pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -214,19 +214,21 @@ class EgpPolicy(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  allow_all = vault.EgpPolicy("allow-all",
222
- name="allow-all",
223
- paths=["*"],
224
223
  enforcement_level="soft-mandatory",
224
+ paths=["*"],
225
225
  policy=\"\"\"main = rule {
226
226
  true
227
227
  }
228
+
228
229
  \"\"\")
229
230
  ```
231
+ <!--End PulumiCodeChooser -->
230
232
 
231
233
  :param str resource_name: The name of the resource.
232
234
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -252,19 +254,21 @@ class EgpPolicy(pulumi.CustomResource):
252
254
 
253
255
  ## Example Usage
254
256
 
257
+ <!--Start PulumiCodeChooser -->
255
258
  ```python
256
259
  import pulumi
257
260
  import pulumi_vault as vault
258
261
 
259
262
  allow_all = vault.EgpPolicy("allow-all",
260
- name="allow-all",
261
- paths=["*"],
262
263
  enforcement_level="soft-mandatory",
264
+ paths=["*"],
263
265
  policy=\"\"\"main = rule {
264
266
  true
265
267
  }
268
+
266
269
  \"\"\")
267
270
  ```
271
+ <!--End PulumiCodeChooser -->
268
272
 
269
273
  :param str resource_name: The name of the resource.
270
274
  :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -22,15 +22,11 @@ class AuthBackendArgs:
22
22
  custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
23
23
  description: Optional[pulumi.Input[str]] = None,
24
24
  disable_remount: Optional[pulumi.Input[bool]] = None,
25
- identity_token_audience: Optional[pulumi.Input[str]] = None,
26
- identity_token_key: Optional[pulumi.Input[str]] = None,
27
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
28
25
  local: Optional[pulumi.Input[bool]] = None,
29
26
  namespace: Optional[pulumi.Input[str]] = None,
30
27
  path: Optional[pulumi.Input[str]] = None,
31
28
  private_key_id: Optional[pulumi.Input[str]] = None,
32
29
  project_id: Optional[pulumi.Input[str]] = None,
33
- service_account_email: Optional[pulumi.Input[str]] = None,
34
30
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
35
31
  """
36
32
  The set of arguments for constructing a AuthBackend resource.
@@ -47,12 +43,6 @@ class AuthBackendArgs:
47
43
  :param pulumi.Input[str] description: A description of the auth method.
48
44
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
49
45
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
51
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
52
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
53
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
54
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
55
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
56
46
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
57
47
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
58
48
  The value should not contain leading or trailing forward slashes.
@@ -61,8 +51,6 @@ class AuthBackendArgs:
61
51
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
62
52
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
63
53
  :param pulumi.Input[str] project_id: The GCP Project ID
64
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
65
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
66
54
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
67
55
 
68
56
  The `tune` block is used to tune the auth backend:
@@ -79,12 +67,6 @@ class AuthBackendArgs:
79
67
  pulumi.set(__self__, "description", description)
80
68
  if disable_remount is not None:
81
69
  pulumi.set(__self__, "disable_remount", disable_remount)
82
- if identity_token_audience is not None:
83
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
84
- if identity_token_key is not None:
85
- pulumi.set(__self__, "identity_token_key", identity_token_key)
86
- if identity_token_ttl is not None:
87
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
88
70
  if local is not None:
89
71
  pulumi.set(__self__, "local", local)
90
72
  if namespace is not None:
@@ -95,8 +77,6 @@ class AuthBackendArgs:
95
77
  pulumi.set(__self__, "private_key_id", private_key_id)
96
78
  if project_id is not None:
97
79
  pulumi.set(__self__, "project_id", project_id)
98
- if service_account_email is not None:
99
- pulumi.set(__self__, "service_account_email", service_account_email)
100
80
  if tune is not None:
101
81
  pulumi.set(__self__, "tune", tune)
102
82
 
@@ -179,45 +159,6 @@ class AuthBackendArgs:
179
159
  def disable_remount(self, value: Optional[pulumi.Input[bool]]):
180
160
  pulumi.set(self, "disable_remount", value)
181
161
 
182
- @property
183
- @pulumi.getter(name="identityTokenAudience")
184
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
185
- """
186
- The audience claim value for plugin identity
187
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
188
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
189
- """
190
- return pulumi.get(self, "identity_token_audience")
191
-
192
- @identity_token_audience.setter
193
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
194
- pulumi.set(self, "identity_token_audience", value)
195
-
196
- @property
197
- @pulumi.getter(name="identityTokenKey")
198
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
199
- """
200
- The key to use for signing plugin identity
201
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
202
- """
203
- return pulumi.get(self, "identity_token_key")
204
-
205
- @identity_token_key.setter
206
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
207
- pulumi.set(self, "identity_token_key", value)
208
-
209
- @property
210
- @pulumi.getter(name="identityTokenTtl")
211
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
212
- """
213
- The TTL of generated tokens.
214
- """
215
- return pulumi.get(self, "identity_token_ttl")
216
-
217
- @identity_token_ttl.setter
218
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
219
- pulumi.set(self, "identity_token_ttl", value)
220
-
221
162
  @property
222
163
  @pulumi.getter
223
164
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -281,19 +222,6 @@ class AuthBackendArgs:
281
222
  def project_id(self, value: Optional[pulumi.Input[str]]):
282
223
  pulumi.set(self, "project_id", value)
283
224
 
284
- @property
285
- @pulumi.getter(name="serviceAccountEmail")
286
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
287
- """
288
- Service Account to impersonate for plugin workload identity federation.
289
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
290
- """
291
- return pulumi.get(self, "service_account_email")
292
-
293
- @service_account_email.setter
294
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
295
- pulumi.set(self, "service_account_email", value)
296
-
297
225
  @property
298
226
  @pulumi.getter
299
227
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
@@ -319,15 +247,11 @@ class _AuthBackendState:
319
247
  custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
320
248
  description: Optional[pulumi.Input[str]] = None,
321
249
  disable_remount: Optional[pulumi.Input[bool]] = None,
322
- identity_token_audience: Optional[pulumi.Input[str]] = None,
323
- identity_token_key: Optional[pulumi.Input[str]] = None,
324
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
325
250
  local: Optional[pulumi.Input[bool]] = None,
326
251
  namespace: Optional[pulumi.Input[str]] = None,
327
252
  path: Optional[pulumi.Input[str]] = None,
328
253
  private_key_id: Optional[pulumi.Input[str]] = None,
329
254
  project_id: Optional[pulumi.Input[str]] = None,
330
- service_account_email: Optional[pulumi.Input[str]] = None,
331
255
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
332
256
  """
333
257
  Input properties used for looking up and filtering AuthBackend resources.
@@ -345,12 +269,6 @@ class _AuthBackendState:
345
269
  :param pulumi.Input[str] description: A description of the auth method.
346
270
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
347
271
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
348
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
349
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
350
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
351
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
352
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
353
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
354
272
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
355
273
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
356
274
  The value should not contain leading or trailing forward slashes.
@@ -359,8 +277,6 @@ class _AuthBackendState:
359
277
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
360
278
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
361
279
  :param pulumi.Input[str] project_id: The GCP Project ID
362
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
363
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
364
280
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
365
281
 
366
282
  The `tune` block is used to tune the auth backend:
@@ -379,12 +295,6 @@ class _AuthBackendState:
379
295
  pulumi.set(__self__, "description", description)
380
296
  if disable_remount is not None:
381
297
  pulumi.set(__self__, "disable_remount", disable_remount)
382
- if identity_token_audience is not None:
383
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
384
- if identity_token_key is not None:
385
- pulumi.set(__self__, "identity_token_key", identity_token_key)
386
- if identity_token_ttl is not None:
387
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
388
298
  if local is not None:
389
299
  pulumi.set(__self__, "local", local)
390
300
  if namespace is not None:
@@ -395,8 +305,6 @@ class _AuthBackendState:
395
305
  pulumi.set(__self__, "private_key_id", private_key_id)
396
306
  if project_id is not None:
397
307
  pulumi.set(__self__, "project_id", project_id)
398
- if service_account_email is not None:
399
- pulumi.set(__self__, "service_account_email", service_account_email)
400
308
  if tune is not None:
401
309
  pulumi.set(__self__, "tune", tune)
402
310
 
@@ -491,45 +399,6 @@ class _AuthBackendState:
491
399
  def disable_remount(self, value: Optional[pulumi.Input[bool]]):
492
400
  pulumi.set(self, "disable_remount", value)
493
401
 
494
- @property
495
- @pulumi.getter(name="identityTokenAudience")
496
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
497
- """
498
- The audience claim value for plugin identity
499
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
500
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
501
- """
502
- return pulumi.get(self, "identity_token_audience")
503
-
504
- @identity_token_audience.setter
505
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
506
- pulumi.set(self, "identity_token_audience", value)
507
-
508
- @property
509
- @pulumi.getter(name="identityTokenKey")
510
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
511
- """
512
- The key to use for signing plugin identity
513
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
514
- """
515
- return pulumi.get(self, "identity_token_key")
516
-
517
- @identity_token_key.setter
518
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
519
- pulumi.set(self, "identity_token_key", value)
520
-
521
- @property
522
- @pulumi.getter(name="identityTokenTtl")
523
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
524
- """
525
- The TTL of generated tokens.
526
- """
527
- return pulumi.get(self, "identity_token_ttl")
528
-
529
- @identity_token_ttl.setter
530
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
531
- pulumi.set(self, "identity_token_ttl", value)
532
-
533
402
  @property
534
403
  @pulumi.getter
535
404
  def local(self) -> Optional[pulumi.Input[bool]]:
@@ -593,19 +462,6 @@ class _AuthBackendState:
593
462
  def project_id(self, value: Optional[pulumi.Input[str]]):
594
463
  pulumi.set(self, "project_id", value)
595
464
 
596
- @property
597
- @pulumi.getter(name="serviceAccountEmail")
598
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
599
- """
600
- Service Account to impersonate for plugin workload identity federation.
601
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
602
- """
603
- return pulumi.get(self, "service_account_email")
604
-
605
- @service_account_email.setter
606
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
607
- pulumi.set(self, "service_account_email", value)
608
-
609
465
  @property
610
466
  @pulumi.getter
611
467
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
@@ -632,15 +488,11 @@ class AuthBackend(pulumi.CustomResource):
632
488
  custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
633
489
  description: Optional[pulumi.Input[str]] = None,
634
490
  disable_remount: Optional[pulumi.Input[bool]] = None,
635
- identity_token_audience: Optional[pulumi.Input[str]] = None,
636
- identity_token_key: Optional[pulumi.Input[str]] = None,
637
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
638
491
  local: Optional[pulumi.Input[bool]] = None,
639
492
  namespace: Optional[pulumi.Input[str]] = None,
640
493
  path: Optional[pulumi.Input[str]] = None,
641
494
  private_key_id: Optional[pulumi.Input[str]] = None,
642
495
  project_id: Optional[pulumi.Input[str]] = None,
643
- service_account_email: Optional[pulumi.Input[str]] = None,
644
496
  tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
645
497
  __props__=None):
646
498
  """
@@ -648,17 +500,21 @@ class AuthBackend(pulumi.CustomResource):
648
500
 
649
501
  ## Example Usage
650
502
 
651
- You can setup the GCP auth backend with Workload Identity Federation (WIF) for a secret-less configuration:
503
+ <!--Start PulumiCodeChooser -->
652
504
  ```python
653
505
  import pulumi
654
506
  import pulumi_vault as vault
655
507
 
656
508
  gcp = vault.gcp.AuthBackend("gcp",
657
- identity_token_key="example-key",
658
- identity_token_ttl=1800,
659
- identity_token_audience="<TOKEN_AUDIENCE>",
660
- service_account_email="<SERVICE_ACCOUNT_EMAIL>")
509
+ credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
510
+ custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
511
+ api="www.googleapis.com",
512
+ iam="iam.googleapis.com",
513
+ crm="cloudresourcemanager.googleapis.com",
514
+ compute="compute.googleapis.com",
515
+ ))
661
516
  ```
517
+ <!--End PulumiCodeChooser -->
662
518
 
663
519
  ## Import
664
520
 
@@ -683,12 +539,6 @@ class AuthBackend(pulumi.CustomResource):
683
539
  :param pulumi.Input[str] description: A description of the auth method.
684
540
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
685
541
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
686
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
687
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
688
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
689
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
690
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
691
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
692
542
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
693
543
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
694
544
  The value should not contain leading or trailing forward slashes.
@@ -697,8 +547,6 @@ class AuthBackend(pulumi.CustomResource):
697
547
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
698
548
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
699
549
  :param pulumi.Input[str] project_id: The GCP Project ID
700
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
701
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
702
550
  :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
703
551
 
704
552
  The `tune` block is used to tune the auth backend:
@@ -714,17 +562,21 @@ class AuthBackend(pulumi.CustomResource):
714
562
 
715
563
  ## Example Usage
716
564
 
717
- You can setup the GCP auth backend with Workload Identity Federation (WIF) for a secret-less configuration:
565
+ <!--Start PulumiCodeChooser -->
718
566
  ```python
719
567
  import pulumi
720
568
  import pulumi_vault as vault
721
569
 
722
570
  gcp = vault.gcp.AuthBackend("gcp",
723
- identity_token_key="example-key",
724
- identity_token_ttl=1800,
725
- identity_token_audience="<TOKEN_AUDIENCE>",
726
- service_account_email="<SERVICE_ACCOUNT_EMAIL>")
571
+ credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
572
+ custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
573
+ api="www.googleapis.com",
574
+ iam="iam.googleapis.com",
575
+ crm="cloudresourcemanager.googleapis.com",
576
+ compute="compute.googleapis.com",
577
+ ))
727
578
  ```
579
+ <!--End PulumiCodeChooser -->
728
580
 
729
581
  ## Import
730
582
 
@@ -755,15 +607,11 @@ class AuthBackend(pulumi.CustomResource):
755
607
  custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
756
608
  description: Optional[pulumi.Input[str]] = None,
757
609
  disable_remount: Optional[pulumi.Input[bool]] = None,
758
- identity_token_audience: Optional[pulumi.Input[str]] = None,
759
- identity_token_key: Optional[pulumi.Input[str]] = None,
760
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
761
610
  local: Optional[pulumi.Input[bool]] = None,
762
611
  namespace: Optional[pulumi.Input[str]] = None,
763
612
  path: Optional[pulumi.Input[str]] = None,
764
613
  private_key_id: Optional[pulumi.Input[str]] = None,
765
614
  project_id: Optional[pulumi.Input[str]] = None,
766
- service_account_email: Optional[pulumi.Input[str]] = None,
767
615
  tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
768
616
  __props__=None):
769
617
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -780,15 +628,11 @@ class AuthBackend(pulumi.CustomResource):
780
628
  __props__.__dict__["custom_endpoint"] = custom_endpoint
781
629
  __props__.__dict__["description"] = description
782
630
  __props__.__dict__["disable_remount"] = disable_remount
783
- __props__.__dict__["identity_token_audience"] = identity_token_audience
784
- __props__.__dict__["identity_token_key"] = identity_token_key
785
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
786
631
  __props__.__dict__["local"] = local
787
632
  __props__.__dict__["namespace"] = namespace
788
633
  __props__.__dict__["path"] = path
789
634
  __props__.__dict__["private_key_id"] = private_key_id
790
635
  __props__.__dict__["project_id"] = project_id
791
- __props__.__dict__["service_account_email"] = service_account_email
792
636
  __props__.__dict__["tune"] = tune
793
637
  __props__.__dict__["accessor"] = None
794
638
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
@@ -810,15 +654,11 @@ class AuthBackend(pulumi.CustomResource):
810
654
  custom_endpoint: Optional[pulumi.Input[pulumi.InputType['AuthBackendCustomEndpointArgs']]] = None,
811
655
  description: Optional[pulumi.Input[str]] = None,
812
656
  disable_remount: Optional[pulumi.Input[bool]] = None,
813
- identity_token_audience: Optional[pulumi.Input[str]] = None,
814
- identity_token_key: Optional[pulumi.Input[str]] = None,
815
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
816
657
  local: Optional[pulumi.Input[bool]] = None,
817
658
  namespace: Optional[pulumi.Input[str]] = None,
818
659
  path: Optional[pulumi.Input[str]] = None,
819
660
  private_key_id: Optional[pulumi.Input[str]] = None,
820
661
  project_id: Optional[pulumi.Input[str]] = None,
821
- service_account_email: Optional[pulumi.Input[str]] = None,
822
662
  tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
823
663
  """
824
664
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -841,12 +681,6 @@ class AuthBackend(pulumi.CustomResource):
841
681
  :param pulumi.Input[str] description: A description of the auth method.
842
682
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
843
683
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
844
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
845
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
846
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
847
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
848
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
849
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
850
684
  :param pulumi.Input[bool] local: Specifies if the auth method is local only.
851
685
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
852
686
  The value should not contain leading or trailing forward slashes.
@@ -855,8 +689,6 @@ class AuthBackend(pulumi.CustomResource):
855
689
  :param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
856
690
  :param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
857
691
  :param pulumi.Input[str] project_id: The GCP Project ID
858
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
859
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
860
692
  :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
861
693
 
862
694
  The `tune` block is used to tune the auth backend:
@@ -872,15 +704,11 @@ class AuthBackend(pulumi.CustomResource):
872
704
  __props__.__dict__["custom_endpoint"] = custom_endpoint
873
705
  __props__.__dict__["description"] = description
874
706
  __props__.__dict__["disable_remount"] = disable_remount
875
- __props__.__dict__["identity_token_audience"] = identity_token_audience
876
- __props__.__dict__["identity_token_key"] = identity_token_key
877
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
878
707
  __props__.__dict__["local"] = local
879
708
  __props__.__dict__["namespace"] = namespace
880
709
  __props__.__dict__["path"] = path
881
710
  __props__.__dict__["private_key_id"] = private_key_id
882
711
  __props__.__dict__["project_id"] = project_id
883
- __props__.__dict__["service_account_email"] = service_account_email
884
712
  __props__.__dict__["tune"] = tune
885
713
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
886
714
 
@@ -947,33 +775,6 @@ class AuthBackend(pulumi.CustomResource):
947
775
  """
948
776
  return pulumi.get(self, "disable_remount")
949
777
 
950
- @property
951
- @pulumi.getter(name="identityTokenAudience")
952
- def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
953
- """
954
- The audience claim value for plugin identity
955
- tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
956
- Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
957
- """
958
- return pulumi.get(self, "identity_token_audience")
959
-
960
- @property
961
- @pulumi.getter(name="identityTokenKey")
962
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
963
- """
964
- The key to use for signing plugin identity
965
- tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
966
- """
967
- return pulumi.get(self, "identity_token_key")
968
-
969
- @property
970
- @pulumi.getter(name="identityTokenTtl")
971
- def identity_token_ttl(self) -> pulumi.Output[Optional[int]]:
972
- """
973
- The TTL of generated tokens.
974
- """
975
- return pulumi.get(self, "identity_token_ttl")
976
-
977
778
  @property
978
779
  @pulumi.getter
979
780
  def local(self) -> pulumi.Output[Optional[bool]]:
@@ -1017,15 +818,6 @@ class AuthBackend(pulumi.CustomResource):
1017
818
  """
1018
819
  return pulumi.get(self, "project_id")
1019
820
 
1020
- @property
1021
- @pulumi.getter(name="serviceAccountEmail")
1022
- def service_account_email(self) -> pulumi.Output[Optional[str]]:
1023
- """
1024
- Service Account to impersonate for plugin workload identity federation.
1025
- Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1026
- """
1027
- return pulumi.get(self, "service_account_email")
1028
-
1029
821
  @property
1030
822
  @pulumi.getter
1031
823
  def tune(self) -> pulumi.Output['outputs.AuthBackendTune']: