pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/get_access_credentials.py +4 -2
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +6 -2
- pulumi_vault/ad/secret_role.py +6 -2
- pulumi_vault/alicloud/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +14 -2
- pulumi_vault/audit_request_header.py +4 -0
- pulumi_vault/auth_backend.py +2 -2
- pulumi_vault/aws/auth_backend_cert.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -2
- pulumi_vault/aws/auth_backend_config_identity.py +6 -2
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
- pulumi_vault/aws/auth_backend_role.py +6 -2
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
- pulumi_vault/aws/auth_backend_sts_role.py +6 -2
- pulumi_vault/aws/get_access_credentials.py +4 -2
- pulumi_vault/aws/secret_backend.py +2 -2
- pulumi_vault/aws/secret_backend_role.py +6 -2
- pulumi_vault/aws/secret_backend_static_role.py +10 -4
- pulumi_vault/azure/auth_backend_config.py +6 -2
- pulumi_vault/azure/auth_backend_role.py +6 -2
- pulumi_vault/azure/backend.py +12 -0
- pulumi_vault/azure/backend_role.py +4 -0
- pulumi_vault/azure/get_access_credentials.py +6 -0
- pulumi_vault/cert_auth_backend_role.py +4 -0
- pulumi_vault/consul/secret_backend.py +14 -2
- pulumi_vault/consul/secret_backend_role.py +8 -2
- pulumi_vault/database/secret_backend_connection.py +6 -2
- pulumi_vault/database/secret_backend_role.py +6 -2
- pulumi_vault/database/secret_backend_static_role.py +6 -2
- pulumi_vault/database/secrets_mount.py +6 -2
- pulumi_vault/egp_policy.py +4 -0
- pulumi_vault/gcp/auth_backend.py +6 -2
- pulumi_vault/gcp/auth_backend_role.py +6 -2
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +4 -0
- pulumi_vault/gcp/secret_impersonated_account.py +6 -2
- pulumi_vault/gcp/secret_roleset.py +6 -2
- pulumi_vault/gcp/secret_static_account.py +6 -2
- pulumi_vault/generic/endpoint.py +6 -0
- pulumi_vault/generic/get_secret.py +6 -6
- pulumi_vault/generic/secret.py +2 -2
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +22 -2
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +4 -0
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +6 -2
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +6 -2
- pulumi_vault/identity/entity_alias.py +6 -2
- pulumi_vault/identity/entity_policies.py +12 -0
- pulumi_vault/identity/get_entity.py +6 -0
- pulumi_vault/identity/get_group.py +6 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -0
- pulumi_vault/identity/get_oidc_openid_config.py +4 -0
- pulumi_vault/identity/get_oidc_public_keys.py +4 -0
- pulumi_vault/identity/group.py +20 -2
- pulumi_vault/identity/group_alias.py +6 -2
- pulumi_vault/identity/group_member_entity_ids.py +12 -0
- pulumi_vault/identity/group_member_group_ids.py +12 -0
- pulumi_vault/identity/group_policies.py +12 -0
- pulumi_vault/identity/mfa_duo.py +6 -2
- pulumi_vault/identity/mfa_login_enforcement.py +6 -2
- pulumi_vault/identity/mfa_okta.py +6 -2
- pulumi_vault/identity/mfa_pingid.py +6 -2
- pulumi_vault/identity/mfa_totp.py +6 -2
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -2
- pulumi_vault/identity/oidc_client.py +6 -2
- pulumi_vault/identity/oidc_key.py +6 -2
- pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
- pulumi_vault/identity/oidc_provider.py +6 -2
- pulumi_vault/identity/oidc_role.py +10 -2
- pulumi_vault/identity/oidc_scope.py +6 -2
- pulumi_vault/jwt/auth_backend.py +18 -6
- pulumi_vault/jwt/auth_backend_role.py +10 -2
- pulumi_vault/kmip/secret_backend.py +6 -2
- pulumi_vault/kmip/secret_role.py +6 -2
- pulumi_vault/kmip/secret_scope.py +6 -2
- pulumi_vault/kubernetes/auth_backend_config.py +6 -2
- pulumi_vault/kubernetes/auth_backend_role.py +6 -2
- pulumi_vault/kubernetes/get_service_account_token.py +4 -0
- pulumi_vault/kubernetes/secret_backend.py +6 -2
- pulumi_vault/kubernetes/secret_backend_role.py +14 -2
- pulumi_vault/kv/get_secret.py +6 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
- pulumi_vault/kv/get_secret_v2.py +2 -6
- pulumi_vault/kv/get_secrets_list.py +6 -0
- pulumi_vault/kv/get_secrets_list_v2.py +6 -0
- pulumi_vault/kv/secret.py +8 -2
- pulumi_vault/kv/secret_backend_v2.py +12 -4
- pulumi_vault/kv/secret_v2.py +8 -2
- pulumi_vault/ldap/auth_backend.py +6 -2
- pulumi_vault/ldap/auth_backend_group.py +6 -2
- pulumi_vault/ldap/auth_backend_user.py +6 -2
- pulumi_vault/ldap/secret_backend.py +6 -2
- pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
- pulumi_vault/ldap/secret_backend_library_set.py +6 -2
- pulumi_vault/ldap/secret_backend_static_role.py +10 -4
- pulumi_vault/managed/keys.py +2 -14
- pulumi_vault/mfa_duo.py +6 -2
- pulumi_vault/mfa_okta.py +6 -2
- pulumi_vault/mfa_pingid.py +6 -2
- pulumi_vault/mfa_totp.py +6 -2
- pulumi_vault/mongodbatlas/secret_backend.py +6 -2
- pulumi_vault/mongodbatlas/secret_role.py +10 -4
- pulumi_vault/mount.py +18 -2
- pulumi_vault/namespace.py +42 -62
- pulumi_vault/nomad_secret_backend.py +6 -2
- pulumi_vault/nomad_secret_role.py +6 -2
- pulumi_vault/okta/auth_backend.py +6 -2
- pulumi_vault/okta/auth_backend_group.py +6 -2
- pulumi_vault/okta/auth_backend_user.py +6 -2
- pulumi_vault/password_policy.py +6 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +4 -0
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
- pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
- pulumi_vault/pkisecret/secret_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_role.py +6 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
- pulumi_vault/policy.py +2 -2
- pulumi_vault/quota_lease_count.py +6 -2
- pulumi_vault/quota_rate_limit.py +6 -2
- pulumi_vault/rabbitmq/secret_backend.py +6 -2
- pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
- pulumi_vault/raft_autopilot.py +6 -2
- pulumi_vault/raft_snapshot_agent_config.py +111 -16
- pulumi_vault/rgp_policy.py +4 -0
- pulumi_vault/saml/auth_backend.py +6 -2
- pulumi_vault/saml/auth_backend_role.py +6 -2
- pulumi_vault/secrets/sync_association.py +4 -0
- pulumi_vault/secrets/sync_aws_destination.py +6 -2
- pulumi_vault/secrets/sync_azure_destination.py +6 -2
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -2
- pulumi_vault/secrets/sync_vercel_destination.py +6 -2
- pulumi_vault/ssh/_inputs.py +4 -0
- pulumi_vault/ssh/outputs.py +4 -0
- pulumi_vault/ssh/secret_backend_ca.py +6 -2
- pulumi_vault/ssh/secret_backend_role.py +6 -2
- pulumi_vault/terraformcloud/secret_backend.py +6 -2
- pulumi_vault/terraformcloud/secret_creds.py +4 -0
- pulumi_vault/terraformcloud/secret_role.py +6 -2
- pulumi_vault/token.py +6 -2
- pulumi_vault/tokenauth/auth_backend_role.py +6 -2
- pulumi_vault/transform/alphabet.py +4 -0
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -0
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -0
- pulumi_vault/transit/secret_backend_key.py +8 -2
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
- pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -371,6 +371,7 @@ class OidcClient(pulumi.CustomResource):
|
|
371
371
|
|
372
372
|
## Example Usage
|
373
373
|
|
374
|
+
<!--Start PulumiCodeChooser -->
|
374
375
|
```python
|
375
376
|
import pulumi
|
376
377
|
import pulumi_vault as vault
|
@@ -388,13 +389,14 @@ class OidcClient(pulumi.CustomResource):
|
|
388
389
|
id_token_ttl=2400,
|
389
390
|
access_token_ttl=7200)
|
390
391
|
```
|
392
|
+
<!--End PulumiCodeChooser -->
|
391
393
|
|
392
394
|
## Import
|
393
395
|
|
394
396
|
OIDC Clients can be imported using the `name`, e.g.
|
395
397
|
|
396
398
|
```sh
|
397
|
-
|
399
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
398
400
|
```
|
399
401
|
|
400
402
|
:param str resource_name: The name of the resource.
|
@@ -429,6 +431,7 @@ class OidcClient(pulumi.CustomResource):
|
|
429
431
|
|
430
432
|
## Example Usage
|
431
433
|
|
434
|
+
<!--Start PulumiCodeChooser -->
|
432
435
|
```python
|
433
436
|
import pulumi
|
434
437
|
import pulumi_vault as vault
|
@@ -446,13 +449,14 @@ class OidcClient(pulumi.CustomResource):
|
|
446
449
|
id_token_ttl=2400,
|
447
450
|
access_token_ttl=7200)
|
448
451
|
```
|
452
|
+
<!--End PulumiCodeChooser -->
|
449
453
|
|
450
454
|
## Import
|
451
455
|
|
452
456
|
OIDC Clients can be imported using the `name`, e.g.
|
453
457
|
|
454
458
|
```sh
|
455
|
-
|
459
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
456
460
|
```
|
457
461
|
|
458
462
|
:param str resource_name: The name of the resource.
|
@@ -258,6 +258,7 @@ class OidcKey(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
+
<!--Start PulumiCodeChooser -->
|
261
262
|
```python
|
262
263
|
import pulumi
|
263
264
|
import pulumi_vault as vault
|
@@ -268,13 +269,14 @@ class OidcKey(pulumi.CustomResource):
|
|
268
269
|
key_name=key.name,
|
269
270
|
allowed_client_id=role_oidc_role.client_id)
|
270
271
|
```
|
272
|
+
<!--End PulumiCodeChooser -->
|
271
273
|
|
272
274
|
## Import
|
273
275
|
|
274
276
|
The key can be imported with the key name, for example:
|
275
277
|
|
276
278
|
```sh
|
277
|
-
|
279
|
+
$ pulumi import vault:identity/oidcKey:OidcKey key key
|
278
280
|
```
|
279
281
|
|
280
282
|
:param str resource_name: The name of the resource.
|
@@ -301,6 +303,7 @@ class OidcKey(pulumi.CustomResource):
|
|
301
303
|
"""
|
302
304
|
## Example Usage
|
303
305
|
|
306
|
+
<!--Start PulumiCodeChooser -->
|
304
307
|
```python
|
305
308
|
import pulumi
|
306
309
|
import pulumi_vault as vault
|
@@ -311,13 +314,14 @@ class OidcKey(pulumi.CustomResource):
|
|
311
314
|
key_name=key.name,
|
312
315
|
allowed_client_id=role_oidc_role.client_id)
|
313
316
|
```
|
317
|
+
<!--End PulumiCodeChooser -->
|
314
318
|
|
315
319
|
## Import
|
316
320
|
|
317
321
|
The key can be imported with the key name, for example:
|
318
322
|
|
319
323
|
```sh
|
320
|
-
|
324
|
+
$ pulumi import vault:identity/oidcKey:OidcKey key key
|
321
325
|
```
|
322
326
|
|
323
327
|
:param str resource_name: The name of the resource.
|
@@ -145,6 +145,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
145
145
|
"""
|
146
146
|
## Example Usage
|
147
147
|
|
148
|
+
<!--Start PulumiCodeChooser -->
|
148
149
|
```python
|
149
150
|
import pulumi
|
150
151
|
import pulumi_vault as vault
|
@@ -155,6 +156,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
155
156
|
key_name=key.name,
|
156
157
|
allowed_client_id=role_oidc_role.client_id)
|
157
158
|
```
|
159
|
+
<!--End PulumiCodeChooser -->
|
158
160
|
|
159
161
|
:param str resource_name: The name of the resource.
|
160
162
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -174,6 +176,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
174
176
|
"""
|
175
177
|
## Example Usage
|
176
178
|
|
179
|
+
<!--Start PulumiCodeChooser -->
|
177
180
|
```python
|
178
181
|
import pulumi
|
179
182
|
import pulumi_vault as vault
|
@@ -184,6 +187,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
184
187
|
key_name=key.name,
|
185
188
|
allowed_client_id=role_oidc_role.client_id)
|
186
189
|
```
|
190
|
+
<!--End PulumiCodeChooser -->
|
187
191
|
|
188
192
|
:param str resource_name: The name of the resource.
|
189
193
|
:param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
|
@@ -273,6 +273,7 @@ class OidcProvider(pulumi.CustomResource):
|
|
273
273
|
|
274
274
|
## Example Usage
|
275
275
|
|
276
|
+
<!--Start PulumiCodeChooser -->
|
276
277
|
```python
|
277
278
|
import pulumi
|
278
279
|
import json
|
@@ -306,13 +307,14 @@ class OidcProvider(pulumi.CustomResource):
|
|
306
307
|
allowed_client_ids=[test_oidc_client.client_id],
|
307
308
|
scopes_supporteds=[test_oidc_scope.name])
|
308
309
|
```
|
310
|
+
<!--End PulumiCodeChooser -->
|
309
311
|
|
310
312
|
## Import
|
311
313
|
|
312
314
|
OIDC Providers can be imported using the `name`, e.g.
|
313
315
|
|
314
316
|
```sh
|
315
|
-
|
317
|
+
$ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
|
316
318
|
```
|
317
319
|
|
318
320
|
:param str resource_name: The name of the resource.
|
@@ -340,6 +342,7 @@ class OidcProvider(pulumi.CustomResource):
|
|
340
342
|
|
341
343
|
## Example Usage
|
342
344
|
|
345
|
+
<!--Start PulumiCodeChooser -->
|
343
346
|
```python
|
344
347
|
import pulumi
|
345
348
|
import json
|
@@ -373,13 +376,14 @@ class OidcProvider(pulumi.CustomResource):
|
|
373
376
|
allowed_client_ids=[test_oidc_client.client_id],
|
374
377
|
scopes_supporteds=[test_oidc_scope.name])
|
375
378
|
```
|
379
|
+
<!--End PulumiCodeChooser -->
|
376
380
|
|
377
381
|
## Import
|
378
382
|
|
379
383
|
OIDC Providers can be imported using the `name`, e.g.
|
380
384
|
|
381
385
|
```sh
|
382
|
-
|
386
|
+
$ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
|
383
387
|
```
|
384
388
|
|
385
389
|
:param str resource_name: The name of the resource.
|
@@ -270,6 +270,7 @@ class OidcRole(pulumi.CustomResource):
|
|
270
270
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
271
271
|
role's Client ID to allow the role to use the key.
|
272
272
|
|
273
|
+
<!--Start PulumiCodeChooser -->
|
273
274
|
```python
|
274
275
|
import pulumi
|
275
276
|
import pulumi_vault as vault
|
@@ -283,11 +284,13 @@ class OidcRole(pulumi.CustomResource):
|
|
283
284
|
algorithm="RS256",
|
284
285
|
allowed_client_ids=[role.client_id])
|
285
286
|
```
|
287
|
+
<!--End PulumiCodeChooser -->
|
286
288
|
|
287
289
|
If you want to create the key first before creating the role, you can use a separate
|
288
290
|
resource to configure the allowed Client ID on
|
289
291
|
the key.
|
290
292
|
|
293
|
+
<!--Start PulumiCodeChooser -->
|
291
294
|
```python
|
292
295
|
import pulumi
|
293
296
|
import pulumi_vault as vault
|
@@ -298,13 +301,14 @@ class OidcRole(pulumi.CustomResource):
|
|
298
301
|
key_name=key.name,
|
299
302
|
allowed_client_id=role_oidc_role.client_id)
|
300
303
|
```
|
304
|
+
<!--End PulumiCodeChooser -->
|
301
305
|
|
302
306
|
## Import
|
303
307
|
|
304
308
|
The key can be imported with the role name, for example:
|
305
309
|
|
306
310
|
```sh
|
307
|
-
|
311
|
+
$ pulumi import vault:identity/oidcRole:OidcRole role role
|
308
312
|
```
|
309
313
|
|
310
314
|
:param str resource_name: The name of the resource.
|
@@ -338,6 +342,7 @@ class OidcRole(pulumi.CustomResource):
|
|
338
342
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
339
343
|
role's Client ID to allow the role to use the key.
|
340
344
|
|
345
|
+
<!--Start PulumiCodeChooser -->
|
341
346
|
```python
|
342
347
|
import pulumi
|
343
348
|
import pulumi_vault as vault
|
@@ -351,11 +356,13 @@ class OidcRole(pulumi.CustomResource):
|
|
351
356
|
algorithm="RS256",
|
352
357
|
allowed_client_ids=[role.client_id])
|
353
358
|
```
|
359
|
+
<!--End PulumiCodeChooser -->
|
354
360
|
|
355
361
|
If you want to create the key first before creating the role, you can use a separate
|
356
362
|
resource to configure the allowed Client ID on
|
357
363
|
the key.
|
358
364
|
|
365
|
+
<!--Start PulumiCodeChooser -->
|
359
366
|
```python
|
360
367
|
import pulumi
|
361
368
|
import pulumi_vault as vault
|
@@ -366,13 +373,14 @@ class OidcRole(pulumi.CustomResource):
|
|
366
373
|
key_name=key.name,
|
367
374
|
allowed_client_id=role_oidc_role.client_id)
|
368
375
|
```
|
376
|
+
<!--End PulumiCodeChooser -->
|
369
377
|
|
370
378
|
## Import
|
371
379
|
|
372
380
|
The key can be imported with the role name, for example:
|
373
381
|
|
374
382
|
```sh
|
375
|
-
|
383
|
+
$ pulumi import vault:identity/oidcRole:OidcRole role role
|
376
384
|
```
|
377
385
|
|
378
386
|
:param str resource_name: The name of the resource.
|
@@ -183,6 +183,7 @@ class OidcScope(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
+
<!--Start PulumiCodeChooser -->
|
186
187
|
```python
|
187
188
|
import pulumi
|
188
189
|
import pulumi_vault as vault
|
@@ -191,13 +192,14 @@ class OidcScope(pulumi.CustomResource):
|
|
191
192
|
description="Vault OIDC Groups Scope",
|
192
193
|
template="{\\"groups\\":{{identity.entity.groups.names}}}")
|
193
194
|
```
|
195
|
+
<!--End PulumiCodeChooser -->
|
194
196
|
|
195
197
|
## Import
|
196
198
|
|
197
199
|
OIDC Scopes can be imported using the `name`, e.g.
|
198
200
|
|
199
201
|
```sh
|
200
|
-
|
202
|
+
$ pulumi import vault:identity/oidcScope:OidcScope groups groups
|
201
203
|
```
|
202
204
|
|
203
205
|
:param str resource_name: The name of the resource.
|
@@ -222,6 +224,7 @@ class OidcScope(pulumi.CustomResource):
|
|
222
224
|
|
223
225
|
## Example Usage
|
224
226
|
|
227
|
+
<!--Start PulumiCodeChooser -->
|
225
228
|
```python
|
226
229
|
import pulumi
|
227
230
|
import pulumi_vault as vault
|
@@ -230,13 +233,14 @@ class OidcScope(pulumi.CustomResource):
|
|
230
233
|
description="Vault OIDC Groups Scope",
|
231
234
|
template="{\\"groups\\":{{identity.entity.groups.names}}}")
|
232
235
|
```
|
236
|
+
<!--End PulumiCodeChooser -->
|
233
237
|
|
234
238
|
## Import
|
235
239
|
|
236
240
|
OIDC Scopes can be imported using the `name`, e.g.
|
237
241
|
|
238
242
|
```sh
|
239
|
-
|
243
|
+
$ pulumi import vault:identity/oidcScope:OidcScope groups groups
|
240
244
|
```
|
241
245
|
|
242
246
|
:param str resource_name: The name of the resource.
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -776,6 +776,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
776
776
|
|
777
777
|
Manage JWT auth backend:
|
778
778
|
|
779
|
+
<!--Start PulumiCodeChooser -->
|
779
780
|
```python
|
780
781
|
import pulumi
|
781
782
|
import pulumi_vault as vault
|
@@ -786,9 +787,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
786
787
|
oidc_discovery_url="https://myco.auth0.com/",
|
787
788
|
path="jwt")
|
788
789
|
```
|
790
|
+
<!--End PulumiCodeChooser -->
|
789
791
|
|
790
792
|
Manage OIDC auth backend:
|
791
793
|
|
794
|
+
<!--Start PulumiCodeChooser -->
|
792
795
|
```python
|
793
796
|
import pulumi
|
794
797
|
import pulumi_vault as vault
|
@@ -805,9 +808,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
805
808
|
),
|
806
809
|
type="oidc")
|
807
810
|
```
|
811
|
+
<!--End PulumiCodeChooser -->
|
808
812
|
|
809
813
|
Configuring the auth backend with a `provider_config:
|
810
814
|
|
815
|
+
<!--Start PulumiCodeChooser -->
|
811
816
|
```python
|
812
817
|
import pulumi
|
813
818
|
import pulumi_vault as vault
|
@@ -824,18 +829,19 @@ class AuthBackend(pulumi.CustomResource):
|
|
824
829
|
},
|
825
830
|
type="oidc")
|
826
831
|
```
|
832
|
+
<!--End PulumiCodeChooser -->
|
827
833
|
|
828
834
|
## Import
|
829
835
|
|
830
836
|
JWT auth backend can be imported using the `path`, e.g.
|
831
837
|
|
832
838
|
```sh
|
833
|
-
|
839
|
+
$ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
|
834
840
|
```
|
835
|
-
|
841
|
+
or
|
836
842
|
|
837
843
|
```sh
|
838
|
-
|
844
|
+
$ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
|
839
845
|
```
|
840
846
|
|
841
847
|
:param str resource_name: The name of the resource.
|
@@ -883,6 +889,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
883
889
|
|
884
890
|
Manage JWT auth backend:
|
885
891
|
|
892
|
+
<!--Start PulumiCodeChooser -->
|
886
893
|
```python
|
887
894
|
import pulumi
|
888
895
|
import pulumi_vault as vault
|
@@ -893,9 +900,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
893
900
|
oidc_discovery_url="https://myco.auth0.com/",
|
894
901
|
path="jwt")
|
895
902
|
```
|
903
|
+
<!--End PulumiCodeChooser -->
|
896
904
|
|
897
905
|
Manage OIDC auth backend:
|
898
906
|
|
907
|
+
<!--Start PulumiCodeChooser -->
|
899
908
|
```python
|
900
909
|
import pulumi
|
901
910
|
import pulumi_vault as vault
|
@@ -912,9 +921,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
912
921
|
),
|
913
922
|
type="oidc")
|
914
923
|
```
|
924
|
+
<!--End PulumiCodeChooser -->
|
915
925
|
|
916
926
|
Configuring the auth backend with a `provider_config:
|
917
927
|
|
928
|
+
<!--Start PulumiCodeChooser -->
|
918
929
|
```python
|
919
930
|
import pulumi
|
920
931
|
import pulumi_vault as vault
|
@@ -931,18 +942,19 @@ class AuthBackend(pulumi.CustomResource):
|
|
931
942
|
},
|
932
943
|
type="oidc")
|
933
944
|
```
|
945
|
+
<!--End PulumiCodeChooser -->
|
934
946
|
|
935
947
|
## Import
|
936
948
|
|
937
949
|
JWT auth backend can be imported using the `path`, e.g.
|
938
950
|
|
939
951
|
```sh
|
940
|
-
|
952
|
+
$ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
|
941
953
|
```
|
942
|
-
|
954
|
+
or
|
943
955
|
|
944
956
|
```sh
|
945
|
-
|
957
|
+
$ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
|
946
958
|
```
|
947
959
|
|
948
960
|
:param str resource_name: The name of the resource.
|
@@ -1189,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1189
1189
|
|
1190
1190
|
Role for JWT backend:
|
1191
1191
|
|
1192
|
+
<!--Start PulumiCodeChooser -->
|
1192
1193
|
```python
|
1193
1194
|
import pulumi
|
1194
1195
|
import pulumi_vault as vault
|
@@ -1209,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1209
1210
|
user_claim="https://vault/user",
|
1210
1211
|
role_type="jwt")
|
1211
1212
|
```
|
1213
|
+
<!--End PulumiCodeChooser -->
|
1212
1214
|
|
1213
1215
|
Role for OIDC backend:
|
1214
1216
|
|
1217
|
+
<!--Start PulumiCodeChooser -->
|
1215
1218
|
```python
|
1216
1219
|
import pulumi
|
1217
1220
|
import pulumi_vault as vault
|
@@ -1231,13 +1234,14 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1231
1234
|
role_type="oidc",
|
1232
1235
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1233
1236
|
```
|
1237
|
+
<!--End PulumiCodeChooser -->
|
1234
1238
|
|
1235
1239
|
## Import
|
1236
1240
|
|
1237
1241
|
JWT authentication backend roles can be imported using the `path`, e.g.
|
1238
1242
|
|
1239
1243
|
```sh
|
1240
|
-
|
1244
|
+
$ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
|
1241
1245
|
```
|
1242
1246
|
|
1243
1247
|
:param str resource_name: The name of the resource.
|
@@ -1335,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1335
1339
|
|
1336
1340
|
Role for JWT backend:
|
1337
1341
|
|
1342
|
+
<!--Start PulumiCodeChooser -->
|
1338
1343
|
```python
|
1339
1344
|
import pulumi
|
1340
1345
|
import pulumi_vault as vault
|
@@ -1355,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1355
1360
|
user_claim="https://vault/user",
|
1356
1361
|
role_type="jwt")
|
1357
1362
|
```
|
1363
|
+
<!--End PulumiCodeChooser -->
|
1358
1364
|
|
1359
1365
|
Role for OIDC backend:
|
1360
1366
|
|
1367
|
+
<!--Start PulumiCodeChooser -->
|
1361
1368
|
```python
|
1362
1369
|
import pulumi
|
1363
1370
|
import pulumi_vault as vault
|
@@ -1377,13 +1384,14 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1377
1384
|
role_type="oidc",
|
1378
1385
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1379
1386
|
```
|
1387
|
+
<!--End PulumiCodeChooser -->
|
1380
1388
|
|
1381
1389
|
## Import
|
1382
1390
|
|
1383
1391
|
JWT authentication backend roles can be imported using the `path`, e.g.
|
1384
1392
|
|
1385
1393
|
```sh
|
1386
|
-
|
1394
|
+
$ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
|
1387
1395
|
```
|
1388
1396
|
|
1389
1397
|
:param str resource_name: The name of the resource.
|
@@ -488,6 +488,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
488
488
|
|
489
489
|
## Example Usage
|
490
490
|
|
491
|
+
<!--Start PulumiCodeChooser -->
|
491
492
|
```python
|
492
493
|
import pulumi
|
493
494
|
import pulumi_vault as vault
|
@@ -505,13 +506,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
505
506
|
tls_ca_key_bits=4096,
|
506
507
|
tls_ca_key_type="rsa")
|
507
508
|
```
|
509
|
+
<!--End PulumiCodeChooser -->
|
508
510
|
|
509
511
|
## Import
|
510
512
|
|
511
513
|
KMIP Secret backend can be imported using the `path`, e.g.
|
512
514
|
|
513
515
|
```sh
|
514
|
-
|
516
|
+
$ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
|
515
517
|
```
|
516
518
|
|
517
519
|
:param str resource_name: The name of the resource.
|
@@ -548,6 +550,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
548
550
|
|
549
551
|
## Example Usage
|
550
552
|
|
553
|
+
<!--Start PulumiCodeChooser -->
|
551
554
|
```python
|
552
555
|
import pulumi
|
553
556
|
import pulumi_vault as vault
|
@@ -565,13 +568,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
565
568
|
tls_ca_key_bits=4096,
|
566
569
|
tls_ca_key_type="rsa")
|
567
570
|
```
|
571
|
+
<!--End PulumiCodeChooser -->
|
568
572
|
|
569
573
|
## Import
|
570
574
|
|
571
575
|
KMIP Secret backend can be imported using the `path`, e.g.
|
572
576
|
|
573
577
|
```sh
|
574
|
-
|
578
|
+
$ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
|
575
579
|
```
|
576
580
|
|
577
581
|
:param str resource_name: The name of the resource.
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -746,6 +746,7 @@ class SecretRole(pulumi.CustomResource):
|
|
746
746
|
|
747
747
|
## Example Usage
|
748
748
|
|
749
|
+
<!--Start PulumiCodeChooser -->
|
749
750
|
```python
|
750
751
|
import pulumi
|
751
752
|
import pulumi_vault as vault
|
@@ -769,13 +770,14 @@ class SecretRole(pulumi.CustomResource):
|
|
769
770
|
operation_create=True,
|
770
771
|
operation_destroy=True)
|
771
772
|
```
|
773
|
+
<!--End PulumiCodeChooser -->
|
772
774
|
|
773
775
|
## Import
|
774
776
|
|
775
777
|
KMIP Secret role can be imported using the `path`, e.g.
|
776
778
|
|
777
779
|
```sh
|
778
|
-
|
780
|
+
$ pulumi import vault:kmip/secretRole:SecretRole admin kmip
|
779
781
|
```
|
780
782
|
|
781
783
|
:param str resource_name: The name of the resource.
|
@@ -819,6 +821,7 @@ class SecretRole(pulumi.CustomResource):
|
|
819
821
|
|
820
822
|
## Example Usage
|
821
823
|
|
824
|
+
<!--Start PulumiCodeChooser -->
|
822
825
|
```python
|
823
826
|
import pulumi
|
824
827
|
import pulumi_vault as vault
|
@@ -842,13 +845,14 @@ class SecretRole(pulumi.CustomResource):
|
|
842
845
|
operation_create=True,
|
843
846
|
operation_destroy=True)
|
844
847
|
```
|
848
|
+
<!--End PulumiCodeChooser -->
|
845
849
|
|
846
850
|
## Import
|
847
851
|
|
848
852
|
KMIP Secret role can be imported using the `path`, e.g.
|
849
853
|
|
850
854
|
```sh
|
851
|
-
|
855
|
+
$ pulumi import vault:kmip/secretRole:SecretRole admin kmip
|
852
856
|
```
|
853
857
|
|
854
858
|
:param str resource_name: The name of the resource.
|
@@ -186,6 +186,7 @@ class SecretScope(pulumi.CustomResource):
|
|
186
186
|
|
187
187
|
## Example Usage
|
188
188
|
|
189
|
+
<!--Start PulumiCodeChooser -->
|
189
190
|
```python
|
190
191
|
import pulumi
|
191
192
|
import pulumi_vault as vault
|
@@ -198,13 +199,14 @@ class SecretScope(pulumi.CustomResource):
|
|
198
199
|
scope="dev",
|
199
200
|
force=True)
|
200
201
|
```
|
202
|
+
<!--End PulumiCodeChooser -->
|
201
203
|
|
202
204
|
## Import
|
203
205
|
|
204
206
|
KMIP Secret scope can be imported using the `path`, e.g.
|
205
207
|
|
206
208
|
```sh
|
207
|
-
|
209
|
+
$ pulumi import vault:kmip/secretScope:SecretScope dev kmip
|
208
210
|
```
|
209
211
|
|
210
212
|
:param str resource_name: The name of the resource.
|
@@ -231,6 +233,7 @@ class SecretScope(pulumi.CustomResource):
|
|
231
233
|
|
232
234
|
## Example Usage
|
233
235
|
|
236
|
+
<!--Start PulumiCodeChooser -->
|
234
237
|
```python
|
235
238
|
import pulumi
|
236
239
|
import pulumi_vault as vault
|
@@ -243,13 +246,14 @@ class SecretScope(pulumi.CustomResource):
|
|
243
246
|
scope="dev",
|
244
247
|
force=True)
|
245
248
|
```
|
249
|
+
<!--End PulumiCodeChooser -->
|
246
250
|
|
247
251
|
## Import
|
248
252
|
|
249
253
|
KMIP Secret scope can be imported using the `path`, e.g.
|
250
254
|
|
251
255
|
```sh
|
252
|
-
|
256
|
+
$ pulumi import vault:kmip/secretScope:SecretScope dev kmip
|
253
257
|
```
|
254
258
|
|
255
259
|
:param str resource_name: The name of the resource.
|
@@ -348,6 +348,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
348
348
|
|
349
349
|
## Example Usage
|
350
350
|
|
351
|
+
<!--Start PulumiCodeChooser -->
|
351
352
|
```python
|
352
353
|
import pulumi
|
353
354
|
import pulumi_vault as vault
|
@@ -363,13 +364,14 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
363
364
|
issuer="api",
|
364
365
|
disable_iss_validation=True)
|
365
366
|
```
|
367
|
+
<!--End PulumiCodeChooser -->
|
366
368
|
|
367
369
|
## Import
|
368
370
|
|
369
371
|
Kubernetes authentication backend can be imported using the `path`, e.g.
|
370
372
|
|
371
373
|
```sh
|
372
|
-
|
374
|
+
$ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
|
373
375
|
```
|
374
376
|
|
375
377
|
:param str resource_name: The name of the resource.
|
@@ -400,6 +402,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
400
402
|
|
401
403
|
## Example Usage
|
402
404
|
|
405
|
+
<!--Start PulumiCodeChooser -->
|
403
406
|
```python
|
404
407
|
import pulumi
|
405
408
|
import pulumi_vault as vault
|
@@ -415,13 +418,14 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
415
418
|
issuer="api",
|
416
419
|
disable_iss_validation=True)
|
417
420
|
```
|
421
|
+
<!--End PulumiCodeChooser -->
|
418
422
|
|
419
423
|
## Import
|
420
424
|
|
421
425
|
Kubernetes authentication backend can be imported using the `path`, e.g.
|
422
426
|
|
423
427
|
```sh
|
424
|
-
|
428
|
+
$ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
|
425
429
|
```
|
426
430
|
|
427
431
|
:param str resource_name: The name of the resource.
|