pulumi-vault 6.7.0a1745304689__py3-none-any.whl → 6.7.1a1746220688__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +33 -13
- pulumi_vault/ad/secret_backend.py +3 -0
- pulumi_vault/ad/secret_library.py +3 -0
- pulumi_vault/ad/secret_role.py +3 -0
- pulumi_vault/alicloud/auth_backend_role.py +3 -0
- pulumi_vault/approle/auth_backend_login.py +3 -0
- pulumi_vault/approle/auth_backend_role.py +3 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +3 -0
- pulumi_vault/audit.py +3 -0
- pulumi_vault/audit_request_header.py +3 -0
- pulumi_vault/auth_backend.py +3 -0
- pulumi_vault/aws/auth_backend_cert.py +3 -0
- pulumi_vault/aws/auth_backend_client.py +3 -0
- pulumi_vault/aws/auth_backend_config_identity.py +3 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +3 -0
- pulumi_vault/aws/auth_backend_login.py +3 -0
- pulumi_vault/aws/auth_backend_role.py +3 -0
- pulumi_vault/aws/auth_backend_role_tag.py +3 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +3 -0
- pulumi_vault/aws/auth_backend_sts_role.py +3 -0
- pulumi_vault/aws/secret_backend.py +3 -0
- pulumi_vault/aws/secret_backend_role.py +3 -0
- pulumi_vault/aws/secret_backend_static_role.py +3 -0
- pulumi_vault/azure/auth_backend_config.py +3 -0
- pulumi_vault/azure/auth_backend_role.py +3 -0
- pulumi_vault/azure/backend.py +3 -0
- pulumi_vault/azure/backend_role.py +50 -0
- pulumi_vault/cert_auth_backend_role.py +3 -0
- pulumi_vault/config/ui_custom_message.py +3 -0
- pulumi_vault/consul/secret_backend.py +3 -0
- pulumi_vault/consul/secret_backend_role.py +3 -0
- pulumi_vault/database/secret_backend_connection.py +3 -0
- pulumi_vault/database/secret_backend_role.py +3 -0
- pulumi_vault/database/secret_backend_static_role.py +3 -0
- pulumi_vault/database/secrets_mount.py +3 -0
- pulumi_vault/egp_policy.py +3 -0
- pulumi_vault/gcp/auth_backend.py +3 -0
- pulumi_vault/gcp/auth_backend_role.py +3 -0
- pulumi_vault/gcp/secret_backend.py +3 -0
- pulumi_vault/gcp/secret_impersonated_account.py +3 -0
- pulumi_vault/gcp/secret_roleset.py +3 -0
- pulumi_vault/gcp/secret_static_account.py +3 -0
- pulumi_vault/generic/endpoint.py +3 -0
- pulumi_vault/generic/secret.py +3 -0
- pulumi_vault/get_namespaces.py +60 -11
- pulumi_vault/github/auth_backend.py +3 -0
- pulumi_vault/github/team.py +3 -0
- pulumi_vault/github/user.py +3 -0
- pulumi_vault/identity/entity.py +3 -0
- pulumi_vault/identity/entity_alias.py +3 -0
- pulumi_vault/identity/entity_policies.py +3 -0
- pulumi_vault/identity/group.py +3 -0
- pulumi_vault/identity/group_alias.py +3 -0
- pulumi_vault/identity/group_member_entity_ids.py +3 -0
- pulumi_vault/identity/group_member_group_ids.py +3 -0
- pulumi_vault/identity/group_policies.py +3 -0
- pulumi_vault/identity/mfa_duo.py +3 -0
- pulumi_vault/identity/mfa_login_enforcement.py +3 -0
- pulumi_vault/identity/mfa_okta.py +3 -0
- pulumi_vault/identity/mfa_pingid.py +3 -0
- pulumi_vault/identity/mfa_totp.py +3 -0
- pulumi_vault/identity/oidc.py +3 -0
- pulumi_vault/identity/oidc_assignment.py +3 -0
- pulumi_vault/identity/oidc_client.py +3 -0
- pulumi_vault/identity/oidc_key.py +3 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +3 -0
- pulumi_vault/identity/oidc_provider.py +3 -0
- pulumi_vault/identity/oidc_role.py +3 -0
- pulumi_vault/identity/oidc_scope.py +3 -0
- pulumi_vault/jwt/auth_backend.py +3 -0
- pulumi_vault/jwt/auth_backend_role.py +3 -0
- pulumi_vault/kmip/secret_backend.py +3 -0
- pulumi_vault/kmip/secret_role.py +3 -0
- pulumi_vault/kmip/secret_scope.py +3 -0
- pulumi_vault/kubernetes/auth_backend_config.py +3 -0
- pulumi_vault/kubernetes/auth_backend_role.py +3 -0
- pulumi_vault/kubernetes/secret_backend.py +3 -0
- pulumi_vault/kubernetes/secret_backend_role.py +3 -0
- pulumi_vault/kv/secret.py +3 -0
- pulumi_vault/kv/secret_backend_v2.py +3 -0
- pulumi_vault/kv/secret_v2.py +3 -0
- pulumi_vault/ldap/auth_backend.py +3 -0
- pulumi_vault/ldap/auth_backend_group.py +3 -0
- pulumi_vault/ldap/auth_backend_user.py +3 -0
- pulumi_vault/ldap/secret_backend.py +3 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +3 -0
- pulumi_vault/ldap/secret_backend_library_set.py +3 -0
- pulumi_vault/ldap/secret_backend_static_role.py +3 -0
- pulumi_vault/managed/keys.py +3 -0
- pulumi_vault/mfa_duo.py +3 -0
- pulumi_vault/mfa_okta.py +3 -0
- pulumi_vault/mfa_pingid.py +3 -0
- pulumi_vault/mfa_totp.py +3 -0
- pulumi_vault/mongodbatlas/secret_backend.py +3 -0
- pulumi_vault/mongodbatlas/secret_role.py +3 -0
- pulumi_vault/mount.py +3 -0
- pulumi_vault/namespace.py +3 -0
- pulumi_vault/nomad_secret_backend.py +3 -0
- pulumi_vault/nomad_secret_role.py +3 -0
- pulumi_vault/okta/auth_backend.py +3 -0
- pulumi_vault/okta/auth_backend_group.py +3 -0
- pulumi_vault/okta/auth_backend_user.py +3 -0
- pulumi_vault/outputs.py +21 -9
- pulumi_vault/password_policy.py +3 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +3 -0
- pulumi_vault/pkisecret/backend_config_acme.py +3 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +3 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +3 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +3 -0
- pulumi_vault/pkisecret/backend_config_est.py +3 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +3 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +3 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +3 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +3 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +3 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +3 -0
- pulumi_vault/pkisecret/secret_backend_key.py +3 -0
- pulumi_vault/pkisecret/secret_backend_role.py +3 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +3 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +3 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +3 -0
- pulumi_vault/plugin.py +3 -0
- pulumi_vault/plugin_pinned_version.py +3 -0
- pulumi_vault/policy.py +3 -0
- pulumi_vault/provider.py +3 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +3 -0
- pulumi_vault/quota_rate_limit.py +3 -0
- pulumi_vault/rabbitmq/secret_backend.py +3 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +3 -0
- pulumi_vault/raft_autopilot.py +3 -0
- pulumi_vault/raft_snapshot_agent_config.py +3 -0
- pulumi_vault/rgp_policy.py +3 -0
- pulumi_vault/saml/auth_backend.py +3 -0
- pulumi_vault/saml/auth_backend_role.py +3 -0
- pulumi_vault/secrets/sync_association.py +3 -0
- pulumi_vault/secrets/sync_aws_destination.py +3 -0
- pulumi_vault/secrets/sync_azure_destination.py +3 -0
- pulumi_vault/secrets/sync_config.py +3 -0
- pulumi_vault/secrets/sync_gcp_destination.py +3 -0
- pulumi_vault/secrets/sync_gh_destination.py +3 -0
- pulumi_vault/secrets/sync_github_apps.py +3 -0
- pulumi_vault/secrets/sync_vercel_destination.py +3 -0
- pulumi_vault/ssh/secret_backend_ca.py +3 -0
- pulumi_vault/ssh/secret_backend_role.py +3 -0
- pulumi_vault/terraformcloud/secret_backend.py +3 -0
- pulumi_vault/terraformcloud/secret_creds.py +3 -0
- pulumi_vault/terraformcloud/secret_role.py +3 -0
- pulumi_vault/token.py +3 -0
- pulumi_vault/tokenauth/auth_backend_role.py +3 -0
- pulumi_vault/transform/alphabet.py +3 -0
- pulumi_vault/transform/role.py +3 -0
- pulumi_vault/transform/template.py +3 -0
- pulumi_vault/transform/transformation.py +3 -0
- pulumi_vault/transit/secret_backend_key.py +3 -0
- pulumi_vault/transit/secret_cache_config.py +3 -0
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.1a1746220688.dist-info/RECORD +265 -0
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/WHEEL +1 -1
- pulumi_vault-6.7.0a1745304689.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1a1746220688.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -411,6 +411,9 @@ class _SecretBackendDynamicRoleState:
|
|
411
411
|
|
412
412
|
|
413
413
|
class SecretBackendDynamicRole(pulumi.CustomResource):
|
414
|
+
|
415
|
+
pulumi_type = "vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole"
|
416
|
+
|
414
417
|
@overload
|
415
418
|
def __init__(__self__,
|
416
419
|
resource_name: str,
|
@@ -289,6 +289,9 @@ class _SecretBackendLibrarySetState:
|
|
289
289
|
|
290
290
|
|
291
291
|
class SecretBackendLibrarySet(pulumi.CustomResource):
|
292
|
+
|
293
|
+
pulumi_type = "vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet"
|
294
|
+
|
292
295
|
@overload
|
293
296
|
def __init__(__self__,
|
294
297
|
resource_name: str,
|
@@ -283,6 +283,9 @@ class _SecretBackendStaticRoleState:
|
|
283
283
|
|
284
284
|
|
285
285
|
class SecretBackendStaticRole(pulumi.CustomResource):
|
286
|
+
|
287
|
+
pulumi_type = "vault:ldap/secretBackendStaticRole:SecretBackendStaticRole"
|
288
|
+
|
286
289
|
@overload
|
287
290
|
def __init__(__self__,
|
288
291
|
resource_name: str,
|
pulumi_vault/managed/keys.py
CHANGED
pulumi_vault/mfa_duo.py
CHANGED
pulumi_vault/mfa_okta.py
CHANGED
pulumi_vault/mfa_pingid.py
CHANGED
pulumi_vault/mfa_totp.py
CHANGED
pulumi_vault/mount.py
CHANGED
pulumi_vault/namespace.py
CHANGED
pulumi_vault/outputs.py
CHANGED
@@ -187,7 +187,8 @@ class GetPolicyDocumentRuleResult(dict):
|
|
187
187
|
description: Optional[builtins.str] = None,
|
188
188
|
max_wrapping_ttl: Optional[builtins.str] = None,
|
189
189
|
min_wrapping_ttl: Optional[builtins.str] = None,
|
190
|
-
required_parameters: Optional[Sequence[builtins.str]] = None
|
190
|
+
required_parameters: Optional[Sequence[builtins.str]] = None,
|
191
|
+
subscribe_event_types: Optional[Sequence[builtins.str]] = None):
|
191
192
|
"""
|
192
193
|
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
193
194
|
:param builtins.str path: A path in Vault that this rule applies to.
|
@@ -197,6 +198,7 @@ class GetPolicyDocumentRuleResult(dict):
|
|
197
198
|
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
198
199
|
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
199
200
|
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
201
|
+
:param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
200
202
|
"""
|
201
203
|
pulumi.set(__self__, "capabilities", capabilities)
|
202
204
|
pulumi.set(__self__, "path", path)
|
@@ -212,6 +214,8 @@ class GetPolicyDocumentRuleResult(dict):
|
|
212
214
|
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
213
215
|
if required_parameters is not None:
|
214
216
|
pulumi.set(__self__, "required_parameters", required_parameters)
|
217
|
+
if subscribe_event_types is not None:
|
218
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
215
219
|
|
216
220
|
@property
|
217
221
|
@pulumi.getter
|
@@ -277,6 +281,14 @@ class GetPolicyDocumentRuleResult(dict):
|
|
277
281
|
"""
|
278
282
|
return pulumi.get(self, "required_parameters")
|
279
283
|
|
284
|
+
@property
|
285
|
+
@pulumi.getter(name="subscribeEventTypes")
|
286
|
+
def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
|
287
|
+
"""
|
288
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
289
|
+
"""
|
290
|
+
return pulumi.get(self, "subscribe_event_types")
|
291
|
+
|
280
292
|
|
281
293
|
@pulumi.output_type
|
282
294
|
class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
@@ -284,8 +296,8 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
284
296
|
key: builtins.str,
|
285
297
|
values: Sequence[builtins.str]):
|
286
298
|
"""
|
287
|
-
:param builtins.str key:
|
288
|
-
:param Sequence[builtins.str] values: list of values what are permitted
|
299
|
+
:param builtins.str key: Name of permitted key.
|
300
|
+
:param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
|
289
301
|
"""
|
290
302
|
pulumi.set(__self__, "key", key)
|
291
303
|
pulumi.set(__self__, "values", values)
|
@@ -294,7 +306,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
294
306
|
@pulumi.getter
|
295
307
|
def key(self) -> builtins.str:
|
296
308
|
"""
|
297
|
-
|
309
|
+
Name of permitted key.
|
298
310
|
"""
|
299
311
|
return pulumi.get(self, "key")
|
300
312
|
|
@@ -302,7 +314,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
302
314
|
@pulumi.getter
|
303
315
|
def values(self) -> Sequence[builtins.str]:
|
304
316
|
"""
|
305
|
-
list of values what are permitted
|
317
|
+
A list of values what are permitted by policy rule.
|
306
318
|
"""
|
307
319
|
return pulumi.get(self, "values")
|
308
320
|
|
@@ -313,8 +325,8 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
313
325
|
key: builtins.str,
|
314
326
|
values: Sequence[builtins.str]):
|
315
327
|
"""
|
316
|
-
:param builtins.str key:
|
317
|
-
:param Sequence[builtins.str] values: list of values what are
|
328
|
+
:param builtins.str key: Name of denied key.
|
329
|
+
:param Sequence[builtins.str] values: A list of values what are denied by policy rule.
|
318
330
|
"""
|
319
331
|
pulumi.set(__self__, "key", key)
|
320
332
|
pulumi.set(__self__, "values", values)
|
@@ -323,7 +335,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
323
335
|
@pulumi.getter
|
324
336
|
def key(self) -> builtins.str:
|
325
337
|
"""
|
326
|
-
|
338
|
+
Name of denied key.
|
327
339
|
"""
|
328
340
|
return pulumi.get(self, "key")
|
329
341
|
|
@@ -331,7 +343,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
331
343
|
@pulumi.getter
|
332
344
|
def values(self) -> Sequence[builtins.str]:
|
333
345
|
"""
|
334
|
-
list of values what are
|
346
|
+
A list of values what are denied by policy rule.
|
335
347
|
"""
|
336
348
|
return pulumi.get(self, "values")
|
337
349
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -856,6 +856,9 @@ class _BackendConfigAutoTidyState:
|
|
856
856
|
|
857
857
|
|
858
858
|
class BackendConfigAutoTidy(pulumi.CustomResource):
|
859
|
+
|
860
|
+
pulumi_type = "vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy"
|
861
|
+
|
859
862
|
@overload
|
860
863
|
def __init__(__self__,
|
861
864
|
resource_name: str,
|
@@ -140,6 +140,9 @@ class _SecretBackendConfigCaState:
|
|
140
140
|
|
141
141
|
|
142
142
|
class SecretBackendConfigCa(pulumi.CustomResource):
|
143
|
+
|
144
|
+
pulumi_type = "vault:pkiSecret/secretBackendConfigCa:SecretBackendConfigCa"
|
145
|
+
|
143
146
|
@overload
|
144
147
|
def __init__(__self__,
|
145
148
|
resource_name: str,
|
@@ -181,6 +181,9 @@ class _SecretBackendConfigIssuersState:
|
|
181
181
|
|
182
182
|
|
183
183
|
class SecretBackendConfigIssuers(pulumi.CustomResource):
|
184
|
+
|
185
|
+
pulumi_type = "vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers"
|
186
|
+
|
184
187
|
@overload
|
185
188
|
def __init__(__self__,
|
186
189
|
resource_name: str,
|
@@ -237,6 +237,9 @@ class _SecretBackendConfigUrlsState:
|
|
237
237
|
|
238
238
|
|
239
239
|
class SecretBackendConfigUrls(pulumi.CustomResource):
|
240
|
+
|
241
|
+
pulumi_type = "vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls"
|
242
|
+
|
240
243
|
@overload
|
241
244
|
def __init__(__self__,
|
242
245
|
resource_name: str,
|
@@ -509,6 +509,9 @@ class _SecretBackendCrlConfigState:
|
|
509
509
|
|
510
510
|
|
511
511
|
class SecretBackendCrlConfig(pulumi.CustomResource):
|
512
|
+
|
513
|
+
pulumi_type = "vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig"
|
514
|
+
|
512
515
|
@overload
|
513
516
|
def __init__(__self__,
|
514
517
|
resource_name: str,
|
@@ -1031,6 +1031,9 @@ class _SecretBackendIntermediateCertRequestState:
|
|
1031
1031
|
|
1032
1032
|
|
1033
1033
|
class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
1034
|
+
|
1035
|
+
pulumi_type = "vault:pkiSecret/secretBackendIntermediateCertRequest:SecretBackendIntermediateCertRequest"
|
1036
|
+
|
1034
1037
|
@overload
|
1035
1038
|
def __init__(__self__,
|
1036
1039
|
resource_name: str,
|
@@ -182,6 +182,9 @@ class _SecretBackendIntermediateSetSignedState:
|
|
182
182
|
|
183
183
|
|
184
184
|
class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
185
|
+
|
186
|
+
pulumi_type = "vault:pkiSecret/secretBackendIntermediateSetSigned:SecretBackendIntermediateSetSigned"
|
187
|
+
|
185
188
|
@overload
|
186
189
|
def __init__(__self__,
|
187
190
|
resource_name: str,
|
@@ -1743,6 +1743,9 @@ class _SecretBackendRoleState:
|
|
1743
1743
|
|
1744
1744
|
|
1745
1745
|
class SecretBackendRole(pulumi.CustomResource):
|
1746
|
+
|
1747
|
+
pulumi_type = "vault:pkiSecret/secretBackendRole:SecretBackendRole"
|
1748
|
+
|
1746
1749
|
@overload
|
1747
1750
|
def __init__(__self__,
|
1748
1751
|
resource_name: str,
|
@@ -1331,6 +1331,9 @@ class _SecretBackendRootCertState:
|
|
1331
1331
|
|
1332
1332
|
|
1333
1333
|
class SecretBackendRootCert(pulumi.CustomResource):
|
1334
|
+
|
1335
|
+
pulumi_type = "vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert"
|
1336
|
+
|
1334
1337
|
@overload
|
1335
1338
|
def __init__(__self__,
|
1336
1339
|
resource_name: str,
|
@@ -1265,6 +1265,9 @@ class _SecretBackendRootSignIntermediateState:
|
|
1265
1265
|
|
1266
1266
|
|
1267
1267
|
class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
1268
|
+
|
1269
|
+
pulumi_type = "vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate"
|
1270
|
+
|
1268
1271
|
@overload
|
1269
1272
|
def __init__(__self__,
|
1270
1273
|
resource_name: str,
|
pulumi_vault/plugin.py
CHANGED
pulumi_vault/policy.py
CHANGED
pulumi_vault/provider.py
CHANGED
pulumi_vault/pulumi-plugin.json
CHANGED
pulumi_vault/quota_rate_limit.py
CHANGED