pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -591,20 +591,21 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
591
591
|
|
592
592
|
Example using `service_account_name` mode:
|
593
593
|
|
594
|
-
<!--Start PulumiCodeChooser -->
|
595
594
|
```python
|
596
595
|
import pulumi
|
596
|
+
import pulumi_std as std
|
597
597
|
import pulumi_vault as vault
|
598
598
|
|
599
599
|
config = vault.kubernetes.SecretBackend("config",
|
600
600
|
path="kubernetes",
|
601
601
|
description="kubernetes secrets engine description",
|
602
602
|
kubernetes_host="https://127.0.0.1:61233",
|
603
|
-
kubernetes_ca_cert=
|
604
|
-
service_account_jwt=
|
603
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
604
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
605
605
|
disable_local_ca_jwt=False)
|
606
606
|
sa_example = vault.kubernetes.SecretBackendRole("sa-example",
|
607
607
|
backend=config.path,
|
608
|
+
name="service-account-name-role",
|
608
609
|
allowed_kubernetes_namespaces=["*"],
|
609
610
|
token_max_ttl=43200,
|
610
611
|
token_default_ttl=21600,
|
@@ -618,24 +619,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
618
619
|
"location": "earth",
|
619
620
|
})
|
620
621
|
```
|
621
|
-
<!--End PulumiCodeChooser -->
|
622
622
|
|
623
623
|
Example using `kubernetes_role_name` mode:
|
624
624
|
|
625
|
-
<!--Start PulumiCodeChooser -->
|
626
625
|
```python
|
627
626
|
import pulumi
|
627
|
+
import pulumi_std as std
|
628
628
|
import pulumi_vault as vault
|
629
629
|
|
630
630
|
config = vault.kubernetes.SecretBackend("config",
|
631
631
|
path="kubernetes",
|
632
632
|
description="kubernetes secrets engine description",
|
633
633
|
kubernetes_host="https://127.0.0.1:61233",
|
634
|
-
kubernetes_ca_cert=
|
635
|
-
service_account_jwt=
|
634
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
635
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
636
636
|
disable_local_ca_jwt=False)
|
637
637
|
name_example = vault.kubernetes.SecretBackendRole("name-example",
|
638
638
|
backend=config.path,
|
639
|
+
name="service-account-name-role",
|
639
640
|
allowed_kubernetes_namespaces=["*"],
|
640
641
|
token_max_ttl=43200,
|
641
642
|
token_default_ttl=21600,
|
@@ -649,24 +650,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
649
650
|
"location": "earth",
|
650
651
|
})
|
651
652
|
```
|
652
|
-
<!--End PulumiCodeChooser -->
|
653
653
|
|
654
654
|
Example using `generated_role_rules` mode:
|
655
655
|
|
656
|
-
<!--Start PulumiCodeChooser -->
|
657
656
|
```python
|
658
657
|
import pulumi
|
658
|
+
import pulumi_std as std
|
659
659
|
import pulumi_vault as vault
|
660
660
|
|
661
661
|
config = vault.kubernetes.SecretBackend("config",
|
662
662
|
path="kubernetes",
|
663
663
|
description="kubernetes secrets engine description",
|
664
664
|
kubernetes_host="https://127.0.0.1:61233",
|
665
|
-
kubernetes_ca_cert=
|
666
|
-
service_account_jwt=
|
665
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
666
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
667
667
|
disable_local_ca_jwt=False)
|
668
668
|
rules_example = vault.kubernetes.SecretBackendRole("rules-example",
|
669
669
|
backend=config.path,
|
670
|
+
name="service-account-name-role",
|
670
671
|
allowed_kubernetes_namespaces=["*"],
|
671
672
|
token_max_ttl=43200,
|
672
673
|
token_default_ttl=21600,
|
@@ -685,7 +686,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
685
686
|
"location": "earth",
|
686
687
|
})
|
687
688
|
```
|
688
|
-
<!--End PulumiCodeChooser -->
|
689
689
|
|
690
690
|
## Import
|
691
691
|
|
@@ -748,20 +748,21 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
748
748
|
|
749
749
|
Example using `service_account_name` mode:
|
750
750
|
|
751
|
-
<!--Start PulumiCodeChooser -->
|
752
751
|
```python
|
753
752
|
import pulumi
|
753
|
+
import pulumi_std as std
|
754
754
|
import pulumi_vault as vault
|
755
755
|
|
756
756
|
config = vault.kubernetes.SecretBackend("config",
|
757
757
|
path="kubernetes",
|
758
758
|
description="kubernetes secrets engine description",
|
759
759
|
kubernetes_host="https://127.0.0.1:61233",
|
760
|
-
kubernetes_ca_cert=
|
761
|
-
service_account_jwt=
|
760
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
761
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
762
762
|
disable_local_ca_jwt=False)
|
763
763
|
sa_example = vault.kubernetes.SecretBackendRole("sa-example",
|
764
764
|
backend=config.path,
|
765
|
+
name="service-account-name-role",
|
765
766
|
allowed_kubernetes_namespaces=["*"],
|
766
767
|
token_max_ttl=43200,
|
767
768
|
token_default_ttl=21600,
|
@@ -775,24 +776,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
775
776
|
"location": "earth",
|
776
777
|
})
|
777
778
|
```
|
778
|
-
<!--End PulumiCodeChooser -->
|
779
779
|
|
780
780
|
Example using `kubernetes_role_name` mode:
|
781
781
|
|
782
|
-
<!--Start PulumiCodeChooser -->
|
783
782
|
```python
|
784
783
|
import pulumi
|
784
|
+
import pulumi_std as std
|
785
785
|
import pulumi_vault as vault
|
786
786
|
|
787
787
|
config = vault.kubernetes.SecretBackend("config",
|
788
788
|
path="kubernetes",
|
789
789
|
description="kubernetes secrets engine description",
|
790
790
|
kubernetes_host="https://127.0.0.1:61233",
|
791
|
-
kubernetes_ca_cert=
|
792
|
-
service_account_jwt=
|
791
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
792
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
793
793
|
disable_local_ca_jwt=False)
|
794
794
|
name_example = vault.kubernetes.SecretBackendRole("name-example",
|
795
795
|
backend=config.path,
|
796
|
+
name="service-account-name-role",
|
796
797
|
allowed_kubernetes_namespaces=["*"],
|
797
798
|
token_max_ttl=43200,
|
798
799
|
token_default_ttl=21600,
|
@@ -806,24 +807,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
806
807
|
"location": "earth",
|
807
808
|
})
|
808
809
|
```
|
809
|
-
<!--End PulumiCodeChooser -->
|
810
810
|
|
811
811
|
Example using `generated_role_rules` mode:
|
812
812
|
|
813
|
-
<!--Start PulumiCodeChooser -->
|
814
813
|
```python
|
815
814
|
import pulumi
|
815
|
+
import pulumi_std as std
|
816
816
|
import pulumi_vault as vault
|
817
817
|
|
818
818
|
config = vault.kubernetes.SecretBackend("config",
|
819
819
|
path="kubernetes",
|
820
820
|
description="kubernetes secrets engine description",
|
821
821
|
kubernetes_host="https://127.0.0.1:61233",
|
822
|
-
kubernetes_ca_cert=
|
823
|
-
service_account_jwt=
|
822
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
823
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
824
824
|
disable_local_ca_jwt=False)
|
825
825
|
rules_example = vault.kubernetes.SecretBackendRole("rules-example",
|
826
826
|
backend=config.path,
|
827
|
+
name="service-account-name-role",
|
827
828
|
allowed_kubernetes_namespaces=["*"],
|
828
829
|
token_max_ttl=43200,
|
829
830
|
token_default_ttl=21600,
|
@@ -842,7 +843,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
842
843
|
"location": "earth",
|
843
844
|
})
|
844
845
|
```
|
845
|
-
<!--End PulumiCodeChooser -->
|
846
846
|
|
847
847
|
## Import
|
848
848
|
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -134,7 +134,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
-
<!--Start PulumiCodeChooser -->
|
138
137
|
```python
|
139
138
|
import pulumi
|
140
139
|
import json
|
@@ -155,7 +154,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
155
154
|
}))
|
156
155
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
157
156
|
```
|
158
|
-
<!--End PulumiCodeChooser -->
|
159
157
|
|
160
158
|
## Required Vault Capabilities
|
161
159
|
|
@@ -192,7 +190,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
192
190
|
"""
|
193
191
|
## Example Usage
|
194
192
|
|
195
|
-
<!--Start PulumiCodeChooser -->
|
196
193
|
```python
|
197
194
|
import pulumi
|
198
195
|
import json
|
@@ -213,7 +210,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
213
210
|
}))
|
214
211
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
215
212
|
```
|
216
|
-
<!--End PulumiCodeChooser -->
|
217
213
|
|
218
214
|
## Required Vault Capabilities
|
219
215
|
|
@@ -134,7 +134,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
-
<!--Start PulumiCodeChooser -->
|
138
137
|
```python
|
139
138
|
import pulumi
|
140
139
|
import json
|
@@ -147,8 +146,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
147
146
|
"version": "2",
|
148
147
|
},
|
149
148
|
description="KV Version 2 secret engine mount")
|
150
|
-
aws_secret = vault.kv.SecretV2("
|
149
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
151
150
|
mount=kvv2.path,
|
151
|
+
name="aws_secret",
|
152
152
|
data_json=json.dumps({
|
153
153
|
"zip": "zap",
|
154
154
|
"foo": "bar",
|
@@ -156,7 +156,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
156
156
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
157
157
|
name=aws_secret.name)
|
158
158
|
```
|
159
|
-
<!--End PulumiCodeChooser -->
|
160
159
|
|
161
160
|
## Required Vault Capabilities
|
162
161
|
|
@@ -210,7 +209,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
210
209
|
"""
|
211
210
|
## Example Usage
|
212
211
|
|
213
|
-
<!--Start PulumiCodeChooser -->
|
214
212
|
```python
|
215
213
|
import pulumi
|
216
214
|
import json
|
@@ -223,8 +221,9 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
223
221
|
"version": "2",
|
224
222
|
},
|
225
223
|
description="KV Version 2 secret engine mount")
|
226
|
-
aws_secret = vault.kv.SecretV2("
|
224
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
227
225
|
mount=kvv2.path,
|
226
|
+
name="aws_secret",
|
228
227
|
data_json=json.dumps({
|
229
228
|
"zip": "zap",
|
230
229
|
"foo": "bar",
|
@@ -232,7 +231,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
232
231
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
233
232
|
name=aws_secret.name)
|
234
233
|
```
|
235
|
-
<!--End PulumiCodeChooser -->
|
236
234
|
|
237
235
|
## Required Vault Capabilities
|
238
236
|
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -179,6 +179,35 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
179
179
|
"""
|
180
180
|
## Example Usage
|
181
181
|
|
182
|
+
```python
|
183
|
+
import pulumi
|
184
|
+
import json
|
185
|
+
import pulumi_vault as vault
|
186
|
+
|
187
|
+
kvv2 = vault.Mount("kvv2",
|
188
|
+
path="kvv2",
|
189
|
+
type="kv",
|
190
|
+
options={
|
191
|
+
"version": "2",
|
192
|
+
},
|
193
|
+
description="KV Version 2 secret engine mount")
|
194
|
+
example_secret_v2 = vault.kv.SecretV2("example",
|
195
|
+
mount=kvv2.path,
|
196
|
+
name="secret",
|
197
|
+
cas=1,
|
198
|
+
delete_all_versions=True,
|
199
|
+
data_json=json.dumps({
|
200
|
+
"zip": "zap",
|
201
|
+
"foo": "bar",
|
202
|
+
}))
|
203
|
+
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
204
|
+
name=example_secret_v2.name)
|
205
|
+
```
|
206
|
+
|
207
|
+
## Required Vault Capabilities
|
208
|
+
|
209
|
+
Use of this resource requires the `read` capability on the given path.
|
210
|
+
|
182
211
|
|
183
212
|
:param str mount: Path where KV-V2 engine is mounted.
|
184
213
|
:param str name: Full name of the secret. For a nested secret
|
@@ -223,6 +252,35 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
223
252
|
"""
|
224
253
|
## Example Usage
|
225
254
|
|
255
|
+
```python
|
256
|
+
import pulumi
|
257
|
+
import json
|
258
|
+
import pulumi_vault as vault
|
259
|
+
|
260
|
+
kvv2 = vault.Mount("kvv2",
|
261
|
+
path="kvv2",
|
262
|
+
type="kv",
|
263
|
+
options={
|
264
|
+
"version": "2",
|
265
|
+
},
|
266
|
+
description="KV Version 2 secret engine mount")
|
267
|
+
example_secret_v2 = vault.kv.SecretV2("example",
|
268
|
+
mount=kvv2.path,
|
269
|
+
name="secret",
|
270
|
+
cas=1,
|
271
|
+
delete_all_versions=True,
|
272
|
+
data_json=json.dumps({
|
273
|
+
"zip": "zap",
|
274
|
+
"foo": "bar",
|
275
|
+
}))
|
276
|
+
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
277
|
+
name=example_secret_v2.name)
|
278
|
+
```
|
279
|
+
|
280
|
+
## Required Vault Capabilities
|
281
|
+
|
282
|
+
Use of this resource requires the `read` capability on the given path.
|
283
|
+
|
226
284
|
|
227
285
|
:param str mount: Path where KV-V2 engine is mounted.
|
228
286
|
:param str name: Full name of the secret. For a nested secret
|
@@ -80,7 +80,6 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
80
80
|
"""
|
81
81
|
## Example Usage
|
82
82
|
|
83
|
-
<!--Start PulumiCodeChooser -->
|
84
83
|
```python
|
85
84
|
import pulumi
|
86
85
|
import json
|
@@ -93,19 +92,18 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
93
92
|
"version": "1",
|
94
93
|
},
|
95
94
|
description="KV Version 1 secret engine mount")
|
96
|
-
aws_secret = vault.kv.Secret("
|
95
|
+
aws_secret = vault.kv.Secret("aws_secret",
|
97
96
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
98
97
|
data_json=json.dumps({
|
99
98
|
"zip": "zap",
|
100
99
|
}))
|
101
|
-
azure_secret = vault.kv.Secret("
|
100
|
+
azure_secret = vault.kv.Secret("azure_secret",
|
102
101
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
103
102
|
data_json=json.dumps({
|
104
103
|
"foo": "bar",
|
105
104
|
}))
|
106
105
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
107
106
|
```
|
108
|
-
<!--End PulumiCodeChooser -->
|
109
107
|
|
110
108
|
## Required Vault Capabilities
|
111
109
|
|
@@ -138,7 +136,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
138
136
|
"""
|
139
137
|
## Example Usage
|
140
138
|
|
141
|
-
<!--Start PulumiCodeChooser -->
|
142
139
|
```python
|
143
140
|
import pulumi
|
144
141
|
import json
|
@@ -151,19 +148,18 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
151
148
|
"version": "1",
|
152
149
|
},
|
153
150
|
description="KV Version 1 secret engine mount")
|
154
|
-
aws_secret = vault.kv.Secret("
|
151
|
+
aws_secret = vault.kv.Secret("aws_secret",
|
155
152
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
156
153
|
data_json=json.dumps({
|
157
154
|
"zip": "zap",
|
158
155
|
}))
|
159
|
-
azure_secret = vault.kv.Secret("
|
156
|
+
azure_secret = vault.kv.Secret("azure_secret",
|
160
157
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
161
158
|
data_json=json.dumps({
|
162
159
|
"foo": "bar",
|
163
160
|
}))
|
164
161
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
165
162
|
```
|
166
|
-
<!--End PulumiCodeChooser -->
|
167
163
|
|
168
164
|
## Required Vault Capabilities
|
169
165
|
|
@@ -102,7 +102,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
102
102
|
"""
|
103
103
|
## Example Usage
|
104
104
|
|
105
|
-
<!--Start PulumiCodeChooser -->
|
106
105
|
```python
|
107
106
|
import pulumi
|
108
107
|
import json
|
@@ -115,26 +114,28 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
115
114
|
"version": "2",
|
116
115
|
},
|
117
116
|
description="KV Version 2 secret engine mount")
|
118
|
-
aws_secret = vault.kv.SecretV2("
|
117
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
119
118
|
mount=kvv2.path,
|
119
|
+
name="aws_secret",
|
120
120
|
data_json=json.dumps({
|
121
121
|
"zip": "zap",
|
122
122
|
}))
|
123
|
-
azure_secret = vault.kv.SecretV2("
|
123
|
+
azure_secret = vault.kv.SecretV2("azure_secret",
|
124
124
|
mount=kvv2.path,
|
125
|
+
name="azure_secret",
|
125
126
|
data_json=json.dumps({
|
126
127
|
"foo": "bar",
|
127
128
|
}))
|
128
|
-
nested_secret = vault.kv.SecretV2("
|
129
|
+
nested_secret = vault.kv.SecretV2("nested_secret",
|
129
130
|
mount=kvv2.path,
|
131
|
+
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
130
132
|
data_json=json.dumps({
|
131
133
|
"password": "test",
|
132
134
|
}))
|
133
135
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
134
136
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
135
|
-
name=
|
137
|
+
name=test2["name"]))
|
136
138
|
```
|
137
|
-
<!--End PulumiCodeChooser -->
|
138
139
|
|
139
140
|
## Required Vault Capabilities
|
140
141
|
|
@@ -175,7 +176,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
175
176
|
"""
|
176
177
|
## Example Usage
|
177
178
|
|
178
|
-
<!--Start PulumiCodeChooser -->
|
179
179
|
```python
|
180
180
|
import pulumi
|
181
181
|
import json
|
@@ -188,26 +188,28 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
188
188
|
"version": "2",
|
189
189
|
},
|
190
190
|
description="KV Version 2 secret engine mount")
|
191
|
-
aws_secret = vault.kv.SecretV2("
|
191
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
192
192
|
mount=kvv2.path,
|
193
|
+
name="aws_secret",
|
193
194
|
data_json=json.dumps({
|
194
195
|
"zip": "zap",
|
195
196
|
}))
|
196
|
-
azure_secret = vault.kv.SecretV2("
|
197
|
+
azure_secret = vault.kv.SecretV2("azure_secret",
|
197
198
|
mount=kvv2.path,
|
199
|
+
name="azure_secret",
|
198
200
|
data_json=json.dumps({
|
199
201
|
"foo": "bar",
|
200
202
|
}))
|
201
|
-
nested_secret = vault.kv.SecretV2("
|
203
|
+
nested_secret = vault.kv.SecretV2("nested_secret",
|
202
204
|
mount=kvv2.path,
|
205
|
+
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
203
206
|
data_json=json.dumps({
|
204
207
|
"password": "test",
|
205
208
|
}))
|
206
209
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
207
210
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
208
|
-
name=
|
211
|
+
name=test2["name"]))
|
209
212
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
213
|
|
212
214
|
## Required Vault Capabilities
|
213
215
|
|
pulumi_vault/kv/secret.py
CHANGED
@@ -176,7 +176,6 @@ class Secret(pulumi.CustomResource):
|
|
176
176
|
|
177
177
|
## Example Usage
|
178
178
|
|
179
|
-
<!--Start PulumiCodeChooser -->
|
180
179
|
```python
|
181
180
|
import pulumi
|
182
181
|
import json
|
@@ -196,7 +195,6 @@ class Secret(pulumi.CustomResource):
|
|
196
195
|
"foo": "bar",
|
197
196
|
}))
|
198
197
|
```
|
199
|
-
<!--End PulumiCodeChooser -->
|
200
198
|
|
201
199
|
## Required Vault Capabilities
|
202
200
|
|
@@ -237,7 +235,6 @@ class Secret(pulumi.CustomResource):
|
|
237
235
|
|
238
236
|
## Example Usage
|
239
237
|
|
240
|
-
<!--Start PulumiCodeChooser -->
|
241
238
|
```python
|
242
239
|
import pulumi
|
243
240
|
import json
|
@@ -257,7 +254,6 @@ class Secret(pulumi.CustomResource):
|
|
257
254
|
"foo": "bar",
|
258
255
|
}))
|
259
256
|
```
|
260
|
-
<!--End PulumiCodeChooser -->
|
261
257
|
|
262
258
|
## Required Vault Capabilities
|
263
259
|
|
@@ -226,7 +226,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
226
226
|
|
227
227
|
## Example Usage
|
228
228
|
|
229
|
-
<!--Start PulumiCodeChooser -->
|
230
229
|
```python
|
231
230
|
import pulumi
|
232
231
|
import pulumi_vault as vault
|
@@ -244,7 +243,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
244
243
|
delete_version_after=12600,
|
245
244
|
cas_required=True)
|
246
245
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
246
|
|
249
247
|
## Required Vault Capabilities
|
250
248
|
|
@@ -290,7 +288,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
290
288
|
|
291
289
|
## Example Usage
|
292
290
|
|
293
|
-
<!--Start PulumiCodeChooser -->
|
294
291
|
```python
|
295
292
|
import pulumi
|
296
293
|
import pulumi_vault as vault
|
@@ -308,7 +305,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
308
305
|
delete_version_after=12600,
|
309
306
|
cas_required=True)
|
310
307
|
```
|
311
|
-
<!--End PulumiCodeChooser -->
|
312
308
|
|
313
309
|
## Required Vault Capabilities
|
314
310
|
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -448,7 +448,6 @@ class SecretV2(pulumi.CustomResource):
|
|
448
448
|
|
449
449
|
## Example Usage
|
450
450
|
|
451
|
-
<!--Start PulumiCodeChooser -->
|
452
451
|
```python
|
453
452
|
import pulumi
|
454
453
|
import json
|
@@ -463,6 +462,7 @@ class SecretV2(pulumi.CustomResource):
|
|
463
462
|
description="KV Version 2 secret engine mount")
|
464
463
|
example = vault.kv.SecretV2("example",
|
465
464
|
mount=kvv2.path,
|
465
|
+
name="secret",
|
466
466
|
cas=1,
|
467
467
|
delete_all_versions=True,
|
468
468
|
data_json=json.dumps({
|
@@ -477,7 +477,6 @@ class SecretV2(pulumi.CustomResource):
|
|
477
477
|
},
|
478
478
|
))
|
479
479
|
```
|
480
|
-
<!--End PulumiCodeChooser -->
|
481
480
|
|
482
481
|
## Required Vault Capabilities
|
483
482
|
|
@@ -546,7 +545,6 @@ class SecretV2(pulumi.CustomResource):
|
|
546
545
|
|
547
546
|
## Example Usage
|
548
547
|
|
549
|
-
<!--Start PulumiCodeChooser -->
|
550
548
|
```python
|
551
549
|
import pulumi
|
552
550
|
import json
|
@@ -561,6 +559,7 @@ class SecretV2(pulumi.CustomResource):
|
|
561
559
|
description="KV Version 2 secret engine mount")
|
562
560
|
example = vault.kv.SecretV2("example",
|
563
561
|
mount=kvv2.path,
|
562
|
+
name="secret",
|
564
563
|
cas=1,
|
565
564
|
delete_all_versions=True,
|
566
565
|
data_json=json.dumps({
|
@@ -575,7 +574,6 @@ class SecretV2(pulumi.CustomResource):
|
|
575
574
|
},
|
576
575
|
))
|
577
576
|
```
|
578
|
-
<!--End PulumiCodeChooser -->
|
579
577
|
|
580
578
|
## Required Vault Capabilities
|
581
579
|
|