pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -25,6 +25,9 @@ class SecretBackendArgs:
|
|
25
25
|
token: Optional[pulumi.Input[str]] = None):
|
26
26
|
"""
|
27
27
|
The set of arguments for constructing a SecretBackend resource.
|
28
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
29
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
30
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
28
31
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
29
32
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
30
33
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -35,6 +38,7 @@ class SecretBackendArgs:
|
|
35
38
|
The value should not contain leading or trailing forward slashes.
|
36
39
|
The `namespace` is always relative to the provider's configured namespace.
|
37
40
|
*Available only for Vault Enterprise*.
|
41
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
38
42
|
"""
|
39
43
|
if address is not None:
|
40
44
|
pulumi.set(__self__, "address", address)
|
@@ -58,6 +62,9 @@ class SecretBackendArgs:
|
|
58
62
|
@property
|
59
63
|
@pulumi.getter
|
60
64
|
def address(self) -> Optional[pulumi.Input[str]]:
|
65
|
+
"""
|
66
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
67
|
+
"""
|
61
68
|
return pulumi.get(self, "address")
|
62
69
|
|
63
70
|
@address.setter
|
@@ -67,6 +74,9 @@ class SecretBackendArgs:
|
|
67
74
|
@property
|
68
75
|
@pulumi.getter
|
69
76
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
77
|
+
"""
|
78
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
79
|
+
"""
|
70
80
|
return pulumi.get(self, "backend")
|
71
81
|
|
72
82
|
@backend.setter
|
@@ -76,6 +86,9 @@ class SecretBackendArgs:
|
|
76
86
|
@property
|
77
87
|
@pulumi.getter(name="basePath")
|
78
88
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
89
|
+
"""
|
90
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
91
|
+
"""
|
79
92
|
return pulumi.get(self, "base_path")
|
80
93
|
|
81
94
|
@base_path.setter
|
@@ -150,6 +163,9 @@ class SecretBackendArgs:
|
|
150
163
|
@property
|
151
164
|
@pulumi.getter
|
152
165
|
def token(self) -> Optional[pulumi.Input[str]]:
|
166
|
+
"""
|
167
|
+
Specifies the Terraform Cloud access token to use.
|
168
|
+
"""
|
153
169
|
return pulumi.get(self, "token")
|
154
170
|
|
155
171
|
@token.setter
|
@@ -171,6 +187,9 @@ class _SecretBackendState:
|
|
171
187
|
token: Optional[pulumi.Input[str]] = None):
|
172
188
|
"""
|
173
189
|
Input properties used for looking up and filtering SecretBackend resources.
|
190
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
191
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
192
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
174
193
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
175
194
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
176
195
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -181,6 +200,7 @@ class _SecretBackendState:
|
|
181
200
|
The value should not contain leading or trailing forward slashes.
|
182
201
|
The `namespace` is always relative to the provider's configured namespace.
|
183
202
|
*Available only for Vault Enterprise*.
|
203
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
184
204
|
"""
|
185
205
|
if address is not None:
|
186
206
|
pulumi.set(__self__, "address", address)
|
@@ -204,6 +224,9 @@ class _SecretBackendState:
|
|
204
224
|
@property
|
205
225
|
@pulumi.getter
|
206
226
|
def address(self) -> Optional[pulumi.Input[str]]:
|
227
|
+
"""
|
228
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
229
|
+
"""
|
207
230
|
return pulumi.get(self, "address")
|
208
231
|
|
209
232
|
@address.setter
|
@@ -213,6 +236,9 @@ class _SecretBackendState:
|
|
213
236
|
@property
|
214
237
|
@pulumi.getter
|
215
238
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
239
|
+
"""
|
240
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
241
|
+
"""
|
216
242
|
return pulumi.get(self, "backend")
|
217
243
|
|
218
244
|
@backend.setter
|
@@ -222,6 +248,9 @@ class _SecretBackendState:
|
|
222
248
|
@property
|
223
249
|
@pulumi.getter(name="basePath")
|
224
250
|
def base_path(self) -> Optional[pulumi.Input[str]]:
|
251
|
+
"""
|
252
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
253
|
+
"""
|
225
254
|
return pulumi.get(self, "base_path")
|
226
255
|
|
227
256
|
@base_path.setter
|
@@ -296,6 +325,9 @@ class _SecretBackendState:
|
|
296
325
|
@property
|
297
326
|
@pulumi.getter
|
298
327
|
def token(self) -> Optional[pulumi.Input[str]]:
|
328
|
+
"""
|
329
|
+
Specifies the Terraform Cloud access token to use.
|
330
|
+
"""
|
299
331
|
return pulumi.get(self, "token")
|
300
332
|
|
301
333
|
@token.setter
|
@@ -321,6 +353,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
321
353
|
"""
|
322
354
|
## Example Usage
|
323
355
|
|
356
|
+
<!--Start PulumiCodeChooser -->
|
324
357
|
```python
|
325
358
|
import pulumi
|
326
359
|
import pulumi_vault as vault
|
@@ -330,6 +363,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
330
363
|
description="Manages the Terraform Cloud backend",
|
331
364
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
332
365
|
```
|
366
|
+
<!--End PulumiCodeChooser -->
|
333
367
|
|
334
368
|
## Import
|
335
369
|
|
@@ -341,6 +375,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
341
375
|
|
342
376
|
:param str resource_name: The name of the resource.
|
343
377
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
378
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
379
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
380
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
344
381
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
345
382
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
346
383
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -351,6 +388,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
351
388
|
The value should not contain leading or trailing forward slashes.
|
352
389
|
The `namespace` is always relative to the provider's configured namespace.
|
353
390
|
*Available only for Vault Enterprise*.
|
391
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
354
392
|
"""
|
355
393
|
...
|
356
394
|
@overload
|
@@ -361,6 +399,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
361
399
|
"""
|
362
400
|
## Example Usage
|
363
401
|
|
402
|
+
<!--Start PulumiCodeChooser -->
|
364
403
|
```python
|
365
404
|
import pulumi
|
366
405
|
import pulumi_vault as vault
|
@@ -370,6 +409,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
370
409
|
description="Manages the Terraform Cloud backend",
|
371
410
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
372
411
|
```
|
412
|
+
<!--End PulumiCodeChooser -->
|
373
413
|
|
374
414
|
## Import
|
375
415
|
|
@@ -449,6 +489,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
449
489
|
:param str resource_name: The unique name of the resulting resource.
|
450
490
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
451
491
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
492
|
+
:param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
493
|
+
:param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
|
494
|
+
:param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
|
452
495
|
:param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
|
453
496
|
:param pulumi.Input[str] description: A human-friendly description for this backend.
|
454
497
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
@@ -459,6 +502,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
459
502
|
The value should not contain leading or trailing forward slashes.
|
460
503
|
The `namespace` is always relative to the provider's configured namespace.
|
461
504
|
*Available only for Vault Enterprise*.
|
505
|
+
:param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
|
462
506
|
"""
|
463
507
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
464
508
|
|
@@ -478,16 +522,25 @@ class SecretBackend(pulumi.CustomResource):
|
|
478
522
|
@property
|
479
523
|
@pulumi.getter
|
480
524
|
def address(self) -> pulumi.Output[Optional[str]]:
|
525
|
+
"""
|
526
|
+
Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
|
527
|
+
"""
|
481
528
|
return pulumi.get(self, "address")
|
482
529
|
|
483
530
|
@property
|
484
531
|
@pulumi.getter
|
485
532
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
533
|
+
"""
|
534
|
+
Unique name of the Vault Terraform Cloud mount to configure
|
535
|
+
"""
|
486
536
|
return pulumi.get(self, "backend")
|
487
537
|
|
488
538
|
@property
|
489
539
|
@pulumi.getter(name="basePath")
|
490
540
|
def base_path(self) -> pulumi.Output[Optional[str]]:
|
541
|
+
"""
|
542
|
+
Specifies the base path for the Terraform Cloud or Enterprise API.
|
543
|
+
"""
|
491
544
|
return pulumi.get(self, "base_path")
|
492
545
|
|
493
546
|
@property
|
@@ -538,5 +591,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
538
591
|
@property
|
539
592
|
@pulumi.getter
|
540
593
|
def token(self) -> pulumi.Output[Optional[str]]:
|
594
|
+
"""
|
595
|
+
Specifies the Terraform Cloud access token to use.
|
596
|
+
"""
|
541
597
|
return pulumi.get(self, "token")
|
542
598
|
|
@@ -19,6 +19,7 @@ class SecretCredsArgs:
|
|
19
19
|
namespace: Optional[pulumi.Input[str]] = None):
|
20
20
|
"""
|
21
21
|
The set of arguments for constructing a SecretCreds resource.
|
22
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
22
23
|
:param pulumi.Input[str] role: Name of the role.
|
23
24
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
24
25
|
The value should not contain leading or trailing forward slashes.
|
@@ -33,6 +34,9 @@ class SecretCredsArgs:
|
|
33
34
|
@property
|
34
35
|
@pulumi.getter
|
35
36
|
def backend(self) -> pulumi.Input[str]:
|
37
|
+
"""
|
38
|
+
Terraform Cloud secret backend to generate tokens from
|
39
|
+
"""
|
36
40
|
return pulumi.get(self, "backend")
|
37
41
|
|
38
42
|
@backend.setter
|
@@ -80,6 +84,7 @@ class _SecretCredsState:
|
|
80
84
|
token_id: Optional[pulumi.Input[str]] = None):
|
81
85
|
"""
|
82
86
|
Input properties used for looking up and filtering SecretCreds resources.
|
87
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
83
88
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
84
89
|
Vault lease associated with them.
|
85
90
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -114,6 +119,9 @@ class _SecretCredsState:
|
|
114
119
|
@property
|
115
120
|
@pulumi.getter
|
116
121
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
122
|
+
"""
|
123
|
+
Terraform Cloud secret backend to generate tokens from
|
124
|
+
"""
|
117
125
|
return pulumi.get(self, "backend")
|
118
126
|
|
119
127
|
@backend.setter
|
@@ -223,6 +231,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
223
231
|
"""
|
224
232
|
## Example Usage
|
225
233
|
|
234
|
+
<!--Start PulumiCodeChooser -->
|
226
235
|
```python
|
227
236
|
import pulumi
|
228
237
|
import pulumi_vault as vault
|
@@ -233,16 +242,17 @@ class SecretCreds(pulumi.CustomResource):
|
|
233
242
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
234
243
|
example = vault.terraformcloud.SecretRole("example",
|
235
244
|
backend=test.backend,
|
236
|
-
name="test-role",
|
237
245
|
organization="example-organization-name",
|
238
246
|
team_id="team-ieF4isC...")
|
239
247
|
token = vault.terraformcloud.SecretCreds("token",
|
240
248
|
backend=test.backend,
|
241
249
|
role=example.name)
|
242
250
|
```
|
251
|
+
<!--End PulumiCodeChooser -->
|
243
252
|
|
244
253
|
:param str resource_name: The name of the resource.
|
245
254
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
255
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
246
256
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
247
257
|
The value should not contain leading or trailing forward slashes.
|
248
258
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -258,6 +268,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
258
268
|
"""
|
259
269
|
## Example Usage
|
260
270
|
|
271
|
+
<!--Start PulumiCodeChooser -->
|
261
272
|
```python
|
262
273
|
import pulumi
|
263
274
|
import pulumi_vault as vault
|
@@ -268,13 +279,13 @@ class SecretCreds(pulumi.CustomResource):
|
|
268
279
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
269
280
|
example = vault.terraformcloud.SecretRole("example",
|
270
281
|
backend=test.backend,
|
271
|
-
name="test-role",
|
272
282
|
organization="example-organization-name",
|
273
283
|
team_id="team-ieF4isC...")
|
274
284
|
token = vault.terraformcloud.SecretCreds("token",
|
275
285
|
backend=test.backend,
|
276
286
|
role=example.name)
|
277
287
|
```
|
288
|
+
<!--End PulumiCodeChooser -->
|
278
289
|
|
279
290
|
:param str resource_name: The name of the resource.
|
280
291
|
:param SecretCredsArgs args: The arguments to use to populate this resource's properties.
|
@@ -342,6 +353,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
342
353
|
:param str resource_name: The unique name of the resulting resource.
|
343
354
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
344
355
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
356
|
+
:param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
|
345
357
|
:param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
|
346
358
|
Vault lease associated with them.
|
347
359
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -373,6 +385,9 @@ class SecretCreds(pulumi.CustomResource):
|
|
373
385
|
@property
|
374
386
|
@pulumi.getter
|
375
387
|
def backend(self) -> pulumi.Output[str]:
|
388
|
+
"""
|
389
|
+
Terraform Cloud secret backend to generate tokens from
|
390
|
+
"""
|
376
391
|
return pulumi.get(self, "backend")
|
377
392
|
|
378
393
|
@property
|
@@ -24,12 +24,17 @@ class SecretRoleArgs:
|
|
24
24
|
user_id: Optional[pulumi.Input[str]] = None):
|
25
25
|
"""
|
26
26
|
The set of arguments for constructing a SecretRole resource.
|
27
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
27
28
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
29
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
28
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
31
|
The value should not contain leading or trailing forward slashes.
|
30
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
33
|
*Available only for Vault Enterprise*.
|
34
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
35
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
32
36
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
37
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
33
38
|
"""
|
34
39
|
if backend is not None:
|
35
40
|
pulumi.set(__self__, "backend", backend)
|
@@ -51,6 +56,9 @@ class SecretRoleArgs:
|
|
51
56
|
@property
|
52
57
|
@pulumi.getter
|
53
58
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
59
|
+
"""
|
60
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
61
|
+
"""
|
54
62
|
return pulumi.get(self, "backend")
|
55
63
|
|
56
64
|
@backend.setter
|
@@ -72,6 +80,9 @@ class SecretRoleArgs:
|
|
72
80
|
@property
|
73
81
|
@pulumi.getter
|
74
82
|
def name(self) -> Optional[pulumi.Input[str]]:
|
83
|
+
"""
|
84
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
85
|
+
"""
|
75
86
|
return pulumi.get(self, "name")
|
76
87
|
|
77
88
|
@name.setter
|
@@ -96,6 +107,9 @@ class SecretRoleArgs:
|
|
96
107
|
@property
|
97
108
|
@pulumi.getter
|
98
109
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
110
|
+
"""
|
111
|
+
Name of the Terraform Cloud or Enterprise organization
|
112
|
+
"""
|
99
113
|
return pulumi.get(self, "organization")
|
100
114
|
|
101
115
|
@organization.setter
|
@@ -105,6 +119,9 @@ class SecretRoleArgs:
|
|
105
119
|
@property
|
106
120
|
@pulumi.getter(name="teamId")
|
107
121
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
122
|
+
"""
|
123
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
124
|
+
"""
|
108
125
|
return pulumi.get(self, "team_id")
|
109
126
|
|
110
127
|
@team_id.setter
|
@@ -126,6 +143,9 @@ class SecretRoleArgs:
|
|
126
143
|
@property
|
127
144
|
@pulumi.getter(name="userId")
|
128
145
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
146
|
+
"""
|
147
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
148
|
+
"""
|
129
149
|
return pulumi.get(self, "user_id")
|
130
150
|
|
131
151
|
@user_id.setter
|
@@ -146,12 +166,17 @@ class _SecretRoleState:
|
|
146
166
|
user_id: Optional[pulumi.Input[str]] = None):
|
147
167
|
"""
|
148
168
|
Input properties used for looking up and filtering SecretRole resources.
|
169
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
149
170
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
171
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
150
172
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
151
173
|
The value should not contain leading or trailing forward slashes.
|
152
174
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
175
|
*Available only for Vault Enterprise*.
|
176
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
177
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
154
178
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
179
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
155
180
|
"""
|
156
181
|
if backend is not None:
|
157
182
|
pulumi.set(__self__, "backend", backend)
|
@@ -173,6 +198,9 @@ class _SecretRoleState:
|
|
173
198
|
@property
|
174
199
|
@pulumi.getter
|
175
200
|
def backend(self) -> Optional[pulumi.Input[str]]:
|
201
|
+
"""
|
202
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
203
|
+
"""
|
176
204
|
return pulumi.get(self, "backend")
|
177
205
|
|
178
206
|
@backend.setter
|
@@ -194,6 +222,9 @@ class _SecretRoleState:
|
|
194
222
|
@property
|
195
223
|
@pulumi.getter
|
196
224
|
def name(self) -> Optional[pulumi.Input[str]]:
|
225
|
+
"""
|
226
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
227
|
+
"""
|
197
228
|
return pulumi.get(self, "name")
|
198
229
|
|
199
230
|
@name.setter
|
@@ -218,6 +249,9 @@ class _SecretRoleState:
|
|
218
249
|
@property
|
219
250
|
@pulumi.getter
|
220
251
|
def organization(self) -> Optional[pulumi.Input[str]]:
|
252
|
+
"""
|
253
|
+
Name of the Terraform Cloud or Enterprise organization
|
254
|
+
"""
|
221
255
|
return pulumi.get(self, "organization")
|
222
256
|
|
223
257
|
@organization.setter
|
@@ -227,6 +261,9 @@ class _SecretRoleState:
|
|
227
261
|
@property
|
228
262
|
@pulumi.getter(name="teamId")
|
229
263
|
def team_id(self) -> Optional[pulumi.Input[str]]:
|
264
|
+
"""
|
265
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
266
|
+
"""
|
230
267
|
return pulumi.get(self, "team_id")
|
231
268
|
|
232
269
|
@team_id.setter
|
@@ -248,6 +285,9 @@ class _SecretRoleState:
|
|
248
285
|
@property
|
249
286
|
@pulumi.getter(name="userId")
|
250
287
|
def user_id(self) -> Optional[pulumi.Input[str]]:
|
288
|
+
"""
|
289
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
290
|
+
"""
|
251
291
|
return pulumi.get(self, "user_id")
|
252
292
|
|
253
293
|
@user_id.setter
|
@@ -272,6 +312,7 @@ class SecretRole(pulumi.CustomResource):
|
|
272
312
|
"""
|
273
313
|
## Example Usage
|
274
314
|
|
315
|
+
<!--Start PulumiCodeChooser -->
|
275
316
|
```python
|
276
317
|
import pulumi
|
277
318
|
import pulumi_vault as vault
|
@@ -282,10 +323,10 @@ class SecretRole(pulumi.CustomResource):
|
|
282
323
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
283
324
|
example = vault.terraformcloud.SecretRole("example",
|
284
325
|
backend=test.backend,
|
285
|
-
name="test-role",
|
286
326
|
organization="example-organization-name",
|
287
327
|
team_id="team-ieF4isC...")
|
288
328
|
```
|
329
|
+
<!--End PulumiCodeChooser -->
|
289
330
|
|
290
331
|
## Import
|
291
332
|
|
@@ -297,12 +338,17 @@ class SecretRole(pulumi.CustomResource):
|
|
297
338
|
|
298
339
|
:param str resource_name: The name of the resource.
|
299
340
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
341
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
300
342
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
343
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
301
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
302
345
|
The value should not contain leading or trailing forward slashes.
|
303
346
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
304
347
|
*Available only for Vault Enterprise*.
|
348
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
349
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
305
350
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
351
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
306
352
|
"""
|
307
353
|
...
|
308
354
|
@overload
|
@@ -313,6 +359,7 @@ class SecretRole(pulumi.CustomResource):
|
|
313
359
|
"""
|
314
360
|
## Example Usage
|
315
361
|
|
362
|
+
<!--Start PulumiCodeChooser -->
|
316
363
|
```python
|
317
364
|
import pulumi
|
318
365
|
import pulumi_vault as vault
|
@@ -323,10 +370,10 @@ class SecretRole(pulumi.CustomResource):
|
|
323
370
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
324
371
|
example = vault.terraformcloud.SecretRole("example",
|
325
372
|
backend=test.backend,
|
326
|
-
name="test-role",
|
327
373
|
organization="example-organization-name",
|
328
374
|
team_id="team-ieF4isC...")
|
329
375
|
```
|
376
|
+
<!--End PulumiCodeChooser -->
|
330
377
|
|
331
378
|
## Import
|
332
379
|
|
@@ -401,12 +448,17 @@ class SecretRole(pulumi.CustomResource):
|
|
401
448
|
:param str resource_name: The unique name of the resulting resource.
|
402
449
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
403
450
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
451
|
+
:param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
|
404
452
|
:param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
|
453
|
+
:param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
|
405
454
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
406
455
|
The value should not contain leading or trailing forward slashes.
|
407
456
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
408
457
|
*Available only for Vault Enterprise*.
|
458
|
+
:param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
|
459
|
+
:param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
409
460
|
:param pulumi.Input[int] ttl: Specifies the TTL for this role.
|
461
|
+
:param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
410
462
|
"""
|
411
463
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
412
464
|
|
@@ -425,6 +477,9 @@ class SecretRole(pulumi.CustomResource):
|
|
425
477
|
@property
|
426
478
|
@pulumi.getter
|
427
479
|
def backend(self) -> pulumi.Output[Optional[str]]:
|
480
|
+
"""
|
481
|
+
The path of the Terraform Cloud Secret Backend the role belongs to.
|
482
|
+
"""
|
428
483
|
return pulumi.get(self, "backend")
|
429
484
|
|
430
485
|
@property
|
@@ -438,6 +493,9 @@ class SecretRole(pulumi.CustomResource):
|
|
438
493
|
@property
|
439
494
|
@pulumi.getter
|
440
495
|
def name(self) -> pulumi.Output[str]:
|
496
|
+
"""
|
497
|
+
The name of an existing role against which to create this Terraform Cloud credential
|
498
|
+
"""
|
441
499
|
return pulumi.get(self, "name")
|
442
500
|
|
443
501
|
@property
|
@@ -454,11 +512,17 @@ class SecretRole(pulumi.CustomResource):
|
|
454
512
|
@property
|
455
513
|
@pulumi.getter
|
456
514
|
def organization(self) -> pulumi.Output[Optional[str]]:
|
515
|
+
"""
|
516
|
+
Name of the Terraform Cloud or Enterprise organization
|
517
|
+
"""
|
457
518
|
return pulumi.get(self, "organization")
|
458
519
|
|
459
520
|
@property
|
460
521
|
@pulumi.getter(name="teamId")
|
461
522
|
def team_id(self) -> pulumi.Output[Optional[str]]:
|
523
|
+
"""
|
524
|
+
ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
|
525
|
+
"""
|
462
526
|
return pulumi.get(self, "team_id")
|
463
527
|
|
464
528
|
@property
|
@@ -472,5 +536,8 @@ class SecretRole(pulumi.CustomResource):
|
|
472
536
|
@property
|
473
537
|
@pulumi.getter(name="userId")
|
474
538
|
def user_id(self) -> pulumi.Output[Optional[str]]:
|
539
|
+
"""
|
540
|
+
ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
|
541
|
+
"""
|
475
542
|
return pulumi.get(self, "user_id")
|
476
543
|
|
pulumi_vault/token.py
CHANGED
@@ -623,24 +623,26 @@ class Token(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
+
<!--Start PulumiCodeChooser -->
|
626
627
|
```python
|
627
628
|
import pulumi
|
628
629
|
import pulumi_vault as vault
|
629
630
|
|
630
631
|
example = vault.Token("example",
|
631
|
-
|
632
|
+
metadata={
|
633
|
+
"purpose": "service-account",
|
634
|
+
},
|
632
635
|
policies=[
|
633
636
|
"policy1",
|
634
637
|
"policy2",
|
635
638
|
],
|
636
|
-
renewable=True,
|
637
|
-
ttl="24h",
|
638
|
-
renew_min_lease=43200,
|
639
639
|
renew_increment=86400,
|
640
|
-
|
641
|
-
|
642
|
-
|
640
|
+
renew_min_lease=43200,
|
641
|
+
renewable=True,
|
642
|
+
role_name="app",
|
643
|
+
ttl="24h")
|
643
644
|
```
|
645
|
+
<!--End PulumiCodeChooser -->
|
644
646
|
|
645
647
|
## Import
|
646
648
|
|
@@ -680,24 +682,26 @@ class Token(pulumi.CustomResource):
|
|
680
682
|
"""
|
681
683
|
## Example Usage
|
682
684
|
|
685
|
+
<!--Start PulumiCodeChooser -->
|
683
686
|
```python
|
684
687
|
import pulumi
|
685
688
|
import pulumi_vault as vault
|
686
689
|
|
687
690
|
example = vault.Token("example",
|
688
|
-
|
691
|
+
metadata={
|
692
|
+
"purpose": "service-account",
|
693
|
+
},
|
689
694
|
policies=[
|
690
695
|
"policy1",
|
691
696
|
"policy2",
|
692
697
|
],
|
693
|
-
renewable=True,
|
694
|
-
ttl="24h",
|
695
|
-
renew_min_lease=43200,
|
696
698
|
renew_increment=86400,
|
697
|
-
|
698
|
-
|
699
|
-
|
699
|
+
renew_min_lease=43200,
|
700
|
+
renewable=True,
|
701
|
+
role_name="app",
|
702
|
+
ttl="24h")
|
700
703
|
```
|
704
|
+
<!--End PulumiCodeChooser -->
|
701
705
|
|
702
706
|
## Import
|
703
707
|
|