pulumi-vault 6.8.0a1750231010__py3-none-any.whl → 7.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -9
- pulumi_vault/_inputs.py +88 -83
- pulumi_vault/azure/backend.py +5 -93
- pulumi_vault/config/outputs.py +52 -47
- pulumi_vault/database/_inputs.py +440 -0
- pulumi_vault/database/outputs.py +308 -0
- pulumi_vault/database/secret_backend_connection.py +14 -0
- pulumi_vault/database/secrets_mount.py +14 -0
- pulumi_vault/gcp/secret_backend.py +61 -0
- pulumi_vault/kv/_inputs.py +12 -12
- pulumi_vault/kv/outputs.py +8 -8
- pulumi_vault/kv/secret_v2.py +101 -36
- pulumi_vault/okta/auth_backend.py +0 -126
- pulumi_vault/provider.py +1 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.8.0a1750231010.dist-info → pulumi_vault-7.0.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.8.0a1750231010.dist-info → pulumi_vault-7.0.0.dist-info}/RECORD +19 -20
- pulumi_vault/password_policy.py +0 -318
- {pulumi_vault-6.8.0a1750231010.dist-info → pulumi_vault-7.0.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.8.0a1750231010.dist-info → pulumi_vault-7.0.0.dist-info}/top_level.txt +0 -0
@@ -28,7 +28,6 @@ class AuthBackendArgs:
|
|
28
28
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
29
29
|
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
30
30
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
31
|
-
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
32
31
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
33
32
|
path: Optional[pulumi.Input[builtins.str]] = None,
|
34
33
|
token: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -41,7 +40,6 @@ class AuthBackendArgs:
|
|
41
40
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
42
41
|
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
43
42
|
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
44
|
-
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
45
43
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
46
44
|
"""
|
47
45
|
The set of arguments for constructing a AuthBackend resource.
|
@@ -53,8 +51,6 @@ class AuthBackendArgs:
|
|
53
51
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
54
52
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
55
53
|
See below for more details.
|
56
|
-
:param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
|
57
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
58
54
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
59
55
|
The value should not contain leading or trailing forward slashes.
|
60
56
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -71,8 +67,6 @@ class AuthBackendArgs:
|
|
71
67
|
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
72
68
|
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
73
69
|
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
74
|
-
:param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
|
75
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
76
70
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
77
71
|
See below for more details.
|
78
72
|
"""
|
@@ -87,11 +81,6 @@ class AuthBackendArgs:
|
|
87
81
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
88
82
|
if groups is not None:
|
89
83
|
pulumi.set(__self__, "groups", groups)
|
90
|
-
if max_ttl is not None:
|
91
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
92
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
93
|
-
if max_ttl is not None:
|
94
|
-
pulumi.set(__self__, "max_ttl", max_ttl)
|
95
84
|
if namespace is not None:
|
96
85
|
pulumi.set(__self__, "namespace", namespace)
|
97
86
|
if path is not None:
|
@@ -116,11 +105,6 @@ class AuthBackendArgs:
|
|
116
105
|
pulumi.set(__self__, "token_ttl", token_ttl)
|
117
106
|
if token_type is not None:
|
118
107
|
pulumi.set(__self__, "token_type", token_type)
|
119
|
-
if ttl is not None:
|
120
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
121
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
122
|
-
if ttl is not None:
|
123
|
-
pulumi.set(__self__, "ttl", ttl)
|
124
108
|
if users is not None:
|
125
109
|
pulumi.set(__self__, "users", users)
|
126
110
|
|
@@ -198,20 +182,6 @@ class AuthBackendArgs:
|
|
198
182
|
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
199
183
|
pulumi.set(self, "groups", value)
|
200
184
|
|
201
|
-
@property
|
202
|
-
@pulumi.getter(name="maxTtl")
|
203
|
-
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
204
|
-
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
205
|
-
"""
|
206
|
-
Maximum duration after which authentication will be expired
|
207
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
208
|
-
"""
|
209
|
-
return pulumi.get(self, "max_ttl")
|
210
|
-
|
211
|
-
@max_ttl.setter
|
212
|
-
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
213
|
-
pulumi.set(self, "max_ttl", value)
|
214
|
-
|
215
185
|
@property
|
216
186
|
@pulumi.getter
|
217
187
|
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
@@ -360,20 +330,6 @@ class AuthBackendArgs:
|
|
360
330
|
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
361
331
|
pulumi.set(self, "token_type", value)
|
362
332
|
|
363
|
-
@property
|
364
|
-
@pulumi.getter
|
365
|
-
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
366
|
-
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
367
|
-
"""
|
368
|
-
Duration after which authentication will be expired.
|
369
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
370
|
-
"""
|
371
|
-
return pulumi.get(self, "ttl")
|
372
|
-
|
373
|
-
@ttl.setter
|
374
|
-
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
375
|
-
pulumi.set(self, "ttl", value)
|
376
|
-
|
377
333
|
@property
|
378
334
|
@pulumi.getter
|
379
335
|
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
@@ -397,7 +353,6 @@ class _AuthBackendState:
|
|
397
353
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
398
354
|
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
399
355
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]] = None,
|
400
|
-
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
401
356
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
402
357
|
organization: Optional[pulumi.Input[builtins.str]] = None,
|
403
358
|
path: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -411,7 +366,6 @@ class _AuthBackendState:
|
|
411
366
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
412
367
|
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
413
368
|
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
414
|
-
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
415
369
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
416
370
|
"""
|
417
371
|
Input properties used for looking up and filtering AuthBackend resources.
|
@@ -423,8 +377,6 @@ class _AuthBackendState:
|
|
423
377
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
424
378
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]] groups: Associate Okta groups with policies within Vault.
|
425
379
|
See below for more details.
|
426
|
-
:param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
|
427
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
428
380
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
429
381
|
The value should not contain leading or trailing forward slashes.
|
430
382
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -442,8 +394,6 @@ class _AuthBackendState:
|
|
442
394
|
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
443
395
|
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
444
396
|
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
445
|
-
:param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
|
446
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
447
397
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
448
398
|
See below for more details.
|
449
399
|
"""
|
@@ -459,11 +409,6 @@ class _AuthBackendState:
|
|
459
409
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
460
410
|
if groups is not None:
|
461
411
|
pulumi.set(__self__, "groups", groups)
|
462
|
-
if max_ttl is not None:
|
463
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
464
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
465
|
-
if max_ttl is not None:
|
466
|
-
pulumi.set(__self__, "max_ttl", max_ttl)
|
467
412
|
if namespace is not None:
|
468
413
|
pulumi.set(__self__, "namespace", namespace)
|
469
414
|
if organization is not None:
|
@@ -490,11 +435,6 @@ class _AuthBackendState:
|
|
490
435
|
pulumi.set(__self__, "token_ttl", token_ttl)
|
491
436
|
if token_type is not None:
|
492
437
|
pulumi.set(__self__, "token_type", token_type)
|
493
|
-
if ttl is not None:
|
494
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
495
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
496
|
-
if ttl is not None:
|
497
|
-
pulumi.set(__self__, "ttl", ttl)
|
498
438
|
if users is not None:
|
499
439
|
pulumi.set(__self__, "users", users)
|
500
440
|
|
@@ -572,20 +512,6 @@ class _AuthBackendState:
|
|
572
512
|
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendGroupArgs']]]]):
|
573
513
|
pulumi.set(self, "groups", value)
|
574
514
|
|
575
|
-
@property
|
576
|
-
@pulumi.getter(name="maxTtl")
|
577
|
-
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
578
|
-
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
579
|
-
"""
|
580
|
-
Maximum duration after which authentication will be expired
|
581
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
582
|
-
"""
|
583
|
-
return pulumi.get(self, "max_ttl")
|
584
|
-
|
585
|
-
@max_ttl.setter
|
586
|
-
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
587
|
-
pulumi.set(self, "max_ttl", value)
|
588
|
-
|
589
515
|
@property
|
590
516
|
@pulumi.getter
|
591
517
|
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
@@ -746,20 +672,6 @@ class _AuthBackendState:
|
|
746
672
|
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
747
673
|
pulumi.set(self, "token_type", value)
|
748
674
|
|
749
|
-
@property
|
750
|
-
@pulumi.getter
|
751
|
-
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
752
|
-
def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
753
|
-
"""
|
754
|
-
Duration after which authentication will be expired.
|
755
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
756
|
-
"""
|
757
|
-
return pulumi.get(self, "ttl")
|
758
|
-
|
759
|
-
@ttl.setter
|
760
|
-
def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
761
|
-
pulumi.set(self, "ttl", value)
|
762
|
-
|
763
675
|
@property
|
764
676
|
@pulumi.getter
|
765
677
|
def users(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]]:
|
@@ -785,7 +697,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
785
697
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
786
698
|
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
787
699
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
788
|
-
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
789
700
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
790
701
|
organization: Optional[pulumi.Input[builtins.str]] = None,
|
791
702
|
path: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -799,7 +710,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
799
710
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
800
711
|
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
801
712
|
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
802
|
-
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
803
713
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
804
714
|
__props__=None):
|
805
715
|
"""
|
@@ -846,8 +756,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
846
756
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
847
757
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
848
758
|
See below for more details.
|
849
|
-
:param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
|
850
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
851
759
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
852
760
|
The value should not contain leading or trailing forward slashes.
|
853
761
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -865,8 +773,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
865
773
|
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
866
774
|
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
867
775
|
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
868
|
-
:param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
|
869
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
870
776
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
871
777
|
See below for more details.
|
872
778
|
"""
|
@@ -931,7 +837,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
931
837
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
932
838
|
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
933
839
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
934
|
-
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
935
840
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
936
841
|
organization: Optional[pulumi.Input[builtins.str]] = None,
|
937
842
|
path: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -945,7 +850,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
945
850
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
946
851
|
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
947
852
|
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
948
|
-
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
949
853
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None,
|
950
854
|
__props__=None):
|
951
855
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -961,7 +865,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
961
865
|
__props__.__dict__["description"] = description
|
962
866
|
__props__.__dict__["disable_remount"] = disable_remount
|
963
867
|
__props__.__dict__["groups"] = groups
|
964
|
-
__props__.__dict__["max_ttl"] = max_ttl
|
965
868
|
__props__.__dict__["namespace"] = namespace
|
966
869
|
if organization is None and not opts.urn:
|
967
870
|
raise TypeError("Missing required property 'organization'")
|
@@ -977,7 +880,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
977
880
|
__props__.__dict__["token_policies"] = token_policies
|
978
881
|
__props__.__dict__["token_ttl"] = token_ttl
|
979
882
|
__props__.__dict__["token_type"] = token_type
|
980
|
-
__props__.__dict__["ttl"] = ttl
|
981
883
|
__props__.__dict__["users"] = users
|
982
884
|
__props__.__dict__["accessor"] = None
|
983
885
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["token"])
|
@@ -998,7 +900,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
998
900
|
description: Optional[pulumi.Input[builtins.str]] = None,
|
999
901
|
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
1000
902
|
groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]]] = None,
|
1001
|
-
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
1002
903
|
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1003
904
|
organization: Optional[pulumi.Input[builtins.str]] = None,
|
1004
905
|
path: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -1012,7 +913,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1012
913
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1013
914
|
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1014
915
|
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
1015
|
-
ttl: Optional[pulumi.Input[builtins.str]] = None,
|
1016
916
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]]] = None) -> 'AuthBackend':
|
1017
917
|
"""
|
1018
918
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -1029,8 +929,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1029
929
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1030
930
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendGroupArgs', 'AuthBackendGroupArgsDict']]]] groups: Associate Okta groups with policies within Vault.
|
1031
931
|
See below for more details.
|
1032
|
-
:param pulumi.Input[builtins.str] max_ttl: Maximum duration after which authentication will be expired
|
1033
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1034
932
|
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1035
933
|
The value should not contain leading or trailing forward slashes.
|
1036
934
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -1048,8 +946,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1048
946
|
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
1049
947
|
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1050
948
|
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
1051
|
-
:param pulumi.Input[builtins.str] ttl: Duration after which authentication will be expired.
|
1052
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1053
949
|
:param pulumi.Input[Sequence[pulumi.Input[Union['AuthBackendUserArgs', 'AuthBackendUserArgsDict']]]] users: Associate Okta users with groups or policies within Vault.
|
1054
950
|
See below for more details.
|
1055
951
|
"""
|
@@ -1063,7 +959,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1063
959
|
__props__.__dict__["description"] = description
|
1064
960
|
__props__.__dict__["disable_remount"] = disable_remount
|
1065
961
|
__props__.__dict__["groups"] = groups
|
1066
|
-
__props__.__dict__["max_ttl"] = max_ttl
|
1067
962
|
__props__.__dict__["namespace"] = namespace
|
1068
963
|
__props__.__dict__["organization"] = organization
|
1069
964
|
__props__.__dict__["path"] = path
|
@@ -1077,7 +972,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1077
972
|
__props__.__dict__["token_policies"] = token_policies
|
1078
973
|
__props__.__dict__["token_ttl"] = token_ttl
|
1079
974
|
__props__.__dict__["token_type"] = token_type
|
1080
|
-
__props__.__dict__["ttl"] = ttl
|
1081
975
|
__props__.__dict__["users"] = users
|
1082
976
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
1083
977
|
|
@@ -1131,16 +1025,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1131
1025
|
"""
|
1132
1026
|
return pulumi.get(self, "groups")
|
1133
1027
|
|
1134
|
-
@property
|
1135
|
-
@pulumi.getter(name="maxTtl")
|
1136
|
-
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
1137
|
-
def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
1138
|
-
"""
|
1139
|
-
Maximum duration after which authentication will be expired
|
1140
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1141
|
-
"""
|
1142
|
-
return pulumi.get(self, "max_ttl")
|
1143
|
-
|
1144
1028
|
@property
|
1145
1029
|
@pulumi.getter
|
1146
1030
|
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
@@ -1249,16 +1133,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1249
1133
|
"""
|
1250
1134
|
return pulumi.get(self, "token_type")
|
1251
1135
|
|
1252
|
-
@property
|
1253
|
-
@pulumi.getter
|
1254
|
-
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
1255
|
-
def ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
1256
|
-
"""
|
1257
|
-
Duration after which authentication will be expired.
|
1258
|
-
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1259
|
-
"""
|
1260
|
-
return pulumi.get(self, "ttl")
|
1261
|
-
|
1262
1136
|
@property
|
1263
1137
|
@pulumi.getter
|
1264
1138
|
def users(self) -> pulumi.Output[Sequence['outputs.AuthBackendUser']]:
|
pulumi_vault/provider.py
CHANGED
@@ -116,9 +116,6 @@ class ProviderArgs:
|
|
116
116
|
pulumi.set(__self__, "ca_cert_dir", ca_cert_dir)
|
117
117
|
if ca_cert_file is not None:
|
118
118
|
pulumi.set(__self__, "ca_cert_file", ca_cert_file)
|
119
|
-
if client_auth is not None:
|
120
|
-
warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
|
121
|
-
pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
|
122
119
|
if client_auth is not None:
|
123
120
|
pulumi.set(__self__, "client_auth", client_auth)
|
124
121
|
if headers is not None:
|
@@ -345,7 +342,6 @@ class ProviderArgs:
|
|
345
342
|
|
346
343
|
@property
|
347
344
|
@pulumi.getter(name="clientAuth")
|
348
|
-
@_utilities.deprecated("""Use auth_login_cert instead""")
|
349
345
|
def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
|
350
346
|
"""
|
351
347
|
Client authentication credentials.
|
@@ -673,7 +669,7 @@ class Provider(pulumi.ProviderResource):
|
|
673
669
|
__props__.__dict__["ca_cert_dir"] = ca_cert_dir
|
674
670
|
__props__.__dict__["ca_cert_file"] = ca_cert_file
|
675
671
|
__props__.__dict__["client_auth"] = pulumi.Output.from_input(client_auth).apply(pulumi.runtime.to_json) if client_auth is not None else None
|
676
|
-
__props__.__dict__["headers"] = pulumi.Output.
|
672
|
+
__props__.__dict__["headers"] = pulumi.Output.from_input(headers).apply(pulumi.runtime.to_json) if headers is not None else None
|
677
673
|
if max_lease_ttl_seconds is None:
|
678
674
|
max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
|
679
675
|
__props__.__dict__["max_lease_ttl_seconds"] = pulumi.Output.from_input(max_lease_ttl_seconds).apply(pulumi.runtime.to_json) if max_lease_ttl_seconds is not None else None
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -1,5 +1,5 @@
|
|
1
|
-
pulumi_vault/__init__.py,sha256=
|
2
|
-
pulumi_vault/_inputs.py,sha256=
|
1
|
+
pulumi_vault/__init__.py,sha256=h0r6XmHmzzbm62VM1lQMq9o9ZJ_-VuWz71HrLrGWP7w,32203
|
2
|
+
pulumi_vault/_inputs.py,sha256=dMqtMZQoofAvjjhDn8WnRkiEPYqXhcudXhdFNglP384,98872
|
3
3
|
pulumi_vault/_utilities.py,sha256=66uLGQDI1oMFOI3Fe5igAphtexWhcSLDyuVW50jW3ik,10789
|
4
4
|
pulumi_vault/audit.py,sha256=zTfPwj-dxashc2_WJiRkt0nmqpKJUPAeBV_4ugehak4,21317
|
5
5
|
pulumi_vault/audit_request_header.py,sha256=ynkvCac3a6wMmhEeKkxEjxNwZZg8GuYEQNKY0a4XEyM,10935
|
@@ -22,12 +22,11 @@ pulumi_vault/namespace.py,sha256=5lt7f3B6E-bXgLhMD8-2X6zpvwG7D1xnHf742Ceczjk,190
|
|
22
22
|
pulumi_vault/nomad_secret_backend.py,sha256=EfqPmZUSqlNGsVM3mHVZyZuqbwfsZgp0WLX4x3E3Tz0,44152
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=gzp1pZKCvMdsiJp3KTkJ0sqxLrUelVZccO4mJQsDz9U,21140
|
24
24
|
pulumi_vault/outputs.py,sha256=CO91AcXZhAKFlT3LGW6Gr8h-zTyADKD_oPjmu__GdIA,14949
|
25
|
-
pulumi_vault/password_policy.py,sha256=nZiXi2E6qDT8wLcw2mc0--2ORoEBgSsKMEvK_AlgjTU,12855
|
26
25
|
pulumi_vault/plugin.py,sha256=wl7UgUnTfB9xPl-Iee8g5ReR3UvT2-yC_Bqu74Uxxgs,24836
|
27
26
|
pulumi_vault/plugin_pinned_version.py,sha256=vs6h8img2CawV-_hRLNAMtPLOy6TyyBVyVsmtj-R1Wo,11207
|
28
27
|
pulumi_vault/policy.py,sha256=TqnEYkckmNBOSkOgMF0QFTS2eewNQ9kNh2X3tFIpSSE,11533
|
29
|
-
pulumi_vault/provider.py,sha256=
|
30
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
28
|
+
pulumi_vault/provider.py,sha256=e4RULnU4J0vlFPScJWYv-PmZIP_6oiPQLb6AYuxDFBk,44462
|
29
|
+
pulumi_vault/pulumi-plugin.json,sha256=RFbKOt3tnKjVzolCsETr50NGvJoU_LEBOB2xgck5GVk,64
|
31
30
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
32
31
|
pulumi_vault/quota_lease_count.py,sha256=JzC1ZI-a07028W0hw6LPkobgNSe2M19pPBVpX9-StbQ,25892
|
33
32
|
pulumi_vault/quota_rate_limit.py,sha256=CV1BjHJrWTlJPFrPaBmmT9dtuHDpNbiwC_JkvWEuqkU,30747
|
@@ -66,33 +65,33 @@ pulumi_vault/azure/__init__.py,sha256=REenr_z9-4E3nXWUO1s5qiZdDTKT9Yqr0Mp554QNg7
|
|
66
65
|
pulumi_vault/azure/_inputs.py,sha256=XHWHtM3DeQIJRm5cPtTCZbh7zjXfTTEDEDDr8xsYfm4,3506
|
67
66
|
pulumi_vault/azure/auth_backend_config.py,sha256=4LKmnUdSe1fYzC6iLW3H3FXILdQixjPOnS6JQJ5dp7I,46642
|
68
67
|
pulumi_vault/azure/auth_backend_role.py,sha256=XJ2F6Xl5-VfZXIzrEYJuAetCy4dRNfpiE1trz7BcjnQ,57218
|
69
|
-
pulumi_vault/azure/backend.py,sha256=
|
68
|
+
pulumi_vault/azure/backend.py,sha256=9XMDkamHizuhIkeIHcHTbk4AIZGKt26dYnEnXjY4teI,51648
|
70
69
|
pulumi_vault/azure/backend_role.py,sha256=wlsVxA4jxgNtQwOHpIuTTxCgBgP9JdHnSkqghfqzTiA,43930
|
71
70
|
pulumi_vault/azure/get_access_credentials.py,sha256=A25OoLqP0_Wd6KhEyKVbRWoeUf9suKckvHF0hsxdEi4,20385
|
72
71
|
pulumi_vault/azure/outputs.py,sha256=ZgrsZTAPXgKdKzQg-cB4i8DXCDZciXorNvIGaz3dcx0,3359
|
73
72
|
pulumi_vault/config/__init__.py,sha256=LBsoZbCKMHDFo-5RJPY0lRzMsShB1weBQPxL9RQBFtY,283
|
74
73
|
pulumi_vault/config/__init__.pyi,sha256=D4j5oXEySKnM4Jnf6mXF2KcaD151CNt2fMp66vxG5kU,3312
|
75
74
|
pulumi_vault/config/_inputs.py,sha256=WOYG92OMcBmcbUKaKNjN63n-L7K9jU9LozDBoev3nq8,1992
|
76
|
-
pulumi_vault/config/outputs.py,sha256=
|
75
|
+
pulumi_vault/config/outputs.py,sha256=UVI1vk_viS4XKIg7296aw_1tYouZaHlPlVfmoJFNzXA,45597
|
77
76
|
pulumi_vault/config/ui_custom_message.py,sha256=14gm4Pf1MSaV7WOrXlu9R70Eppad-EJHwALDBpendjs,24011
|
78
77
|
pulumi_vault/config/vars.py,sha256=3IYXokNRsps5_83etk8gaSnG_oD9TfiJxNW4EEMy4Tw,6697
|
79
78
|
pulumi_vault/consul/__init__.py,sha256=zhq-CCogqo7Fr2-__lboX5FUmDlXUqwK7cQINzhLhA4,332
|
80
79
|
pulumi_vault/consul/secret_backend.py,sha256=97GHkK6curnqGlJgxrzBawVwLqaVMOyKOOP06vcveNw,41515
|
81
80
|
pulumi_vault/consul/secret_backend_role.py,sha256=c0bfvvhIhKqYVmjcNIjvmmYWTogykLcu9K5tiV9pi-s,43400
|
82
81
|
pulumi_vault/database/__init__.py,sha256=aoZ2W-UiiV4smvSf5q-uHk0UTUB6qOGYzfObA4-jnEo,459
|
83
|
-
pulumi_vault/database/_inputs.py,sha256=
|
84
|
-
pulumi_vault/database/outputs.py,sha256=
|
85
|
-
pulumi_vault/database/secret_backend_connection.py,sha256=
|
82
|
+
pulumi_vault/database/_inputs.py,sha256=50WDBsTS_NARkcx_cuaMaOOilOx5mmo8I3yyZyg56vs,510110
|
83
|
+
pulumi_vault/database/outputs.py,sha256=HM2OJhZS7iXYYhks4ytDmt_S7ZDylb8kICjduOrMWQM,353303
|
84
|
+
pulumi_vault/database/secret_backend_connection.py,sha256=OdVfkDV9OjKNNstU_G09GEEcXb770NjlWuCUePotK20,91800
|
86
85
|
pulumi_vault/database/secret_backend_role.py,sha256=2KkrCXkAOs8BRfXz19ps9RNR0A0GZ7WU9-1ko6zD77w,38703
|
87
86
|
pulumi_vault/database/secret_backend_static_role.py,sha256=cryQSPRFcuMEeG9psR4zG5A3GPWM-MgTep62iFleo0w,44034
|
88
|
-
pulumi_vault/database/secrets_mount.py,sha256=
|
87
|
+
pulumi_vault/database/secrets_mount.py,sha256=no2NJI_xhW3jG7prTTFJIoEy-m4aYZcgphx9qG0MmKY,119397
|
89
88
|
pulumi_vault/gcp/__init__.py,sha256=lHe18sSRojUWSbofTBS55MZmZWmSn8jJ_Xs_Q_r6iXA,550
|
90
89
|
pulumi_vault/gcp/_inputs.py,sha256=bDg1_ZQU3lzaQAo7Cgot4Rve5oGGSCe5XEDJGigHVEM,20089
|
91
90
|
pulumi_vault/gcp/auth_backend.py,sha256=VGvStkIP0I1hIq5bW0wdUDxm0g9u9UOsniR4q1Wj32s,67062
|
92
91
|
pulumi_vault/gcp/auth_backend_role.py,sha256=hKbD-ab4nkdBo3HHB2aAGdUJjg9DMvOeLOMd-M5U4jQ,54664
|
93
92
|
pulumi_vault/gcp/get_auth_backend_role.py,sha256=ddr5M7XtkS0nkdAHzRDvij03MeG-v20utEixNTjuU70,25781
|
94
93
|
pulumi_vault/gcp/outputs.py,sha256=eEUoNLmhOA_QcqPNQbaVxPute9lH_ZpALyjBtoJLckI,13217
|
95
|
-
pulumi_vault/gcp/secret_backend.py,sha256=
|
94
|
+
pulumi_vault/gcp/secret_backend.py,sha256=J0lLl_x8dXcrbpD3Lo_Uc3nSIcGylreZLYgmshwxuE8,59720
|
96
95
|
pulumi_vault/gcp/secret_impersonated_account.py,sha256=Qn9RDy5GWeNg1in5DYLz4wuHvMj9Yf966yDEciNJIgE,22685
|
97
96
|
pulumi_vault/gcp/secret_roleset.py,sha256=e91on0EZAipTeILS8ud_9PogNUgh4PjHcSpWK-6kCMY,27067
|
98
97
|
pulumi_vault/gcp/secret_static_account.py,sha256=KAwccUnmed9aNnu3NaqkjaJ1qdYuQAl-svE8gkj-6ng,28401
|
@@ -152,16 +151,16 @@ pulumi_vault/kubernetes/get_service_account_token.py,sha256=wZ0W1ca3PP1wYz3GJrgg
|
|
152
151
|
pulumi_vault/kubernetes/secret_backend.py,sha256=r5scM9mtiTIo-vst7TnDXCzDCYxKtJ2S0_TDMAOTHaM,69650
|
153
152
|
pulumi_vault/kubernetes/secret_backend_role.py,sha256=IVvFyeF4reA4oKgyZe73gaQpOxSbUXK0AP7xzfy7uvA,57720
|
154
153
|
pulumi_vault/kv/__init__.py,sha256=1XUGX4F8g_MaH4rdbH2Rnyk38OsXKR2cE1nnXMd08hA,551
|
155
|
-
pulumi_vault/kv/_inputs.py,sha256=
|
154
|
+
pulumi_vault/kv/_inputs.py,sha256=cR6b2Z5c1Hl2OVykkbFGRiDWsK2YaM9y2tyFu25X63M,5343
|
156
155
|
pulumi_vault/kv/get_secret.py,sha256=JtLfz4nFn1o6cjWuU8IdCaGZTPT3BAKlgiwKj4MzAOA,8922
|
157
156
|
pulumi_vault/kv/get_secret_subkeys_v2.py,sha256=2NL3rZQujYee04kkCAWaut8Sw0edIjPQMr2R9kVOp-0,10807
|
158
157
|
pulumi_vault/kv/get_secret_v2.py,sha256=FGcfiLHf_6lmi475u1HbdqeRSRrFqdfSD--Y3gTpnpI,12012
|
159
158
|
pulumi_vault/kv/get_secrets_list.py,sha256=H4_92hwGSD-XKmpVvbz46ACFxWV_Mf9Qov-MmQ6uGE4,6689
|
160
159
|
pulumi_vault/kv/get_secrets_list_v2.py,sha256=A2hDcu7_aU3HoolZFRo66w7Q8x_8uRvGLsJ_CQ4bF6Y,9004
|
161
|
-
pulumi_vault/kv/outputs.py,sha256=
|
160
|
+
pulumi_vault/kv/outputs.py,sha256=XW0FC4kcYZmCMfNuEfLscShqA9Pmoq83MV6zczOKAWM,4121
|
162
161
|
pulumi_vault/kv/secret.py,sha256=ksqjRFKIQrfv2wdHl-i3uCnMz18pmHJuzyJo7Y8MQFE,16655
|
163
162
|
pulumi_vault/kv/secret_backend_v2.py,sha256=B0G-EQDmQ7TUZCzg7vfOV7ZIplPp-Lb52eJdMTl-7fs,19844
|
164
|
-
pulumi_vault/kv/secret_v2.py,sha256=
|
163
|
+
pulumi_vault/kv/secret_v2.py,sha256=6Q5iM9WsWXBztTsq_7SqN1aPpb8zRHVmpVVo4W6pGjs,41657
|
165
164
|
pulumi_vault/ldap/__init__.py,sha256=3vX5QNXFZEatvpCkk19WRvXuIc8iUC0W3raMUcNDpKA,596
|
166
165
|
pulumi_vault/ldap/auth_backend.py,sha256=v800P1VEKz5bbIU01OqEZuQRFRBeV7ZjOshMZMXiqno,106230
|
167
166
|
pulumi_vault/ldap/auth_backend_group.py,sha256=kLDpGJXDq-y9b8E6Xtxm5ah6xxPbRBZBYEnLjqj_hVM,17164
|
@@ -181,7 +180,7 @@ pulumi_vault/mongodbatlas/secret_backend.py,sha256=X5YSLk-PjugOsLe2Dj7lG3rZEXmCU
|
|
181
180
|
pulumi_vault/mongodbatlas/secret_role.py,sha256=Drq34N74RKyNiR5VcLbjfoBzVSiNKNcGHCy8ILZxGB0,35236
|
182
181
|
pulumi_vault/okta/__init__.py,sha256=i00jeeEenAIDZEZzoJmILyKvpxpguU-qV1g600l2ExY,407
|
183
182
|
pulumi_vault/okta/_inputs.py,sha256=qkHB7CXC8KJ07V_vrQ90qdiSFvpdY5BCqZ2WAr_c6rI,4878
|
184
|
-
pulumi_vault/okta/auth_backend.py,sha256=
|
183
|
+
pulumi_vault/okta/auth_backend.py,sha256=wCkAgdSOrkMI9tZDnjjRwiyaDaTVpYm_SF5Jvc28k5s,55749
|
185
184
|
pulumi_vault/okta/auth_backend_group.py,sha256=m4fFFDKb8O4wS0DL1sx9C9cqi3P9gM98hPyrLRrs4xc,15718
|
186
185
|
pulumi_vault/okta/auth_backend_user.py,sha256=wVYUyRNGtMUSkweKspTt_tEEaQxd4Io5f_i4IOm72dQ,17804
|
187
186
|
pulumi_vault/okta/outputs.py,sha256=7T-kEMcFHQ6fs7CIo2XOF8TyBGlILyDiD9DlCavsBUI,3374
|
@@ -259,7 +258,7 @@ pulumi_vault/transit/get_sign.py,sha256=LzjCEOxnt7khS5djaJr_VpewMjhD2JJUFm9glIL7
|
|
259
258
|
pulumi_vault/transit/get_verify.py,sha256=6acxKmxPpdnCYWu21RZ3CqffJ3ZqCXY2pu-Lw5qDRUI,16130
|
260
259
|
pulumi_vault/transit/secret_backend_key.py,sha256=5f2F-j9vj04vA6ipFlk6_MQbZEd637sYmCMrMC94iFY,64387
|
261
260
|
pulumi_vault/transit/secret_cache_config.py,sha256=-xxdfOyhFodNGCgMGGoaJ8W4KipauYhgl6Ir4ZeA6NM,13105
|
262
|
-
pulumi_vault-
|
263
|
-
pulumi_vault-
|
264
|
-
pulumi_vault-
|
265
|
-
pulumi_vault-
|
261
|
+
pulumi_vault-7.0.0.dist-info/METADATA,sha256=Pt5uDMkqyZB-6XeJYspXoXRFU60qUy6vsxFToQbjhoQ,4915
|
262
|
+
pulumi_vault-7.0.0.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
263
|
+
pulumi_vault-7.0.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
264
|
+
pulumi_vault-7.0.0.dist-info/RECORD,,
|