pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -923,7 +923,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
923
923
|
"""
|
924
924
|
## Example Usage
|
925
925
|
|
926
|
-
<!--Start PulumiCodeChooser -->
|
927
926
|
```python
|
928
927
|
import pulumi
|
929
928
|
import pulumi_vault as vault
|
@@ -933,6 +932,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
933
932
|
type="database")
|
934
933
|
postgres = vault.database.SecretBackendConnection("postgres",
|
935
934
|
backend=db.path,
|
935
|
+
name="postgres",
|
936
936
|
allowed_roles=[
|
937
937
|
"dev",
|
938
938
|
"prod",
|
@@ -941,7 +941,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
941
941
|
connection_url="postgres://username:password@host:port/database",
|
942
942
|
))
|
943
943
|
```
|
944
|
-
<!--End PulumiCodeChooser -->
|
945
944
|
|
946
945
|
## Import
|
947
946
|
|
@@ -996,7 +995,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
996
995
|
"""
|
997
996
|
## Example Usage
|
998
997
|
|
999
|
-
<!--Start PulumiCodeChooser -->
|
1000
998
|
```python
|
1001
999
|
import pulumi
|
1002
1000
|
import pulumi_vault as vault
|
@@ -1006,6 +1004,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1006
1004
|
type="database")
|
1007
1005
|
postgres = vault.database.SecretBackendConnection("postgres",
|
1008
1006
|
backend=db.path,
|
1007
|
+
name="postgres",
|
1009
1008
|
allowed_roles=[
|
1010
1009
|
"dev",
|
1011
1010
|
"prod",
|
@@ -1014,7 +1013,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1014
1013
|
connection_url="postgres://username:password@host:port/database",
|
1015
1014
|
))
|
1016
1015
|
```
|
1017
|
-
<!--End PulumiCodeChooser -->
|
1018
1016
|
|
1019
1017
|
## Import
|
1020
1018
|
|
@@ -489,7 +489,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
489
489
|
"""
|
490
490
|
## Example Usage
|
491
491
|
|
492
|
-
<!--Start PulumiCodeChooser -->
|
493
492
|
```python
|
494
493
|
import pulumi
|
495
494
|
import pulumi_vault as vault
|
@@ -499,6 +498,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
499
498
|
type="database")
|
500
499
|
postgres = vault.database.SecretBackendConnection("postgres",
|
501
500
|
backend=db.path,
|
501
|
+
name="postgres",
|
502
502
|
allowed_roles=[
|
503
503
|
"dev",
|
504
504
|
"prod",
|
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
508
508
|
))
|
509
509
|
role = vault.database.SecretBackendRole("role",
|
510
510
|
backend=db.path,
|
511
|
+
name="dev",
|
511
512
|
db_name=postgres.name,
|
512
513
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
513
514
|
```
|
514
|
-
<!--End PulumiCodeChooser -->
|
515
515
|
|
516
516
|
## Import
|
517
517
|
|
@@ -560,7 +560,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
560
560
|
"""
|
561
561
|
## Example Usage
|
562
562
|
|
563
|
-
<!--Start PulumiCodeChooser -->
|
564
563
|
```python
|
565
564
|
import pulumi
|
566
565
|
import pulumi_vault as vault
|
@@ -570,6 +569,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
570
569
|
type="database")
|
571
570
|
postgres = vault.database.SecretBackendConnection("postgres",
|
572
571
|
backend=db.path,
|
572
|
+
name="postgres",
|
573
573
|
allowed_roles=[
|
574
574
|
"dev",
|
575
575
|
"prod",
|
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
579
579
|
))
|
580
580
|
role = vault.database.SecretBackendRole("role",
|
581
581
|
backend=db.path,
|
582
|
+
name="dev",
|
582
583
|
db_name=postgres.name,
|
583
584
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
584
585
|
```
|
585
|
-
<!--End PulumiCodeChooser -->
|
586
586
|
|
587
587
|
## Import
|
588
588
|
|
@@ -370,7 +370,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
370
370
|
|
371
371
|
## Example Usage
|
372
372
|
|
373
|
-
<!--Start PulumiCodeChooser -->
|
374
373
|
```python
|
375
374
|
import pulumi
|
376
375
|
import pulumi_vault as vault
|
@@ -380,27 +379,29 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
380
379
|
type="database")
|
381
380
|
postgres = vault.database.SecretBackendConnection("postgres",
|
382
381
|
backend=db.path,
|
382
|
+
name="postgres",
|
383
383
|
allowed_roles=["*"],
|
384
384
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
385
385
|
connection_url="postgres://username:password@host:port/database",
|
386
386
|
))
|
387
387
|
# configure a static role with period-based rotations
|
388
|
-
period_role = vault.database.SecretBackendStaticRole("
|
388
|
+
period_role = vault.database.SecretBackendStaticRole("period_role",
|
389
389
|
backend=db.path,
|
390
|
+
name="my-period-role",
|
390
391
|
db_name=postgres.name,
|
391
392
|
username="example",
|
392
393
|
rotation_period=3600,
|
393
394
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
394
395
|
# configure a static role with schedule-based rotations
|
395
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
396
|
+
schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
|
396
397
|
backend=db.path,
|
398
|
+
name="my-schedule-role",
|
397
399
|
db_name=postgres.name,
|
398
400
|
username="example",
|
399
401
|
rotation_schedule="0 0 * * SAT",
|
400
402
|
rotation_window=172800,
|
401
403
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
402
404
|
```
|
403
|
-
<!--End PulumiCodeChooser -->
|
404
405
|
|
405
406
|
## Import
|
406
407
|
|
@@ -444,7 +445,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
444
445
|
|
445
446
|
## Example Usage
|
446
447
|
|
447
|
-
<!--Start PulumiCodeChooser -->
|
448
448
|
```python
|
449
449
|
import pulumi
|
450
450
|
import pulumi_vault as vault
|
@@ -454,27 +454,29 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
454
454
|
type="database")
|
455
455
|
postgres = vault.database.SecretBackendConnection("postgres",
|
456
456
|
backend=db.path,
|
457
|
+
name="postgres",
|
457
458
|
allowed_roles=["*"],
|
458
459
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
459
460
|
connection_url="postgres://username:password@host:port/database",
|
460
461
|
))
|
461
462
|
# configure a static role with period-based rotations
|
462
|
-
period_role = vault.database.SecretBackendStaticRole("
|
463
|
+
period_role = vault.database.SecretBackendStaticRole("period_role",
|
463
464
|
backend=db.path,
|
465
|
+
name="my-period-role",
|
464
466
|
db_name=postgres.name,
|
465
467
|
username="example",
|
466
468
|
rotation_period=3600,
|
467
469
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
468
470
|
# configure a static role with schedule-based rotations
|
469
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
471
|
+
schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
|
470
472
|
backend=db.path,
|
473
|
+
name="my-schedule-role",
|
471
474
|
db_name=postgres.name,
|
472
475
|
username="example",
|
473
476
|
rotation_schedule="0 0 * * SAT",
|
474
477
|
rotation_window=172800,
|
475
478
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
476
479
|
```
|
477
|
-
<!--End PulumiCodeChooser -->
|
478
480
|
|
479
481
|
## Import
|
480
482
|
|
@@ -1139,7 +1139,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1139
1139
|
"""
|
1140
1140
|
## Example Usage
|
1141
1141
|
|
1142
|
-
<!--Start PulumiCodeChooser -->
|
1143
1142
|
```python
|
1144
1143
|
import pulumi
|
1145
1144
|
import pulumi_vault as vault
|
@@ -1162,6 +1161,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1162
1161
|
allowed_roles=["dev2"],
|
1163
1162
|
)])
|
1164
1163
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1164
|
+
name="dev1",
|
1165
1165
|
backend=db.path,
|
1166
1166
|
db_name=db.mssqls[0].name,
|
1167
1167
|
creation_statements=[
|
@@ -1170,6 +1170,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1170
1170
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1171
1171
|
])
|
1172
1172
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1173
|
+
name="dev2",
|
1173
1174
|
backend=db.path,
|
1174
1175
|
db_name=db.postgresqls[0].name,
|
1175
1176
|
creation_statements=[
|
@@ -1177,7 +1178,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1177
1178
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1178
1179
|
])
|
1179
1180
|
```
|
1180
|
-
<!--End PulumiCodeChooser -->
|
1181
1181
|
|
1182
1182
|
## Import
|
1183
1183
|
|
@@ -1249,7 +1249,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1249
1249
|
"""
|
1250
1250
|
## Example Usage
|
1251
1251
|
|
1252
|
-
<!--Start PulumiCodeChooser -->
|
1253
1252
|
```python
|
1254
1253
|
import pulumi
|
1255
1254
|
import pulumi_vault as vault
|
@@ -1272,6 +1271,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1272
1271
|
allowed_roles=["dev2"],
|
1273
1272
|
)])
|
1274
1273
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1274
|
+
name="dev1",
|
1275
1275
|
backend=db.path,
|
1276
1276
|
db_name=db.mssqls[0].name,
|
1277
1277
|
creation_statements=[
|
@@ -1280,6 +1280,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1280
1280
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1281
1281
|
])
|
1282
1282
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1283
|
+
name="dev2",
|
1283
1284
|
backend=db.path,
|
1284
1285
|
db_name=db.postgresqls[0].name,
|
1285
1286
|
creation_statements=[
|
@@ -1287,7 +1288,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1287
1288
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1288
1289
|
])
|
1289
1290
|
```
|
1290
|
-
<!--End PulumiCodeChooser -->
|
1291
1291
|
|
1292
1292
|
## Import
|
1293
1293
|
|
pulumi_vault/egp_policy.py
CHANGED
@@ -214,21 +214,19 @@ class EgpPolicy(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
217
|
```python
|
219
218
|
import pulumi
|
220
219
|
import pulumi_vault as vault
|
221
220
|
|
222
221
|
allow_all = vault.EgpPolicy("allow-all",
|
223
|
-
|
222
|
+
name="allow-all",
|
224
223
|
paths=["*"],
|
224
|
+
enforcement_level="soft-mandatory",
|
225
225
|
policy=\"\"\"main = rule {
|
226
226
|
true
|
227
227
|
}
|
228
|
-
|
229
228
|
\"\"\")
|
230
229
|
```
|
231
|
-
<!--End PulumiCodeChooser -->
|
232
230
|
|
233
231
|
:param str resource_name: The name of the resource.
|
234
232
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -254,21 +252,19 @@ class EgpPolicy(pulumi.CustomResource):
|
|
254
252
|
|
255
253
|
## Example Usage
|
256
254
|
|
257
|
-
<!--Start PulumiCodeChooser -->
|
258
255
|
```python
|
259
256
|
import pulumi
|
260
257
|
import pulumi_vault as vault
|
261
258
|
|
262
259
|
allow_all = vault.EgpPolicy("allow-all",
|
263
|
-
|
260
|
+
name="allow-all",
|
264
261
|
paths=["*"],
|
262
|
+
enforcement_level="soft-mandatory",
|
265
263
|
policy=\"\"\"main = rule {
|
266
264
|
true
|
267
265
|
}
|
268
|
-
|
269
266
|
\"\"\")
|
270
267
|
```
|
271
|
-
<!--End PulumiCodeChooser -->
|
272
268
|
|
273
269
|
:param str resource_name: The name of the resource.
|
274
270
|
:param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -498,24 +498,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
498
498
|
"""
|
499
499
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
500
500
|
|
501
|
-
## Example Usage
|
502
|
-
|
503
|
-
<!--Start PulumiCodeChooser -->
|
504
|
-
```python
|
505
|
-
import pulumi
|
506
|
-
import pulumi_vault as vault
|
507
|
-
|
508
|
-
gcp = vault.gcp.AuthBackend("gcp",
|
509
|
-
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
510
|
-
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
511
|
-
api="www.googleapis.com",
|
512
|
-
iam="iam.googleapis.com",
|
513
|
-
crm="cloudresourcemanager.googleapis.com",
|
514
|
-
compute="compute.googleapis.com",
|
515
|
-
))
|
516
|
-
```
|
517
|
-
<!--End PulumiCodeChooser -->
|
518
|
-
|
519
501
|
## Import
|
520
502
|
|
521
503
|
GCP authentication backends can be imported using the backend name, e.g.
|
@@ -560,24 +542,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
560
542
|
"""
|
561
543
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
562
544
|
|
563
|
-
## Example Usage
|
564
|
-
|
565
|
-
<!--Start PulumiCodeChooser -->
|
566
|
-
```python
|
567
|
-
import pulumi
|
568
|
-
import pulumi_vault as vault
|
569
|
-
|
570
|
-
gcp = vault.gcp.AuthBackend("gcp",
|
571
|
-
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
572
|
-
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
573
|
-
api="www.googleapis.com",
|
574
|
-
iam="iam.googleapis.com",
|
575
|
-
crm="cloudresourcemanager.googleapis.com",
|
576
|
-
compute="compute.googleapis.com",
|
577
|
-
))
|
578
|
-
```
|
579
|
-
<!--End PulumiCodeChooser -->
|
580
|
-
|
581
545
|
## Import
|
582
546
|
|
583
547
|
GCP authentication backends can be imported using the backend name, e.g.
|