi_vault/secrets/sync_gh_destination.py +1 -3
- pulumi_vault/secrets/sync_github_apps.py +1 -3
- pulumi_vault/secrets/sync_vercel_destination.py +1 -3
- pulumi_vault/ssh/secret_backend_ca.py +1 -3
- pulumi_vault/ssh/secret_backend_role.py +1 -3
- pulumi_vault/terraformcloud/secret_backend.py +1 -3
- pulumi_vault/terraformcloud/secret_creds.py +1 -3
- pulumi_vault/terraformcloud/secret_role.py +1 -3
- pulumi_vault/token.py +1 -3
- pulumi_vault/tokenauth/auth_backend_role.py +1 -3
- pulumi_vault/transform/alphabet.py +1 -3
- pulumi_vault/transform/role.py +1 -3
- pulumi_vault/transform/template.py +1 -3
- pulumi_vault/transform/transformation.py +1 -3
- pulumi_vault/transit/secret_backend_key.py +1 -3
- pulumi_vault/transit/secret_cache_config.py +1 -3
- {pulumi_vault-6.8.0a1746427746.dist-info → pulumi_vault-6.8.0a1746773222.dist-info}/METADATA +3 -3
- pulumi_vault-6.8.0a1746773222.dist-info/RECORD +265 -0
- pulumi_vault-6.8.0a1746427746.dist-info/RECORD +0 -265
- {pulumi_vault-6.8.0a1746427746.dist-info → pulumi_vault-6.8.0a1746773222.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.8.0a1746427746.dist-info → pulumi_vault-6.8.0a1746773222.dist-info}/top_level.txt +0 -0
@@ -170,10 +170,8 @@ class _GroupAliasState:
|
|
170
170
|
pulumi.set(self, "namespace", value)
|
171
171
|
|
172
172
|
|
173
|
+
@pulumi.type_token("vault:identity/groupAlias:GroupAlias")
|
173
174
|
class GroupAlias(pulumi.CustomResource):
|
174
|
-
|
175
|
-
pulumi_type = "vault:identity/groupAlias:GroupAlias"
|
176
|
-
|
177
175
|
@overload
|
178
176
|
def __init__(__self__,
|
179
177
|
resource_name: str,
|
@@ -188,10 +188,8 @@ class _GroupMemberEntityIdsState:
|
|
188
188
|
pulumi.set(self, "namespace", value)
|
189
189
|
|
190
190
|
|
191
|
+
@pulumi.type_token("vault:identity/groupMemberEntityIds:GroupMemberEntityIds")
|
191
192
|
class GroupMemberEntityIds(pulumi.CustomResource):
|
192
|
-
|
193
|
-
pulumi_type = "vault:identity/groupMemberEntityIds:GroupMemberEntityIds"
|
194
|
-
|
195
193
|
@overload
|
196
194
|
def __init__(__self__,
|
197
195
|
resource_name: str,
|
@@ -200,10 +200,8 @@ class _GroupMemberGroupIdsState:
|
|
200
200
|
pulumi.set(self, "namespace", value)
|
201
201
|
|
202
202
|
|
203
|
+
@pulumi.type_token("vault:identity/groupMemberGroupIds:GroupMemberGroupIds")
|
203
204
|
class GroupMemberGroupIds(pulumi.CustomResource):
|
204
|
-
|
205
|
-
pulumi_type = "vault:identity/groupMemberGroupIds:GroupMemberGroupIds"
|
206
|
-
|
207
205
|
@overload
|
208
206
|
def __init__(__self__,
|
209
207
|
resource_name: str,
|
@@ -203,10 +203,8 @@ class _GroupPoliciesState:
|
|
203
203
|
pulumi.set(self, "policies", value)
|
204
204
|
|
205
205
|
|
206
|
+
@pulumi.type_token("vault:identity/groupPolicies:GroupPolicies")
|
206
207
|
class GroupPolicies(pulumi.CustomResource):
|
207
|
-
|
208
|
-
pulumi_type = "vault:identity/groupPolicies:GroupPolicies"
|
209
|
-
|
210
208
|
@overload
|
211
209
|
def __init__(__self__,
|
212
210
|
resource_name: str,
|
pulumi_vault/identity/mfa_duo.py
CHANGED
@@ -366,10 +366,8 @@ class _MfaDuoState:
|
|
366
366
|
pulumi.set(self, "uuid", value)
|
367
367
|
|
368
368
|
|
369
|
+
@pulumi.type_token("vault:identity/mfaDuo:MfaDuo")
|
369
370
|
class MfaDuo(pulumi.CustomResource):
|
370
|
-
|
371
|
-
pulumi_type = "vault:identity/mfaDuo:MfaDuo"
|
372
|
-
|
373
371
|
@overload
|
374
372
|
def __init__(__self__,
|
375
373
|
resource_name: str,
|
@@ -304,10 +304,8 @@ class _MfaLoginEnforcementState:
|
|
304
304
|
pulumi.set(self, "uuid", value)
|
305
305
|
|
306
306
|
|
307
|
+
@pulumi.type_token("vault:identity/mfaLoginEnforcement:MfaLoginEnforcement")
|
307
308
|
class MfaLoginEnforcement(pulumi.CustomResource):
|
308
|
-
|
309
|
-
pulumi_type = "vault:identity/mfaLoginEnforcement:MfaLoginEnforcement"
|
310
|
-
|
311
309
|
@overload
|
312
310
|
def __init__(__self__,
|
313
311
|
resource_name: str,
|
@@ -335,10 +335,8 @@ class _MfaOktaState:
|
|
335
335
|
pulumi.set(self, "uuid", value)
|
336
336
|
|
337
337
|
|
338
|
+
@pulumi.type_token("vault:identity/mfaOkta:MfaOkta")
|
338
339
|
class MfaOkta(pulumi.CustomResource):
|
339
|
-
|
340
|
-
pulumi_type = "vault:identity/mfaOkta:MfaOkta"
|
341
|
-
|
342
340
|
@overload
|
343
341
|
def __init__(__self__,
|
344
342
|
resource_name: str,
|
@@ -320,10 +320,8 @@ class _MfaPingidState:
|
|
320
320
|
pulumi.set(self, "uuid", value)
|
321
321
|
|
322
322
|
|
323
|
+
@pulumi.type_token("vault:identity/mfaPingid:MfaPingid")
|
323
324
|
class MfaPingid(pulumi.CustomResource):
|
324
|
-
|
325
|
-
pulumi_type = "vault:identity/mfaPingid:MfaPingid"
|
326
|
-
|
327
325
|
@overload
|
328
326
|
def __init__(__self__,
|
329
327
|
resource_name: str,
|
@@ -432,10 +432,8 @@ class _MfaTotpState:
|
|
432
432
|
pulumi.set(self, "uuid", value)
|
433
433
|
|
434
434
|
|
435
|
+
@pulumi.type_token("vault:identity/mfaTotp:MfaTotp")
|
435
436
|
class MfaTotp(pulumi.CustomResource):
|
436
|
-
|
437
|
-
pulumi_type = "vault:identity/mfaTotp:MfaTotp"
|
438
|
-
|
439
437
|
@overload
|
440
438
|
def __init__(__self__,
|
441
439
|
resource_name: str,
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -121,10 +121,8 @@ class _OidcState:
|
|
121
121
|
pulumi.set(self, "namespace", value)
|
122
122
|
|
123
123
|
|
124
|
+
@pulumi.type_token("vault:identity/oidc:Oidc")
|
124
125
|
class Oidc(pulumi.CustomResource):
|
125
|
-
|
126
|
-
pulumi_type = "vault:identity/oidc:Oidc"
|
127
|
-
|
128
126
|
@overload
|
129
127
|
def __init__(__self__,
|
130
128
|
resource_name: str,
|
@@ -173,10 +173,8 @@ class _OidcAssignmentState:
|
|
173
173
|
pulumi.set(self, "namespace", value)
|
174
174
|
|
175
175
|
|
176
|
+
@pulumi.type_token("vault:identity/oidcAssignment:OidcAssignment")
|
176
177
|
class OidcAssignment(pulumi.CustomResource):
|
177
|
-
|
178
|
-
pulumi_type = "vault:identity/oidcAssignment:OidcAssignment"
|
179
|
-
|
180
178
|
@overload
|
181
179
|
def __init__(__self__,
|
182
180
|
resource_name: str,
|
@@ -359,10 +359,8 @@ class _OidcClientState:
|
|
359
359
|
pulumi.set(self, "redirect_uris", value)
|
360
360
|
|
361
361
|
|
362
|
+
@pulumi.type_token("vault:identity/oidcClient:OidcClient")
|
362
363
|
class OidcClient(pulumi.CustomResource):
|
363
|
-
|
364
|
-
pulumi_type = "vault:identity/oidcClient:OidcClient"
|
365
|
-
|
366
364
|
@overload
|
367
365
|
def __init__(__self__,
|
368
366
|
resource_name: str,
|
@@ -249,10 +249,8 @@ class _OidcKeyState:
|
|
249
249
|
pulumi.set(self, "verification_ttl", value)
|
250
250
|
|
251
251
|
|
252
|
+
@pulumi.type_token("vault:identity/oidcKey:OidcKey")
|
252
253
|
class OidcKey(pulumi.CustomResource):
|
253
|
-
|
254
|
-
pulumi_type = "vault:identity/oidcKey:OidcKey"
|
255
|
-
|
256
254
|
@overload
|
257
255
|
def __init__(__self__,
|
258
256
|
resource_name: str,
|
@@ -139,10 +139,8 @@ class _OidcKeyAllowedClientIDState:
|
|
139
139
|
pulumi.set(self, "namespace", value)
|
140
140
|
|
141
141
|
|
142
|
+
@pulumi.type_token("vault:identity/oidcKeyAllowedClientID:OidcKeyAllowedClientID")
|
142
143
|
class OidcKeyAllowedClientID(pulumi.CustomResource):
|
143
|
-
|
144
|
-
pulumi_type = "vault:identity/oidcKeyAllowedClientID:OidcKeyAllowedClientID"
|
145
|
-
|
146
144
|
@overload
|
147
145
|
def __init__(__self__,
|
148
146
|
resource_name: str,
|
@@ -261,10 +261,8 @@ class _OidcProviderState:
|
|
261
261
|
pulumi.set(self, "scopes_supporteds", value)
|
262
262
|
|
263
263
|
|
264
|
+
@pulumi.type_token("vault:identity/oidcProvider:OidcProvider")
|
264
265
|
class OidcProvider(pulumi.CustomResource):
|
265
|
-
|
266
|
-
pulumi_type = "vault:identity/oidcProvider:OidcProvider"
|
267
|
-
|
268
266
|
@overload
|
269
267
|
def __init__(__self__,
|
270
268
|
resource_name: str,
|
@@ -256,10 +256,8 @@ class _OidcRoleState:
|
|
256
256
|
pulumi.set(self, "ttl", value)
|
257
257
|
|
258
258
|
|
259
|
+
@pulumi.type_token("vault:identity/oidcRole:OidcRole")
|
259
260
|
class OidcRole(pulumi.CustomResource):
|
260
|
-
|
261
|
-
pulumi_type = "vault:identity/oidcRole:OidcRole"
|
262
|
-
|
263
261
|
@overload
|
264
262
|
def __init__(__self__,
|
265
263
|
resource_name: str,
|
@@ -173,10 +173,8 @@ class _OidcScopeState:
|
|
173
173
|
pulumi.set(self, "template", value)
|
174
174
|
|
175
175
|
|
176
|
+
@pulumi.type_token("vault:identity/oidcScope:OidcScope")
|
176
177
|
class OidcScope(pulumi.CustomResource):
|
177
|
-
|
178
|
-
pulumi_type = "vault:identity/oidcScope:OidcScope"
|
179
|
-
|
180
178
|
@overload
|
181
179
|
def __init__(__self__,
|
182
180
|
resource_name: str,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -747,10 +747,8 @@ class _AuthBackendState:
|
|
747
747
|
pulumi.set(self, "type", value)
|
748
748
|
|
749
749
|
|
750
|
+
@pulumi.type_token("vault:jwt/authBackend:AuthBackend")
|
750
751
|
class AuthBackend(pulumi.CustomResource):
|
751
|
-
|
752
|
-
pulumi_type = "vault:jwt/authBackend:AuthBackend"
|
753
|
-
|
754
752
|
@overload
|
755
753
|
def __init__(__self__,
|
756
754
|
resource_name: str,
|
@@ -1079,10 +1079,8 @@ class _AuthBackendRoleState:
|
|
1079
1079
|
pulumi.set(self, "verbose_oidc_logging", value)
|
1080
1080
|
|
1081
1081
|
|
1082
|
+
@pulumi.type_token("vault:jwt/authBackendRole:AuthBackendRole")
|
1082
1083
|
class AuthBackendRole(pulumi.CustomResource):
|
1083
|
-
|
1084
|
-
pulumi_type = "vault:jwt/authBackendRole:AuthBackendRole"
|
1085
|
-
|
1086
1084
|
@overload
|
1087
1085
|
def __init__(__self__,
|
1088
1086
|
resource_name: str,
|
@@ -468,10 +468,8 @@ class _SecretBackendState:
|
|
468
468
|
pulumi.set(self, "tls_min_version", value)
|
469
469
|
|
470
470
|
|
471
|
+
@pulumi.type_token("vault:kmip/secretBackend:SecretBackend")
|
471
472
|
class SecretBackend(pulumi.CustomResource):
|
472
|
-
|
473
|
-
pulumi_type = "vault:kmip/secretBackend:SecretBackend"
|
474
|
-
|
475
473
|
@overload
|
476
474
|
def __init__(__self__,
|
477
475
|
resource_name: str,
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -718,10 +718,8 @@ class _SecretRoleState:
|
|
718
718
|
pulumi.set(self, "tls_client_ttl", value)
|
719
719
|
|
720
720
|
|
721
|
+
@pulumi.type_token("vault:kmip/secretRole:SecretRole")
|
721
722
|
class SecretRole(pulumi.CustomResource):
|
722
|
-
|
723
|
-
pulumi_type = "vault:kmip/secretRole:SecretRole"
|
724
|
-
|
725
723
|
@overload
|
726
724
|
def __init__(__self__,
|
727
725
|
resource_name: str,
|
@@ -175,10 +175,8 @@ class _SecretScopeState:
|
|
175
175
|
pulumi.set(self, "scope", value)
|
176
176
|
|
177
177
|
|
178
|
+
@pulumi.type_token("vault:kmip/secretScope:SecretScope")
|
178
179
|
class SecretScope(pulumi.CustomResource):
|
179
|
-
|
180
|
-
pulumi_type = "vault:kmip/secretScope:SecretScope"
|
181
|
-
|
182
180
|
@overload
|
183
181
|
def __init__(__self__,
|
184
182
|
resource_name: str,
|
@@ -364,10 +364,8 @@ class _AuthBackendConfigState:
|
|
364
364
|
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
365
365
|
|
366
366
|
|
367
|
+
@pulumi.type_token("vault:kubernetes/authBackendConfig:AuthBackendConfig")
|
367
368
|
class AuthBackendConfig(pulumi.CustomResource):
|
368
|
-
|
369
|
-
pulumi_type = "vault:kubernetes/authBackendConfig:AuthBackendConfig"
|
370
|
-
|
371
369
|
@overload
|
372
370
|
def __init__(__self__,
|
373
371
|
resource_name: str,
|
@@ -574,10 +574,8 @@ class _AuthBackendRoleState:
|
|
574
574
|
pulumi.set(self, "token_type", value)
|
575
575
|
|
576
576
|
|
577
|
+
@pulumi.type_token("vault:kubernetes/authBackendRole:AuthBackendRole")
|
577
578
|
class AuthBackendRole(pulumi.CustomResource):
|
578
|
-
|
579
|
-
pulumi_type = "vault:kubernetes/authBackendRole:AuthBackendRole"
|
580
|
-
|
581
579
|
@overload
|
582
580
|
def __init__(__self__,
|
583
581
|
resource_name: str,
|
@@ -796,10 +796,8 @@ class _SecretBackendState:
|
|
796
796
|
pulumi.set(self, "service_account_jwt", value)
|
797
797
|
|
798
798
|
|
799
|
+
@pulumi.type_token("vault:kubernetes/secretBackend:SecretBackend")
|
799
800
|
class SecretBackend(pulumi.CustomResource):
|
800
|
-
|
801
|
-
pulumi_type = "vault:kubernetes/secretBackend:SecretBackend"
|
802
|
-
|
803
801
|
@overload
|
804
802
|
def __init__(__self__,
|
805
803
|
resource_name: str,
|
@@ -572,10 +572,8 @@ class _SecretBackendRoleState:
|
|
572
572
|
pulumi.set(self, "token_max_ttl", value)
|
573
573
|
|
574
574
|
|
575
|
+
@pulumi.type_token("vault:kubernetes/secretBackendRole:SecretBackendRole")
|
575
576
|
class SecretBackendRole(pulumi.CustomResource):
|
576
|
-
|
577
|
-
pulumi_type = "vault:kubernetes/secretBackendRole:SecretBackendRole"
|
578
|
-
|
579
577
|
@overload
|
580
578
|
def __init__(__self__,
|
581
579
|
resource_name: str,
|
pulumi_vault/kv/secret.py
CHANGED
@@ -165,10 +165,8 @@ class _SecretState:
|
|
165
165
|
pulumi.set(self, "path", value)
|
166
166
|
|
167
167
|
|
168
|
+
@pulumi.type_token("vault:kv/secret:Secret")
|
168
169
|
class Secret(pulumi.CustomResource):
|
169
|
-
|
170
|
-
pulumi_type = "vault:kv/secret:Secret"
|
171
|
-
|
172
170
|
@overload
|
173
171
|
def __init__(__self__,
|
174
172
|
resource_name: str,
|
@@ -212,10 +212,8 @@ class _SecretBackendV2State:
|
|
212
212
|
pulumi.set(self, "namespace", value)
|
213
213
|
|
214
214
|
|
215
|
+
@pulumi.type_token("vault:kv/secretBackendV2:SecretBackendV2")
|
215
216
|
class SecretBackendV2(pulumi.CustomResource):
|
216
|
-
|
217
|
-
pulumi_type = "vault:kv/secretBackendV2:SecretBackendV2"
|
218
|
-
|
219
217
|
@overload
|
220
218
|
def __init__(__self__,
|
221
219
|
resource_name: str,
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -431,10 +431,8 @@ class _SecretV2State:
|
|
431
431
|
pulumi.set(self, "path", value)
|
432
432
|
|
433
433
|
|
434
|
+
@pulumi.type_token("vault:kv/secretV2:SecretV2")
|
434
435
|
class SecretV2(pulumi.CustomResource):
|
435
|
-
|
436
|
-
pulumi_type = "vault:kv/secretV2:SecretV2"
|
437
|
-
|
438
436
|
@overload
|
439
437
|
def __init__(__self__,
|
440
438
|
resource_name: str,
|
@@ -1412,10 +1412,8 @@ class _AuthBackendState:
|
|
1412
1412
|
pulumi.set(self, "username_as_alias", value)
|
1413
1413
|
|
1414
1414
|
|
1415
|
+
@pulumi.type_token("vault:ldap/authBackend:AuthBackend")
|
1415
1416
|
class AuthBackend(pulumi.CustomResource):
|
1416
|
-
|
1417
|
-
pulumi_type = "vault:ldap/authBackend:AuthBackend"
|
1418
|
-
|
1419
1417
|
@overload
|
1420
1418
|
def __init__(__self__,
|
1421
1419
|
resource_name: str,
|
@@ -180,10 +180,8 @@ class _AuthBackendGroupState:
|
|
180
180
|
pulumi.set(self, "policies", value)
|
181
181
|
|
182
182
|
|
183
|
+
@pulumi.type_token("vault:ldap/authBackendGroup:AuthBackendGroup")
|
183
184
|
class AuthBackendGroup(pulumi.CustomResource):
|
184
|
-
|
185
|
-
pulumi_type = "vault:ldap/authBackendGroup:AuthBackendGroup"
|
186
|
-
|
187
185
|
@overload
|
188
186
|
def __init__(__self__,
|
189
187
|
resource_name: str,
|
@@ -212,10 +212,8 @@ class _AuthBackendUserState:
|
|
212
212
|
pulumi.set(self, "username", value)
|
213
213
|
|
214
214
|
|
215
|
+
@pulumi.type_token("vault:ldap/authBackendUser:AuthBackendUser")
|
215
216
|
class AuthBackendUser(pulumi.CustomResource):
|
216
|
-
|
217
|
-
pulumi_type = "vault:ldap/authBackendUser:AuthBackendUser"
|
218
|
-
|
219
217
|
@overload
|
220
218
|
def __init__(__self__,
|
221
219
|
resource_name: str,
|
@@ -1355,10 +1355,8 @@ class _SecretBackendState:
|
|
1355
1355
|
pulumi.set(self, "userdn", value)
|
1356
1356
|
|
1357
1357
|
|
1358
|
+
@pulumi.type_token("vault:ldap/secretBackend:SecretBackend")
|
1358
1359
|
class SecretBackend(pulumi.CustomResource):
|
1359
|
-
|
1360
|
-
pulumi_type = "vault:ldap/secretBackend:SecretBackend"
|
1361
|
-
|
1362
1360
|
@overload
|
1363
1361
|
def __init__(__self__,
|
1364
1362
|
resource_name: str,
|
@@ -410,10 +410,8 @@ class _SecretBackendDynamicRoleState:
|
|
410
410
|
pulumi.set(self, "username_template", value)
|
411
411
|
|
412
412
|
|
413
|
+
@pulumi.type_token("vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole")
|
413
414
|
class SecretBackendDynamicRole(pulumi.CustomResource):
|
414
|
-
|
415
|
-
pulumi_type = "vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole"
|
416
|
-
|
417
415
|
@overload
|
418
416
|
def __init__(__self__,
|
419
417
|
resource_name: str,
|
@@ -288,10 +288,8 @@ class _SecretBackendLibrarySetState:
|
|
288
288
|
pulumi.set(self, "ttl", value)
|
289
289
|
|
290
290
|
|
291
|
+
@pulumi.type_token("vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet")
|
291
292
|
class SecretBackendLibrarySet(pulumi.CustomResource):
|
292
|
-
|
293
|
-
pulumi_type = "vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet"
|
294
|
-
|
295
293
|
@overload
|
296
294
|
def __init__(__self__,
|
297
295
|
resource_name: str,
|
@@ -282,10 +282,8 @@ class _SecretBackendStaticRoleState:
|
|
282
282
|
pulumi.set(self, "username", value)
|
283
283
|
|
284
284
|
|
285
|
+
@pulumi.type_token("vault:ldap/secretBackendStaticRole:SecretBackendStaticRole")
|
285
286
|
class SecretBackendStaticRole(pulumi.CustomResource):
|
286
|
-
|
287
|
-
pulumi_type = "vault:ldap/secretBackendStaticRole:SecretBackendStaticRole"
|
288
|
-
|
289
287
|
@overload
|
290
288
|
def __init__(__self__,
|
291
289
|
resource_name: str,
|
pulumi_vault/managed/keys.py
CHANGED
@@ -163,10 +163,8 @@ class _KeysState:
|
|
163
163
|
pulumi.set(self, "pkcs", value)
|
164
164
|
|
165
165
|
|
166
|
+
@pulumi.type_token("vault:managed/keys:Keys")
|
166
167
|
class Keys(pulumi.CustomResource):
|
167
|
-
|
168
|
-
pulumi_type = "vault:managed/keys:Keys"
|
169
|
-
|
170
168
|
@overload
|
171
169
|
def __init__(__self__,
|
172
170
|
resource_name: str,
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -313,10 +313,8 @@ class _MfaDuoState:
|
|
313
313
|
pulumi.set(self, "username_format", value)
|
314
314
|
|
315
315
|
|
316
|
+
@pulumi.type_token("vault:index/mfaDuo:MfaDuo")
|
316
317
|
class MfaDuo(pulumi.CustomResource):
|
317
|
-
|
318
|
-
pulumi_type = "vault:index/mfaDuo:MfaDuo"
|
319
|
-
|
320
318
|
@overload
|
321
319
|
def __init__(__self__,
|
322
320
|
resource_name: str,
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -334,10 +334,8 @@ class _MfaOktaState:
|
|
334
334
|
pulumi.set(self, "username_format", value)
|
335
335
|
|
336
336
|
|
337
|
+
@pulumi.type_token("vault:index/mfaOkta:MfaOkta")
|
337
338
|
class MfaOkta(pulumi.CustomResource):
|
338
|
-
|
339
|
-
pulumi_type = "vault:index/mfaOkta:MfaOkta"
|
340
|
-
|
341
339
|
@overload
|
342
340
|
def __init__(__self__,
|
343
341
|
resource_name: str,
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -347,10 +347,8 @@ class _MfaPingidState:
|
|
347
347
|
pulumi.set(self, "username_format", value)
|
348
348
|
|
349
349
|
|
350
|
+
@pulumi.type_token("vault:index/mfaPingid:MfaPingid")
|
350
351
|
class MfaPingid(pulumi.CustomResource):
|
351
|
-
|
352
|
-
pulumi_type = "vault:index/mfaPingid:MfaPingid"
|
353
|
-
|
354
352
|
@overload
|
355
353
|
def __init__(__self__,
|
356
354
|
resource_name: str,
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -344,10 +344,8 @@ class _MfaTotpState:
|
|
344
344
|
pulumi.set(self, "skew", value)
|
345
345
|
|
346
346
|
|
347
|
+
@pulumi.type_token("vault:index/mfaTotp:MfaTotp")
|
347
348
|
class MfaTotp(pulumi.CustomResource):
|
348
|
-
|
349
|
-
pulumi_type = "vault:index/mfaTotp:MfaTotp"
|
350
|
-
|
351
349
|
@overload
|
352
350
|
def __init__(__self__,
|
353
351
|
resource_name: str,
|
@@ -186,10 +186,8 @@ class _SecretBackendState:
|
|
186
186
|
pulumi.set(self, "public_key", value)
|
187
187
|
|
188
188
|
|
189
|
+
@pulumi.type_token("vault:mongodbatlas/secretBackend:SecretBackend")
|
189
190
|
class SecretBackend(pulumi.CustomResource):
|
190
|
-
|
191
|
-
pulumi_type = "vault:mongodbatlas/secretBackend:SecretBackend"
|
192
|
-
|
193
191
|
@overload
|
194
192
|
def __init__(__self__,
|
195
193
|
resource_name: str,
|
@@ -403,10 +403,8 @@ class _SecretRoleState:
|
|
403
403
|
pulumi.set(self, "ttl", value)
|
404
404
|
|
405
405
|
|
406
|
+
@pulumi.type_token("vault:mongodbatlas/secretRole:SecretRole")
|
406
407
|
class SecretRole(pulumi.CustomResource):
|
407
|
-
|
408
|
-
pulumi_type = "vault:mongodbatlas/secretRole:SecretRole"
|
409
|
-
|
410
408
|
@overload
|
411
409
|
def __init__(__self__,
|
412
410
|
resource_name: str,
|
pulumi_vault/mount.py
CHANGED
@@ -695,10 +695,8 @@ class _MountState:
|
|
695
695
|
pulumi.set(self, "type", value)
|
696
696
|
|
697
697
|
|
698
|
+
@pulumi.type_token("vault:index/mount:Mount")
|
698
699
|
class Mount(pulumi.CustomResource):
|
699
|
-
|
700
|
-
pulumi_type = "vault:index/mount:Mount"
|
701
|
-
|
702
700
|
@overload
|
703
701
|
def __init__(__self__,
|
704
702
|
resource_name: str,
|
pulumi_vault/namespace.py
CHANGED
@@ -196,10 +196,8 @@ class _NamespaceState:
|
|
196
196
|
pulumi.set(self, "path_fq", value)
|
197
197
|
|
198
198
|
|
199
|
+
@pulumi.type_token("vault:index/namespace:Namespace")
|
199
200
|
class Namespace(pulumi.CustomResource):
|
200
|
-
|
201
|
-
pulumi_type = "vault:index/namespace:Namespace"
|
202
|
-
|
203
201
|
@overload
|
204
202
|
def __init__(__self__,
|
205
203
|
resource_name: str,
|
@@ -553,10 +553,8 @@ class _NomadSecretBackendState:
|
|
553
553
|
pulumi.set(self, "ttl", value)
|
554
554
|
|
555
555
|
|
556
|
+
@pulumi.type_token("vault:index/nomadSecretBackend:NomadSecretBackend")
|
556
557
|
class NomadSecretBackend(pulumi.CustomResource):
|
557
|
-
|
558
|
-
pulumi_type = "vault:index/nomadSecretBackend:NomadSecretBackend"
|
559
|
-
|
560
558
|
@overload
|
561
559
|
def __init__(__self__,
|
562
560
|
resource_name: str,
|
@@ -251,10 +251,8 @@ class _NomadSecretRoleState:
|
|
251
251
|
pulumi.set(self, "type", value)
|
252
252
|
|
253
253
|
|
254
|
+
@pulumi.type_token("vault:index/nomadSecretRole:NomadSecretRole")
|
254
255
|
class NomadSecretRole(pulumi.CustomResource):
|
255
|
-
|
256
|
-
pulumi_type = "vault:index/nomadSecretRole:NomadSecretRole"
|
257
|
-
|
258
256
|
@overload
|
259
257
|
def __init__(__self__,
|
260
258
|
resource_name: str,
|
@@ -774,10 +774,8 @@ class _AuthBackendState:
|
|
774
774
|
pulumi.set(self, "users", value)
|
775
775
|
|
776
776
|
|
777
|
+
@pulumi.type_token("vault:okta/authBackend:AuthBackend")
|
777
778
|
class AuthBackend(pulumi.CustomResource):
|
778
|
-
|
779
|
-
pulumi_type = "vault:okta/authBackend:AuthBackend"
|
780
|
-
|
781
779
|
@overload
|
782
780
|
def __init__(__self__,
|
783
781
|
resource_name: str,
|
@@ -171,10 +171,8 @@ class _AuthBackendGroupState:
|
|
171
171
|
pulumi.set(self, "policies", value)
|
172
172
|
|
173
173
|
|
174
|
+
@pulumi.type_token("vault:okta/authBackendGroup:AuthBackendGroup")
|
174
175
|
class AuthBackendGroup(pulumi.CustomResource):
|
175
|
-
|
176
|
-
pulumi_type = "vault:okta/authBackendGroup:AuthBackendGroup"
|
177
|
-
|
178
176
|
@overload
|
179
177
|
def __init__(__self__,
|
180
178
|
resource_name: str,
|
@@ -203,10 +203,8 @@ class _AuthBackendUserState:
|
|
203
203
|
pulumi.set(self, "username", value)
|
204
204
|
|
205
205
|
|
206
|
+
@pulumi.type_token("vault:okta/authBackendUser:AuthBackendUser")
|
206
207
|
class AuthBackendUser(pulumi.CustomResource):
|
207
|
-
|
208
|
-
pulumi_type = "vault:okta/authBackendUser:AuthBackendUser"
|
209
|
-
|
210
208
|
@overload
|
211
209
|
def __init__(__self__,
|
212
210
|
resource_name: str,
|