pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -142,14 +142,14 @@ class AuditRequestHeader(pulumi.CustomResource):
142
142
 
143
143
  ## Example Usage
144
144
 
145
+ <!--Start PulumiCodeChooser -->
145
146
  ```python
146
147
  import pulumi
147
148
  import pulumi_vault as vault
148
149
 
149
- x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
150
- name="X-Forwarded-For",
151
- hmac=False)
150
+ x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
152
151
  ```
152
+ <!--End PulumiCodeChooser -->
153
153
 
154
154
  :param str resource_name: The name of the resource.
155
155
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -173,14 +173,14 @@ class AuditRequestHeader(pulumi.CustomResource):
173
173
 
174
174
  ## Example Usage
175
175
 
176
+ <!--Start PulumiCodeChooser -->
176
177
  ```python
177
178
  import pulumi
178
179
  import pulumi_vault as vault
179
180
 
180
- x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
181
- name="X-Forwarded-For",
182
- hmac=False)
181
+ x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
183
182
  ```
183
+ <!--End PulumiCodeChooser -->
184
184
 
185
185
  :param str resource_name: The name of the resource.
186
186
  :param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.
@@ -430,16 +430,18 @@ class AuthBackendClient(pulumi.CustomResource):
430
430
  """
431
431
  ## Example Usage
432
432
 
433
+ <!--Start PulumiCodeChooser -->
433
434
  ```python
434
435
  import pulumi
435
436
  import pulumi_vault as vault
436
437
 
437
- example = vault.AuthBackend("example", type="aws")
438
- example_auth_backend_client = vault.aws.AuthBackendClient("example",
439
- backend=example.path,
438
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
439
+ example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
440
+ backend=example_auth_backend.path,
440
441
  access_key="INSERT_AWS_ACCESS_KEY",
441
442
  secret_key="INSERT_AWS_SECRET_KEY")
442
443
  ```
444
+ <!--End PulumiCodeChooser -->
443
445
 
444
446
  ## Import
445
447
 
@@ -487,16 +489,18 @@ class AuthBackendClient(pulumi.CustomResource):
487
489
  """
488
490
  ## Example Usage
489
491
 
492
+ <!--Start PulumiCodeChooser -->
490
493
  ```python
491
494
  import pulumi
492
495
  import pulumi_vault as vault
493
496
 
494
- example = vault.AuthBackend("example", type="aws")
495
- example_auth_backend_client = vault.aws.AuthBackendClient("example",
496
- backend=example.path,
497
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
498
+ example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
499
+ backend=example_auth_backend.path,
497
500
  access_key="INSERT_AWS_ACCESS_KEY",
498
501
  secret_key="INSERT_AWS_SECRET_KEY")
499
502
  ```
503
+ <!--End PulumiCodeChooser -->
500
504
 
501
505
  ## Import
502
506
 
@@ -266,6 +266,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
266
266
 
267
267
  ## Example Usage
268
268
 
269
+ <!--Start PulumiCodeChooser -->
269
270
  ```python
270
271
  import pulumi
271
272
  import pulumi_vault as vault
@@ -279,6 +280,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
279
280
  "account_id",
280
281
  ])
281
282
  ```
283
+ <!--End PulumiCodeChooser -->
282
284
 
283
285
  ## Import
284
286
 
@@ -317,6 +319,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
317
319
 
318
320
  ## Example Usage
319
321
 
322
+ <!--Start PulumiCodeChooser -->
320
323
  ```python
321
324
  import pulumi
322
325
  import pulumi_vault as vault
@@ -330,6 +333,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
330
333
  "account_id",
331
334
  ])
332
335
  ```
336
+ <!--End PulumiCodeChooser -->
333
337
 
334
338
  ## Import
335
339
 
@@ -197,15 +197,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
197
197
 
198
198
  ## Example Usage
199
199
 
200
+ <!--Start PulumiCodeChooser -->
200
201
  ```python
201
202
  import pulumi
202
203
  import pulumi_vault as vault
203
204
 
204
- example = vault.AuthBackend("example", type="aws")
205
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
206
- backend=example.path,
205
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
207
+ backend=example_auth_backend.path,
207
208
  safety_buffer=3600)
208
209
  ```
210
+ <!--End PulumiCodeChooser -->
209
211
 
210
212
  ## Import
211
213
 
@@ -242,15 +244,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
242
244
 
243
245
  ## Example Usage
244
246
 
247
+ <!--Start PulumiCodeChooser -->
245
248
  ```python
246
249
  import pulumi
247
250
  import pulumi_vault as vault
248
251
 
249
- example = vault.AuthBackend("example", type="aws")
250
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
251
- backend=example.path,
252
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
253
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
254
+ backend=example_auth_backend.path,
252
255
  safety_buffer=3600)
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
@@ -270,6 +270,7 @@ class _AuthBackendLoginState:
270
270
  authenticate with. Can be retrieved from the EC2 metadata server.
271
271
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
272
272
  to the time in `lease_start_time`.
273
+ :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
273
274
  :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
274
275
  authentication used to generate this token.
275
276
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -460,6 +461,9 @@ class _AuthBackendLoginState:
460
461
  @property
461
462
  @pulumi.getter(name="leaseStartTime")
462
463
  def lease_start_time(self) -> Optional[pulumi.Input[str]]:
464
+ """
465
+ Time at which the lease was read, using the clock of the system where Terraform was running
466
+ """
463
467
  return pulumi.get(self, "lease_start_time")
464
468
 
465
469
  @lease_start_time.setter
@@ -750,6 +754,7 @@ class AuthBackendLogin(pulumi.CustomResource):
750
754
  authenticate with. Can be retrieved from the EC2 metadata server.
751
755
  :param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
752
756
  to the time in `lease_start_time`.
757
+ :param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
753
758
  :param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
754
759
  authentication used to generate this token.
755
760
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -886,6 +891,9 @@ class AuthBackendLogin(pulumi.CustomResource):
886
891
  @property
887
892
  @pulumi.getter(name="leaseStartTime")
888
893
  def lease_start_time(self) -> pulumi.Output[str]:
894
+ """
895
+ Time at which the lease was read, using the clock of the system where Terraform was running
896
+ """
889
897
  return pulumi.get(self, "lease_start_time")
890
898
 
891
899
  @property