pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -142,14 +142,14 @@ class AuditRequestHeader(pulumi.CustomResource):
142
142
 
143
143
  ## Example Usage
144
144
 
145
- <!--Start PulumiCodeChooser -->
146
145
  ```python
147
146
  import pulumi
148
147
  import pulumi_vault as vault
149
148
 
150
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
149
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
150
+ name="X-Forwarded-For",
151
+ hmac=False)
151
152
  ```
152
- <!--End PulumiCodeChooser -->
153
153
 
154
154
  :param str resource_name: The name of the resource.
155
155
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -173,14 +173,14 @@ class AuditRequestHeader(pulumi.CustomResource):
173
173
 
174
174
  ## Example Usage
175
175
 
176
- <!--Start PulumiCodeChooser -->
177
176
  ```python
178
177
  import pulumi
179
178
  import pulumi_vault as vault
180
179
 
181
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
180
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
181
+ name="X-Forwarded-For",
182
+ hmac=False)
182
183
  ```
183
- <!--End PulumiCodeChooser -->
184
184
 
185
185
  :param str resource_name: The name of the resource.
186
186
  :param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.
@@ -430,18 +430,16 @@ class AuthBackendClient(pulumi.CustomResource):
430
430
  """
431
431
  ## Example Usage
432
432
 
433
- <!--Start PulumiCodeChooser -->
434
433
  ```python
435
434
  import pulumi
436
435
  import pulumi_vault as vault
437
436
 
438
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
439
- example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
440
- backend=example_auth_backend.path,
437
+ example = vault.AuthBackend("example", type="aws")
438
+ example_auth_backend_client = vault.aws.AuthBackendClient("example",
439
+ backend=example.path,
441
440
  access_key="INSERT_AWS_ACCESS_KEY",
442
441
  secret_key="INSERT_AWS_SECRET_KEY")
443
442
  ```
444
- <!--End PulumiCodeChooser -->
445
443
 
446
444
  ## Import
447
445
 
@@ -489,18 +487,16 @@ class AuthBackendClient(pulumi.CustomResource):
489
487
  """
490
488
  ## Example Usage
491
489
 
492
- <!--Start PulumiCodeChooser -->
493
490
  ```python
494
491
  import pulumi
495
492
  import pulumi_vault as vault
496
493
 
497
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
498
- example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
499
- backend=example_auth_backend.path,
494
+ example = vault.AuthBackend("example", type="aws")
495
+ example_auth_backend_client = vault.aws.AuthBackendClient("example",
496
+ backend=example.path,
500
497
  access_key="INSERT_AWS_ACCESS_KEY",
501
498
  secret_key="INSERT_AWS_SECRET_KEY")
502
499
  ```
503
- <!--End PulumiCodeChooser -->
504
500
 
505
501
  ## Import
506
502
 
@@ -266,7 +266,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
266
266
 
267
267
  ## Example Usage
268
268
 
269
- <!--Start PulumiCodeChooser -->
270
269
  ```python
271
270
  import pulumi
272
271
  import pulumi_vault as vault
@@ -280,7 +279,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
280
279
  "account_id",
281
280
  ])
282
281
  ```
283
- <!--End PulumiCodeChooser -->
284
282
 
285
283
  ## Import
286
284
 
@@ -319,7 +317,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
319
317
 
320
318
  ## Example Usage
321
319
 
322
- <!--Start PulumiCodeChooser -->
323
320
  ```python
324
321
  import pulumi
325
322
  import pulumi_vault as vault
@@ -333,7 +330,6 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
333
330
  "account_id",
334
331
  ])
335
332
  ```
336
- <!--End PulumiCodeChooser -->
337
333
 
338
334
  ## Import
339
335
 
@@ -197,17 +197,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
197
197
 
198
198
  ## Example Usage
199
199
 
200
- <!--Start PulumiCodeChooser -->
201
200
  ```python
202
201
  import pulumi
203
202
  import pulumi_vault as vault
204
203
 
205
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
207
- backend=example_auth_backend.path,
204
+ example = vault.AuthBackend("example", type="aws")
205
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
206
+ backend=example.path,
208
207
  safety_buffer=3600)
209
208
  ```
210
- <!--End PulumiCodeChooser -->
211
209
 
212
210
  ## Import
213
211
 
@@ -244,17 +242,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
244
242
 
245
243
  ## Example Usage
246
244
 
247
- <!--Start PulumiCodeChooser -->
248
245
  ```python
249
246
  import pulumi
250
247
  import pulumi_vault as vault
251
248
 
252
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
253
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
254
- backend=example_auth_backend.path,
249
+ example = vault.AuthBackend("example", type="aws")
250
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
251
+ backend=example.path,
255
252
  safety_buffer=3600)
256
253
  ```
257
- <!--End PulumiCodeChooser -->
258
254
 
259
255
  ## Import
260
256
 
@@ -270,7 +270,6 @@ class _AuthBackendLoginState:
270
270
  authenticate with. Can be retrieved from the EC2 metadata server.
271
271
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
272
272
  to the time in `lease_start_time`.
273
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
274
273
  :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
275
274
  authentication used to generate this token.
276
275
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -461,9 +460,6 @@ class _AuthBackendLoginState:
461
460
  @property
462
461
  @pulumi.getter(name="leaseStartTime")
463
462
  def lease_start_time(self) -> Optional[pulumi.Input[str]]:
464
- """
465
- Time at which the lease was read, using the clock of the system where Terraform was running
466
- """
467
463
  return pulumi.get(self, "lease_start_time")
468
464
 
469
465
  @lease_start_time.setter
@@ -754,7 +750,6 @@ class AuthBackendLogin(pulumi.CustomResource):
754
750
  authenticate with. Can be retrieved from the EC2 metadata server.
755
751
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
756
752
  to the time in `lease_start_time`.
757
- :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
758
753
  :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
759
754
  authentication used to generate this token.
760
755
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -891,9 +886,6 @@ class AuthBackendLogin(pulumi.CustomResource):
891
886
  @property
892
887
  @pulumi.getter(name="leaseStartTime")
893
888
  def lease_start_time(self) -> pulumi.Output[str]:
894
- """
895
- Time at which the lease was read, using the clock of the system where Terraform was running
896
- """
897
889
  return pulumi.get(self, "lease_start_time")
898
890
 
899
891
  @property