pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/get_access_credentials.py +4 -2
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +6 -2
- pulumi_vault/ad/secret_role.py +6 -2
- pulumi_vault/alicloud/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +14 -2
- pulumi_vault/audit_request_header.py +4 -0
- pulumi_vault/auth_backend.py +2 -2
- pulumi_vault/aws/auth_backend_cert.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -2
- pulumi_vault/aws/auth_backend_config_identity.py +6 -2
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
- pulumi_vault/aws/auth_backend_role.py +6 -2
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
- pulumi_vault/aws/auth_backend_sts_role.py +6 -2
- pulumi_vault/aws/get_access_credentials.py +4 -2
- pulumi_vault/aws/secret_backend.py +2 -2
- pulumi_vault/aws/secret_backend_role.py +6 -2
- pulumi_vault/aws/secret_backend_static_role.py +10 -4
- pulumi_vault/azure/auth_backend_config.py +6 -2
- pulumi_vault/azure/auth_backend_role.py +6 -2
- pulumi_vault/azure/backend.py +12 -0
- pulumi_vault/azure/backend_role.py +4 -0
- pulumi_vault/azure/get_access_credentials.py +6 -0
- pulumi_vault/cert_auth_backend_role.py +4 -0
- pulumi_vault/consul/secret_backend.py +14 -2
- pulumi_vault/consul/secret_backend_role.py +8 -2
- pulumi_vault/database/secret_backend_connection.py +6 -2
- pulumi_vault/database/secret_backend_role.py +6 -2
- pulumi_vault/database/secret_backend_static_role.py +6 -2
- pulumi_vault/database/secrets_mount.py +6 -2
- pulumi_vault/egp_policy.py +4 -0
- pulumi_vault/gcp/auth_backend.py +6 -2
- pulumi_vault/gcp/auth_backend_role.py +6 -2
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +4 -0
- pulumi_vault/gcp/secret_impersonated_account.py +6 -2
- pulumi_vault/gcp/secret_roleset.py +6 -2
- pulumi_vault/gcp/secret_static_account.py +6 -2
- pulumi_vault/generic/endpoint.py +6 -0
- pulumi_vault/generic/get_secret.py +6 -6
- pulumi_vault/generic/secret.py +2 -2
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +22 -2
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +4 -0
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +6 -2
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +6 -2
- pulumi_vault/identity/entity_alias.py +6 -2
- pulumi_vault/identity/entity_policies.py +12 -0
- pulumi_vault/identity/get_entity.py +6 -0
- pulumi_vault/identity/get_group.py +6 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -0
- pulumi_vault/identity/get_oidc_openid_config.py +4 -0
- pulumi_vault/identity/get_oidc_public_keys.py +4 -0
- pulumi_vault/identity/group.py +20 -2
- pulumi_vault/identity/group_alias.py +6 -2
- pulumi_vault/identity/group_member_entity_ids.py +12 -0
- pulumi_vault/identity/group_member_group_ids.py +12 -0
- pulumi_vault/identity/group_policies.py +12 -0
- pulumi_vault/identity/mfa_duo.py +6 -2
- pulumi_vault/identity/mfa_login_enforcement.py +6 -2
- pulumi_vault/identity/mfa_okta.py +6 -2
- pulumi_vault/identity/mfa_pingid.py +6 -2
- pulumi_vault/identity/mfa_totp.py +6 -2
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -2
- pulumi_vault/identity/oidc_client.py +6 -2
- pulumi_vault/identity/oidc_key.py +6 -2
- pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
- pulumi_vault/identity/oidc_provider.py +6 -2
- pulumi_vault/identity/oidc_role.py +10 -2
- pulumi_vault/identity/oidc_scope.py +6 -2
- pulumi_vault/jwt/auth_backend.py +18 -6
- pulumi_vault/jwt/auth_backend_role.py +10 -2
- pulumi_vault/kmip/secret_backend.py +6 -2
- pulumi_vault/kmip/secret_role.py +6 -2
- pulumi_vault/kmip/secret_scope.py +6 -2
- pulumi_vault/kubernetes/auth_backend_config.py +6 -2
- pulumi_vault/kubernetes/auth_backend_role.py +6 -2
- pulumi_vault/kubernetes/get_service_account_token.py +4 -0
- pulumi_vault/kubernetes/secret_backend.py +6 -2
- pulumi_vault/kubernetes/secret_backend_role.py +14 -2
- pulumi_vault/kv/get_secret.py +6 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
- pulumi_vault/kv/get_secret_v2.py +2 -6
- pulumi_vault/kv/get_secrets_list.py +6 -0
- pulumi_vault/kv/get_secrets_list_v2.py +6 -0
- pulumi_vault/kv/secret.py +8 -2
- pulumi_vault/kv/secret_backend_v2.py +12 -4
- pulumi_vault/kv/secret_v2.py +8 -2
- pulumi_vault/ldap/auth_backend.py +6 -2
- pulumi_vault/ldap/auth_backend_group.py +6 -2
- pulumi_vault/ldap/auth_backend_user.py +6 -2
- pulumi_vault/ldap/secret_backend.py +6 -2
- pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
- pulumi_vault/ldap/secret_backend_library_set.py +6 -2
- pulumi_vault/ldap/secret_backend_static_role.py +10 -4
- pulumi_vault/managed/keys.py +2 -14
- pulumi_vault/mfa_duo.py +6 -2
- pulumi_vault/mfa_okta.py +6 -2
- pulumi_vault/mfa_pingid.py +6 -2
- pulumi_vault/mfa_totp.py +6 -2
- pulumi_vault/mongodbatlas/secret_backend.py +6 -2
- pulumi_vault/mongodbatlas/secret_role.py +10 -4
- pulumi_vault/mount.py +18 -2
- pulumi_vault/namespace.py +42 -62
- pulumi_vault/nomad_secret_backend.py +6 -2
- pulumi_vault/nomad_secret_role.py +6 -2
- pulumi_vault/okta/auth_backend.py +6 -2
- pulumi_vault/okta/auth_backend_group.py +6 -2
- pulumi_vault/okta/auth_backend_user.py +6 -2
- pulumi_vault/password_policy.py +6 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +4 -0
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
- pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
- pulumi_vault/pkisecret/secret_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_role.py +6 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
- pulumi_vault/policy.py +2 -2
- pulumi_vault/quota_lease_count.py +6 -2
- pulumi_vault/quota_rate_limit.py +6 -2
- pulumi_vault/rabbitmq/secret_backend.py +6 -2
- pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
- pulumi_vault/raft_autopilot.py +6 -2
- pulumi_vault/raft_snapshot_agent_config.py +111 -16
- pulumi_vault/rgp_policy.py +4 -0
- pulumi_vault/saml/auth_backend.py +6 -2
- pulumi_vault/saml/auth_backend_role.py +6 -2
- pulumi_vault/secrets/sync_association.py +4 -0
- pulumi_vault/secrets/sync_aws_destination.py +6 -2
- pulumi_vault/secrets/sync_azure_destination.py +6 -2
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -2
- pulumi_vault/secrets/sync_vercel_destination.py +6 -2
- pulumi_vault/ssh/_inputs.py +4 -0
- pulumi_vault/ssh/outputs.py +4 -0
- pulumi_vault/ssh/secret_backend_ca.py +6 -2
- pulumi_vault/ssh/secret_backend_role.py +6 -2
- pulumi_vault/terraformcloud/secret_backend.py +6 -2
- pulumi_vault/terraformcloud/secret_creds.py +4 -0
- pulumi_vault/terraformcloud/secret_role.py +6 -2
- pulumi_vault/token.py +6 -2
- pulumi_vault/tokenauth/auth_backend_role.py +6 -2
- pulumi_vault/transform/alphabet.py +4 -0
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -0
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -0
- pulumi_vault/transit/secret_backend_key.py +8 -2
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
- pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -90,7 +90,17 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
90
90
|
type: Optional[str] = None,
|
91
91
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendsResult:
|
92
92
|
"""
|
93
|
-
|
93
|
+
## Example Usage
|
94
|
+
|
95
|
+
<!--Start PulumiCodeChooser -->
|
96
|
+
```python
|
97
|
+
import pulumi
|
98
|
+
import pulumi_vault as vault
|
99
|
+
|
100
|
+
example = vault.get_auth_backends()
|
101
|
+
```
|
102
|
+
<!--End PulumiCodeChooser -->
|
103
|
+
|
94
104
|
|
95
105
|
:param str namespace: The namespace of the target resource.
|
96
106
|
The value should not contain leading or trailing forward slashes.
|
@@ -117,7 +127,17 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
117
127
|
type: Optional[pulumi.Input[Optional[str]]] = None,
|
118
128
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
|
119
129
|
"""
|
120
|
-
|
130
|
+
## Example Usage
|
131
|
+
|
132
|
+
<!--Start PulumiCodeChooser -->
|
133
|
+
```python
|
134
|
+
import pulumi
|
135
|
+
import pulumi_vault as vault
|
136
|
+
|
137
|
+
example = vault.get_auth_backends()
|
138
|
+
```
|
139
|
+
<!--End PulumiCodeChooser -->
|
140
|
+
|
121
141
|
|
122
142
|
:param str namespace: The namespace of the target resource.
|
123
143
|
The value should not contain leading or trailing forward slashes.
|
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
103
103
|
"""
|
104
104
|
## Example Usage
|
105
105
|
|
106
|
+
<!--Start PulumiCodeChooser -->
|
106
107
|
```python
|
107
108
|
import pulumi
|
108
109
|
import pulumi_vault as vault
|
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
122
123
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
123
124
|
role=role))
|
124
125
|
```
|
126
|
+
<!--End PulumiCodeChooser -->
|
125
127
|
|
126
128
|
|
127
129
|
:param str backend: The path to the Nomad secret backend to
|
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
157
159
|
"""
|
158
160
|
## Example Usage
|
159
161
|
|
162
|
+
<!--Start PulumiCodeChooser -->
|
160
163
|
```python
|
161
164
|
import pulumi
|
162
165
|
import pulumi_vault as vault
|
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
176
179
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
177
180
|
role=role))
|
178
181
|
```
|
182
|
+
<!--End PulumiCodeChooser -->
|
179
183
|
|
180
184
|
|
181
185
|
:param str backend: The path to the Nomad secret backend to
|
@@ -84,6 +84,7 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
84
84
|
|
85
85
|
## Example Usage
|
86
86
|
|
87
|
+
<!--Start PulumiCodeChooser -->
|
87
88
|
```python
|
88
89
|
import pulumi
|
89
90
|
import pulumi_vault as vault
|
@@ -101,6 +102,7 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
101
102
|
)])
|
102
103
|
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
103
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
104
106
|
"""
|
105
107
|
__args__ = dict()
|
106
108
|
__args__['namespace'] = namespace
|
@@ -124,6 +126,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
124
126
|
|
125
127
|
## Example Usage
|
126
128
|
|
129
|
+
<!--Start PulumiCodeChooser -->
|
127
130
|
```python
|
128
131
|
import pulumi
|
129
132
|
import pulumi_vault as vault
|
@@ -141,5 +144,6 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
141
144
|
)])
|
142
145
|
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
143
146
|
```
|
147
|
+
<!--End PulumiCodeChooser -->
|
144
148
|
"""
|
145
149
|
...
|
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
190
190
|
"""
|
191
191
|
## Example Usage
|
192
192
|
|
193
|
+
<!--Start PulumiCodeChooser -->
|
193
194
|
```python
|
194
195
|
import pulumi
|
195
196
|
import pulumi_vault as vault
|
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
197
198
|
main = vault.get_raft_autopilot_state()
|
198
199
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
199
200
|
```
|
201
|
+
<!--End PulumiCodeChooser -->
|
200
202
|
|
201
203
|
|
202
204
|
:param str namespace: The namespace of the target resource.
|
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
231
233
|
"""
|
232
234
|
## Example Usage
|
233
235
|
|
236
|
+
<!--Start PulumiCodeChooser -->
|
234
237
|
```python
|
235
238
|
import pulumi
|
236
239
|
import pulumi_vault as vault
|
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
238
241
|
main = vault.get_raft_autopilot_state()
|
239
242
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
240
243
|
```
|
244
|
+
<!--End PulumiCodeChooser -->
|
241
245
|
|
242
246
|
|
243
247
|
:param str namespace: The namespace of the target resource.
|
@@ -714,19 +714,21 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
714
|
|
715
715
|
## Example Usage
|
716
716
|
|
717
|
+
<!--Start PulumiCodeChooser -->
|
717
718
|
```python
|
718
719
|
import pulumi
|
719
720
|
import pulumi_vault as vault
|
720
721
|
|
721
722
|
example = vault.github.AuthBackend("example", organization="myorg")
|
722
723
|
```
|
724
|
+
<!--End PulumiCodeChooser -->
|
723
725
|
|
724
726
|
## Import
|
725
727
|
|
726
728
|
GitHub authentication mounts can be imported using the `path`, e.g.
|
727
729
|
|
728
730
|
```sh
|
729
|
-
|
731
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
730
732
|
```
|
731
733
|
|
732
734
|
:param str resource_name: The name of the resource.
|
@@ -786,19 +788,21 @@ class AuthBackend(pulumi.CustomResource):
|
|
786
788
|
|
787
789
|
## Example Usage
|
788
790
|
|
791
|
+
<!--Start PulumiCodeChooser -->
|
789
792
|
```python
|
790
793
|
import pulumi
|
791
794
|
import pulumi_vault as vault
|
792
795
|
|
793
796
|
example = vault.github.AuthBackend("example", organization="myorg")
|
794
797
|
```
|
798
|
+
<!--End PulumiCodeChooser -->
|
795
799
|
|
796
800
|
## Import
|
797
801
|
|
798
802
|
GitHub authentication mounts can be imported using the `path`, e.g.
|
799
803
|
|
800
804
|
```sh
|
801
|
-
|
805
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
802
806
|
```
|
803
807
|
|
804
808
|
:param str resource_name: The name of the resource.
|
pulumi_vault/github/team.py
CHANGED
@@ -191,6 +191,7 @@ class Team(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
@@ -204,13 +205,14 @@ class Team(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
210
212
|
Github team mappings can be imported using the `path`, e.g.
|
211
213
|
|
212
214
|
```sh
|
213
|
-
|
215
|
+
$ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
|
214
216
|
```
|
215
217
|
|
216
218
|
:param str resource_name: The name of the resource.
|
@@ -238,6 +240,7 @@ class Team(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
@@ -251,13 +254,14 @@ class Team(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
257
261
|
Github team mappings can be imported using the `path`, e.g.
|
258
262
|
|
259
263
|
```sh
|
260
|
-
|
264
|
+
$ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
|
261
265
|
```
|
262
266
|
|
263
267
|
:param str resource_name: The name of the resource.
|
pulumi_vault/github/user.py
CHANGED
@@ -191,6 +191,7 @@ class User(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
@@ -204,13 +205,14 @@ class User(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
210
212
|
Github user mappings can be imported using the `path`, e.g.
|
211
213
|
|
212
214
|
```sh
|
213
|
-
|
215
|
+
$ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
|
214
216
|
```
|
215
217
|
|
216
218
|
:param str resource_name: The name of the resource.
|
@@ -238,6 +240,7 @@ class User(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
@@ -251,13 +254,14 @@ class User(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
257
261
|
Github user mappings can be imported using the `path`, e.g.
|
258
262
|
|
259
263
|
```sh
|
260
|
-
|
264
|
+
$ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
|
261
265
|
```
|
262
266
|
|
263
267
|
:param str resource_name: The name of the resource.
|
pulumi_vault/identity/entity.py
CHANGED
@@ -246,6 +246,7 @@ class Entity(pulumi.CustomResource):
|
|
246
246
|
"""
|
247
247
|
## Example Usage
|
248
248
|
|
249
|
+
<!--Start PulumiCodeChooser -->
|
249
250
|
```python
|
250
251
|
import pulumi
|
251
252
|
import pulumi_vault as vault
|
@@ -256,13 +257,14 @@ class Entity(pulumi.CustomResource):
|
|
256
257
|
},
|
257
258
|
policies=["test"])
|
258
259
|
```
|
260
|
+
<!--End PulumiCodeChooser -->
|
259
261
|
|
260
262
|
## Import
|
261
263
|
|
262
264
|
Identity entity can be imported using the `id`, e.g.
|
263
265
|
|
264
266
|
```sh
|
265
|
-
|
267
|
+
$ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
|
266
268
|
```
|
267
269
|
|
268
270
|
:param str resource_name: The name of the resource.
|
@@ -286,6 +288,7 @@ class Entity(pulumi.CustomResource):
|
|
286
288
|
"""
|
287
289
|
## Example Usage
|
288
290
|
|
291
|
+
<!--Start PulumiCodeChooser -->
|
289
292
|
```python
|
290
293
|
import pulumi
|
291
294
|
import pulumi_vault as vault
|
@@ -296,13 +299,14 @@ class Entity(pulumi.CustomResource):
|
|
296
299
|
},
|
297
300
|
policies=["test"])
|
298
301
|
```
|
302
|
+
<!--End PulumiCodeChooser -->
|
299
303
|
|
300
304
|
## Import
|
301
305
|
|
302
306
|
Identity entity can be imported using the `id`, e.g.
|
303
307
|
|
304
308
|
```sh
|
305
|
-
|
309
|
+
$ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
|
306
310
|
```
|
307
311
|
|
308
312
|
:param str resource_name: The name of the resource.
|
@@ -211,6 +211,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
211
211
|
"""
|
212
212
|
## Example Usage
|
213
213
|
|
214
|
+
<!--Start PulumiCodeChooser -->
|
214
215
|
```python
|
215
216
|
import pulumi
|
216
217
|
import pulumi_vault as vault
|
@@ -219,13 +220,14 @@ class EntityAlias(pulumi.CustomResource):
|
|
219
220
|
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
220
221
|
mount_accessor="token_1f2bd5")
|
221
222
|
```
|
223
|
+
<!--End PulumiCodeChooser -->
|
222
224
|
|
223
225
|
## Import
|
224
226
|
|
225
227
|
Identity entity alias can be imported using the `id`, e.g.
|
226
228
|
|
227
229
|
```sh
|
228
|
-
|
230
|
+
$ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
|
229
231
|
```
|
230
232
|
|
231
233
|
:param str resource_name: The name of the resource.
|
@@ -248,6 +250,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
248
250
|
"""
|
249
251
|
## Example Usage
|
250
252
|
|
253
|
+
<!--Start PulumiCodeChooser -->
|
251
254
|
```python
|
252
255
|
import pulumi
|
253
256
|
import pulumi_vault as vault
|
@@ -256,13 +259,14 @@ class EntityAlias(pulumi.CustomResource):
|
|
256
259
|
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
257
260
|
mount_accessor="token_1f2bd5")
|
258
261
|
```
|
262
|
+
<!--End PulumiCodeChooser -->
|
259
263
|
|
260
264
|
## Import
|
261
265
|
|
262
266
|
Identity entity alias can be imported using the `id`, e.g.
|
263
267
|
|
264
268
|
```sh
|
265
|
-
|
269
|
+
$ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
|
266
270
|
```
|
267
271
|
|
268
272
|
:param str resource_name: The name of the resource.
|
@@ -211,8 +211,10 @@ class EntityPolicies(pulumi.CustomResource):
|
|
211
211
|
Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
212
212
|
|
213
213
|
## Example Usage
|
214
|
+
|
214
215
|
### Exclusive Policies
|
215
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
216
218
|
```python
|
217
219
|
import pulumi
|
218
220
|
import pulumi_vault as vault
|
@@ -226,8 +228,11 @@ class EntityPolicies(pulumi.CustomResource):
|
|
226
228
|
exclusive=True,
|
227
229
|
entity_id=entity.id)
|
228
230
|
```
|
231
|
+
<!--End PulumiCodeChooser -->
|
232
|
+
|
229
233
|
### Non-exclusive Policies
|
230
234
|
|
235
|
+
<!--Start PulumiCodeChooser -->
|
231
236
|
```python
|
232
237
|
import pulumi
|
233
238
|
import pulumi_vault as vault
|
@@ -245,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
245
250
|
exclusive=False,
|
246
251
|
entity_id=entity.id)
|
247
252
|
```
|
253
|
+
<!--End PulumiCodeChooser -->
|
248
254
|
|
249
255
|
:param str resource_name: The name of the resource.
|
250
256
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -270,8 +276,10 @@ class EntityPolicies(pulumi.CustomResource):
|
|
270
276
|
Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
271
277
|
|
272
278
|
## Example Usage
|
279
|
+
|
273
280
|
### Exclusive Policies
|
274
281
|
|
282
|
+
<!--Start PulumiCodeChooser -->
|
275
283
|
```python
|
276
284
|
import pulumi
|
277
285
|
import pulumi_vault as vault
|
@@ -285,8 +293,11 @@ class EntityPolicies(pulumi.CustomResource):
|
|
285
293
|
exclusive=True,
|
286
294
|
entity_id=entity.id)
|
287
295
|
```
|
296
|
+
<!--End PulumiCodeChooser -->
|
297
|
+
|
288
298
|
### Non-exclusive Policies
|
289
299
|
|
300
|
+
<!--Start PulumiCodeChooser -->
|
290
301
|
```python
|
291
302
|
import pulumi
|
292
303
|
import pulumi_vault as vault
|
@@ -304,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
304
315
|
exclusive=False,
|
305
316
|
entity_id=entity.id)
|
306
317
|
```
|
318
|
+
<!--End PulumiCodeChooser -->
|
307
319
|
|
308
320
|
:param str resource_name: The name of the resource.
|
309
321
|
:param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
|
@@ -254,12 +254,15 @@ def get_entity(alias_id: Optional[str] = None,
|
|
254
254
|
"""
|
255
255
|
## Example Usage
|
256
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
257
258
|
```python
|
258
259
|
import pulumi
|
259
260
|
import pulumi_vault as vault
|
260
261
|
|
261
262
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
262
263
|
```
|
264
|
+
<!--End PulumiCodeChooser -->
|
265
|
+
|
263
266
|
## Required Vault Capabilities
|
264
267
|
|
265
268
|
Use of this resource requires the `create` capability on `/identity/lookup/entity`.
|
@@ -323,12 +326,15 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
323
326
|
"""
|
324
327
|
## Example Usage
|
325
328
|
|
329
|
+
<!--Start PulumiCodeChooser -->
|
326
330
|
```python
|
327
331
|
import pulumi
|
328
332
|
import pulumi_vault as vault
|
329
333
|
|
330
334
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
331
335
|
```
|
336
|
+
<!--End PulumiCodeChooser -->
|
337
|
+
|
332
338
|
## Required Vault Capabilities
|
333
339
|
|
334
340
|
Use of this resource requires the `create` capability on `/identity/lookup/entity`.
|
@@ -325,12 +325,15 @@ def get_group(alias_id: Optional[str] = None,
|
|
325
325
|
"""
|
326
326
|
## Example Usage
|
327
327
|
|
328
|
+
<!--Start PulumiCodeChooser -->
|
328
329
|
```python
|
329
330
|
import pulumi
|
330
331
|
import pulumi_vault as vault
|
331
332
|
|
332
333
|
group = vault.identity.get_group(group_name="user")
|
333
334
|
```
|
335
|
+
<!--End PulumiCodeChooser -->
|
336
|
+
|
334
337
|
## Required Vault Capabilities
|
335
338
|
|
336
339
|
Use of this resource requires the `create` capability on `/identity/lookup/group`.
|
@@ -400,12 +403,15 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
400
403
|
"""
|
401
404
|
## Example Usage
|
402
405
|
|
406
|
+
<!--Start PulumiCodeChooser -->
|
403
407
|
```python
|
404
408
|
import pulumi
|
405
409
|
import pulumi_vault as vault
|
406
410
|
|
407
411
|
group = vault.identity.get_group(group_name="user")
|
408
412
|
```
|
413
|
+
<!--End PulumiCodeChooser -->
|
414
|
+
|
409
415
|
## Required Vault Capabilities
|
410
416
|
|
411
417
|
Use of this resource requires the `create` capability on `/identity/lookup/group`.
|
@@ -93,6 +93,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
93
93
|
"""
|
94
94
|
## Example Usage
|
95
95
|
|
96
|
+
<!--Start PulumiCodeChooser -->
|
96
97
|
```python
|
97
98
|
import pulumi
|
98
99
|
import pulumi_vault as vault
|
@@ -107,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
107
108
|
access_token_ttl=7200)
|
108
109
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
109
110
|
```
|
111
|
+
<!--End PulumiCodeChooser -->
|
110
112
|
|
111
113
|
|
112
114
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -136,6 +138,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
136
138
|
"""
|
137
139
|
## Example Usage
|
138
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
139
142
|
```python
|
140
143
|
import pulumi
|
141
144
|
import pulumi_vault as vault
|
@@ -150,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
150
153
|
access_token_ttl=7200)
|
151
154
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
152
155
|
```
|
156
|
+
<!--End PulumiCodeChooser -->
|
153
157
|
|
154
158
|
|
155
159
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -214,6 +214,7 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
214
214
|
"""
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
@@ -234,6 +235,7 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
234
235
|
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
235
236
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
236
237
|
```
|
238
|
+
<!--End PulumiCodeChooser -->
|
237
239
|
|
238
240
|
|
239
241
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -273,6 +275,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
273
275
|
"""
|
274
276
|
## Example Usage
|
275
277
|
|
278
|
+
<!--Start PulumiCodeChooser -->
|
276
279
|
```python
|
277
280
|
import pulumi
|
278
281
|
import pulumi_vault as vault
|
@@ -293,6 +296,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
293
296
|
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
294
297
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
295
298
|
```
|
299
|
+
<!--End PulumiCodeChooser -->
|
296
300
|
|
297
301
|
|
298
302
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -81,6 +81,7 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
81
81
|
"""
|
82
82
|
## Example Usage
|
83
83
|
|
84
|
+
<!--Start PulumiCodeChooser -->
|
84
85
|
```python
|
85
86
|
import pulumi
|
86
87
|
import pulumi_vault as vault
|
@@ -101,6 +102,7 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
101
102
|
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
102
103
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
103
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
104
106
|
|
105
107
|
|
106
108
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -129,6 +131,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
129
131
|
"""
|
130
132
|
## Example Usage
|
131
133
|
|
134
|
+
<!--Start PulumiCodeChooser -->
|
132
135
|
```python
|
133
136
|
import pulumi
|
134
137
|
import pulumi_vault as vault
|
@@ -149,6 +152,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
149
152
|
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
150
153
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
151
154
|
```
|
155
|
+
<!--End PulumiCodeChooser -->
|
152
156
|
|
153
157
|
|
154
158
|
:param str name: The name of the OIDC Provider in Vault.
|