pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -776,43 +776,38 @@ class AuthBackend(pulumi.CustomResource):
|
|
776
776
|
|
777
777
|
Manage JWT auth backend:
|
778
778
|
|
779
|
-
<!--Start PulumiCodeChooser -->
|
780
779
|
```python
|
781
780
|
import pulumi
|
782
781
|
import pulumi_vault as vault
|
783
782
|
|
784
783
|
example = vault.jwt.AuthBackend("example",
|
785
|
-
bound_issuer="https://myco.auth0.com/",
|
786
784
|
description="Demonstration of the Terraform JWT auth backend",
|
785
|
+
path="jwt",
|
787
786
|
oidc_discovery_url="https://myco.auth0.com/",
|
788
|
-
|
787
|
+
bound_issuer="https://myco.auth0.com/")
|
789
788
|
```
|
790
|
-
<!--End PulumiCodeChooser -->
|
791
789
|
|
792
790
|
Manage OIDC auth backend:
|
793
791
|
|
794
|
-
<!--Start PulumiCodeChooser -->
|
795
792
|
```python
|
796
793
|
import pulumi
|
797
794
|
import pulumi_vault as vault
|
798
795
|
|
799
796
|
example = vault.jwt.AuthBackend("example",
|
800
|
-
bound_issuer="https://myco.auth0.com/",
|
801
797
|
description="Demonstration of the Terraform JWT auth backend",
|
798
|
+
path="oidc",
|
799
|
+
type="oidc",
|
800
|
+
oidc_discovery_url="https://myco.auth0.com/",
|
802
801
|
oidc_client_id="1234567890",
|
803
802
|
oidc_client_secret="secret123456",
|
804
|
-
|
805
|
-
path="oidc",
|
803
|
+
bound_issuer="https://myco.auth0.com/",
|
806
804
|
tune=vault.jwt.AuthBackendTuneArgs(
|
807
805
|
listing_visibility="unauth",
|
808
|
-
)
|
809
|
-
type="oidc")
|
806
|
+
))
|
810
807
|
```
|
811
|
-
<!--End PulumiCodeChooser -->
|
812
808
|
|
813
809
|
Configuring the auth backend with a `provider_config:
|
814
810
|
|
815
|
-
<!--Start PulumiCodeChooser -->
|
816
811
|
```python
|
817
812
|
import pulumi
|
818
813
|
import pulumi_vault as vault
|
@@ -821,15 +816,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
821
816
|
description="OIDC backend",
|
822
817
|
oidc_discovery_url="https://accounts.google.com",
|
823
818
|
path="oidc",
|
819
|
+
type="oidc",
|
824
820
|
provider_config={
|
821
|
+
"provider": "gsuite",
|
825
822
|
"fetch_groups": "true",
|
826
823
|
"fetch_user_info": "true",
|
827
824
|
"groups_recurse_max_depth": "1",
|
828
|
-
|
829
|
-
},
|
830
|
-
type="oidc")
|
825
|
+
})
|
831
826
|
```
|
832
|
-
<!--End PulumiCodeChooser -->
|
833
827
|
|
834
828
|
## Import
|
835
829
|
|
@@ -889,43 +883,38 @@ class AuthBackend(pulumi.CustomResource):
|
|
889
883
|
|
890
884
|
Manage JWT auth backend:
|
891
885
|
|
892
|
-
<!--Start PulumiCodeChooser -->
|
893
886
|
```python
|
894
887
|
import pulumi
|
895
888
|
import pulumi_vault as vault
|
896
889
|
|
897
890
|
example = vault.jwt.AuthBackend("example",
|
898
|
-
bound_issuer="https://myco.auth0.com/",
|
899
891
|
description="Demonstration of the Terraform JWT auth backend",
|
892
|
+
path="jwt",
|
900
893
|
oidc_discovery_url="https://myco.auth0.com/",
|
901
|
-
|
894
|
+
bound_issuer="https://myco.auth0.com/")
|
902
895
|
```
|
903
|
-
<!--End PulumiCodeChooser -->
|
904
896
|
|
905
897
|
Manage OIDC auth backend:
|
906
898
|
|
907
|
-
<!--Start PulumiCodeChooser -->
|
908
899
|
```python
|
909
900
|
import pulumi
|
910
901
|
import pulumi_vault as vault
|
911
902
|
|
912
903
|
example = vault.jwt.AuthBackend("example",
|
913
|
-
bound_issuer="https://myco.auth0.com/",
|
914
904
|
description="Demonstration of the Terraform JWT auth backend",
|
905
|
+
path="oidc",
|
906
|
+
type="oidc",
|
907
|
+
oidc_discovery_url="https://myco.auth0.com/",
|
915
908
|
oidc_client_id="1234567890",
|
916
909
|
oidc_client_secret="secret123456",
|
917
|
-
|
918
|
-
path="oidc",
|
910
|
+
bound_issuer="https://myco.auth0.com/",
|
919
911
|
tune=vault.jwt.AuthBackendTuneArgs(
|
920
912
|
listing_visibility="unauth",
|
921
|
-
)
|
922
|
-
type="oidc")
|
913
|
+
))
|
923
914
|
```
|
924
|
-
<!--End PulumiCodeChooser -->
|
925
915
|
|
926
916
|
Configuring the auth backend with a `provider_config:
|
927
917
|
|
928
|
-
<!--Start PulumiCodeChooser -->
|
929
918
|
```python
|
930
919
|
import pulumi
|
931
920
|
import pulumi_vault as vault
|
@@ -934,15 +923,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
934
923
|
description="OIDC backend",
|
935
924
|
oidc_discovery_url="https://accounts.google.com",
|
936
925
|
path="oidc",
|
926
|
+
type="oidc",
|
937
927
|
provider_config={
|
928
|
+
"provider": "gsuite",
|
938
929
|
"fetch_groups": "true",
|
939
930
|
"fetch_user_info": "true",
|
940
931
|
"groups_recurse_max_depth": "1",
|
941
|
-
|
942
|
-
},
|
943
|
-
type="oidc")
|
932
|
+
})
|
944
933
|
```
|
945
|
-
<!--End PulumiCodeChooser -->
|
946
934
|
|
947
935
|
## Import
|
948
936
|
|