pulumi-vault 5.19.0a1705621752__py3-none-any.whl → 5.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. pulumi_vault/__init__.py +59 -0
  2. pulumi_vault/_inputs.py +380 -0
  3. pulumi_vault/_utilities.py +2 -2
  4. pulumi_vault/aws/secret_backend.py +188 -0
  5. pulumi_vault/aws/secret_backend_static_role.py +2 -2
  6. pulumi_vault/azure/backend.py +7 -21
  7. pulumi_vault/config/__init__.pyi +0 -3
  8. pulumi_vault/config/outputs.py +380 -0
  9. pulumi_vault/config/vars.py +0 -3
  10. pulumi_vault/consul/secret_backend.py +7 -35
  11. pulumi_vault/database/_inputs.py +176 -0
  12. pulumi_vault/database/outputs.py +168 -0
  13. pulumi_vault/get_raft_autopilot_state.py +0 -12
  14. pulumi_vault/identity/group_alias.py +6 -6
  15. pulumi_vault/kubernetes/secret_backend_role.py +8 -4
  16. pulumi_vault/kv/_inputs.py +12 -0
  17. pulumi_vault/kv/outputs.py +12 -0
  18. pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
  19. pulumi_vault/ldap/secret_backend_static_role.py +2 -2
  20. pulumi_vault/managed/_inputs.py +12 -0
  21. pulumi_vault/managed/keys.py +20 -0
  22. pulumi_vault/managed/outputs.py +12 -0
  23. pulumi_vault/mongodbatlas/secret_role.py +2 -2
  24. pulumi_vault/namespace.py +46 -14
  25. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
  26. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
  27. pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  28. pulumi_vault/rabbitmq/_inputs.py +36 -0
  29. pulumi_vault/rabbitmq/outputs.py +36 -0
  30. pulumi_vault/saml/auth_backend_role.py +7 -14
  31. pulumi_vault/secrets/__init__.py +14 -0
  32. pulumi_vault/secrets/sync_association.py +464 -0
  33. pulumi_vault/secrets/sync_aws_destination.py +564 -0
  34. pulumi_vault/secrets/sync_azure_destination.py +674 -0
  35. pulumi_vault/secrets/sync_config.py +297 -0
  36. pulumi_vault/secrets/sync_gcp_destination.py +438 -0
  37. pulumi_vault/secrets/sync_gh_destination.py +511 -0
  38. pulumi_vault/secrets/sync_vercel_destination.py +541 -0
  39. pulumi_vault/ssh/secret_backend_role.py +7 -14
  40. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
  41. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +43 -35
  42. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
  43. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -18,9 +18,6 @@ __config__ = pulumi.Config('vault')
18
18
  class _ExportableConfig(types.ModuleType):
19
19
  @property
20
20
  def add_address_to_env(self) -> Optional[str]:
21
- """
22
- If true, adds the value of the `address` argument to the Terraform process environment.
23
- """
24
21
  return __config__.get('addAddressToEnv')
25
22
 
26
23
  @property
@@ -31,11 +31,7 @@ class SecretBackendArgs:
31
31
  """
32
32
  The set of arguments for constructing a SecretBackend resource.
33
33
  :param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
34
- :param pulumi.Input[bool] bootstrap: Denotes that the resource is used to bootstrap the Consul ACL system.
35
-
36
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
37
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
38
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
34
+ :param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
39
35
  :param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
40
36
  :param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
41
37
  this is set you need to also set client_key.
@@ -101,11 +97,7 @@ class SecretBackendArgs:
101
97
  @pulumi.getter
102
98
  def bootstrap(self) -> Optional[pulumi.Input[bool]]:
103
99
  """
104
- Denotes that the resource is used to bootstrap the Consul ACL system.
105
-
106
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
107
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
108
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
100
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
109
101
  """
110
102
  return pulumi.get(self, "bootstrap")
111
103
 
@@ -286,11 +278,7 @@ class _SecretBackendState:
286
278
  """
287
279
  Input properties used for looking up and filtering SecretBackend resources.
288
280
  :param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
289
- :param pulumi.Input[bool] bootstrap: Denotes that the resource is used to bootstrap the Consul ACL system.
290
-
291
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
292
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
293
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
281
+ :param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
294
282
  :param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
295
283
  :param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
296
284
  this is set you need to also set client_key.
@@ -357,11 +345,7 @@ class _SecretBackendState:
357
345
  @pulumi.getter
358
346
  def bootstrap(self) -> Optional[pulumi.Input[bool]]:
359
347
  """
360
- Denotes that the resource is used to bootstrap the Consul ACL system.
361
-
362
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
363
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
364
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
348
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
365
349
  """
366
350
  return pulumi.get(self, "bootstrap")
367
351
 
@@ -578,11 +562,7 @@ class SecretBackend(pulumi.CustomResource):
578
562
  :param str resource_name: The name of the resource.
579
563
  :param pulumi.ResourceOptions opts: Options for the resource.
580
564
  :param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
581
- :param pulumi.Input[bool] bootstrap: Denotes that the resource is used to bootstrap the Consul ACL system.
582
-
583
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
584
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
585
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
565
+ :param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
586
566
  :param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
587
567
  :param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
588
568
  this is set you need to also set client_key.
@@ -731,11 +711,7 @@ class SecretBackend(pulumi.CustomResource):
731
711
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
732
712
  :param pulumi.ResourceOptions opts: Options for the resource.
733
713
  :param pulumi.Input[str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
734
- :param pulumi.Input[bool] bootstrap: Denotes that the resource is used to bootstrap the Consul ACL system.
735
-
736
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
737
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
738
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
714
+ :param pulumi.Input[bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
739
715
  :param pulumi.Input[str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
740
716
  :param pulumi.Input[str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
741
717
  this is set you need to also set client_key.
@@ -789,11 +765,7 @@ class SecretBackend(pulumi.CustomResource):
789
765
  @pulumi.getter
790
766
  def bootstrap(self) -> pulumi.Output[Optional[bool]]:
791
767
  """
792
- Denotes that the resource is used to bootstrap the Consul ACL system.
793
-
794
- > **Important** When `bootstrap` is true, Vault will attempt to bootstrap the Consul server. The token returned from
795
- this operation will only ever be known to Vault. If the resource is ever destroyed, the bootstrap token will be lost
796
- and a [Consul reset may be required.](https://learn.hashicorp.com/tutorials/consul/access-control-troubleshoot#reset-the-acl-system)
768
+ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
797
769
  """
798
770
  return pulumi.get(self, "bootstrap")
799
771