pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_okta.py
CHANGED
@@ -349,6 +349,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
349
349
|
|
350
350
|
## Example Usage
|
351
351
|
|
352
|
+
<!--Start PulumiCodeChooser -->
|
352
353
|
```python
|
353
354
|
import pulumi
|
354
355
|
import pulumi_vault as vault
|
@@ -356,13 +357,13 @@ class MfaOkta(pulumi.CustomResource):
|
|
356
357
|
userpass = vault.AuthBackend("userpass",
|
357
358
|
type="userpass",
|
358
359
|
path="userpass")
|
359
|
-
my_okta = vault.MfaOkta("
|
360
|
-
name="my_okta",
|
360
|
+
my_okta = vault.MfaOkta("myOkta",
|
361
361
|
mount_accessor=userpass.accessor,
|
362
362
|
username_format="user@example.com",
|
363
363
|
org_name="hashicorp",
|
364
364
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
365
365
|
```
|
366
|
+
<!--End PulumiCodeChooser -->
|
366
367
|
|
367
368
|
## Import
|
368
369
|
|
@@ -408,6 +409,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
408
409
|
|
409
410
|
## Example Usage
|
410
411
|
|
412
|
+
<!--Start PulumiCodeChooser -->
|
411
413
|
```python
|
412
414
|
import pulumi
|
413
415
|
import pulumi_vault as vault
|
@@ -415,13 +417,13 @@ class MfaOkta(pulumi.CustomResource):
|
|
415
417
|
userpass = vault.AuthBackend("userpass",
|
416
418
|
type="userpass",
|
417
419
|
path="userpass")
|
418
|
-
my_okta = vault.MfaOkta("
|
419
|
-
name="my_okta",
|
420
|
+
my_okta = vault.MfaOkta("myOkta",
|
420
421
|
mount_accessor=userpass.accessor,
|
421
422
|
username_format="user@example.com",
|
422
423
|
org_name="hashicorp",
|
423
424
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
424
425
|
```
|
426
|
+
<!--End PulumiCodeChooser -->
|
425
427
|
|
426
428
|
## Import
|
427
429
|
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -359,6 +359,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
359
359
|
|
360
360
|
## Example Usage
|
361
361
|
|
362
|
+
<!--Start PulumiCodeChooser -->
|
362
363
|
```python
|
363
364
|
import pulumi
|
364
365
|
import pulumi_vault as vault
|
@@ -368,12 +369,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
368
369
|
userpass = vault.AuthBackend("userpass",
|
369
370
|
type="userpass",
|
370
371
|
path="userpass")
|
371
|
-
my_pingid = vault.MfaPingid("
|
372
|
-
name="my_pingid",
|
372
|
+
my_pingid = vault.MfaPingid("myPingid",
|
373
373
|
mount_accessor=userpass.accessor,
|
374
374
|
username_format="user@example.com",
|
375
375
|
settings_file_base64=settings_file)
|
376
376
|
```
|
377
|
+
<!--End PulumiCodeChooser -->
|
377
378
|
|
378
379
|
## Import
|
379
380
|
|
@@ -415,6 +416,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
415
416
|
|
416
417
|
## Example Usage
|
417
418
|
|
419
|
+
<!--Start PulumiCodeChooser -->
|
418
420
|
```python
|
419
421
|
import pulumi
|
420
422
|
import pulumi_vault as vault
|
@@ -424,12 +426,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
424
426
|
userpass = vault.AuthBackend("userpass",
|
425
427
|
type="userpass",
|
426
428
|
path="userpass")
|
427
|
-
my_pingid = vault.MfaPingid("
|
428
|
-
name="my_pingid",
|
429
|
+
my_pingid = vault.MfaPingid("myPingid",
|
429
430
|
mount_accessor=userpass.accessor,
|
430
431
|
username_format="user@example.com",
|
431
432
|
settings_file_base64=settings_file)
|
432
433
|
```
|
434
|
+
<!--End PulumiCodeChooser -->
|
433
435
|
|
434
436
|
## Import
|
435
437
|
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -360,18 +360,19 @@ class MfaTotp(pulumi.CustomResource):
|
|
360
360
|
|
361
361
|
## Example Usage
|
362
362
|
|
363
|
+
<!--Start PulumiCodeChooser -->
|
363
364
|
```python
|
364
365
|
import pulumi
|
365
366
|
import pulumi_vault as vault
|
366
367
|
|
367
|
-
my_totp = vault.MfaTotp("
|
368
|
-
name="my_totp",
|
369
|
-
issuer="hashicorp",
|
370
|
-
period=60,
|
368
|
+
my_totp = vault.MfaTotp("myTotp",
|
371
369
|
algorithm="SHA256",
|
372
370
|
digits=8,
|
373
|
-
|
371
|
+
issuer="hashicorp",
|
372
|
+
key_size=20,
|
373
|
+
period=60)
|
374
374
|
```
|
375
|
+
<!--End PulumiCodeChooser -->
|
375
376
|
|
376
377
|
## Import
|
377
378
|
|
@@ -412,18 +413,19 @@ class MfaTotp(pulumi.CustomResource):
|
|
412
413
|
|
413
414
|
## Example Usage
|
414
415
|
|
416
|
+
<!--Start PulumiCodeChooser -->
|
415
417
|
```python
|
416
418
|
import pulumi
|
417
419
|
import pulumi_vault as vault
|
418
420
|
|
419
|
-
my_totp = vault.MfaTotp("
|
420
|
-
name="my_totp",
|
421
|
-
issuer="hashicorp",
|
422
|
-
period=60,
|
421
|
+
my_totp = vault.MfaTotp("myTotp",
|
423
422
|
algorithm="SHA256",
|
424
423
|
digits=8,
|
425
|
-
|
424
|
+
issuer="hashicorp",
|
425
|
+
key_size=20,
|
426
|
+
period=60)
|
426
427
|
```
|
428
|
+
<!--End PulumiCodeChooser -->
|
427
429
|
|
428
430
|
## Import
|
429
431
|
|
@@ -193,6 +193,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
193
193
|
"""
|
194
194
|
## Example Usage
|
195
195
|
|
196
|
+
<!--Start PulumiCodeChooser -->
|
196
197
|
```python
|
197
198
|
import pulumi
|
198
199
|
import pulumi_vault as vault
|
@@ -206,6 +207,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
206
207
|
private_key="privateKey",
|
207
208
|
public_key="publicKey")
|
208
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
209
211
|
|
210
212
|
## Import
|
211
213
|
|
@@ -234,6 +236,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
234
236
|
"""
|
235
237
|
## Example Usage
|
236
238
|
|
239
|
+
<!--Start PulumiCodeChooser -->
|
237
240
|
```python
|
238
241
|
import pulumi
|
239
242
|
import pulumi_vault as vault
|
@@ -247,6 +250,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
247
250
|
private_key="privateKey",
|
248
251
|
public_key="publicKey")
|
249
252
|
```
|
253
|
+
<!--End PulumiCodeChooser -->
|
250
254
|
|
251
255
|
## Import
|
252
256
|
|
@@ -417,6 +417,7 @@ class SecretRole(pulumi.CustomResource):
|
|
417
417
|
"""
|
418
418
|
## Example Usage
|
419
419
|
|
420
|
+
<!--Start PulumiCodeChooser -->
|
420
421
|
```python
|
421
422
|
import pulumi
|
422
423
|
import pulumi_vault as vault
|
@@ -431,7 +432,6 @@ class SecretRole(pulumi.CustomResource):
|
|
431
432
|
public_key="publicKey")
|
432
433
|
role = vault.mongodbatlas.SecretRole("role",
|
433
434
|
mount=mongo.path,
|
434
|
-
name="tf-test-role",
|
435
435
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
436
436
|
project_id="5cf5a45a9ccf6400e60981b6",
|
437
437
|
roles=["ORG_READ_ONLY"],
|
@@ -441,6 +441,7 @@ class SecretRole(pulumi.CustomResource):
|
|
441
441
|
ttl="60",
|
442
442
|
max_ttl="120")
|
443
443
|
```
|
444
|
+
<!--End PulumiCodeChooser -->
|
444
445
|
|
445
446
|
## Import
|
446
447
|
|
@@ -479,6 +480,7 @@ class SecretRole(pulumi.CustomResource):
|
|
479
480
|
"""
|
480
481
|
## Example Usage
|
481
482
|
|
483
|
+
<!--Start PulumiCodeChooser -->
|
482
484
|
```python
|
483
485
|
import pulumi
|
484
486
|
import pulumi_vault as vault
|
@@ -493,7 +495,6 @@ class SecretRole(pulumi.CustomResource):
|
|
493
495
|
public_key="publicKey")
|
494
496
|
role = vault.mongodbatlas.SecretRole("role",
|
495
497
|
mount=mongo.path,
|
496
|
-
name="tf-test-role",
|
497
498
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
498
499
|
project_id="5cf5a45a9ccf6400e60981b6",
|
499
500
|
roles=["ORG_READ_ONLY"],
|
@@ -503,6 +504,7 @@ class SecretRole(pulumi.CustomResource):
|
|
503
504
|
ttl="60",
|
504
505
|
max_ttl="120")
|
505
506
|
```
|
507
|
+
<!--End PulumiCodeChooser -->
|
506
508
|
|
507
509
|
## Import
|
508
510
|
|