pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -142,14 +142,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
+
<!--Start PulumiCodeChooser -->
|
145
146
|
```python
|
146
147
|
import pulumi
|
147
148
|
import pulumi_vault as vault
|
148
149
|
|
149
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
150
|
-
name="X-Forwarded-For",
|
151
|
-
hmac=False)
|
150
|
+
x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
|
152
151
|
```
|
152
|
+
<!--End PulumiCodeChooser -->
|
153
153
|
|
154
154
|
:param str resource_name: The name of the resource.
|
155
155
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -173,14 +173,14 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
173
173
|
|
174
174
|
## Example Usage
|
175
175
|
|
176
|
+
<!--Start PulumiCodeChooser -->
|
176
177
|
```python
|
177
178
|
import pulumi
|
178
179
|
import pulumi_vault as vault
|
179
180
|
|
180
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
181
|
-
name="X-Forwarded-For",
|
182
|
-
hmac=False)
|
181
|
+
x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
|
183
182
|
```
|
183
|
+
<!--End PulumiCodeChooser -->
|
184
184
|
|
185
185
|
:param str resource_name: The name of the resource.
|
186
186
|
:param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.
|
@@ -430,16 +430,18 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
430
430
|
"""
|
431
431
|
## Example Usage
|
432
432
|
|
433
|
+
<!--Start PulumiCodeChooser -->
|
433
434
|
```python
|
434
435
|
import pulumi
|
435
436
|
import pulumi_vault as vault
|
436
437
|
|
437
|
-
|
438
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
439
|
-
backend=
|
438
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
439
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
|
440
|
+
backend=example_auth_backend.path,
|
440
441
|
access_key="INSERT_AWS_ACCESS_KEY",
|
441
442
|
secret_key="INSERT_AWS_SECRET_KEY")
|
442
443
|
```
|
444
|
+
<!--End PulumiCodeChooser -->
|
443
445
|
|
444
446
|
## Import
|
445
447
|
|
@@ -487,16 +489,18 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
487
489
|
"""
|
488
490
|
## Example Usage
|
489
491
|
|
492
|
+
<!--Start PulumiCodeChooser -->
|
490
493
|
```python
|
491
494
|
import pulumi
|
492
495
|
import pulumi_vault as vault
|
493
496
|
|
494
|
-
|
495
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
496
|
-
backend=
|
497
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
498
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
|
499
|
+
backend=example_auth_backend.path,
|
497
500
|
access_key="INSERT_AWS_ACCESS_KEY",
|
498
501
|
secret_key="INSERT_AWS_SECRET_KEY")
|
499
502
|
```
|
503
|
+
<!--End PulumiCodeChooser -->
|
500
504
|
|
501
505
|
## Import
|
502
506
|
|
@@ -266,6 +266,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
266
266
|
|
267
267
|
## Example Usage
|
268
268
|
|
269
|
+
<!--Start PulumiCodeChooser -->
|
269
270
|
```python
|
270
271
|
import pulumi
|
271
272
|
import pulumi_vault as vault
|
@@ -279,6 +280,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
279
280
|
"account_id",
|
280
281
|
])
|
281
282
|
```
|
283
|
+
<!--End PulumiCodeChooser -->
|
282
284
|
|
283
285
|
## Import
|
284
286
|
|
@@ -317,6 +319,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
317
319
|
|
318
320
|
## Example Usage
|
319
321
|
|
322
|
+
<!--Start PulumiCodeChooser -->
|
320
323
|
```python
|
321
324
|
import pulumi
|
322
325
|
import pulumi_vault as vault
|
@@ -330,6 +333,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
330
333
|
"account_id",
|
331
334
|
])
|
332
335
|
```
|
336
|
+
<!--End PulumiCodeChooser -->
|
333
337
|
|
334
338
|
## Import
|
335
339
|
|
@@ -197,15 +197,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
197
197
|
|
198
198
|
## Example Usage
|
199
199
|
|
200
|
+
<!--Start PulumiCodeChooser -->
|
200
201
|
```python
|
201
202
|
import pulumi
|
202
203
|
import pulumi_vault as vault
|
203
204
|
|
204
|
-
|
205
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
206
|
-
backend=
|
205
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
206
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
|
207
|
+
backend=example_auth_backend.path,
|
207
208
|
safety_buffer=3600)
|
208
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
209
211
|
|
210
212
|
## Import
|
211
213
|
|
@@ -242,15 +244,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
242
244
|
|
243
245
|
## Example Usage
|
244
246
|
|
247
|
+
<!--Start PulumiCodeChooser -->
|
245
248
|
```python
|
246
249
|
import pulumi
|
247
250
|
import pulumi_vault as vault
|
248
251
|
|
249
|
-
|
250
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
251
|
-
backend=
|
252
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
253
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
|
254
|
+
backend=example_auth_backend.path,
|
252
255
|
safety_buffer=3600)
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
@@ -270,6 +270,7 @@ class _AuthBackendLoginState:
|
|
270
270
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
271
271
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
272
272
|
to the time in `lease_start_time`.
|
273
|
+
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
273
274
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
274
275
|
authentication used to generate this token.
|
275
276
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -460,6 +461,9 @@ class _AuthBackendLoginState:
|
|
460
461
|
@property
|
461
462
|
@pulumi.getter(name="leaseStartTime")
|
462
463
|
def lease_start_time(self) -> Optional[pulumi.Input[str]]:
|
464
|
+
"""
|
465
|
+
Time at which the lease was read, using the clock of the system where Terraform was running
|
466
|
+
"""
|
463
467
|
return pulumi.get(self, "lease_start_time")
|
464
468
|
|
465
469
|
@lease_start_time.setter
|
@@ -750,6 +754,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
750
754
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
751
755
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
752
756
|
to the time in `lease_start_time`.
|
757
|
+
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
753
758
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
754
759
|
authentication used to generate this token.
|
755
760
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -886,6 +891,9 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
886
891
|
@property
|
887
892
|
@pulumi.getter(name="leaseStartTime")
|
888
893
|
def lease_start_time(self) -> pulumi.Output[str]:
|
894
|
+
"""
|
895
|
+
Time at which the lease was read, using the clock of the system where Terraform was running
|
896
|
+
"""
|
889
897
|
return pulumi.get(self, "lease_start_time")
|
890
898
|
|
891
899
|
@property
|