pulumi-vault 6.7.0a1745304689__py3-none-any.whl → 6.7.1a1746220688__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +33 -13
- pulumi_vault/ad/secret_backend.py +3 -0
- pulumi_vault/ad/secret_library.py +3 -0
- pulumi_vault/ad/secret_role.py +3 -0
- pulumi_vault/alicloud/auth_backend_role.py +3 -0
- pulumi_vault/approle/auth_backend_login.py +3 -0
- pulumi_vault/approle/auth_backend_role.py +3 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +3 -0
- pulumi_vault/audit.py +3 -0
- pulumi_vault/audit_request_header.py +3 -0
- pulumi_vault/auth_backend.py +3 -0
- pulumi_vault/aws/auth_backend_cert.py +3 -0
- pulumi_vault/aws/auth_backend_client.py +3 -0
- pulumi_vault/aws/auth_backend_config_identity.py +3 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +3 -0
- pulumi_vault/aws/auth_backend_login.py +3 -0
- pulumi_vault/aws/auth_backend_role.py +3 -0
- pulumi_vault/aws/auth_backend_role_tag.py +3 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +3 -0
- pulumi_vault/aws/auth_backend_sts_role.py +3 -0
- pulumi_vault/aws/secret_backend.py +3 -0
- pulumi_vault/aws/secret_backend_role.py +3 -0
- pulumi_vault/aws/secret_backend_static_role.py +3 -0
- pulumi_vault/azure/auth_backend_config.py +3 -0
- pulumi_vault/azure/auth_backend_role.py +3 -0
- pulumi_vault/azure/backend.py +3 -0
- pulumi_vault/azure/backend_role.py +50 -0
- pulumi_vault/cert_auth_backend_role.py +3 -0
- pulumi_vault/config/ui_custom_message.py +3 -0
- pulumi_vault/consul/secret_backend.py +3 -0
- pulumi_vault/consul/secret_backend_role.py +3 -0
- pulumi_vault/database/secret_backend_connection.py +3 -0
- pulumi_vault/database/secret_backend_role.py +3 -0
- pulumi_vault/database/secret_backend_static_role.py +3 -0
- pulumi_vault/database/secrets_mount.py +3 -0
- pulumi_vault/egp_policy.py +3 -0
- pulumi_vault/gcp/auth_backend.py +3 -0
- pulumi_vault/gcp/auth_backend_role.py +3 -0
- pulumi_vault/gcp/secret_backend.py +3 -0
- pulumi_vault/gcp/secret_impersonated_account.py +3 -0
- pulumi_vault/gcp/secret_roleset.py +3 -0
- pulumi_vault/gcp/secret_static_account.py +3 -0
- pulumi_vault/generic/endpoint.py +3 -0
- pulumi_vault/generic/secret.py +3 -0
- pulumi_vault/get_namespaces.py +60 -11
- pulumi_vault/github/auth_backend.py +3 -0
- pulumi_vault/github/team.py +3 -0
- pulumi_vault/github/user.py +3 -0
- pulumi_vault/identity/entity.py +3 -0
- pulumi_vault/identity/entity_alias.py +3 -0
- pulumi_vault/identity/entity_policies.py +3 -0
- pulumi_vault/identity/group.py +3 -0
- pulumi_vault/identity/group_alias.py +3 -0
- pulumi_vault/identity/group_member_entity_ids.py +3 -0
- pulumi_vault/identity/group_member_group_ids.py +3 -0
- pulumi_vault/identity/group_policies.py +3 -0
- pulumi_vault/identity/mfa_duo.py +3 -0
- pulumi_vault/identity/mfa_login_enforcement.py +3 -0
- pulumi_vault/identity/mfa_okta.py +3 -0
- pulumi_vault/identity/mfa_pingid.py +3 -0
- pulumi_vault/identity/mfa_totp.py +3 -0
- pulumi_vault/identity/oidc.py +3 -0
- pulumi_vault/identity/oidc_assignment.py +3 -0
- pulumi_vault/identity/oidc_client.py +3 -0
- pulumi_vault/identity/oidc_key.py +3 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +3 -0
- pulumi_vault/identity/oidc_provider.py +3 -0
- pulumi_vault/identity/oidc_role.py +3 -0
- pulumi_vault/identity/oidc_scope.py +3 -0
- pulumi_vault/jwt/auth_backend.py +3 -0
- pulumi_vault/jwt/auth_backend_role.py +3 -0
- pulumi_vault/kmip/secret_backend.py +3 -0
- pulumi_vault/kmip/secret_role.py +3 -0
- pulumi_vault/kmip/secret_scope.py +3 -0
- pulumi_vault/kubernetes/auth_backend_config.py +3 -0
- pulumi_vault/kubernetes/auth_backend_role.py +3 -0
- pulumi_vault/kubernetes/secret_backend.py +3 -0
- pulumi_vault/kubernetes/secret_backend_role.py +3 -0
- pulumi_vault/kv/secret.py +3 -0
- pulumi_vault/kv/secret_backend_v2.py +3 -0
- pulumi_vault/kv/secret_v2.py +3 -0
- pulumi_vault/ldap/auth_backend.py +3 -0
- pulumi_vault/ldap/auth_backend_group.py +3 -0
- pulumi_vault/ldap/auth_backend_user.py +3 -0
- pulumi_vault/ldap/secret_backend.py +3 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +3 -0
- pulumi_vault/ldap/secret_backend_library_set.py +3 -0
- pulumi_vault/ldap/secret_backend_static_role.py +3 -0
- pulumi_vault/managed/keys.py +3 -0
- pulumi_vault/mfa_duo.py +3 -0
- pulumi_vault/mfa_okta.py +3 -0
- pulumi_vault/mfa_pingid.py +3 -0
- pulumi_vault/mfa_totp.py +3 -0
- pulumi_vault/mongodbatlas/secret_backend.py +3 -0
- pulumi_vault/mongodbatlas/secret_role.py +3 -0
- pulumi_vault/mount.py +3 -0
- pulumi_vault/namespace.py +3 -0
- pulumi_vault/nomad_secret_backend.py +3 -0
- pulumi_vault/nomad_secret_role.py +3 -0
- pulumi_vault/okta/auth_backend.py +3 -0
- pulumi_vault/okta/auth_backend_group.py +3 -0
- pulumi_vault/okta/auth_backend_user.py +3 -0
- pulumi_vault/outputs.py +21 -9
- pulumi_vault/password_policy.py +3 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +3 -0
- pulumi_vault/pkisecret/backend_config_acme.py +3 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +3 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +3 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +3 -0
- pulumi_vault/pkisecret/backend_config_est.py +3 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +3 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +3 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +3 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +3 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +3 -0
- pulumi_vault/pkisecret/secret_backend_key.py +3 -0
- pulumi_vault/pkisecret/secret_backend_role.py +3 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +3 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +3 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +3 -0
- pulumi_vault/plugin.py +3 -0
- pulumi_vault/plugin_pinned_version.py +3 -0
- pulumi_vault/policy.py +3 -0
- pulumi_vault/provider.py +3 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +3 -0
- pulumi_vault/quota_rate_limit.py +3 -0
- pulumi_vault/rabbitmq/secret_backend.py +3 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +3 -0
- pulumi_vault/raft_autopilot.py +3 -0
- pulumi_vault/raft_snapshot_agent_config.py +3 -0
- pulumi_vault/rgp_policy.py +3 -0
- pulumi_vault/saml/auth_backend.py +3 -0
- pulumi_vault/saml/auth_backend_role.py +3 -0
- pulumi_vault/secrets/sync_association.py +3 -0
- pulumi_vault/secrets/sync_aws_destination.py +3 -0
- pulumi_vault/secrets/sync_azure_destination.py +3 -0
- pulumi_vault/secrets/sync_config.py +3 -0
- pulumi_vault/secrets/sync_gcp_destination.py +3 -0
- pulumi_vault/secrets/sync_gh_destination.py +3 -0
- pulumi_vault/secrets/sync_github_apps.py +3 -0
- pulumi_vault/secrets/sync_vercel_destination.py +3 -0
- pulumi_vault/ssh/secret_backend_ca.py +3 -0
- pulumi_vault/ssh/secret_backend_role.py +3 -0
- pulumi_vault/terraformcloud/secret_backend.py +3 -0
- pulumi_vault/terraformcloud/secret_creds.py +3 -0
- pulumi_vault/terraformcloud/secret_role.py +3 -0
- pulumi_vault/token.py +3 -0
- pulumi_vault/tokenauth/auth_backend_role.py +3 -0
- pulumi_vault/transform/alphabet.py +3 -0
- pulumi_vault/transform/role.py +3 -0
- pulumi_vault/transform/template.py +3 -0
- pulumi_vault/transform/transformation.py +3 -0
- pulumi_vault/transit/secret_backend_key.py +3 -0
- pulumi_vault/transit/secret_cache_config.py +3 -0
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.1a1746220688.dist-info/RECORD +265 -0
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/WHEEL +1 -1
- pulumi_vault-6.7.0a1745304689.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/top_level.txt +0 -0
pulumi_vault/egp_policy.py
CHANGED
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -243,6 +243,9 @@ class _SecretImpersonatedAccountState:
|
|
243
243
|
|
244
244
|
|
245
245
|
class SecretImpersonatedAccount(pulumi.CustomResource):
|
246
|
+
|
247
|
+
pulumi_type = "vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount"
|
248
|
+
|
246
249
|
@overload
|
247
250
|
def __init__(__self__,
|
248
251
|
resource_name: str,
|
pulumi_vault/generic/endpoint.py
CHANGED
pulumi_vault/generic/secret.py
CHANGED
pulumi_vault/get_namespaces.py
CHANGED
@@ -27,7 +27,7 @@ class GetNamespacesResult:
|
|
27
27
|
"""
|
28
28
|
A collection of values returned by getNamespaces.
|
29
29
|
"""
|
30
|
-
def __init__(__self__, id=None, namespace=None, paths=None):
|
30
|
+
def __init__(__self__, id=None, namespace=None, paths=None, paths_fqs=None, recursive=None):
|
31
31
|
if id and not isinstance(id, str):
|
32
32
|
raise TypeError("Expected argument 'id' to be a str")
|
33
33
|
pulumi.set(__self__, "id", id)
|
@@ -37,6 +37,12 @@ class GetNamespacesResult:
|
|
37
37
|
if paths and not isinstance(paths, list):
|
38
38
|
raise TypeError("Expected argument 'paths' to be a list")
|
39
39
|
pulumi.set(__self__, "paths", paths)
|
40
|
+
if paths_fqs and not isinstance(paths_fqs, list):
|
41
|
+
raise TypeError("Expected argument 'paths_fqs' to be a list")
|
42
|
+
pulumi.set(__self__, "paths_fqs", paths_fqs)
|
43
|
+
if recursive and not isinstance(recursive, bool):
|
44
|
+
raise TypeError("Expected argument 'recursive' to be a bool")
|
45
|
+
pulumi.set(__self__, "recursive", recursive)
|
40
46
|
|
41
47
|
@property
|
42
48
|
@pulumi.getter
|
@@ -55,10 +61,23 @@ class GetNamespacesResult:
|
|
55
61
|
@pulumi.getter
|
56
62
|
def paths(self) -> Sequence[builtins.str]:
|
57
63
|
"""
|
58
|
-
Set of the paths of
|
64
|
+
Set of the paths of child namespaces.
|
59
65
|
"""
|
60
66
|
return pulumi.get(self, "paths")
|
61
67
|
|
68
|
+
@property
|
69
|
+
@pulumi.getter(name="pathsFqs")
|
70
|
+
def paths_fqs(self) -> Sequence[builtins.str]:
|
71
|
+
"""
|
72
|
+
Set of the fully qualified paths of child namespaces.
|
73
|
+
"""
|
74
|
+
return pulumi.get(self, "paths_fqs")
|
75
|
+
|
76
|
+
@property
|
77
|
+
@pulumi.getter
|
78
|
+
def recursive(self) -> Optional[builtins.bool]:
|
79
|
+
return pulumi.get(self, "recursive")
|
80
|
+
|
62
81
|
|
63
82
|
class AwaitableGetNamespacesResult(GetNamespacesResult):
|
64
83
|
# pylint: disable=using-constant-test
|
@@ -68,15 +87,18 @@ class AwaitableGetNamespacesResult(GetNamespacesResult):
|
|
68
87
|
return GetNamespacesResult(
|
69
88
|
id=self.id,
|
70
89
|
namespace=self.namespace,
|
71
|
-
paths=self.paths
|
90
|
+
paths=self.paths,
|
91
|
+
paths_fqs=self.paths_fqs,
|
92
|
+
recursive=self.recursive)
|
72
93
|
|
73
94
|
|
74
95
|
def get_namespaces(namespace: Optional[builtins.str] = None,
|
96
|
+
recursive: Optional[builtins.bool] = None,
|
75
97
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNamespacesResult:
|
76
98
|
"""
|
77
99
|
## Example Usage
|
78
100
|
|
79
|
-
###
|
101
|
+
### Direct child namespaces
|
80
102
|
|
81
103
|
```python
|
82
104
|
import pulumi
|
@@ -85,9 +107,18 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
|
|
85
107
|
children = vault.get_namespaces()
|
86
108
|
```
|
87
109
|
|
88
|
-
###
|
110
|
+
### All child namespaces
|
89
111
|
|
90
|
-
|
112
|
+
```python
|
113
|
+
import pulumi
|
114
|
+
import pulumi_vault as vault
|
115
|
+
|
116
|
+
children = vault.get_namespaces(recursive=True)
|
117
|
+
```
|
118
|
+
|
119
|
+
### Child namespace details
|
120
|
+
|
121
|
+
To fetch the details of child namespaces:
|
91
122
|
|
92
123
|
```python
|
93
124
|
import pulumi
|
@@ -102,22 +133,27 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
|
|
102
133
|
:param builtins.str namespace: The namespace to provision the resource in.
|
103
134
|
The value should not contain leading or trailing forward slashes.
|
104
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
136
|
+
:param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
|
105
137
|
"""
|
106
138
|
__args__ = dict()
|
107
139
|
__args__['namespace'] = namespace
|
140
|
+
__args__['recursive'] = recursive
|
108
141
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
109
142
|
__ret__ = pulumi.runtime.invoke('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult).value
|
110
143
|
|
111
144
|
return AwaitableGetNamespacesResult(
|
112
145
|
id=pulumi.get(__ret__, 'id'),
|
113
146
|
namespace=pulumi.get(__ret__, 'namespace'),
|
114
|
-
paths=pulumi.get(__ret__, 'paths')
|
147
|
+
paths=pulumi.get(__ret__, 'paths'),
|
148
|
+
paths_fqs=pulumi.get(__ret__, 'paths_fqs'),
|
149
|
+
recursive=pulumi.get(__ret__, 'recursive'))
|
115
150
|
def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
151
|
+
recursive: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
116
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNamespacesResult]:
|
117
153
|
"""
|
118
154
|
## Example Usage
|
119
155
|
|
120
|
-
###
|
156
|
+
### Direct child namespaces
|
121
157
|
|
122
158
|
```python
|
123
159
|
import pulumi
|
@@ -126,9 +162,18 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
|
|
126
162
|
children = vault.get_namespaces()
|
127
163
|
```
|
128
164
|
|
129
|
-
###
|
165
|
+
### All child namespaces
|
166
|
+
|
167
|
+
```python
|
168
|
+
import pulumi
|
169
|
+
import pulumi_vault as vault
|
170
|
+
|
171
|
+
children = vault.get_namespaces(recursive=True)
|
172
|
+
```
|
173
|
+
|
174
|
+
### Child namespace details
|
130
175
|
|
131
|
-
To fetch the details of
|
176
|
+
To fetch the details of child namespaces:
|
132
177
|
|
133
178
|
```python
|
134
179
|
import pulumi
|
@@ -143,12 +188,16 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
|
|
143
188
|
:param builtins.str namespace: The namespace to provision the resource in.
|
144
189
|
The value should not contain leading or trailing forward slashes.
|
145
190
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
191
|
+
:param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
|
146
192
|
"""
|
147
193
|
__args__ = dict()
|
148
194
|
__args__['namespace'] = namespace
|
195
|
+
__args__['recursive'] = recursive
|
149
196
|
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
150
197
|
__ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
|
151
198
|
return __ret__.apply(lambda __response__: GetNamespacesResult(
|
152
199
|
id=pulumi.get(__response__, 'id'),
|
153
200
|
namespace=pulumi.get(__response__, 'namespace'),
|
154
|
-
paths=pulumi.get(__response__, 'paths')
|
201
|
+
paths=pulumi.get(__response__, 'paths'),
|
202
|
+
paths_fqs=pulumi.get(__response__, 'paths_fqs'),
|
203
|
+
recursive=pulumi.get(__response__, 'recursive')))
|
pulumi_vault/github/team.py
CHANGED
pulumi_vault/github/user.py
CHANGED
pulumi_vault/identity/entity.py
CHANGED
pulumi_vault/identity/group.py
CHANGED
pulumi_vault/identity/mfa_duo.py
CHANGED
pulumi_vault/identity/oidc.py
CHANGED
@@ -140,6 +140,9 @@ class _OidcKeyAllowedClientIDState:
|
|
140
140
|
|
141
141
|
|
142
142
|
class OidcKeyAllowedClientID(pulumi.CustomResource):
|
143
|
+
|
144
|
+
pulumi_type = "vault:identity/oidcKeyAllowedClientID:OidcKeyAllowedClientID"
|
145
|
+
|
143
146
|
@overload
|
144
147
|
def __init__(__self__,
|
145
148
|
resource_name: str,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
pulumi_vault/kmip/secret_role.py
CHANGED
pulumi_vault/kv/secret.py
CHANGED