pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -923,6 +923,7 @@ class SecretBackendConnection(pulumi.CustomResource):
923
923
  """
924
924
  ## Example Usage
925
925
 
926
+ <!--Start PulumiCodeChooser -->
926
927
  ```python
927
928
  import pulumi
928
929
  import pulumi_vault as vault
@@ -932,7 +933,6 @@ class SecretBackendConnection(pulumi.CustomResource):
932
933
  type="database")
933
934
  postgres = vault.database.SecretBackendConnection("postgres",
934
935
  backend=db.path,
935
- name="postgres",
936
936
  allowed_roles=[
937
937
  "dev",
938
938
  "prod",
@@ -941,6 +941,7 @@ class SecretBackendConnection(pulumi.CustomResource):
941
941
  connection_url="postgres://username:password@host:port/database",
942
942
  ))
943
943
  ```
944
+ <!--End PulumiCodeChooser -->
944
945
 
945
946
  ## Import
946
947
 
@@ -995,6 +996,7 @@ class SecretBackendConnection(pulumi.CustomResource):
995
996
  """
996
997
  ## Example Usage
997
998
 
999
+ <!--Start PulumiCodeChooser -->
998
1000
  ```python
999
1001
  import pulumi
1000
1002
  import pulumi_vault as vault
@@ -1004,7 +1006,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1004
1006
  type="database")
1005
1007
  postgres = vault.database.SecretBackendConnection("postgres",
1006
1008
  backend=db.path,
1007
- name="postgres",
1008
1009
  allowed_roles=[
1009
1010
  "dev",
1010
1011
  "prod",
@@ -1013,6 +1014,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1013
1014
  connection_url="postgres://username:password@host:port/database",
1014
1015
  ))
1015
1016
  ```
1017
+ <!--End PulumiCodeChooser -->
1016
1018
 
1017
1019
  ## Import
1018
1020
 
@@ -489,6 +489,7 @@ class SecretBackendRole(pulumi.CustomResource):
489
489
  """
490
490
  ## Example Usage
491
491
 
492
+ <!--Start PulumiCodeChooser -->
492
493
  ```python
493
494
  import pulumi
494
495
  import pulumi_vault as vault
@@ -498,7 +499,6 @@ class SecretBackendRole(pulumi.CustomResource):
498
499
  type="database")
499
500
  postgres = vault.database.SecretBackendConnection("postgres",
500
501
  backend=db.path,
501
- name="postgres",
502
502
  allowed_roles=[
503
503
  "dev",
504
504
  "prod",
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
508
508
  ))
509
509
  role = vault.database.SecretBackendRole("role",
510
510
  backend=db.path,
511
- name="dev",
512
511
  db_name=postgres.name,
513
512
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
514
513
  ```
514
+ <!--End PulumiCodeChooser -->
515
515
 
516
516
  ## Import
517
517
 
@@ -560,6 +560,7 @@ class SecretBackendRole(pulumi.CustomResource):
560
560
  """
561
561
  ## Example Usage
562
562
 
563
+ <!--Start PulumiCodeChooser -->
563
564
  ```python
564
565
  import pulumi
565
566
  import pulumi_vault as vault
@@ -569,7 +570,6 @@ class SecretBackendRole(pulumi.CustomResource):
569
570
  type="database")
570
571
  postgres = vault.database.SecretBackendConnection("postgres",
571
572
  backend=db.path,
572
- name="postgres",
573
573
  allowed_roles=[
574
574
  "dev",
575
575
  "prod",
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
579
579
  ))
580
580
  role = vault.database.SecretBackendRole("role",
581
581
  backend=db.path,
582
- name="dev",
583
582
  db_name=postgres.name,
584
583
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
585
584
  ```
585
+ <!--End PulumiCodeChooser -->
586
586
 
587
587
  ## Import
588
588
 
@@ -370,6 +370,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
370
370
 
371
371
  ## Example Usage
372
372
 
373
+ <!--Start PulumiCodeChooser -->
373
374
  ```python
374
375
  import pulumi
375
376
  import pulumi_vault as vault
@@ -379,29 +380,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
379
380
  type="database")
380
381
  postgres = vault.database.SecretBackendConnection("postgres",
381
382
  backend=db.path,
382
- name="postgres",
383
383
  allowed_roles=["*"],
384
384
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
385
385
  connection_url="postgres://username:password@host:port/database",
386
386
  ))
387
387
  # configure a static role with period-based rotations
388
- period_role = vault.database.SecretBackendStaticRole("period_role",
388
+ period_role = vault.database.SecretBackendStaticRole("periodRole",
389
389
  backend=db.path,
390
- name="my-period-role",
391
390
  db_name=postgres.name,
392
391
  username="example",
393
392
  rotation_period=3600,
394
393
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
395
394
  # configure a static role with schedule-based rotations
396
- schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
395
+ schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
397
396
  backend=db.path,
398
- name="my-schedule-role",
399
397
  db_name=postgres.name,
400
398
  username="example",
401
399
  rotation_schedule="0 0 * * SAT",
402
400
  rotation_window=172800,
403
401
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
404
402
  ```
403
+ <!--End PulumiCodeChooser -->
405
404
 
406
405
  ## Import
407
406
 
@@ -445,6 +444,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
445
444
 
446
445
  ## Example Usage
447
446
 
447
+ <!--Start PulumiCodeChooser -->
448
448
  ```python
449
449
  import pulumi
450
450
  import pulumi_vault as vault
@@ -454,29 +454,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
454
454
  type="database")
455
455
  postgres = vault.database.SecretBackendConnection("postgres",
456
456
  backend=db.path,
457
- name="postgres",
458
457
  allowed_roles=["*"],
459
458
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
460
459
  connection_url="postgres://username:password@host:port/database",
461
460
  ))
462
461
  # configure a static role with period-based rotations
463
- period_role = vault.database.SecretBackendStaticRole("period_role",
462
+ period_role = vault.database.SecretBackendStaticRole("periodRole",
464
463
  backend=db.path,
465
- name="my-period-role",
466
464
  db_name=postgres.name,
467
465
  username="example",
468
466
  rotation_period=3600,
469
467
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
470
468
  # configure a static role with schedule-based rotations
471
- schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
469
+ schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
472
470
  backend=db.path,
473
- name="my-schedule-role",
474
471
  db_name=postgres.name,
475
472
  username="example",
476
473
  rotation_schedule="0 0 * * SAT",
477
474
  rotation_window=172800,
478
475
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
479
476
  ```
477
+ <!--End PulumiCodeChooser -->
480
478
 
481
479
  ## Import
482
480