pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -1844,19 +1844,12 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
-
"""
|
1848
|
-
:param str key: name of permitted or denied parameter.
|
1849
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
-
"""
|
1851
1847
|
pulumi.set(__self__, "key", key)
|
1852
1848
|
pulumi.set(__self__, "values", values)
|
1853
1849
|
|
1854
1850
|
@property
|
1855
1851
|
@pulumi.getter
|
1856
1852
|
def key(self) -> str:
|
1857
|
-
"""
|
1858
|
-
name of permitted or denied parameter.
|
1859
|
-
"""
|
1860
1853
|
return pulumi.get(self, "key")
|
1861
1854
|
|
1862
1855
|
@key.setter
|
@@ -1866,9 +1859,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1866
1859
|
@property
|
1867
1860
|
@pulumi.getter
|
1868
1861
|
def values(self) -> Sequence[str]:
|
1869
|
-
"""
|
1870
|
-
list of values what are permitted or denied by policy rule.
|
1871
|
-
"""
|
1872
1862
|
return pulumi.get(self, "values")
|
1873
1863
|
|
1874
1864
|
@values.setter
|
@@ -1881,19 +1871,12 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1881
1871
|
def __init__(__self__, *,
|
1882
1872
|
key: str,
|
1883
1873
|
values: Sequence[str]):
|
1884
|
-
"""
|
1885
|
-
:param str key: name of permitted or denied parameter.
|
1886
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
-
"""
|
1888
1874
|
pulumi.set(__self__, "key", key)
|
1889
1875
|
pulumi.set(__self__, "values", values)
|
1890
1876
|
|
1891
1877
|
@property
|
1892
1878
|
@pulumi.getter
|
1893
1879
|
def key(self) -> str:
|
1894
|
-
"""
|
1895
|
-
name of permitted or denied parameter.
|
1896
|
-
"""
|
1897
1880
|
return pulumi.get(self, "key")
|
1898
1881
|
|
1899
1882
|
@key.setter
|
@@ -1903,9 +1886,6 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1903
1886
|
@property
|
1904
1887
|
@pulumi.getter
|
1905
1888
|
def values(self) -> Sequence[str]:
|
1906
|
-
"""
|
1907
|
-
list of values what are permitted or denied by policy rule.
|
1908
|
-
"""
|
1909
1889
|
return pulumi.get(self, "values")
|
1910
1890
|
|
1911
1891
|
@values.setter
|
@@ -1252,7 +1252,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1252
1252
|
"""
|
1253
1253
|
## Example Usage
|
1254
1254
|
|
1255
|
-
<!--Start PulumiCodeChooser -->
|
1256
1255
|
```python
|
1257
1256
|
import pulumi
|
1258
1257
|
import pulumi_vault as vault
|
@@ -1261,11 +1260,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
1261
1260
|
backend="ad",
|
1262
1261
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1263
1262
|
bindpass="SuperSecretPassw0rd",
|
1264
|
-
insecure_tls=True,
|
1265
1263
|
url="ldaps://ad",
|
1264
|
+
insecure_tls=True,
|
1266
1265
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1267
1266
|
```
|
1268
|
-
<!--End PulumiCodeChooser -->
|
1269
1267
|
|
1270
1268
|
## Import
|
1271
1269
|
|
@@ -1345,7 +1343,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1345
1343
|
"""
|
1346
1344
|
## Example Usage
|
1347
1345
|
|
1348
|
-
<!--Start PulumiCodeChooser -->
|
1349
1346
|
```python
|
1350
1347
|
import pulumi
|
1351
1348
|
import pulumi_vault as vault
|
@@ -1354,11 +1351,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
1354
1351
|
backend="ad",
|
1355
1352
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1356
1353
|
bindpass="SuperSecretPassw0rd",
|
1357
|
-
insecure_tls=True,
|
1358
1354
|
url="ldaps://ad",
|
1355
|
+
insecure_tls=True,
|
1359
1356
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1360
1357
|
```
|
1361
|
-
<!--End PulumiCodeChooser -->
|
1362
1358
|
|
1363
1359
|
## Import
|
1364
1360
|
|
@@ -293,7 +293,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
293
293
|
"""
|
294
294
|
## Example Usage
|
295
295
|
|
296
|
-
<!--Start PulumiCodeChooser -->
|
297
296
|
```python
|
298
297
|
import pulumi
|
299
298
|
import pulumi_vault as vault
|
@@ -307,6 +306,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
307
306
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
308
307
|
qa = vault.ad.SecretLibrary("qa",
|
309
308
|
backend=config.backend,
|
309
|
+
name="qa",
|
310
310
|
service_account_names=[
|
311
311
|
"Bob",
|
312
312
|
"Mary",
|
@@ -315,7 +315,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
315
315
|
disable_check_in_enforcement=True,
|
316
316
|
max_ttl=120)
|
317
317
|
```
|
318
|
-
<!--End PulumiCodeChooser -->
|
319
318
|
|
320
319
|
## Import
|
321
320
|
|
@@ -351,7 +350,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
351
350
|
"""
|
352
351
|
## Example Usage
|
353
352
|
|
354
|
-
<!--Start PulumiCodeChooser -->
|
355
353
|
```python
|
356
354
|
import pulumi
|
357
355
|
import pulumi_vault as vault
|
@@ -365,6 +363,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
365
363
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
366
364
|
qa = vault.ad.SecretLibrary("qa",
|
367
365
|
backend=config.backend,
|
366
|
+
name="qa",
|
368
367
|
service_account_names=[
|
369
368
|
"Bob",
|
370
369
|
"Mary",
|
@@ -373,7 +372,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
373
372
|
disable_check_in_enforcement=True,
|
374
373
|
max_ttl=120)
|
375
374
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
375
|
|
378
376
|
## Import
|
379
377
|
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -258,7 +258,6 @@ class SecretRole(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
-
<!--Start PulumiCodeChooser -->
|
262
261
|
```python
|
263
262
|
import pulumi
|
264
263
|
import pulumi_vault as vault
|
@@ -276,7 +275,6 @@ class SecretRole(pulumi.CustomResource):
|
|
276
275
|
service_account_name="Bob",
|
277
276
|
ttl=60)
|
278
277
|
```
|
279
|
-
<!--End PulumiCodeChooser -->
|
280
278
|
|
281
279
|
## Import
|
282
280
|
|
@@ -310,7 +308,6 @@ class SecretRole(pulumi.CustomResource):
|
|
310
308
|
"""
|
311
309
|
## Example Usage
|
312
310
|
|
313
|
-
<!--Start PulumiCodeChooser -->
|
314
311
|
```python
|
315
312
|
import pulumi
|
316
313
|
import pulumi_vault as vault
|
@@ -328,7 +325,6 @@ class SecretRole(pulumi.CustomResource):
|
|
328
325
|
service_account_name="Bob",
|
329
326
|
ttl=60)
|
330
327
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
328
|
|
333
329
|
## Import
|
334
330
|
|