pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/__init__.py
CHANGED
@@ -26,8 +26,6 @@ from .namespace import *
|
|
26
26
|
from .nomad_secret_backend import *
|
27
27
|
from .nomad_secret_role import *
|
28
28
|
from .password_policy import *
|
29
|
-
from .plugin import *
|
30
|
-
from .plugin_pinned_version import *
|
31
29
|
from .policy import *
|
32
30
|
from .provider import *
|
33
31
|
from .quota_lease_count import *
|
@@ -741,22 +739,6 @@ _utilities.register(
|
|
741
739
|
"vault:index/passwordPolicy:PasswordPolicy": "PasswordPolicy"
|
742
740
|
}
|
743
741
|
},
|
744
|
-
{
|
745
|
-
"pkg": "vault",
|
746
|
-
"mod": "index/plugin",
|
747
|
-
"fqn": "pulumi_vault",
|
748
|
-
"classes": {
|
749
|
-
"vault:index/plugin:Plugin": "Plugin"
|
750
|
-
}
|
751
|
-
},
|
752
|
-
{
|
753
|
-
"pkg": "vault",
|
754
|
-
"mod": "index/pluginPinnedVersion",
|
755
|
-
"fqn": "pulumi_vault",
|
756
|
-
"classes": {
|
757
|
-
"vault:index/pluginPinnedVersion:PluginPinnedVersion": "PluginPinnedVersion"
|
758
|
-
}
|
759
|
-
},
|
760
742
|
{
|
761
743
|
"pkg": "vault",
|
762
744
|
"mod": "index/policy",
|
@@ -1021,14 +1003,6 @@ _utilities.register(
|
|
1021
1003
|
"vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
|
1022
1004
|
}
|
1023
1005
|
},
|
1024
|
-
{
|
1025
|
-
"pkg": "vault",
|
1026
|
-
"mod": "pkiSecret/backendConfigEst",
|
1027
|
-
"fqn": "pulumi_vault.pkisecret",
|
1028
|
-
"classes": {
|
1029
|
-
"vault:pkiSecret/backendConfigEst:BackendConfigEst": "BackendConfigEst"
|
1030
|
-
}
|
1031
|
-
},
|
1032
1006
|
{
|
1033
1007
|
"pkg": "vault",
|
1034
1008
|
"mod": "pkiSecret/secretBackendCert",
|
pulumi_vault/_inputs.py
CHANGED
@@ -1844,12 +1844,19 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
+
"""
|
1848
|
+
:param str key: name of permitted or denied parameter.
|
1849
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
+
"""
|
1847
1851
|
pulumi.set(__self__, "key", key)
|
1848
1852
|
pulumi.set(__self__, "values", values)
|
1849
1853
|
|
1850
1854
|
@property
|
1851
1855
|
@pulumi.getter
|
1852
1856
|
def key(self) -> str:
|
1857
|
+
"""
|
1858
|
+
name of permitted or denied parameter.
|
1859
|
+
"""
|
1853
1860
|
return pulumi.get(self, "key")
|
1854
1861
|
|
1855
1862
|
@key.setter
|
@@ -1859,6 +1866,9 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1859
1866
|
@property
|
1860
1867
|
@pulumi.getter
|
1861
1868
|
def values(self) -> Sequence[str]:
|
1869
|
+
"""
|
1870
|
+
list of values what are permitted or denied by policy rule.
|
1871
|
+
"""
|
1862
1872
|
return pulumi.get(self, "values")
|
1863
1873
|
|
1864
1874
|
@values.setter
|
@@ -1871,12 +1881,19 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1871
1881
|
def __init__(__self__, *,
|
1872
1882
|
key: str,
|
1873
1883
|
values: Sequence[str]):
|
1884
|
+
"""
|
1885
|
+
:param str key: name of permitted or denied parameter.
|
1886
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
+
"""
|
1874
1888
|
pulumi.set(__self__, "key", key)
|
1875
1889
|
pulumi.set(__self__, "values", values)
|
1876
1890
|
|
1877
1891
|
@property
|
1878
1892
|
@pulumi.getter
|
1879
1893
|
def key(self) -> str:
|
1894
|
+
"""
|
1895
|
+
name of permitted or denied parameter.
|
1896
|
+
"""
|
1880
1897
|
return pulumi.get(self, "key")
|
1881
1898
|
|
1882
1899
|
@key.setter
|
@@ -1886,6 +1903,9 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1886
1903
|
@property
|
1887
1904
|
@pulumi.getter
|
1888
1905
|
def values(self) -> Sequence[str]:
|
1906
|
+
"""
|
1907
|
+
list of values what are permitted or denied by policy rule.
|
1908
|
+
"""
|
1889
1909
|
return pulumi.get(self, "values")
|
1890
1910
|
|
1891
1911
|
@values.setter
|
@@ -1252,6 +1252,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1252
1252
|
"""
|
1253
1253
|
## Example Usage
|
1254
1254
|
|
1255
|
+
<!--Start PulumiCodeChooser -->
|
1255
1256
|
```python
|
1256
1257
|
import pulumi
|
1257
1258
|
import pulumi_vault as vault
|
@@ -1260,10 +1261,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1260
1261
|
backend="ad",
|
1261
1262
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1262
1263
|
bindpass="SuperSecretPassw0rd",
|
1263
|
-
url="ldaps://ad",
|
1264
1264
|
insecure_tls=True,
|
1265
|
+
url="ldaps://ad",
|
1265
1266
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1266
1267
|
```
|
1268
|
+
<!--End PulumiCodeChooser -->
|
1267
1269
|
|
1268
1270
|
## Import
|
1269
1271
|
|
@@ -1343,6 +1345,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1343
1345
|
"""
|
1344
1346
|
## Example Usage
|
1345
1347
|
|
1348
|
+
<!--Start PulumiCodeChooser -->
|
1346
1349
|
```python
|
1347
1350
|
import pulumi
|
1348
1351
|
import pulumi_vault as vault
|
@@ -1351,10 +1354,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1351
1354
|
backend="ad",
|
1352
1355
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1353
1356
|
bindpass="SuperSecretPassw0rd",
|
1354
|
-
url="ldaps://ad",
|
1355
1357
|
insecure_tls=True,
|
1358
|
+
url="ldaps://ad",
|
1356
1359
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1357
1360
|
```
|
1361
|
+
<!--End PulumiCodeChooser -->
|
1358
1362
|
|
1359
1363
|
## Import
|
1360
1364
|
|
@@ -293,6 +293,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
293
293
|
"""
|
294
294
|
## Example Usage
|
295
295
|
|
296
|
+
<!--Start PulumiCodeChooser -->
|
296
297
|
```python
|
297
298
|
import pulumi
|
298
299
|
import pulumi_vault as vault
|
@@ -306,7 +307,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
306
307
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
307
308
|
qa = vault.ad.SecretLibrary("qa",
|
308
309
|
backend=config.backend,
|
309
|
-
name="qa",
|
310
310
|
service_account_names=[
|
311
311
|
"Bob",
|
312
312
|
"Mary",
|
@@ -315,6 +315,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
315
315
|
disable_check_in_enforcement=True,
|
316
316
|
max_ttl=120)
|
317
317
|
```
|
318
|
+
<!--End PulumiCodeChooser -->
|
318
319
|
|
319
320
|
## Import
|
320
321
|
|
@@ -350,6 +351,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
350
351
|
"""
|
351
352
|
## Example Usage
|
352
353
|
|
354
|
+
<!--Start PulumiCodeChooser -->
|
353
355
|
```python
|
354
356
|
import pulumi
|
355
357
|
import pulumi_vault as vault
|
@@ -363,7 +365,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
363
365
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
364
366
|
qa = vault.ad.SecretLibrary("qa",
|
365
367
|
backend=config.backend,
|
366
|
-
name="qa",
|
367
368
|
service_account_names=[
|
368
369
|
"Bob",
|
369
370
|
"Mary",
|
@@ -372,6 +373,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
372
373
|
disable_check_in_enforcement=True,
|
373
374
|
max_ttl=120)
|
374
375
|
```
|
376
|
+
<!--End PulumiCodeChooser -->
|
375
377
|
|
376
378
|
## Import
|
377
379
|
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -258,6 +258,7 @@ class SecretRole(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
+
<!--Start PulumiCodeChooser -->
|
261
262
|
```python
|
262
263
|
import pulumi
|
263
264
|
import pulumi_vault as vault
|
@@ -275,6 +276,7 @@ class SecretRole(pulumi.CustomResource):
|
|
275
276
|
service_account_name="Bob",
|
276
277
|
ttl=60)
|
277
278
|
```
|
279
|
+
<!--End PulumiCodeChooser -->
|
278
280
|
|
279
281
|
## Import
|
280
282
|
|
@@ -308,6 +310,7 @@ class SecretRole(pulumi.CustomResource):
|
|
308
310
|
"""
|
309
311
|
## Example Usage
|
310
312
|
|
313
|
+
<!--Start PulumiCodeChooser -->
|
311
314
|
```python
|
312
315
|
import pulumi
|
313
316
|
import pulumi_vault as vault
|
@@ -325,6 +328,7 @@ class SecretRole(pulumi.CustomResource):
|
|
325
328
|
service_account_name="Bob",
|
326
329
|
ttl=60)
|
327
330
|
```
|
331
|
+
<!--End PulumiCodeChooser -->
|
328
332
|
|
329
333
|
## Import
|
330
334
|
|