pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -142,14 +142,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
145
|
```python
|
147
146
|
import pulumi
|
148
147
|
import pulumi_vault as vault
|
149
148
|
|
150
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
149
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
150
|
+
name="X-Forwarded-For",
|
151
|
+
hmac=False)
|
151
152
|
```
|
152
|
-
<!--End PulumiCodeChooser -->
|
153
153
|
|
154
154
|
:param str resource_name: The name of the resource.
|
155
155
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -173,14 +173,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
173
173
|
|
174
174
|
## Example Usage
|
175
175
|
|
176
|
-
<!--Start PulumiCodeChooser -->
|
177
176
|
```python
|
178
177
|
import pulumi
|
179
178
|
import pulumi_vault as vault
|
180
179
|
|
181
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
180
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
181
|
+
name="X-Forwarded-For",
|
182
|
+
hmac=False)
|
182
183
|
```
|
183
|
-
<!--End PulumiCodeChooser -->
|
184
184
|
|
185
185
|
:param str resource_name: The name of the resource.
|
186
186
|
:param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.
|
@@ -430,18 +430,16 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
430
430
|
"""
|
431
431
|
## Example Usage
|
432
432
|
|
433
|
-
<!--Start PulumiCodeChooser -->
|
434
433
|
```python
|
435
434
|
import pulumi
|
436
435
|
import pulumi_vault as vault
|
437
436
|
|
438
|
-
|
439
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
440
|
-
backend=
|
437
|
+
example = vault.AuthBackend("example", type="aws")
|
438
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
439
|
+
backend=example.path,
|
441
440
|
access_key="INSERT_AWS_ACCESS_KEY",
|
442
441
|
secret_key="INSERT_AWS_SECRET_KEY")
|
443
442
|
```
|
444
|
-
<!--End PulumiCodeChooser -->
|
445
443
|
|
446
444
|
## Import
|
447
445
|
|
@@ -489,18 +487,16 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
489
487
|
"""
|
490
488
|
## Example Usage
|
491
489
|
|
492
|
-
<!--Start PulumiCodeChooser -->
|
493
490
|
```python
|
494
491
|
import pulumi
|
495
492
|
import pulumi_vault as vault
|
496
493
|
|
497
|
-
|
498
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
499
|
-
backend=
|
494
|
+
example = vault.AuthBackend("example", type="aws")
|
495
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
496
|
+
backend=example.path,
|
500
497
|
access_key="INSERT_AWS_ACCESS_KEY",
|
501
498
|
secret_key="INSERT_AWS_SECRET_KEY")
|
502
499
|
```
|
503
|
-
<!--End PulumiCodeChooser -->
|
504
500
|
|
505
501
|
## Import
|
506
502
|
|
@@ -266,7 +266,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
266
266
|
|
267
267
|
## Example Usage
|
268
268
|
|
269
|
-
<!--Start PulumiCodeChooser -->
|
270
269
|
```python
|
271
270
|
import pulumi
|
272
271
|
import pulumi_vault as vault
|
@@ -280,7 +279,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
280
279
|
"account_id",
|
281
280
|
])
|
282
281
|
```
|
283
|
-
<!--End PulumiCodeChooser -->
|
284
282
|
|
285
283
|
## Import
|
286
284
|
|
@@ -319,7 +317,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
319
317
|
|
320
318
|
## Example Usage
|
321
319
|
|
322
|
-
<!--Start PulumiCodeChooser -->
|
323
320
|
```python
|
324
321
|
import pulumi
|
325
322
|
import pulumi_vault as vault
|
@@ -333,7 +330,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
333
330
|
"account_id",
|
334
331
|
])
|
335
332
|
```
|
336
|
-
<!--End PulumiCodeChooser -->
|
337
333
|
|
338
334
|
## Import
|
339
335
|
|
@@ -197,17 +197,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
197
197
|
|
198
198
|
## Example Usage
|
199
199
|
|
200
|
-
<!--Start PulumiCodeChooser -->
|
201
200
|
```python
|
202
201
|
import pulumi
|
203
202
|
import pulumi_vault as vault
|
204
203
|
|
205
|
-
|
206
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
207
|
-
backend=
|
204
|
+
example = vault.AuthBackend("example", type="aws")
|
205
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
206
|
+
backend=example.path,
|
208
207
|
safety_buffer=3600)
|
209
208
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
209
|
|
212
210
|
## Import
|
213
211
|
|
@@ -244,17 +242,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
244
242
|
|
245
243
|
## Example Usage
|
246
244
|
|
247
|
-
<!--Start PulumiCodeChooser -->
|
248
245
|
```python
|
249
246
|
import pulumi
|
250
247
|
import pulumi_vault as vault
|
251
248
|
|
252
|
-
|
253
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
254
|
-
backend=
|
249
|
+
example = vault.AuthBackend("example", type="aws")
|
250
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
251
|
+
backend=example.path,
|
255
252
|
safety_buffer=3600)
|
256
253
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
254
|
|
259
255
|
## Import
|
260
256
|
|
@@ -270,7 +270,6 @@ class _AuthBackendLoginState:
|
|
270
270
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
271
271
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
272
272
|
to the time in `lease_start_time`.
|
273
|
-
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
274
273
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
275
274
|
authentication used to generate this token.
|
276
275
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -461,9 +460,6 @@ class _AuthBackendLoginState:
|
|
461
460
|
@property
|
462
461
|
@pulumi.getter(name="leaseStartTime")
|
463
462
|
def lease_start_time(self) -> Optional[pulumi.Input[str]]:
|
464
|
-
"""
|
465
|
-
Time at which the lease was read, using the clock of the system where Terraform was running
|
466
|
-
"""
|
467
463
|
return pulumi.get(self, "lease_start_time")
|
468
464
|
|
469
465
|
@lease_start_time.setter
|
@@ -754,7 +750,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
754
750
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
755
751
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
756
752
|
to the time in `lease_start_time`.
|
757
|
-
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
758
753
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
759
754
|
authentication used to generate this token.
|
760
755
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -891,9 +886,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
891
886
|
@property
|
892
887
|
@pulumi.getter(name="leaseStartTime")
|
893
888
|
def lease_start_time(self) -> pulumi.Output[str]:
|
894
|
-
"""
|
895
|
-
Time at which the lease was read, using the clock of the system where Terraform was running
|
896
|
-
"""
|
897
889
|
return pulumi.get(self, "lease_start_time")
|
898
890
|
|
899
891
|
@property
|