pulumi-vault 7.2.1__py3-none-any.whl → 7.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/aws/auth_backend_config_identity.py +14 -7
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/vars.py +1 -2
- pulumi_vault/database/secret_backend_static_role.py +7 -14
- pulumi_vault/ldap/secret_backend.py +47 -0
- pulumi_vault/nomad_secret_backend.py +7 -14
- pulumi_vault/oci_auth_backend.py +7 -14
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +7 -14
- pulumi_vault/provider.py +3 -6
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-7.2.1.dist-info → pulumi_vault-7.3.0.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.1.dist-info → pulumi_vault-7.3.0.dist-info}/RECORD +14 -14
- {pulumi_vault-7.2.1.dist-info → pulumi_vault-7.3.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.1.dist-info → pulumi_vault-7.3.0.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,8 @@ class AuthBackendConfigIdentityArgs:
|
|
27
27
|
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
28
28
|
"""
|
29
29
|
The set of arguments for constructing a AuthBackendConfigIdentity resource.
|
30
|
-
:param pulumi.Input[_builtins.str] backend:
|
30
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
31
|
+
mounted at. Defaults to `aws`.
|
31
32
|
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
32
33
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
33
34
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
@@ -58,7 +59,8 @@ class AuthBackendConfigIdentityArgs:
|
|
58
59
|
@pulumi.getter
|
59
60
|
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
60
61
|
"""
|
61
|
-
|
62
|
+
The path the AWS auth backend being configured was
|
63
|
+
mounted at. Defaults to `aws`.
|
62
64
|
"""
|
63
65
|
return pulumi.get(self, "backend")
|
64
66
|
|
@@ -145,7 +147,8 @@ class _AuthBackendConfigIdentityState:
|
|
145
147
|
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
146
148
|
"""
|
147
149
|
Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
|
148
|
-
:param pulumi.Input[_builtins.str] backend:
|
150
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
151
|
+
mounted at. Defaults to `aws`.
|
149
152
|
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
150
153
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
151
154
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
@@ -176,7 +179,8 @@ class _AuthBackendConfigIdentityState:
|
|
176
179
|
@pulumi.getter
|
177
180
|
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
178
181
|
"""
|
179
|
-
|
182
|
+
The path the AWS auth backend being configured was
|
183
|
+
mounted at. Defaults to `aws`.
|
180
184
|
"""
|
181
185
|
return pulumi.get(self, "backend")
|
182
186
|
|
@@ -296,7 +300,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
296
300
|
|
297
301
|
:param str resource_name: The name of the resource.
|
298
302
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
299
|
-
:param pulumi.Input[_builtins.str] backend:
|
303
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
304
|
+
mounted at. Defaults to `aws`.
|
300
305
|
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
301
306
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
302
307
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
@@ -404,7 +409,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
404
409
|
:param str resource_name: The unique name of the resulting resource.
|
405
410
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
406
411
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
407
|
-
:param pulumi.Input[_builtins.str] backend:
|
412
|
+
:param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
|
413
|
+
mounted at. Defaults to `aws`.
|
408
414
|
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
409
415
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
410
416
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
@@ -434,7 +440,8 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
434
440
|
@pulumi.getter
|
435
441
|
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
436
442
|
"""
|
437
|
-
|
443
|
+
The path the AWS auth backend being configured was
|
444
|
+
mounted at. Defaults to `aws`.
|
438
445
|
"""
|
439
446
|
return pulumi.get(self, "backend")
|
440
447
|
|
pulumi_vault/config/__init__.pyi
CHANGED
@@ -124,8 +124,7 @@ The namespace to use. Available only for Vault Enterprise.
|
|
124
124
|
|
125
125
|
setNamespaceFromToken: Optional[bool]
|
126
126
|
"""
|
127
|
-
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
128
|
-
token namespace as the root namespace for all resources.
|
127
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
129
128
|
"""
|
130
129
|
|
131
130
|
skipChildToken: Optional[bool]
|
pulumi_vault/config/vars.py
CHANGED
@@ -175,8 +175,7 @@ class _ExportableConfig(types.ModuleType):
|
|
175
175
|
@_builtins.property
|
176
176
|
def set_namespace_from_token(self) -> Optional[bool]:
|
177
177
|
"""
|
178
|
-
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
179
|
-
token namespace as the root namespace for all resources.
|
178
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
180
179
|
"""
|
181
180
|
return __config__.get_bool('setNamespaceFromToken')
|
182
181
|
|
@@ -37,8 +37,7 @@ class SecretBackendStaticRoleArgs:
|
|
37
37
|
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
38
38
|
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
39
39
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
40
|
-
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
41
|
-
can be done in `credential_config`.
|
40
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
42
41
|
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
43
42
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
44
43
|
The value should not contain leading or trailing forward slashes.
|
@@ -133,8 +132,7 @@ class SecretBackendStaticRoleArgs:
|
|
133
132
|
@pulumi.getter(name="credentialType")
|
134
133
|
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
135
134
|
"""
|
136
|
-
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
137
|
-
can be done in `credential_config`.
|
135
|
+
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
138
136
|
"""
|
139
137
|
return pulumi.get(self, "credential_type")
|
140
138
|
|
@@ -270,8 +268,7 @@ class _SecretBackendStaticRoleState:
|
|
270
268
|
"""
|
271
269
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
272
270
|
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
273
|
-
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
274
|
-
can be done in `credential_config`.
|
271
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
275
272
|
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
276
273
|
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
277
274
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
@@ -347,8 +344,7 @@ class _SecretBackendStaticRoleState:
|
|
347
344
|
@pulumi.getter(name="credentialType")
|
348
345
|
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
349
346
|
"""
|
350
|
-
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
351
|
-
can be done in `credential_config`.
|
347
|
+
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
352
348
|
"""
|
353
349
|
return pulumi.get(self, "credential_type")
|
354
350
|
|
@@ -560,8 +556,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
560
556
|
:param str resource_name: The name of the resource.
|
561
557
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
562
558
|
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
563
|
-
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
564
|
-
can be done in `credential_config`.
|
559
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
565
560
|
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
566
561
|
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
567
562
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
@@ -728,8 +723,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
728
723
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
729
724
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
730
725
|
:param pulumi.Input[_builtins.str] backend: The unique name of the Vault mount to configure.
|
731
|
-
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
732
|
-
can be done in `credential_config`.
|
726
|
+
:param pulumi.Input[_builtins.str] credential_type: The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
733
727
|
:param pulumi.Input[_builtins.str] db_name: The unique name of the database connection to use for the static role.
|
734
728
|
:param pulumi.Input[_builtins.str] name: A unique name to give the static role.
|
735
729
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
@@ -789,8 +783,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
789
783
|
@pulumi.getter(name="credentialType")
|
790
784
|
def credential_type(self) -> pulumi.Output[_builtins.str]:
|
791
785
|
"""
|
792
|
-
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration
|
793
|
-
can be done in `credential_config`.
|
786
|
+
The credential type for the user, can be one of "password", "rsa_private_key" or "client_certificate".The configuration can be done in `credential_config`.
|
794
787
|
"""
|
795
788
|
return pulumi.get(self, "credential_type")
|
796
789
|
|
@@ -29,6 +29,7 @@ class SecretBackendArgs:
|
|
29
29
|
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
30
30
|
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
31
|
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
32
33
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
33
34
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
35
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -73,6 +74,7 @@ class SecretBackendArgs:
|
|
73
74
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
74
75
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
75
76
|
the next URL in the configuration.
|
77
|
+
:param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
76
78
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
77
79
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
78
80
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
@@ -134,6 +136,8 @@ class SecretBackendArgs:
|
|
134
136
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
135
137
|
if connection_timeout is not None:
|
136
138
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
139
|
+
if credential_type is not None:
|
140
|
+
pulumi.set(__self__, "credential_type", credential_type)
|
137
141
|
if default_lease_ttl_seconds is not None:
|
138
142
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
139
143
|
if delegated_auth_accessors is not None:
|
@@ -317,6 +321,18 @@ class SecretBackendArgs:
|
|
317
321
|
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
318
322
|
pulumi.set(self, "connection_timeout", value)
|
319
323
|
|
324
|
+
@_builtins.property
|
325
|
+
@pulumi.getter(name="credentialType")
|
326
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
327
|
+
"""
|
328
|
+
The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
329
|
+
"""
|
330
|
+
return pulumi.get(self, "credential_type")
|
331
|
+
|
332
|
+
@credential_type.setter
|
333
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
334
|
+
pulumi.set(self, "credential_type", value)
|
335
|
+
|
320
336
|
@_builtins.property
|
321
337
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
322
338
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -704,6 +720,7 @@ class _SecretBackendState:
|
|
704
720
|
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
705
721
|
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
706
722
|
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
723
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
707
724
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
708
725
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
709
726
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -749,6 +766,7 @@ class _SecretBackendState:
|
|
749
766
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
750
767
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
751
768
|
the next URL in the configuration.
|
769
|
+
:param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
752
770
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
753
771
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
754
772
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
@@ -814,6 +832,8 @@ class _SecretBackendState:
|
|
814
832
|
pulumi.set(__self__, "client_tls_key", client_tls_key)
|
815
833
|
if connection_timeout is not None:
|
816
834
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
835
|
+
if credential_type is not None:
|
836
|
+
pulumi.set(__self__, "credential_type", credential_type)
|
817
837
|
if default_lease_ttl_seconds is not None:
|
818
838
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
819
839
|
if delegated_auth_accessors is not None:
|
@@ -1009,6 +1029,18 @@ class _SecretBackendState:
|
|
1009
1029
|
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1010
1030
|
pulumi.set(self, "connection_timeout", value)
|
1011
1031
|
|
1032
|
+
@_builtins.property
|
1033
|
+
@pulumi.getter(name="credentialType")
|
1034
|
+
def credential_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1035
|
+
"""
|
1036
|
+
The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
1037
|
+
"""
|
1038
|
+
return pulumi.get(self, "credential_type")
|
1039
|
+
|
1040
|
+
@credential_type.setter
|
1041
|
+
def credential_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1042
|
+
pulumi.set(self, "credential_type", value)
|
1043
|
+
|
1012
1044
|
@_builtins.property
|
1013
1045
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1014
1046
|
def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
@@ -1398,6 +1430,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1398
1430
|
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1399
1431
|
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1400
1432
|
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1433
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1401
1434
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1402
1435
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1403
1436
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1469,6 +1502,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1469
1502
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1470
1503
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1471
1504
|
the next URL in the configuration.
|
1505
|
+
:param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
1472
1506
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1473
1507
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1474
1508
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
@@ -1569,6 +1603,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1569
1603
|
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1570
1604
|
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1571
1605
|
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1606
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1572
1607
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1573
1608
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1574
1609
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1622,6 +1657,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1622
1657
|
__props__.__dict__["client_tls_cert"] = None if client_tls_cert is None else pulumi.Output.secret(client_tls_cert)
|
1623
1658
|
__props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
|
1624
1659
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1660
|
+
__props__.__dict__["credential_type"] = credential_type
|
1625
1661
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1626
1662
|
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1627
1663
|
__props__.__dict__["description"] = description
|
@@ -1676,6 +1712,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1676
1712
|
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1677
1713
|
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1678
1714
|
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1715
|
+
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1679
1716
|
default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
1680
1717
|
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1681
1718
|
description: Optional[pulumi.Input[_builtins.str]] = None,
|
@@ -1726,6 +1763,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1726
1763
|
:param pulumi.Input[_builtins.str] client_tls_key: Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
1727
1764
|
:param pulumi.Input[_builtins.int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1728
1765
|
the next URL in the configuration.
|
1766
|
+
:param pulumi.Input[_builtins.str] credential_type: The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
1729
1767
|
:param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1730
1768
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1731
1769
|
:param pulumi.Input[_builtins.str] description: Human-friendly description of the mount
|
@@ -1784,6 +1822,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1784
1822
|
__props__.__dict__["client_tls_cert"] = client_tls_cert
|
1785
1823
|
__props__.__dict__["client_tls_key"] = client_tls_key
|
1786
1824
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1825
|
+
__props__.__dict__["credential_type"] = credential_type
|
1787
1826
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1788
1827
|
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1789
1828
|
__props__.__dict__["description"] = description
|
@@ -1906,6 +1945,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1906
1945
|
"""
|
1907
1946
|
return pulumi.get(self, "connection_timeout")
|
1908
1947
|
|
1948
|
+
@_builtins.property
|
1949
|
+
@pulumi.getter(name="credentialType")
|
1950
|
+
def credential_type(self) -> pulumi.Output[_builtins.str]:
|
1951
|
+
"""
|
1952
|
+
The type of credential to generate. Valid values include `password` and `phrase`. Default is `password`.
|
1953
|
+
"""
|
1954
|
+
return pulumi.get(self, "credential_type")
|
1955
|
+
|
1909
1956
|
@_builtins.property
|
1910
1957
|
@pulumi.getter(name="defaultLeaseTtlSeconds")
|
1911
1958
|
def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
|
@@ -70,8 +70,7 @@ class NomadSecretBackendArgs:
|
|
70
70
|
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
71
71
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
72
72
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
73
|
-
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
74
|
-
use when checking the last rotation time.
|
73
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
75
74
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
76
75
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
77
76
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -357,8 +356,7 @@ class NomadSecretBackendArgs:
|
|
357
356
|
@pulumi.getter
|
358
357
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
359
358
|
"""
|
360
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
361
|
-
use when checking the last rotation time.
|
359
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
362
360
|
"""
|
363
361
|
return pulumi.get(self, "local")
|
364
362
|
|
@@ -548,8 +546,7 @@ class _NomadSecretBackendState:
|
|
548
546
|
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
549
547
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
550
548
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
551
|
-
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
552
|
-
use when checking the last rotation time.
|
549
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
553
550
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
554
551
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
555
552
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -849,8 +846,7 @@ class _NomadSecretBackendState:
|
|
849
846
|
@pulumi.getter
|
850
847
|
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
851
848
|
"""
|
852
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
853
|
-
use when checking the last rotation time.
|
849
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
854
850
|
"""
|
855
851
|
return pulumi.get(self, "local")
|
856
852
|
|
@@ -1068,8 +1064,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
1068
1064
|
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1069
1065
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1070
1066
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1071
|
-
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1072
|
-
use when checking the last rotation time.
|
1067
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
1073
1068
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1074
1069
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
1075
1070
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -1269,8 +1264,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
1269
1264
|
:param pulumi.Input[_builtins.bool] force_no_cache: If set to true, disables caching.
|
1270
1265
|
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1271
1266
|
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1272
|
-
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1273
|
-
use when checking the last rotation time.
|
1267
|
+
:param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
1274
1268
|
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
1275
1269
|
:param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
|
1276
1270
|
generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
|
@@ -1474,8 +1468,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
1474
1468
|
@pulumi.getter
|
1475
1469
|
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1476
1470
|
"""
|
1477
|
-
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to
|
1478
|
-
use when checking the last rotation time.
|
1471
|
+
Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time.
|
1479
1472
|
"""
|
1480
1473
|
return pulumi.get(self, "local")
|
1481
1474
|
|
pulumi_vault/oci_auth_backend.py
CHANGED
@@ -44,8 +44,7 @@ class OciAuthBackendArgs:
|
|
44
44
|
:param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
|
45
45
|
:param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
|
46
46
|
:param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
|
47
|
-
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
48
|
-
Can only be used with rotation_schedule.
|
47
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
49
48
|
:param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
50
49
|
|
51
50
|
The `tune` block is used to tune the auth backend:
|
@@ -173,8 +172,7 @@ class OciAuthBackendArgs:
|
|
173
172
|
@pulumi.getter(name="rotationWindow")
|
174
173
|
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
175
174
|
"""
|
176
|
-
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
177
|
-
Can only be used with rotation_schedule.
|
175
|
+
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
178
176
|
"""
|
179
177
|
return pulumi.get(self, "rotation_window")
|
180
178
|
|
@@ -225,8 +223,7 @@ class _OciAuthBackendState:
|
|
225
223
|
:param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
|
226
224
|
:param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
|
227
225
|
:param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
|
228
|
-
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
229
|
-
Can only be used with rotation_schedule.
|
226
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
230
227
|
:param pulumi.Input['OciAuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
231
228
|
|
232
229
|
The `tune` block is used to tune the auth backend:
|
@@ -369,8 +366,7 @@ class _OciAuthBackendState:
|
|
369
366
|
@pulumi.getter(name="rotationWindow")
|
370
367
|
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
371
368
|
"""
|
372
|
-
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
373
|
-
Can only be used with rotation_schedule.
|
369
|
+
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
374
370
|
"""
|
375
371
|
return pulumi.get(self, "rotation_window")
|
376
372
|
|
@@ -443,8 +439,7 @@ class OciAuthBackend(pulumi.CustomResource):
|
|
443
439
|
:param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
|
444
440
|
:param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
|
445
441
|
:param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
|
446
|
-
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
447
|
-
Can only be used with rotation_schedule.
|
442
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
448
443
|
:param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
449
444
|
|
450
445
|
The `tune` block is used to tune the auth backend:
|
@@ -564,8 +559,7 @@ class OciAuthBackend(pulumi.CustomResource):
|
|
564
559
|
:param pulumi.Input[_builtins.str] path: Unique name of the auth backend to configure.
|
565
560
|
:param pulumi.Input[_builtins.int] rotation_period: The period of time in seconds between each rotation of the root credential. Cannot be used with rotation_schedule.
|
566
561
|
:param pulumi.Input[_builtins.str] rotation_schedule: The cron-style schedule for the root credential to be rotated on. Cannot be used with rotation_period.
|
567
|
-
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
568
|
-
Can only be used with rotation_schedule.
|
562
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
569
563
|
:param pulumi.Input[Union['OciAuthBackendTuneArgs', 'OciAuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
570
564
|
|
571
565
|
The `tune` block is used to tune the auth backend:
|
@@ -666,8 +660,7 @@ class OciAuthBackend(pulumi.CustomResource):
|
|
666
660
|
@pulumi.getter(name="rotationWindow")
|
667
661
|
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
668
662
|
"""
|
669
|
-
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered.
|
670
|
-
Can only be used with rotation_schedule.
|
663
|
+
The maximum amount of time in seconds Vault is allowed to complete a rotation once a scheduled rotation is triggered. Can only be used with rotation_schedule.
|
671
664
|
"""
|
672
665
|
return pulumi.get(self, "rotation_window")
|
673
666
|
|
@@ -47,8 +47,7 @@ class BackendConfigAutoTidyArgs:
|
|
47
47
|
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
48
48
|
read the configuration from, with no leading or trailing `/`s.
|
49
49
|
:param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
|
50
|
-
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
51
|
-
time after being marked revoked or deactivated.
|
50
|
+
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
52
51
|
:param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
|
53
52
|
between tidy invocations (after one finishes to the start of the next).
|
54
53
|
:param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
|
@@ -164,8 +163,7 @@ class BackendConfigAutoTidyArgs:
|
|
164
163
|
@pulumi.getter(name="acmeAccountSafetyBuffer")
|
165
164
|
def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
166
165
|
"""
|
167
|
-
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
168
|
-
time after being marked revoked or deactivated.
|
166
|
+
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
169
167
|
"""
|
170
168
|
return pulumi.get(self, "acme_account_safety_buffer")
|
171
169
|
|
@@ -462,8 +460,7 @@ class _BackendConfigAutoTidyState:
|
|
462
460
|
tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None):
|
463
461
|
"""
|
464
462
|
Input properties used for looking up and filtering BackendConfigAutoTidy resources.
|
465
|
-
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
466
|
-
time after being marked revoked or deactivated.
|
463
|
+
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
467
464
|
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
468
465
|
read the configuration from, with no leading or trailing `/`s.
|
469
466
|
:param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
|
@@ -559,8 +556,7 @@ class _BackendConfigAutoTidyState:
|
|
559
556
|
@pulumi.getter(name="acmeAccountSafetyBuffer")
|
560
557
|
def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
561
558
|
"""
|
562
|
-
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
563
|
-
time after being marked revoked or deactivated.
|
559
|
+
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
564
560
|
"""
|
565
561
|
return pulumi.get(self, "acme_account_safety_buffer")
|
566
562
|
|
@@ -907,8 +903,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
|
|
907
903
|
|
908
904
|
:param str resource_name: The name of the resource.
|
909
905
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
910
|
-
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
911
|
-
time after being marked revoked or deactivated.
|
906
|
+
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
912
907
|
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
913
908
|
read the configuration from, with no leading or trailing `/`s.
|
914
909
|
:param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
|
@@ -1094,8 +1089,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
|
|
1094
1089
|
:param str resource_name: The unique name of the resulting resource.
|
1095
1090
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1096
1091
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1097
|
-
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
1098
|
-
time after being marked revoked or deactivated.
|
1092
|
+
:param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
1099
1093
|
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
1100
1094
|
read the configuration from, with no leading or trailing `/`s.
|
1101
1095
|
:param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
|
@@ -1173,8 +1167,7 @@ class BackendConfigAutoTidy(pulumi.CustomResource):
|
|
1173
1167
|
@pulumi.getter(name="acmeAccountSafetyBuffer")
|
1174
1168
|
def acme_account_safety_buffer(self) -> pulumi.Output[_builtins.str]:
|
1175
1169
|
"""
|
1176
|
-
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of
|
1177
|
-
time after being marked revoked or deactivated.
|
1170
|
+
The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
|
1178
1171
|
"""
|
1179
1172
|
return pulumi.get(self, "acme_account_safety_buffer")
|
1180
1173
|
|
pulumi_vault/provider.py
CHANGED
@@ -73,8 +73,7 @@ class ProviderArgs:
|
|
73
73
|
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
74
74
|
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
75
75
|
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
76
|
-
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
77
|
-
token namespace as the root namespace for all resources.
|
76
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
78
77
|
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
79
78
|
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
80
79
|
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
@@ -415,8 +414,7 @@ class ProviderArgs:
|
|
415
414
|
@pulumi.getter(name="setNamespaceFromToken")
|
416
415
|
def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
417
416
|
"""
|
418
|
-
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
419
|
-
token namespace as the root namespace for all resources.
|
417
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
420
418
|
"""
|
421
419
|
return pulumi.get(self, "set_namespace_from_token")
|
422
420
|
|
@@ -575,8 +573,7 @@ class Provider(pulumi.ProviderResource):
|
|
575
573
|
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
576
574
|
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
577
575
|
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
578
|
-
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
579
|
-
token namespace as the root namespace for all resources.
|
576
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
580
577
|
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
581
578
|
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
582
579
|
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -19,16 +19,16 @@ pulumi_vault/mfa_pingid.py,sha256=qtYnZ7xA35EZZij8YsM1yZHVDNLkOciLDVui_CkSf9I,32
|
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=oioMOfMYIpqaj2J7tEbujskxQ6EbvBTR1-15DkCEP2c,27097
|
20
20
|
pulumi_vault/mount.py,sha256=JtwtH9JHyMpUe-Sk2ApftSWdgCYXs4JAdgNvJhgyTLU,65745
|
21
21
|
pulumi_vault/namespace.py,sha256=R21BCWrDoMOSFDgPbjVzP_h2J5LynnTMyGEWrgaqHAE,19256
|
22
|
-
pulumi_vault/nomad_secret_backend.py,sha256=
|
22
|
+
pulumi_vault/nomad_secret_backend.py,sha256=0MLjqo6m-9dqW7j54HeVM4Ohk2E4DJQr5KoHDs1CHzQ,82171
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=axNMl7B12t-_atT3I4vwBiqpfaWPgeqMHaJaTNjIh8w,21405
|
24
|
-
pulumi_vault/oci_auth_backend.py,sha256=
|
24
|
+
pulumi_vault/oci_auth_backend.py,sha256=ckYMSV2Kj6w0UL1bNyqWb7r6IvJqRkaXKau5GHGoZiE,32906
|
25
25
|
pulumi_vault/oci_auth_backend_role.py,sha256=sesaveRmaFy-3asJEbCoNBpm4WcFSkFyYTXm094Fyz4,38113
|
26
26
|
pulumi_vault/outputs.py,sha256=q-HfnLHjRLbBe_T-9-kc2dE4ndKETqte_0t1TFAu-N8,22343
|
27
27
|
pulumi_vault/plugin.py,sha256=57QZXnzP9lPAU0TbErKMCaLggsm9MehQm9hjVgy36_k,25233
|
28
28
|
pulumi_vault/plugin_pinned_version.py,sha256=w3YbjWKRyKY_7Ufc45n7nIAhVxpuj352jqykNlzmk4Q,11340
|
29
29
|
pulumi_vault/policy.py,sha256=eOofckCLS7K3YRGh3GElW5jpXz_oK76xny4Fk5VrsR0,11666
|
30
|
-
pulumi_vault/provider.py,sha256=
|
31
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
30
|
+
pulumi_vault/provider.py,sha256=0rno_jWm-8NzVdJYUdgvtlhL5R15IjrWJxlcclfPc0c,44944
|
31
|
+
pulumi_vault/pulumi-plugin.json,sha256=JEVpXAsAIDW_X3IP1Du_n4e8bHjkPRfXC9_S36GvJCA,64
|
32
32
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
33
33
|
pulumi_vault/quota_lease_count.py,sha256=CoqfUnFAx956hEU4610qCLLhfzYcB5Qey0Jfy3hkVwA,26157
|
34
34
|
pulumi_vault/quota_rate_limit.py,sha256=tI72HsW0lOMEMMHLyr3EQhW8d6F-FfgsEQyXGH5ebjU,43077
|
@@ -52,7 +52,7 @@ pulumi_vault/approle/get_auth_backend_role_id.py,sha256=Pos6QmC1CcXI-tNsq0VWxVMi
|
|
52
52
|
pulumi_vault/aws/__init__.py,sha256=AiNPhSbbIWCzh2PXRscR4HPDmqjVnvrRn0lVBPR3NVo,816
|
53
53
|
pulumi_vault/aws/auth_backend_cert.py,sha256=3n4u19tLfBErnP_UQKmaGfQ31bkN0Z--xO_L989xwas,19456
|
54
54
|
pulumi_vault/aws/auth_backend_client.py,sha256=jt6xAQp6yXbVE2NNQenXD5q0nYI8b0CSi_bJRguy4Gk,61511
|
55
|
-
pulumi_vault/aws/auth_backend_config_identity.py,sha256=
|
55
|
+
pulumi_vault/aws/auth_backend_config_identity.py,sha256=81K0EljnEdSIhaeE6k4nPccWRRgaj6pQ6s-gw7mFB2I,24752
|
56
56
|
pulumi_vault/aws/auth_backend_identity_whitelist.py,sha256=Yxi2tGPMwBKRIXkZz7G2FkM34VInIVQw2AnGN13lFhk,17883
|
57
57
|
pulumi_vault/aws/auth_backend_login.py,sha256=pJEddkhIAdNEamAAIkFXTgyxmAq3shJMnOA0u4r5nYc,45402
|
58
58
|
pulumi_vault/aws/auth_backend_role.py,sha256=Q1F_ObDloShGsqC2UIzpARmNtx7MJQeiV_OeS3gfROE,105567
|
@@ -73,11 +73,11 @@ pulumi_vault/azure/backend_role.py,sha256=56fxGFa0IxqmEwlsXtNOwmF3RpHUBn9HpqVlXS
|
|
73
73
|
pulumi_vault/azure/get_access_credentials.py,sha256=Fq9VD7uteM-MgM6gprkh3yTf-l1Edf9LgO-rRyTc8qg,20613
|
74
74
|
pulumi_vault/azure/outputs.py,sha256=JqVDbYxhPOUhfiuRjkwkXo_VfaU08awc7VyGL4joI9k,3420
|
75
75
|
pulumi_vault/config/__init__.py,sha256=XWnQfVtc2oPapjSXXCdORFJvMpXt_SMJQASWdTRoPmc,296
|
76
|
-
pulumi_vault/config/__init__.pyi,sha256=
|
76
|
+
pulumi_vault/config/__init__.pyi,sha256=fP-OU4bus3s58b7gkKNcgoDkf9sT8eoKfSQBEQ2vQfk,3313
|
77
77
|
pulumi_vault/config/_inputs.py,sha256=M505VzKZpJruf45QhBirCUEPC2mw8dv740P5VBTw2dI,2023
|
78
78
|
pulumi_vault/config/outputs.py,sha256=ViTYi4YxunYgaBHVUJJL7g9Ih6q2eWNfmJPf-hY-bN4,46804
|
79
79
|
pulumi_vault/config/ui_custom_message.py,sha256=dB9ZRzS2LHr0f2UsOp3W0tmCOKEYnl15y9xgvFKPM_o,24394
|
80
|
-
pulumi_vault/config/vars.py,sha256=
|
80
|
+
pulumi_vault/config/vars.py,sha256=54tTSG5EVJ7OCe1r-9X8ahcYM3X62Y1ssQmzR25SHFk,6990
|
81
81
|
pulumi_vault/consul/__init__.py,sha256=rvV594Qo7hp6Ysz7aaxgrOVw1c6LlliyrD8nrCoKEdU,345
|
82
82
|
pulumi_vault/consul/secret_backend.py,sha256=qKboTfen7iw4PB46LMe_jH_C8TxLOztDRTsE0wKZg28,79364
|
83
83
|
pulumi_vault/consul/secret_backend_role.py,sha256=42QN0s2omlBnfwOiPV4EmNOlpOCRlf_vb_Cyk63HmCg,43973
|
@@ -86,7 +86,7 @@ pulumi_vault/database/_inputs.py,sha256=eValBNKKgSg16n8gbW5Oe3ALPipO_tFWWCNC2a50
|
|
86
86
|
pulumi_vault/database/outputs.py,sha256=211SlAm68M0ICkYh8U_P6wy5P4XH7CXt_Rek8VK-iGo,361928
|
87
87
|
pulumi_vault/database/secret_backend_connection.py,sha256=-lETXtUXeiz1vmwG7glaFHi7v4iR8ghIwRHM9dwYchQ,93381
|
88
88
|
pulumi_vault/database/secret_backend_role.py,sha256=Sm4PtpIA3m0nfUtfIEAGjORXZamAQsEpMaPkNSPNr8U,39232
|
89
|
-
pulumi_vault/database/secret_backend_static_role.py,sha256=
|
89
|
+
pulumi_vault/database/secret_backend_static_role.py,sha256=nB2EZ39_M3Z3KOhnr4tXww92qlt2g9hjPNKbTDktz3Q,44519
|
90
90
|
pulumi_vault/database/secrets_mount.py,sha256=WAJEOlfp0dB2SZxh1GkTGXGMImweQxS42O3bdboPlIQ,122955
|
91
91
|
pulumi_vault/gcp/__init__.py,sha256=FEwIPfzcZ5RqQYSD27FtChXzHEMQfcnhJbDvOPlWSAE,563
|
92
92
|
pulumi_vault/gcp/_inputs.py,sha256=OLgraky8XbCZfbPIjQF6Q7G4Gglag_AIOKKZD97VsZk,20330
|
@@ -170,7 +170,7 @@ pulumi_vault/ldap/auth_backend_group.py,sha256=bjnSZPaUnUJSV2TD76k0ciyU_r4YO245K
|
|
170
170
|
pulumi_vault/ldap/auth_backend_user.py,sha256=hwIK_XGGuYAOhHaNWBFErbH_mRyXfwy366nQKXwzGoc,19577
|
171
171
|
pulumi_vault/ldap/get_dynamic_credentials.py,sha256=AXkcISQo0YSfGrTEP6VDMohl_s2WFMHjY132qQ8ziAM,7970
|
172
172
|
pulumi_vault/ldap/get_static_credentials.py,sha256=6ulQebkikrl6onkom9uWaE2s5NRvNiA--lL5JsLsW3k,8205
|
173
|
-
pulumi_vault/ldap/secret_backend.py,sha256=
|
173
|
+
pulumi_vault/ldap/secret_backend.py,sha256=IlzltdCn7V0vzqIBv_GL894RuVcM4IBD56BrcDd7AUE,117692
|
174
174
|
pulumi_vault/ldap/secret_backend_dynamic_role.py,sha256=41aPRUrxVk_iWjQyRrUHoKhw5JR70UJ2AqrSLlQi-Yo,39583
|
175
175
|
pulumi_vault/ldap/secret_backend_library_set.py,sha256=ydUXFqRFUBiLRbEDw_DE_ESbYyos1FZCpMrLcqHya4s,25372
|
176
176
|
pulumi_vault/ldap/secret_backend_static_role.py,sha256=KMrK3R7jeJqUkiuSpG5TTFQ3K0iUfoSxn22ncBt3la8,25419
|
@@ -191,7 +191,7 @@ pulumi_vault/pkisecret/__init__.py,sha256=Pf-8rD7OIRMbT5yWzT810ogXGSP0xG82B3sx4y
|
|
191
191
|
pulumi_vault/pkisecret/_inputs.py,sha256=g6235fUvQFCwrlcZPns0xxUlvzM9Z6Neo2JPj-i5ESo,10068
|
192
192
|
pulumi_vault/pkisecret/backend_acme_eab.py,sha256=YqPMNitUVf7f_q9IrJ5ENn32R1lFctsCXxR3Xriu62o,25451
|
193
193
|
pulumi_vault/pkisecret/backend_config_acme.py,sha256=zEWburMpqKOcHBzRypTImNS87TP8XNTlwqFQu9nW6I8,34367
|
194
|
-
pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=
|
194
|
+
pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=31f0dixOtSCUfU2sl6rDNHUSjpZPXGQi_a6hNpqP6f4,75949
|
195
195
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=BFdj9-vZjssNGuuwqOpfDhwo09r9eG0Erx2Lf8kpTl8,16860
|
196
196
|
pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=rHtG4Uqo7tx3GEoBjrKX5_eEt3HYm0_zlqt4c-JPqUU,30119
|
197
197
|
pulumi_vault/pkisecret/backend_config_est.py,sha256=ZiWCH7hrUXrEW9Z4E95k6r_lekbSE16fq4qwegtzJfo,34471
|
@@ -264,7 +264,7 @@ pulumi_vault/transit/get_sign.py,sha256=cvWAgPsSZSyhzU4Hewp7FCsQiMLH3NxgD2d8rbFb
|
|
264
264
|
pulumi_vault/transit/get_verify.py,sha256=h2XhUQwJOlOOx8IzccA2YPySmhEMcHWOtuNfKV-9DQ0,17126
|
265
265
|
pulumi_vault/transit/secret_backend_key.py,sha256=4F_MJXEBzVsNY22HzSp79mPl0SLIVPCknk-D9klcW5A,68515
|
266
266
|
pulumi_vault/transit/secret_cache_config.py,sha256=v5enplOZynVxCUCPaav5df8d9zK2vi07C8F9SAQ73aA,13238
|
267
|
-
pulumi_vault-7.
|
268
|
-
pulumi_vault-7.
|
269
|
-
pulumi_vault-7.
|
270
|
-
pulumi_vault-7.
|
267
|
+
pulumi_vault-7.3.0.dist-info/METADATA,sha256=0FsE8nwcVxSnnGdX8Oh12Qznhzabpzv7bBLyxXLwkko,4915
|
268
|
+
pulumi_vault-7.3.0.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
269
|
+
pulumi_vault-7.3.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
270
|
+
pulumi_vault-7.3.0.dist-info/RECORD,,
|
File without changes
|
File without changes
|