pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/azure/backend_role.py +111 -0
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +536 -0
- pulumi_vault/database/outputs.py +483 -3
- pulumi_vault/gcp/_inputs.py +162 -4
- pulumi_vault/gcp/auth_backend.py +64 -3
- pulumi_vault/gcp/outputs.py +161 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/auth_backend_config.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +54 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
pulumi_vault/config/vars.py
CHANGED
@@ -18,9 +18,6 @@ __config__ = pulumi.Config('vault')
|
|
18
18
|
class _ExportableConfig(types.ModuleType):
|
19
19
|
@property
|
20
20
|
def add_address_to_env(self) -> Optional[str]:
|
21
|
-
"""
|
22
|
-
If true, adds the value of the `address` argument to the Terraform process environment.
|
23
|
-
"""
|
24
21
|
return __config__.get('addAddressToEnv')
|
25
22
|
|
26
23
|
@property
|
@@ -31,11 +31,7 @@ class SecretBackendArgs:
|
|
31
31
|
"""
|
32
32
|
The set of arguments for constructing a SecretBackend resource.
|
33
33
|
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
34
|
-
:param pulumi.Input[bool] bootstrap: Denotes
|
35
|
-
|
36
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
37
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
38
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
34
|
+
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
39
35
|
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
40
36
|
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
41
37
|
this is set you need to also set client_key.
|
@@ -101,11 +97,7 @@ class SecretBackendArgs:
|
|
101
97
|
@pulumi.getter
|
102
98
|
def bootstrap(self) -> Optional[pulumi.Input[bool]]:
|
103
99
|
"""
|
104
|
-
Denotes
|
105
|
-
|
106
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
107
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
108
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
100
|
+
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
109
101
|
"""
|
110
102
|
return pulumi.get(self, "bootstrap")
|
111
103
|
|
@@ -286,11 +278,7 @@ class _SecretBackendState:
|
|
286
278
|
"""
|
287
279
|
Input properties used for looking up and filtering SecretBackend resources.
|
288
280
|
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
289
|
-
:param pulumi.Input[bool] bootstrap: Denotes
|
290
|
-
|
291
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
292
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
293
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
281
|
+
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
294
282
|
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
295
283
|
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
296
284
|
this is set you need to also set client_key.
|
@@ -357,11 +345,7 @@ class _SecretBackendState:
|
|
357
345
|
@pulumi.getter
|
358
346
|
def bootstrap(self) -> Optional[pulumi.Input[bool]]:
|
359
347
|
"""
|
360
|
-
Denotes
|
361
|
-
|
362
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
363
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
364
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
348
|
+
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
365
349
|
"""
|
366
350
|
return pulumi.get(self, "bootstrap")
|
367
351
|
|
@@ -578,11 +562,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
578
562
|
:param str resource_name: The name of the resource.
|
579
563
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
580
564
|
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
581
|
-
:param pulumi.Input[bool] bootstrap: Denotes
|
582
|
-
|
583
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
584
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
585
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
565
|
+
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
586
566
|
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
587
567
|
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
588
568
|
this is set you need to also set client_key.
|
@@ -731,11 +711,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
731
711
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
732
712
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
733
713
|
:param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
734
|
-
:param pulumi.Input[bool] bootstrap: Denotes
|
735
|
-
|
736
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
737
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
738
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
714
|
+
:param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
739
715
|
:param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
740
716
|
:param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
|
741
717
|
this is set you need to also set client_key.
|
@@ -789,11 +765,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
789
765
|
@pulumi.getter
|
790
766
|
def bootstrap(self) -> pulumi.Output[Optional[bool]]:
|
791
767
|
"""
|
792
|
-
Denotes
|
793
|
-
|
794
|
-
> **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
|
795
|
-
this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
|
796
|
-
and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
|
768
|
+
Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
|
797
769
|
"""
|
798
770
|
return pulumi.get(self, "bootstrap")
|
799
771
|
|