pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -224,7 +224,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
224
224
|
"""
|
225
225
|
## Example Usage
|
226
226
|
|
227
|
-
<!--Start PulumiCodeChooser -->
|
228
227
|
```python
|
229
228
|
import pulumi
|
230
229
|
import json
|
@@ -239,21 +238,23 @@ class SyncAssociation(pulumi.CustomResource):
|
|
239
238
|
description="KV Version 2 secret engine mount")
|
240
239
|
token = vault.kv.SecretV2("token",
|
241
240
|
mount=kvv2.path,
|
241
|
+
name="token",
|
242
242
|
data_json=json.dumps({
|
243
243
|
"dev": "B!gS3cr3t",
|
244
244
|
"prod": "S3cureP4$$",
|
245
245
|
}))
|
246
246
|
gh = vault.secrets.SyncGhDestination("gh",
|
247
|
-
|
248
|
-
|
247
|
+
name="gh-dest",
|
248
|
+
access_token=access_token,
|
249
|
+
repository_owner=repo_owner,
|
249
250
|
repository_name="repo-name-example",
|
250
251
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
251
|
-
gh_token = vault.secrets.SyncAssociation("
|
252
|
+
gh_token = vault.secrets.SyncAssociation("gh_token",
|
253
|
+
name=gh.name,
|
252
254
|
type=gh.type,
|
253
255
|
mount=kvv2.path,
|
254
256
|
secret_name=token.name)
|
255
257
|
```
|
256
|
-
<!--End PulumiCodeChooser -->
|
257
258
|
|
258
259
|
:param str resource_name: The name of the resource.
|
259
260
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -274,7 +275,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
274
275
|
"""
|
275
276
|
## Example Usage
|
276
277
|
|
277
|
-
<!--Start PulumiCodeChooser -->
|
278
278
|
```python
|
279
279
|
import pulumi
|
280
280
|
import json
|
@@ -289,21 +289,23 @@ class SyncAssociation(pulumi.CustomResource):
|
|
289
289
|
description="KV Version 2 secret engine mount")
|
290
290
|
token = vault.kv.SecretV2("token",
|
291
291
|
mount=kvv2.path,
|
292
|
+
name="token",
|
292
293
|
data_json=json.dumps({
|
293
294
|
"dev": "B!gS3cr3t",
|
294
295
|
"prod": "S3cureP4$$",
|
295
296
|
}))
|
296
297
|
gh = vault.secrets.SyncGhDestination("gh",
|
297
|
-
|
298
|
-
|
298
|
+
name="gh-dest",
|
299
|
+
access_token=access_token,
|
300
|
+
repository_owner=repo_owner,
|
299
301
|
repository_name="repo-name-example",
|
300
302
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
301
|
-
gh_token = vault.secrets.SyncAssociation("
|
303
|
+
gh_token = vault.secrets.SyncAssociation("gh_token",
|
304
|
+
name=gh.name,
|
302
305
|
type=gh.type,
|
303
306
|
mount=kvv2.path,
|
304
307
|
secret_name=token.name)
|
305
308
|
```
|
306
|
-
<!--End PulumiCodeChooser -->
|
307
309
|
|
308
310
|
:param str resource_name: The name of the resource.
|
309
311
|
:param SyncAssociationArgs args: The arguments to use to populate this resource's properties.
|
@@ -454,14 +454,14 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
454
454
|
"""
|
455
455
|
## Example Usage
|
456
456
|
|
457
|
-
<!--Start PulumiCodeChooser -->
|
458
457
|
```python
|
459
458
|
import pulumi
|
460
459
|
import pulumi_vault as vault
|
461
460
|
|
462
461
|
aws = vault.secrets.SyncAwsDestination("aws",
|
463
|
-
|
464
|
-
|
462
|
+
name="aws-dest",
|
463
|
+
access_key_id=access_key_id,
|
464
|
+
secret_access_key=secret_access_key,
|
465
465
|
region="us-east-1",
|
466
466
|
role_arn="role-arn",
|
467
467
|
external_id="external-id",
|
@@ -470,7 +470,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
470
470
|
"foo": "bar",
|
471
471
|
})
|
472
472
|
```
|
473
|
-
<!--End PulumiCodeChooser -->
|
474
473
|
|
475
474
|
## Import
|
476
475
|
|
@@ -520,14 +519,14 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
520
519
|
"""
|
521
520
|
## Example Usage
|
522
521
|
|
523
|
-
<!--Start PulumiCodeChooser -->
|
524
522
|
```python
|
525
523
|
import pulumi
|
526
524
|
import pulumi_vault as vault
|
527
525
|
|
528
526
|
aws = vault.secrets.SyncAwsDestination("aws",
|
529
|
-
|
530
|
-
|
527
|
+
name="aws-dest",
|
528
|
+
access_key_id=access_key_id,
|
529
|
+
secret_access_key=secret_access_key,
|
531
530
|
region="us-east-1",
|
532
531
|
role_arn="role-arn",
|
533
532
|
external_id="external-id",
|
@@ -536,7 +535,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
536
535
|
"foo": "bar",
|
537
536
|
})
|
538
537
|
```
|
539
|
-
<!--End PulumiCodeChooser -->
|
540
538
|
|
541
539
|
## Import
|
542
540
|
|
@@ -430,22 +430,21 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
430
430
|
"""
|
431
431
|
## Example Usage
|
432
432
|
|
433
|
-
<!--Start PulumiCodeChooser -->
|
434
433
|
```python
|
435
434
|
import pulumi
|
436
435
|
import pulumi_vault as vault
|
437
436
|
|
438
437
|
az = vault.secrets.SyncAzureDestination("az",
|
439
|
-
|
440
|
-
|
441
|
-
|
442
|
-
|
438
|
+
name="az-dest",
|
439
|
+
key_vault_uri=key_vault_uri,
|
440
|
+
client_id=client_id,
|
441
|
+
client_secret=client_secret,
|
442
|
+
tenant_id=tenant_id,
|
443
443
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
444
444
|
custom_tags={
|
445
445
|
"foo": "bar",
|
446
446
|
})
|
447
447
|
```
|
448
|
-
<!--End PulumiCodeChooser -->
|
449
448
|
|
450
449
|
## Import
|
451
450
|
|
@@ -489,22 +488,21 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
489
488
|
"""
|
490
489
|
## Example Usage
|
491
490
|
|
492
|
-
<!--Start PulumiCodeChooser -->
|
493
491
|
```python
|
494
492
|
import pulumi
|
495
493
|
import pulumi_vault as vault
|
496
494
|
|
497
495
|
az = vault.secrets.SyncAzureDestination("az",
|
498
|
-
|
499
|
-
|
500
|
-
|
501
|
-
|
496
|
+
name="az-dest",
|
497
|
+
key_vault_uri=key_vault_uri,
|
498
|
+
client_id=client_id,
|
499
|
+
client_secret=client_secret,
|
500
|
+
tenant_id=tenant_id,
|
502
501
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
503
502
|
custom_tags={
|
504
503
|
"foo": "bar",
|
505
504
|
})
|
506
505
|
```
|
507
|
-
<!--End PulumiCodeChooser -->
|
508
506
|
|
509
507
|
## Import
|
510
508
|
|
@@ -150,16 +150,14 @@ class SyncConfig(pulumi.CustomResource):
|
|
150
150
|
|
151
151
|
## Example Usage
|
152
152
|
|
153
|
-
<!--Start PulumiCodeChooser -->
|
154
153
|
```python
|
155
154
|
import pulumi
|
156
155
|
import pulumi_vault as vault
|
157
156
|
|
158
|
-
global_config = vault.secrets.SyncConfig("
|
157
|
+
global_config = vault.secrets.SyncConfig("global_config",
|
159
158
|
disabled=True,
|
160
159
|
queue_capacity=500000)
|
161
160
|
```
|
162
|
-
<!--End PulumiCodeChooser -->
|
163
161
|
|
164
162
|
## Import
|
165
163
|
|
@@ -191,16 +189,14 @@ class SyncConfig(pulumi.CustomResource):
|
|
191
189
|
|
192
190
|
## Example Usage
|
193
191
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
192
|
```python
|
196
193
|
import pulumi
|
197
194
|
import pulumi_vault as vault
|
198
195
|
|
199
|
-
global_config = vault.secrets.SyncConfig("
|
196
|
+
global_config = vault.secrets.SyncConfig("global_config",
|
200
197
|
disabled=True,
|
201
198
|
queue_capacity=500000)
|
202
199
|
```
|
203
|
-
<!--End PulumiCodeChooser -->
|
204
200
|
|
205
201
|
## Import
|
206
202
|
|
@@ -319,20 +319,20 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
319
319
|
"""
|
320
320
|
## Example Usage
|
321
321
|
|
322
|
-
<!--Start PulumiCodeChooser -->
|
323
322
|
```python
|
324
323
|
import pulumi
|
324
|
+
import pulumi_std as std
|
325
325
|
import pulumi_vault as vault
|
326
326
|
|
327
327
|
gcp = vault.secrets.SyncGcpDestination("gcp",
|
328
|
+
name="gcp-dest",
|
328
329
|
project_id="gcp-project-id",
|
329
|
-
credentials=
|
330
|
+
credentials=std.file(input=credentials_file).result,
|
330
331
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
331
332
|
custom_tags={
|
332
333
|
"foo": "bar",
|
333
334
|
})
|
334
335
|
```
|
335
|
-
<!--End PulumiCodeChooser -->
|
336
336
|
|
337
337
|
## Import
|
338
338
|
|
@@ -370,20 +370,20 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
370
370
|
"""
|
371
371
|
## Example Usage
|
372
372
|
|
373
|
-
<!--Start PulumiCodeChooser -->
|
374
373
|
```python
|
375
374
|
import pulumi
|
375
|
+
import pulumi_std as std
|
376
376
|
import pulumi_vault as vault
|
377
377
|
|
378
378
|
gcp = vault.secrets.SyncGcpDestination("gcp",
|
379
|
+
name="gcp-dest",
|
379
380
|
project_id="gcp-project-id",
|
380
|
-
credentials=
|
381
|
+
credentials=std.file(input=credentials_file).result,
|
381
382
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
382
383
|
custom_tags={
|
383
384
|
"foo": "bar",
|
384
385
|
})
|
385
386
|
```
|
386
|
-
<!--End PulumiCodeChooser -->
|
387
387
|
|
388
388
|
## Import
|
389
389
|
|
@@ -401,18 +401,17 @@ class SyncGhDestination(pulumi.CustomResource):
|
|
401
401
|
"""
|
402
402
|
## Example Usage
|
403
403
|
|
404
|
-
<!--Start PulumiCodeChooser -->
|
405
404
|
```python
|
406
405
|
import pulumi
|
407
406
|
import pulumi_vault as vault
|
408
407
|
|
409
408
|
gh = vault.secrets.SyncGhDestination("gh",
|
410
|
-
|
411
|
-
|
409
|
+
name="gh-dest",
|
410
|
+
access_token=access_token,
|
411
|
+
repository_owner=repo_owner,
|
412
412
|
repository_name="repo-name-example",
|
413
413
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
414
414
|
```
|
415
|
-
<!--End PulumiCodeChooser -->
|
416
415
|
|
417
416
|
## Import
|
418
417
|
|
@@ -456,18 +455,17 @@ class SyncGhDestination(pulumi.CustomResource):
|
|
456
455
|
"""
|
457
456
|
## Example Usage
|
458
457
|
|
459
|
-
<!--Start PulumiCodeChooser -->
|
460
458
|
```python
|
461
459
|
import pulumi
|
462
460
|
import pulumi_vault as vault
|
463
461
|
|
464
462
|
gh = vault.secrets.SyncGhDestination("gh",
|
465
|
-
|
466
|
-
|
463
|
+
name="gh-dest",
|
464
|
+
access_token=access_token,
|
465
|
+
repository_owner=repo_owner,
|
467
466
|
repository_name="repo-name-example",
|
468
467
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
469
468
|
```
|
470
|
-
<!--End PulumiCodeChooser -->
|
471
469
|
|
472
470
|
## Import
|
473
471
|
|
@@ -190,16 +190,16 @@ class SyncGithubApps(pulumi.CustomResource):
|
|
190
190
|
"""
|
191
191
|
## Example Usage
|
192
192
|
|
193
|
-
<!--Start PulumiCodeChooser -->
|
194
193
|
```python
|
195
194
|
import pulumi
|
195
|
+
import pulumi_std as std
|
196
196
|
import pulumi_vault as vault
|
197
197
|
|
198
198
|
github_apps = vault.secrets.SyncGithubApps("github-apps",
|
199
|
-
|
200
|
-
|
199
|
+
name="gh-apps",
|
200
|
+
app_id=app_id,
|
201
|
+
private_key=std.file(input=privatekey_file).result)
|
201
202
|
```
|
202
|
-
<!--End PulumiCodeChooser -->
|
203
203
|
|
204
204
|
## Import
|
205
205
|
|
@@ -227,16 +227,16 @@ class SyncGithubApps(pulumi.CustomResource):
|
|
227
227
|
"""
|
228
228
|
## Example Usage
|
229
229
|
|
230
|
-
<!--Start PulumiCodeChooser -->
|
231
230
|
```python
|
232
231
|
import pulumi
|
232
|
+
import pulumi_std as std
|
233
233
|
import pulumi_vault as vault
|
234
234
|
|
235
235
|
github_apps = vault.secrets.SyncGithubApps("github-apps",
|
236
|
-
|
237
|
-
|
236
|
+
name="gh-apps",
|
237
|
+
app_id=app_id,
|
238
|
+
private_key=std.file(input=privatekey_file).result)
|
238
239
|
```
|
239
|
-
<!--End PulumiCodeChooser -->
|
240
240
|
|
241
241
|
## Import
|
242
242
|
|
@@ -337,14 +337,14 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
337
337
|
"""
|
338
338
|
## Example Usage
|
339
339
|
|
340
|
-
<!--Start PulumiCodeChooser -->
|
341
340
|
```python
|
342
341
|
import pulumi
|
343
342
|
import pulumi_vault as vault
|
344
343
|
|
345
344
|
vercel = vault.secrets.SyncVercelDestination("vercel",
|
346
|
-
|
347
|
-
|
345
|
+
name="vercel-dest",
|
346
|
+
access_token=access_token,
|
347
|
+
project_id=project_id,
|
348
348
|
deployment_environments=[
|
349
349
|
"development",
|
350
350
|
"preview",
|
@@ -352,7 +352,6 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
352
352
|
],
|
353
353
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
354
354
|
```
|
355
|
-
<!--End PulumiCodeChooser -->
|
356
355
|
|
357
356
|
## Import
|
358
357
|
|
@@ -388,14 +387,14 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
388
387
|
"""
|
389
388
|
## Example Usage
|
390
389
|
|
391
|
-
<!--Start PulumiCodeChooser -->
|
392
390
|
```python
|
393
391
|
import pulumi
|
394
392
|
import pulumi_vault as vault
|
395
393
|
|
396
394
|
vercel = vault.secrets.SyncVercelDestination("vercel",
|
397
|
-
|
398
|
-
|
395
|
+
name="vercel-dest",
|
396
|
+
access_token=access_token,
|
397
|
+
project_id=project_id,
|
399
398
|
deployment_environments=[
|
400
399
|
"development",
|
401
400
|
"preview",
|
@@ -403,7 +402,6 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
403
402
|
],
|
404
403
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
405
404
|
```
|
406
|
-
<!--End PulumiCodeChooser -->
|
407
405
|
|
408
406
|
## Import
|
409
407
|
|
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -19,22 +19,9 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
19
19
|
lengths: pulumi.Input[Sequence[pulumi.Input[int]]],
|
20
20
|
type: pulumi.Input[str]):
|
21
21
|
"""
|
22
|
-
:param pulumi.Input[Sequence[pulumi.Input[int]]] lengths:
|
23
|
-
|
24
|
-
|
25
|
-
must be set to a single element list.
|
26
|
-
|
27
|
-
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
28
|
-
|
29
|
-
<!--Start PulumiCodeChooser -->
|
30
|
-
```python
|
31
|
-
import pulumi
|
32
|
-
```
|
33
|
-
<!--End PulumiCodeChooser -->
|
34
|
-
:param pulumi.Input[str] type: The SSH public key type.
|
35
|
-
*Supported key types are:*
|
36
|
-
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
37
|
-
`ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
|
22
|
+
:param pulumi.Input[Sequence[pulumi.Input[int]]] lengths: List of allowed key lengths, vault-1.10 and above
|
23
|
+
:param pulumi.Input[str] type: Key type, choices:
|
24
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
38
25
|
"""
|
39
26
|
pulumi.set(__self__, "lengths", lengths)
|
40
27
|
pulumi.set(__self__, "type", type)
|
@@ -43,18 +30,7 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
43
30
|
@pulumi.getter
|
44
31
|
def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[int]]]:
|
45
32
|
"""
|
46
|
-
|
47
|
-
For key types that do not support setting the length a value of `[0]` should be used.
|
48
|
-
Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
|
49
|
-
must be set to a single element list.
|
50
|
-
|
51
|
-
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
52
|
-
|
53
|
-
<!--Start PulumiCodeChooser -->
|
54
|
-
```python
|
55
|
-
import pulumi
|
56
|
-
```
|
57
|
-
<!--End PulumiCodeChooser -->
|
33
|
+
List of allowed key lengths, vault-1.10 and above
|
58
34
|
"""
|
59
35
|
return pulumi.get(self, "lengths")
|
60
36
|
|
@@ -66,10 +42,8 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
66
42
|
@pulumi.getter
|
67
43
|
def type(self) -> pulumi.Input[str]:
|
68
44
|
"""
|
69
|
-
|
70
|
-
|
71
|
-
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
72
|
-
`ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
|
45
|
+
Key type, choices:
|
46
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
73
47
|
"""
|
74
48
|
return pulumi.get(self, "type")
|
75
49
|
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -19,22 +19,9 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
19
19
|
lengths: Sequence[int],
|
20
20
|
type: str):
|
21
21
|
"""
|
22
|
-
:param Sequence[int] lengths:
|
23
|
-
|
24
|
-
|
25
|
-
must be set to a single element list.
|
26
|
-
|
27
|
-
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
28
|
-
|
29
|
-
<!--Start PulumiCodeChooser -->
|
30
|
-
```python
|
31
|
-
import pulumi
|
32
|
-
```
|
33
|
-
<!--End PulumiCodeChooser -->
|
34
|
-
:param str type: The SSH public key type.
|
35
|
-
*Supported key types are:*
|
36
|
-
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
37
|
-
`ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
|
22
|
+
:param Sequence[int] lengths: List of allowed key lengths, vault-1.10 and above
|
23
|
+
:param str type: Key type, choices:
|
24
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
38
25
|
"""
|
39
26
|
pulumi.set(__self__, "lengths", lengths)
|
40
27
|
pulumi.set(__self__, "type", type)
|
@@ -43,18 +30,7 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
43
30
|
@pulumi.getter
|
44
31
|
def lengths(self) -> Sequence[int]:
|
45
32
|
"""
|
46
|
-
|
47
|
-
For key types that do not support setting the length a value of `[0]` should be used.
|
48
|
-
Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
|
49
|
-
must be set to a single element list.
|
50
|
-
|
51
|
-
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
52
|
-
|
53
|
-
<!--Start PulumiCodeChooser -->
|
54
|
-
```python
|
55
|
-
import pulumi
|
56
|
-
```
|
57
|
-
<!--End PulumiCodeChooser -->
|
33
|
+
List of allowed key lengths, vault-1.10 and above
|
58
34
|
"""
|
59
35
|
return pulumi.get(self, "lengths")
|
60
36
|
|
@@ -62,10 +38,8 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
62
38
|
@pulumi.getter
|
63
39
|
def type(self) -> str:
|
64
40
|
"""
|
65
|
-
|
66
|
-
|
67
|
-
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
68
|
-
`ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
|
41
|
+
Key type, choices:
|
42
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
69
43
|
"""
|
70
44
|
return pulumi.get(self, "type")
|
71
45
|
|
@@ -216,7 +216,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
216
216
|
|
217
217
|
## Example Usage
|
218
218
|
|
219
|
-
<!--Start PulumiCodeChooser -->
|
220
219
|
```python
|
221
220
|
import pulumi
|
222
221
|
import pulumi_vault as vault
|
@@ -224,7 +223,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
224
223
|
example = vault.Mount("example", type="ssh")
|
225
224
|
foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
|
226
225
|
```
|
227
|
-
<!--End PulumiCodeChooser -->
|
228
226
|
|
229
227
|
## Import
|
230
228
|
|
@@ -257,7 +255,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
257
255
|
|
258
256
|
## Example Usage
|
259
257
|
|
260
|
-
<!--Start PulumiCodeChooser -->
|
261
258
|
```python
|
262
259
|
import pulumi
|
263
260
|
import pulumi_vault as vault
|
@@ -265,7 +262,6 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
265
262
|
example = vault.Mount("example", type="ssh")
|
266
263
|
foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
|
267
264
|
```
|
268
|
-
<!--End PulumiCodeChooser -->
|
269
265
|
|
270
266
|
## Import
|
271
267
|
|
@@ -921,24 +921,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
921
921
|
|
922
922
|
## Example Usage
|
923
923
|
|
924
|
-
<!--Start PulumiCodeChooser -->
|
925
924
|
```python
|
926
925
|
import pulumi
|
927
926
|
import pulumi_vault as vault
|
928
927
|
|
929
928
|
example = vault.Mount("example", type="ssh")
|
930
929
|
foo = vault.ssh.SecretBackendRole("foo",
|
930
|
+
name="my-role",
|
931
931
|
backend=example.path,
|
932
932
|
key_type="ca",
|
933
933
|
allow_user_certificates=True)
|
934
934
|
bar = vault.ssh.SecretBackendRole("bar",
|
935
|
+
name="otp-role",
|
935
936
|
backend=example.path,
|
936
937
|
key_type="otp",
|
937
938
|
default_user="default",
|
938
939
|
allowed_users="default,baz",
|
939
940
|
cidr_list="0.0.0.0/0")
|
940
941
|
```
|
941
|
-
<!--End PulumiCodeChooser -->
|
942
942
|
|
943
943
|
## Import
|
944
944
|
|
@@ -995,24 +995,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
995
995
|
|
996
996
|
## Example Usage
|
997
997
|
|
998
|
-
<!--Start PulumiCodeChooser -->
|
999
998
|
```python
|
1000
999
|
import pulumi
|
1001
1000
|
import pulumi_vault as vault
|
1002
1001
|
|
1003
1002
|
example = vault.Mount("example", type="ssh")
|
1004
1003
|
foo = vault.ssh.SecretBackendRole("foo",
|
1004
|
+
name="my-role",
|
1005
1005
|
backend=example.path,
|
1006
1006
|
key_type="ca",
|
1007
1007
|
allow_user_certificates=True)
|
1008
1008
|
bar = vault.ssh.SecretBackendRole("bar",
|
1009
|
+
name="otp-role",
|
1009
1010
|
backend=example.path,
|
1010
1011
|
key_type="otp",
|
1011
1012
|
default_user="default",
|
1012
1013
|
allowed_users="default,baz",
|
1013
1014
|
cidr_list="0.0.0.0/0")
|
1014
1015
|
```
|
1015
|
-
<!--End PulumiCodeChooser -->
|
1016
1016
|
|
1017
1017
|
## Import
|
1018
1018
|
|