pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -923,6 +923,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
923
923
|
"""
|
924
924
|
## Example Usage
|
925
925
|
|
926
|
+
<!--Start PulumiCodeChooser -->
|
926
927
|
```python
|
927
928
|
import pulumi
|
928
929
|
import pulumi_vault as vault
|
@@ -932,7 +933,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
932
933
|
type="database")
|
933
934
|
postgres = vault.database.SecretBackendConnection("postgres",
|
934
935
|
backend=db.path,
|
935
|
-
name="postgres",
|
936
936
|
allowed_roles=[
|
937
937
|
"dev",
|
938
938
|
"prod",
|
@@ -941,6 +941,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
941
941
|
connection_url="postgres://username:password@host:port/database",
|
942
942
|
))
|
943
943
|
```
|
944
|
+
<!--End PulumiCodeChooser -->
|
944
945
|
|
945
946
|
## Import
|
946
947
|
|
@@ -995,6 +996,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
995
996
|
"""
|
996
997
|
## Example Usage
|
997
998
|
|
999
|
+
<!--Start PulumiCodeChooser -->
|
998
1000
|
```python
|
999
1001
|
import pulumi
|
1000
1002
|
import pulumi_vault as vault
|
@@ -1004,7 +1006,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1004
1006
|
type="database")
|
1005
1007
|
postgres = vault.database.SecretBackendConnection("postgres",
|
1006
1008
|
backend=db.path,
|
1007
|
-
name="postgres",
|
1008
1009
|
allowed_roles=[
|
1009
1010
|
"dev",
|
1010
1011
|
"prod",
|
@@ -1013,6 +1014,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1013
1014
|
connection_url="postgres://username:password@host:port/database",
|
1014
1015
|
))
|
1015
1016
|
```
|
1017
|
+
<!--End PulumiCodeChooser -->
|
1016
1018
|
|
1017
1019
|
## Import
|
1018
1020
|
|
@@ -489,6 +489,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
489
489
|
"""
|
490
490
|
## Example Usage
|
491
491
|
|
492
|
+
<!--Start PulumiCodeChooser -->
|
492
493
|
```python
|
493
494
|
import pulumi
|
494
495
|
import pulumi_vault as vault
|
@@ -498,7 +499,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
498
499
|
type="database")
|
499
500
|
postgres = vault.database.SecretBackendConnection("postgres",
|
500
501
|
backend=db.path,
|
501
|
-
name="postgres",
|
502
502
|
allowed_roles=[
|
503
503
|
"dev",
|
504
504
|
"prod",
|
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
508
508
|
))
|
509
509
|
role = vault.database.SecretBackendRole("role",
|
510
510
|
backend=db.path,
|
511
|
-
name="dev",
|
512
511
|
db_name=postgres.name,
|
513
512
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
514
513
|
```
|
514
|
+
<!--End PulumiCodeChooser -->
|
515
515
|
|
516
516
|
## Import
|
517
517
|
|
@@ -560,6 +560,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
560
560
|
"""
|
561
561
|
## Example Usage
|
562
562
|
|
563
|
+
<!--Start PulumiCodeChooser -->
|
563
564
|
```python
|
564
565
|
import pulumi
|
565
566
|
import pulumi_vault as vault
|
@@ -569,7 +570,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
569
570
|
type="database")
|
570
571
|
postgres = vault.database.SecretBackendConnection("postgres",
|
571
572
|
backend=db.path,
|
572
|
-
name="postgres",
|
573
573
|
allowed_roles=[
|
574
574
|
"dev",
|
575
575
|
"prod",
|
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
579
579
|
))
|
580
580
|
role = vault.database.SecretBackendRole("role",
|
581
581
|
backend=db.path,
|
582
|
-
name="dev",
|
583
582
|
db_name=postgres.name,
|
584
583
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
585
584
|
```
|
585
|
+
<!--End PulumiCodeChooser -->
|
586
586
|
|
587
587
|
## Import
|
588
588
|
|
@@ -370,6 +370,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
370
370
|
|
371
371
|
## Example Usage
|
372
372
|
|
373
|
+
<!--Start PulumiCodeChooser -->
|
373
374
|
```python
|
374
375
|
import pulumi
|
375
376
|
import pulumi_vault as vault
|
@@ -379,29 +380,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
379
380
|
type="database")
|
380
381
|
postgres = vault.database.SecretBackendConnection("postgres",
|
381
382
|
backend=db.path,
|
382
|
-
name="postgres",
|
383
383
|
allowed_roles=["*"],
|
384
384
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
385
385
|
connection_url="postgres://username:password@host:port/database",
|
386
386
|
))
|
387
387
|
# configure a static role with period-based rotations
|
388
|
-
period_role = vault.database.SecretBackendStaticRole("
|
388
|
+
period_role = vault.database.SecretBackendStaticRole("periodRole",
|
389
389
|
backend=db.path,
|
390
|
-
name="my-period-role",
|
391
390
|
db_name=postgres.name,
|
392
391
|
username="example",
|
393
392
|
rotation_period=3600,
|
394
393
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
395
394
|
# configure a static role with schedule-based rotations
|
396
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
395
|
+
schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
|
397
396
|
backend=db.path,
|
398
|
-
name="my-schedule-role",
|
399
397
|
db_name=postgres.name,
|
400
398
|
username="example",
|
401
399
|
rotation_schedule="0 0 * * SAT",
|
402
400
|
rotation_window=172800,
|
403
401
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
404
402
|
```
|
403
|
+
<!--End PulumiCodeChooser -->
|
405
404
|
|
406
405
|
## Import
|
407
406
|
|
@@ -445,6 +444,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
445
444
|
|
446
445
|
## Example Usage
|
447
446
|
|
447
|
+
<!--Start PulumiCodeChooser -->
|
448
448
|
```python
|
449
449
|
import pulumi
|
450
450
|
import pulumi_vault as vault
|
@@ -454,29 +454,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
454
454
|
type="database")
|
455
455
|
postgres = vault.database.SecretBackendConnection("postgres",
|
456
456
|
backend=db.path,
|
457
|
-
name="postgres",
|
458
457
|
allowed_roles=["*"],
|
459
458
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
460
459
|
connection_url="postgres://username:password@host:port/database",
|
461
460
|
))
|
462
461
|
# configure a static role with period-based rotations
|
463
|
-
period_role = vault.database.SecretBackendStaticRole("
|
462
|
+
period_role = vault.database.SecretBackendStaticRole("periodRole",
|
464
463
|
backend=db.path,
|
465
|
-
name="my-period-role",
|
466
464
|
db_name=postgres.name,
|
467
465
|
username="example",
|
468
466
|
rotation_period=3600,
|
469
467
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
470
468
|
# configure a static role with schedule-based rotations
|
471
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
469
|
+
schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
|
472
470
|
backend=db.path,
|
473
|
-
name="my-schedule-role",
|
474
471
|
db_name=postgres.name,
|
475
472
|
username="example",
|
476
473
|
rotation_schedule="0 0 * * SAT",
|
477
474
|
rotation_window=172800,
|
478
475
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
479
476
|
```
|
477
|
+
<!--End PulumiCodeChooser -->
|
480
478
|
|
481
479
|
## Import
|
482
480
|
|