pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
pulumi_vault/egp_policy.py
CHANGED
@@ -214,19 +214,21 @@ class EgpPolicy(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
222
|
allow_all = vault.EgpPolicy("allow-all",
|
222
|
-
name="allow-all",
|
223
|
-
paths=["*"],
|
224
223
|
enforcement_level="soft-mandatory",
|
224
|
+
paths=["*"],
|
225
225
|
policy=\"\"\"main = rule {
|
226
226
|
true
|
227
227
|
}
|
228
|
+
|
228
229
|
\"\"\")
|
229
230
|
```
|
231
|
+
<!--End PulumiCodeChooser -->
|
230
232
|
|
231
233
|
:param str resource_name: The name of the resource.
|
232
234
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -252,19 +254,21 @@ class EgpPolicy(pulumi.CustomResource):
|
|
252
254
|
|
253
255
|
## Example Usage
|
254
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
255
258
|
```python
|
256
259
|
import pulumi
|
257
260
|
import pulumi_vault as vault
|
258
261
|
|
259
262
|
allow_all = vault.EgpPolicy("allow-all",
|
260
|
-
name="allow-all",
|
261
|
-
paths=["*"],
|
262
263
|
enforcement_level="soft-mandatory",
|
264
|
+
paths=["*"],
|
263
265
|
policy=\"\"\"main = rule {
|
264
266
|
true
|
265
267
|
}
|
268
|
+
|
266
269
|
\"\"\")
|
267
270
|
```
|
271
|
+
<!--End PulumiCodeChooser -->
|
268
272
|
|
269
273
|
:param str resource_name: The name of the resource.
|
270
274
|
:param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -22,15 +22,11 @@ class AuthBackendArgs:
|
|
22
22
|
custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
|
23
23
|
description: Optional[pulumi.Input[str]] = None,
|
24
24
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
25
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
26
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
27
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
28
25
|
local: Optional[pulumi.Input[bool]] = None,
|
29
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
30
27
|
path: Optional[pulumi.Input[str]] = None,
|
31
28
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
32
29
|
project_id: Optional[pulumi.Input[str]] = None,
|
33
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
34
30
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
35
31
|
"""
|
36
32
|
The set of arguments for constructing a AuthBackend resource.
|
@@ -47,12 +43,6 @@ class AuthBackendArgs:
|
|
47
43
|
:param pulumi.Input[str] description: A description of the auth method.
|
48
44
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
45
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
50
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
51
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
52
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
53
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
54
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
55
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
56
46
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
57
47
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
58
48
|
The value should not contain leading or trailing forward slashes.
|
@@ -61,8 +51,6 @@ class AuthBackendArgs:
|
|
61
51
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
62
52
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
63
53
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
64
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
65
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
66
54
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
67
55
|
|
68
56
|
The `tune` block is used to tune the auth backend:
|
@@ -79,12 +67,6 @@ class AuthBackendArgs:
|
|
79
67
|
pulumi.set(__self__, "description", description)
|
80
68
|
if disable_remount is not None:
|
81
69
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
82
|
-
if identity_token_audience is not None:
|
83
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
84
|
-
if identity_token_key is not None:
|
85
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
86
|
-
if identity_token_ttl is not None:
|
87
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
88
70
|
if local is not None:
|
89
71
|
pulumi.set(__self__, "local", local)
|
90
72
|
if namespace is not None:
|
@@ -95,8 +77,6 @@ class AuthBackendArgs:
|
|
95
77
|
pulumi.set(__self__, "private_key_id", private_key_id)
|
96
78
|
if project_id is not None:
|
97
79
|
pulumi.set(__self__, "project_id", project_id)
|
98
|
-
if service_account_email is not None:
|
99
|
-
pulumi.set(__self__, "service_account_email", service_account_email)
|
100
80
|
if tune is not None:
|
101
81
|
pulumi.set(__self__, "tune", tune)
|
102
82
|
|
@@ -179,45 +159,6 @@ class AuthBackendArgs:
|
|
179
159
|
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
180
160
|
pulumi.set(self, "disable_remount", value)
|
181
161
|
|
182
|
-
@property
|
183
|
-
@pulumi.getter(name="identityTokenAudience")
|
184
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
185
|
-
"""
|
186
|
-
The audience claim value for plugin identity
|
187
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
188
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
189
|
-
"""
|
190
|
-
return pulumi.get(self, "identity_token_audience")
|
191
|
-
|
192
|
-
@identity_token_audience.setter
|
193
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
194
|
-
pulumi.set(self, "identity_token_audience", value)
|
195
|
-
|
196
|
-
@property
|
197
|
-
@pulumi.getter(name="identityTokenKey")
|
198
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
199
|
-
"""
|
200
|
-
The key to use for signing plugin identity
|
201
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
202
|
-
"""
|
203
|
-
return pulumi.get(self, "identity_token_key")
|
204
|
-
|
205
|
-
@identity_token_key.setter
|
206
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
207
|
-
pulumi.set(self, "identity_token_key", value)
|
208
|
-
|
209
|
-
@property
|
210
|
-
@pulumi.getter(name="identityTokenTtl")
|
211
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
212
|
-
"""
|
213
|
-
The TTL of generated tokens.
|
214
|
-
"""
|
215
|
-
return pulumi.get(self, "identity_token_ttl")
|
216
|
-
|
217
|
-
@identity_token_ttl.setter
|
218
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
219
|
-
pulumi.set(self, "identity_token_ttl", value)
|
220
|
-
|
221
162
|
@property
|
222
163
|
@pulumi.getter
|
223
164
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -281,19 +222,6 @@ class AuthBackendArgs:
|
|
281
222
|
def project_id(self, value: Optional[pulumi.Input[str]]):
|
282
223
|
pulumi.set(self, "project_id", value)
|
283
224
|
|
284
|
-
@property
|
285
|
-
@pulumi.getter(name="serviceAccountEmail")
|
286
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
287
|
-
"""
|
288
|
-
Service Account to impersonate for plugin workload identity federation.
|
289
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
290
|
-
"""
|
291
|
-
return pulumi.get(self, "service_account_email")
|
292
|
-
|
293
|
-
@service_account_email.setter
|
294
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
295
|
-
pulumi.set(self, "service_account_email", value)
|
296
|
-
|
297
225
|
@property
|
298
226
|
@pulumi.getter
|
299
227
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
@@ -319,15 +247,11 @@ class _AuthBackendState:
|
|
319
247
|
custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
|
320
248
|
description: Optional[pulumi.Input[str]] = None,
|
321
249
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
322
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
323
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
324
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
325
250
|
local: Optional[pulumi.Input[bool]] = None,
|
326
251
|
namespace: Optional[pulumi.Input[str]] = None,
|
327
252
|
path: Optional[pulumi.Input[str]] = None,
|
328
253
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
329
254
|
project_id: Optional[pulumi.Input[str]] = None,
|
330
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
331
255
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
332
256
|
"""
|
333
257
|
Input properties used for looking up and filtering AuthBackend resources.
|
@@ -345,12 +269,6 @@ class _AuthBackendState:
|
|
345
269
|
:param pulumi.Input[str] description: A description of the auth method.
|
346
270
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
347
271
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
348
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
349
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
350
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
351
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
352
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
353
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
354
272
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
355
273
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
356
274
|
The value should not contain leading or trailing forward slashes.
|
@@ -359,8 +277,6 @@ class _AuthBackendState:
|
|
359
277
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
360
278
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
361
279
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
362
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
363
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
364
280
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
365
281
|
|
366
282
|
The `tune` block is used to tune the auth backend:
|
@@ -379,12 +295,6 @@ class _AuthBackendState:
|
|
379
295
|
pulumi.set(__self__, "description", description)
|
380
296
|
if disable_remount is not None:
|
381
297
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
382
|
-
if identity_token_audience is not None:
|
383
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
384
|
-
if identity_token_key is not None:
|
385
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
386
|
-
if identity_token_ttl is not None:
|
387
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
388
298
|
if local is not None:
|
389
299
|
pulumi.set(__self__, "local", local)
|
390
300
|
if namespace is not None:
|
@@ -395,8 +305,6 @@ class _AuthBackendState:
|
|
395
305
|
pulumi.set(__self__, "private_key_id", private_key_id)
|
396
306
|
if project_id is not None:
|
397
307
|
pulumi.set(__self__, "project_id", project_id)
|
398
|
-
if service_account_email is not None:
|
399
|
-
pulumi.set(__self__, "service_account_email", service_account_email)
|
400
308
|
if tune is not None:
|
401
309
|
pulumi.set(__self__, "tune", tune)
|
402
310
|
|
@@ -491,45 +399,6 @@ class _AuthBackendState:
|
|
491
399
|
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
492
400
|
pulumi.set(self, "disable_remount", value)
|
493
401
|
|
494
|
-
@property
|
495
|
-
@pulumi.getter(name="identityTokenAudience")
|
496
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
497
|
-
"""
|
498
|
-
The audience claim value for plugin identity
|
499
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
500
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
501
|
-
"""
|
502
|
-
return pulumi.get(self, "identity_token_audience")
|
503
|
-
|
504
|
-
@identity_token_audience.setter
|
505
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
506
|
-
pulumi.set(self, "identity_token_audience", value)
|
507
|
-
|
508
|
-
@property
|
509
|
-
@pulumi.getter(name="identityTokenKey")
|
510
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
511
|
-
"""
|
512
|
-
The key to use for signing plugin identity
|
513
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
514
|
-
"""
|
515
|
-
return pulumi.get(self, "identity_token_key")
|
516
|
-
|
517
|
-
@identity_token_key.setter
|
518
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
519
|
-
pulumi.set(self, "identity_token_key", value)
|
520
|
-
|
521
|
-
@property
|
522
|
-
@pulumi.getter(name="identityTokenTtl")
|
523
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
524
|
-
"""
|
525
|
-
The TTL of generated tokens.
|
526
|
-
"""
|
527
|
-
return pulumi.get(self, "identity_token_ttl")
|
528
|
-
|
529
|
-
@identity_token_ttl.setter
|
530
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
531
|
-
pulumi.set(self, "identity_token_ttl", value)
|
532
|
-
|
533
402
|
@property
|
534
403
|
@pulumi.getter
|
535
404
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -593,19 +462,6 @@ class _AuthBackendState:
|
|
593
462
|
def project_id(self, value: Optional[pulumi.Input[str]]):
|
594
463
|
pulumi.set(self, "project_id", value)
|
595
464
|
|
596
|
-
@property
|
597
|
-
@pulumi.getter(name="serviceAccountEmail")
|
598
|
-
def service_account_email(self) -> Optional[pulumi.Input[str]]:
|
599
|
-
"""
|
600
|
-
Service Account to impersonate for plugin workload identity federation.
|
601
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
602
|
-
"""
|
603
|
-
return pulumi.get(self, "service_account_email")
|
604
|
-
|
605
|
-
@service_account_email.setter
|
606
|
-
def service_account_email(self, value: Optional[pulumi.Input[str]]):
|
607
|
-
pulumi.set(self, "service_account_email", value)
|
608
|
-
|
609
465
|
@property
|
610
466
|
@pulumi.getter
|
611
467
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
@@ -632,15 +488,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
632
488
|
custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
|
633
489
|
description: Optional[pulumi.Input[str]] = None,
|
634
490
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
635
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
636
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
637
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
638
491
|
local: Optional[pulumi.Input[bool]] = None,
|
639
492
|
namespace: Optional[pulumi.Input[str]] = None,
|
640
493
|
path: Optional[pulumi.Input[str]] = None,
|
641
494
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
642
495
|
project_id: Optional[pulumi.Input[str]] = None,
|
643
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
644
496
|
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
|
645
497
|
__props__=None):
|
646
498
|
"""
|
@@ -648,17 +500,21 @@ class AuthBackend(pulumi.CustomResource):
|
|
648
500
|
|
649
501
|
## Example Usage
|
650
502
|
|
651
|
-
|
503
|
+
<!--Start PulumiCodeChooser -->
|
652
504
|
```python
|
653
505
|
import pulumi
|
654
506
|
import pulumi_vault as vault
|
655
507
|
|
656
508
|
gcp = vault.gcp.AuthBackend("gcp",
|
657
|
-
|
658
|
-
|
659
|
-
|
660
|
-
|
509
|
+
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
510
|
+
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
511
|
+
api="www.googleapis.com",
|
512
|
+
iam="iam.googleapis.com",
|
513
|
+
crm="cloudresourcemanager.googleapis.com",
|
514
|
+
compute="compute.googleapis.com",
|
515
|
+
))
|
661
516
|
```
|
517
|
+
<!--End PulumiCodeChooser -->
|
662
518
|
|
663
519
|
## Import
|
664
520
|
|
@@ -683,12 +539,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
683
539
|
:param pulumi.Input[str] description: A description of the auth method.
|
684
540
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
685
541
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
686
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
687
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
688
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
689
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
690
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
691
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
692
542
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
693
543
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
694
544
|
The value should not contain leading or trailing forward slashes.
|
@@ -697,8 +547,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
697
547
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
698
548
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
699
549
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
700
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
701
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
702
550
|
:param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
|
703
551
|
|
704
552
|
The `tune` block is used to tune the auth backend:
|
@@ -714,17 +562,21 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
562
|
|
715
563
|
## Example Usage
|
716
564
|
|
717
|
-
|
565
|
+
<!--Start PulumiCodeChooser -->
|
718
566
|
```python
|
719
567
|
import pulumi
|
720
568
|
import pulumi_vault as vault
|
721
569
|
|
722
570
|
gcp = vault.gcp.AuthBackend("gcp",
|
723
|
-
|
724
|
-
|
725
|
-
|
726
|
-
|
571
|
+
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
572
|
+
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
573
|
+
api="www.googleapis.com",
|
574
|
+
iam="iam.googleapis.com",
|
575
|
+
crm="cloudresourcemanager.googleapis.com",
|
576
|
+
compute="compute.googleapis.com",
|
577
|
+
))
|
727
578
|
```
|
579
|
+
<!--End PulumiCodeChooser -->
|
728
580
|
|
729
581
|
## Import
|
730
582
|
|
@@ -755,15 +607,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
755
607
|
custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
|
756
608
|
description: Optional[pulumi.Input[str]] = None,
|
757
609
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
758
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
759
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
760
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
761
610
|
local: Optional[pulumi.Input[bool]] = None,
|
762
611
|
namespace: Optional[pulumi.Input[str]] = None,
|
763
612
|
path: Optional[pulumi.Input[str]] = None,
|
764
613
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
765
614
|
project_id: Optional[pulumi.Input[str]] = None,
|
766
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
767
615
|
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
|
768
616
|
__props__=None):
|
769
617
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -780,15 +628,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
780
628
|
__props__.__dict__["custom_endpoint"] = custom_endpoint
|
781
629
|
__props__.__dict__["description"] = description
|
782
630
|
__props__.__dict__["disable_remount"] = disable_remount
|
783
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
784
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
785
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
786
631
|
__props__.__dict__["local"] = local
|
787
632
|
__props__.__dict__["namespace"] = namespace
|
788
633
|
__props__.__dict__["path"] = path
|
789
634
|
__props__.__dict__["private_key_id"] = private_key_id
|
790
635
|
__props__.__dict__["project_id"] = project_id
|
791
|
-
__props__.__dict__["service_account_email"] = service_account_email
|
792
636
|
__props__.__dict__["tune"] = tune
|
793
637
|
__props__.__dict__["accessor"] = None
|
794
638
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
|
@@ -810,15 +654,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
810
654
|
custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
|
811
655
|
description: Optional[pulumi.Input[str]] = None,
|
812
656
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
813
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
814
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
815
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
816
657
|
local: Optional[pulumi.Input[bool]] = None,
|
817
658
|
namespace: Optional[pulumi.Input[str]] = None,
|
818
659
|
path: Optional[pulumi.Input[str]] = None,
|
819
660
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
820
661
|
project_id: Optional[pulumi.Input[str]] = None,
|
821
|
-
service_account_email: Optional[pulumi.Input[str]] = None,
|
822
662
|
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
|
823
663
|
"""
|
824
664
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -841,12 +681,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
841
681
|
:param pulumi.Input[str] description: A description of the auth method.
|
842
682
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
843
683
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
844
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
|
845
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
846
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
847
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
|
848
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
849
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
|
850
684
|
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
851
685
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
852
686
|
The value should not contain leading or trailing forward slashes.
|
@@ -855,8 +689,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
855
689
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
856
690
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
857
691
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
858
|
-
:param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
859
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
860
692
|
:param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
|
861
693
|
|
862
694
|
The `tune` block is used to tune the auth backend:
|
@@ -872,15 +704,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
872
704
|
__props__.__dict__["custom_endpoint"] = custom_endpoint
|
873
705
|
__props__.__dict__["description"] = description
|
874
706
|
__props__.__dict__["disable_remount"] = disable_remount
|
875
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
876
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
877
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
878
707
|
__props__.__dict__["local"] = local
|
879
708
|
__props__.__dict__["namespace"] = namespace
|
880
709
|
__props__.__dict__["path"] = path
|
881
710
|
__props__.__dict__["private_key_id"] = private_key_id
|
882
711
|
__props__.__dict__["project_id"] = project_id
|
883
|
-
__props__.__dict__["service_account_email"] = service_account_email
|
884
712
|
__props__.__dict__["tune"] = tune
|
885
713
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
886
714
|
|
@@ -947,33 +775,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
947
775
|
"""
|
948
776
|
return pulumi.get(self, "disable_remount")
|
949
777
|
|
950
|
-
@property
|
951
|
-
@pulumi.getter(name="identityTokenAudience")
|
952
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
|
953
|
-
"""
|
954
|
-
The audience claim value for plugin identity
|
955
|
-
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
956
|
-
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
957
|
-
"""
|
958
|
-
return pulumi.get(self, "identity_token_audience")
|
959
|
-
|
960
|
-
@property
|
961
|
-
@pulumi.getter(name="identityTokenKey")
|
962
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
963
|
-
"""
|
964
|
-
The key to use for signing plugin identity
|
965
|
-
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
966
|
-
"""
|
967
|
-
return pulumi.get(self, "identity_token_key")
|
968
|
-
|
969
|
-
@property
|
970
|
-
@pulumi.getter(name="identityTokenTtl")
|
971
|
-
def identity_token_ttl(self) -> pulumi.Output[Optional[int]]:
|
972
|
-
"""
|
973
|
-
The TTL of generated tokens.
|
974
|
-
"""
|
975
|
-
return pulumi.get(self, "identity_token_ttl")
|
976
|
-
|
977
778
|
@property
|
978
779
|
@pulumi.getter
|
979
780
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1017,15 +818,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1017
818
|
"""
|
1018
819
|
return pulumi.get(self, "project_id")
|
1019
820
|
|
1020
|
-
@property
|
1021
|
-
@pulumi.getter(name="serviceAccountEmail")
|
1022
|
-
def service_account_email(self) -> pulumi.Output[Optional[str]]:
|
1023
|
-
"""
|
1024
|
-
Service Account to impersonate for plugin workload identity federation.
|
1025
|
-
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1026
|
-
"""
|
1027
|
-
return pulumi.get(self, "service_account_email")
|
1028
|
-
|
1029
821
|
@property
|
1030
822
|
@pulumi.getter
|
1031
823
|
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|