pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -776,38 +776,43 @@ class AuthBackend(pulumi.CustomResource):
|
|
776
776
|
|
777
777
|
Manage JWT auth backend:
|
778
778
|
|
779
|
+
<!--Start PulumiCodeChooser -->
|
779
780
|
```python
|
780
781
|
import pulumi
|
781
782
|
import pulumi_vault as vault
|
782
783
|
|
783
784
|
example = vault.jwt.AuthBackend("example",
|
785
|
+
bound_issuer="https://myco.auth0.com/",
|
784
786
|
description="Demonstration of the Terraform JWT auth backend",
|
785
|
-
path="jwt",
|
786
787
|
oidc_discovery_url="https://myco.auth0.com/",
|
787
|
-
|
788
|
+
path="jwt")
|
788
789
|
```
|
790
|
+
<!--End PulumiCodeChooser -->
|
789
791
|
|
790
792
|
Manage OIDC auth backend:
|
791
793
|
|
794
|
+
<!--Start PulumiCodeChooser -->
|
792
795
|
```python
|
793
796
|
import pulumi
|
794
797
|
import pulumi_vault as vault
|
795
798
|
|
796
799
|
example = vault.jwt.AuthBackend("example",
|
800
|
+
bound_issuer="https://myco.auth0.com/",
|
797
801
|
description="Demonstration of the Terraform JWT auth backend",
|
798
|
-
path="oidc",
|
799
|
-
type="oidc",
|
800
|
-
oidc_discovery_url="https://myco.auth0.com/",
|
801
802
|
oidc_client_id="1234567890",
|
802
803
|
oidc_client_secret="secret123456",
|
803
|
-
|
804
|
+
oidc_discovery_url="https://myco.auth0.com/",
|
805
|
+
path="oidc",
|
804
806
|
tune=vault.jwt.AuthBackendTuneArgs(
|
805
807
|
listing_visibility="unauth",
|
806
|
-
)
|
808
|
+
),
|
809
|
+
type="oidc")
|
807
810
|
```
|
811
|
+
<!--End PulumiCodeChooser -->
|
808
812
|
|
809
813
|
Configuring the auth backend with a `provider_config:
|
810
814
|
|
815
|
+
<!--Start PulumiCodeChooser -->
|
811
816
|
```python
|
812
817
|
import pulumi
|
813
818
|
import pulumi_vault as vault
|
@@ -816,14 +821,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
816
821
|
description="OIDC backend",
|
817
822
|
oidc_discovery_url="https://accounts.google.com",
|
818
823
|
path="oidc",
|
819
|
-
type="oidc",
|
820
824
|
provider_config={
|
821
|
-
"provider": "gsuite",
|
822
825
|
"fetch_groups": "true",
|
823
826
|
"fetch_user_info": "true",
|
824
827
|
"groups_recurse_max_depth": "1",
|
825
|
-
|
828
|
+
"provider": "gsuite",
|
829
|
+
},
|
830
|
+
type="oidc")
|
826
831
|
```
|
832
|
+
<!--End PulumiCodeChooser -->
|
827
833
|
|
828
834
|
## Import
|
829
835
|
|
@@ -883,38 +889,43 @@ class AuthBackend(pulumi.CustomResource):
|
|
883
889
|
|
884
890
|
Manage JWT auth backend:
|
885
891
|
|
892
|
+
<!--Start PulumiCodeChooser -->
|
886
893
|
```python
|
887
894
|
import pulumi
|
888
895
|
import pulumi_vault as vault
|
889
896
|
|
890
897
|
example = vault.jwt.AuthBackend("example",
|
898
|
+
bound_issuer="https://myco.auth0.com/",
|
891
899
|
description="Demonstration of the Terraform JWT auth backend",
|
892
|
-
path="jwt",
|
893
900
|
oidc_discovery_url="https://myco.auth0.com/",
|
894
|
-
|
901
|
+
path="jwt")
|
895
902
|
```
|
903
|
+
<!--End PulumiCodeChooser -->
|
896
904
|
|
897
905
|
Manage OIDC auth backend:
|
898
906
|
|
907
|
+
<!--Start PulumiCodeChooser -->
|
899
908
|
```python
|
900
909
|
import pulumi
|
901
910
|
import pulumi_vault as vault
|
902
911
|
|
903
912
|
example = vault.jwt.AuthBackend("example",
|
913
|
+
bound_issuer="https://myco.auth0.com/",
|
904
914
|
description="Demonstration of the Terraform JWT auth backend",
|
905
|
-
path="oidc",
|
906
|
-
type="oidc",
|
907
|
-
oidc_discovery_url="https://myco.auth0.com/",
|
908
915
|
oidc_client_id="1234567890",
|
909
916
|
oidc_client_secret="secret123456",
|
910
|
-
|
917
|
+
oidc_discovery_url="https://myco.auth0.com/",
|
918
|
+
path="oidc",
|
911
919
|
tune=vault.jwt.AuthBackendTuneArgs(
|
912
920
|
listing_visibility="unauth",
|
913
|
-
)
|
921
|
+
),
|
922
|
+
type="oidc")
|
914
923
|
```
|
924
|
+
<!--End PulumiCodeChooser -->
|
915
925
|
|
916
926
|
Configuring the auth backend with a `provider_config:
|
917
927
|
|
928
|
+
<!--Start PulumiCodeChooser -->
|
918
929
|
```python
|
919
930
|
import pulumi
|
920
931
|
import pulumi_vault as vault
|
@@ -923,14 +934,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
923
934
|
description="OIDC backend",
|
924
935
|
oidc_discovery_url="https://accounts.google.com",
|
925
936
|
path="oidc",
|
926
|
-
type="oidc",
|
927
937
|
provider_config={
|
928
|
-
"provider": "gsuite",
|
929
938
|
"fetch_groups": "true",
|
930
939
|
"fetch_user_info": "true",
|
931
940
|
"groups_recurse_max_depth": "1",
|
932
|
-
|
941
|
+
"provider": "gsuite",
|
942
|
+
},
|
943
|
+
type="oidc")
|
933
944
|
```
|
945
|
+
<!--End PulumiCodeChooser -->
|
934
946
|
|
935
947
|
## Import
|
936
948
|
|