pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -84,12 +84,11 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
84
84
|
|
85
85
|
## Example Usage
|
86
86
|
|
87
|
-
<!--Start PulumiCodeChooser -->
|
88
87
|
```python
|
89
88
|
import pulumi
|
90
89
|
import pulumi_vault as vault
|
91
90
|
|
92
|
-
|
91
|
+
example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
93
92
|
path="secret/*",
|
94
93
|
capabilities=[
|
95
94
|
"create",
|
@@ -100,9 +99,10 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
100
99
|
],
|
101
100
|
description="allow all on secrets",
|
102
101
|
)])
|
103
|
-
example_policy = vault.Policy("
|
102
|
+
example_policy = vault.Policy("example",
|
103
|
+
name="example_policy",
|
104
|
+
policy=example.hcl)
|
104
105
|
```
|
105
|
-
<!--End PulumiCodeChooser -->
|
106
106
|
"""
|
107
107
|
__args__ = dict()
|
108
108
|
__args__['namespace'] = namespace
|
@@ -126,12 +126,11 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
126
126
|
|
127
127
|
## Example Usage
|
128
128
|
|
129
|
-
<!--Start PulumiCodeChooser -->
|
130
129
|
```python
|
131
130
|
import pulumi
|
132
131
|
import pulumi_vault as vault
|
133
132
|
|
134
|
-
|
133
|
+
example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
135
134
|
path="secret/*",
|
136
135
|
capabilities=[
|
137
136
|
"create",
|
@@ -142,8 +141,9 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
142
141
|
],
|
143
142
|
description="allow all on secrets",
|
144
143
|
)])
|
145
|
-
example_policy = vault.Policy("
|
144
|
+
example_policy = vault.Policy("example",
|
145
|
+
name="example_policy",
|
146
|
+
policy=example.hcl)
|
146
147
|
```
|
147
|
-
<!--End PulumiCodeChooser -->
|
148
148
|
"""
|
149
149
|
...
|
@@ -190,7 +190,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
190
190
|
"""
|
191
191
|
## Example Usage
|
192
192
|
|
193
|
-
<!--Start PulumiCodeChooser -->
|
194
193
|
```python
|
195
194
|
import pulumi
|
196
195
|
import pulumi_vault as vault
|
@@ -198,7 +197,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
198
197
|
main = vault.get_raft_autopilot_state()
|
199
198
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
200
199
|
```
|
201
|
-
<!--End PulumiCodeChooser -->
|
202
200
|
|
203
201
|
|
204
202
|
:param str namespace: The namespace of the target resource.
|
@@ -233,7 +231,6 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
233
231
|
"""
|
234
232
|
## Example Usage
|
235
233
|
|
236
|
-
<!--Start PulumiCodeChooser -->
|
237
234
|
```python
|
238
235
|
import pulumi
|
239
236
|
import pulumi_vault as vault
|
@@ -241,7 +238,6 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
241
238
|
main = vault.get_raft_autopilot_state()
|
242
239
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
243
240
|
```
|
244
|
-
<!--End PulumiCodeChooser -->
|
245
241
|
|
246
242
|
|
247
243
|
:param str namespace: The namespace of the target resource.
|
@@ -714,14 +714,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
714
|
|
715
715
|
## Example Usage
|
716
716
|
|
717
|
-
<!--Start PulumiCodeChooser -->
|
718
717
|
```python
|
719
718
|
import pulumi
|
720
719
|
import pulumi_vault as vault
|
721
720
|
|
722
721
|
example = vault.github.AuthBackend("example", organization="myorg")
|
723
722
|
```
|
724
|
-
<!--End PulumiCodeChooser -->
|
725
723
|
|
726
724
|
## Import
|
727
725
|
|
@@ -788,14 +786,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
788
786
|
|
789
787
|
## Example Usage
|
790
788
|
|
791
|
-
<!--Start PulumiCodeChooser -->
|
792
789
|
```python
|
793
790
|
import pulumi
|
794
791
|
import pulumi_vault as vault
|
795
792
|
|
796
793
|
example = vault.github.AuthBackend("example", organization="myorg")
|
797
794
|
```
|
798
|
-
<!--End PulumiCodeChooser -->
|
799
795
|
|
800
796
|
## Import
|
801
797
|
|
pulumi_vault/github/team.py
CHANGED
@@ -191,13 +191,12 @@ class Team(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
194
|
```python
|
196
195
|
import pulumi
|
197
196
|
import pulumi_vault as vault
|
198
197
|
|
199
198
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_devs = vault.github.Team("
|
199
|
+
tf_devs = vault.github.Team("tf_devs",
|
201
200
|
backend=example.id,
|
202
201
|
team="terraform-developers",
|
203
202
|
policies=[
|
@@ -205,7 +204,6 @@ class Team(pulumi.CustomResource):
|
|
205
204
|
"read-only",
|
206
205
|
])
|
207
206
|
```
|
208
|
-
<!--End PulumiCodeChooser -->
|
209
207
|
|
210
208
|
## Import
|
211
209
|
|
@@ -240,13 +238,12 @@ class Team(pulumi.CustomResource):
|
|
240
238
|
|
241
239
|
## Example Usage
|
242
240
|
|
243
|
-
<!--Start PulumiCodeChooser -->
|
244
241
|
```python
|
245
242
|
import pulumi
|
246
243
|
import pulumi_vault as vault
|
247
244
|
|
248
245
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_devs = vault.github.Team("
|
246
|
+
tf_devs = vault.github.Team("tf_devs",
|
250
247
|
backend=example.id,
|
251
248
|
team="terraform-developers",
|
252
249
|
policies=[
|
@@ -254,7 +251,6 @@ class Team(pulumi.CustomResource):
|
|
254
251
|
"read-only",
|
255
252
|
])
|
256
253
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
254
|
|
259
255
|
## Import
|
260
256
|
|
pulumi_vault/github/user.py
CHANGED
@@ -191,13 +191,12 @@ class User(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
194
|
```python
|
196
195
|
import pulumi
|
197
196
|
import pulumi_vault as vault
|
198
197
|
|
199
198
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_user = vault.github.User("
|
199
|
+
tf_user = vault.github.User("tf_user",
|
201
200
|
backend=example.id,
|
202
201
|
user="john.doe",
|
203
202
|
policies=[
|
@@ -205,7 +204,6 @@ class User(pulumi.CustomResource):
|
|
205
204
|
"read-only",
|
206
205
|
])
|
207
206
|
```
|
208
|
-
<!--End PulumiCodeChooser -->
|
209
207
|
|
210
208
|
## Import
|
211
209
|
|
@@ -240,13 +238,12 @@ class User(pulumi.CustomResource):
|
|
240
238
|
|
241
239
|
## Example Usage
|
242
240
|
|
243
|
-
<!--Start PulumiCodeChooser -->
|
244
241
|
```python
|
245
242
|
import pulumi
|
246
243
|
import pulumi_vault as vault
|
247
244
|
|
248
245
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_user = vault.github.User("
|
246
|
+
tf_user = vault.github.User("tf_user",
|
250
247
|
backend=example.id,
|
251
248
|
user="john.doe",
|
252
249
|
policies=[
|
@@ -254,7 +251,6 @@ class User(pulumi.CustomResource):
|
|
254
251
|
"read-only",
|
255
252
|
])
|
256
253
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
254
|
|
259
255
|
## Import
|
260
256
|
|
pulumi_vault/identity/entity.py
CHANGED
@@ -246,18 +246,17 @@ class Entity(pulumi.CustomResource):
|
|
246
246
|
"""
|
247
247
|
## Example Usage
|
248
248
|
|
249
|
-
<!--Start PulumiCodeChooser -->
|
250
249
|
```python
|
251
250
|
import pulumi
|
252
251
|
import pulumi_vault as vault
|
253
252
|
|
254
253
|
test = vault.identity.Entity("test",
|
254
|
+
name="tester1",
|
255
|
+
policies=["test"],
|
255
256
|
metadata={
|
256
257
|
"foo": "bar",
|
257
|
-
}
|
258
|
-
policies=["test"])
|
258
|
+
})
|
259
259
|
```
|
260
|
-
<!--End PulumiCodeChooser -->
|
261
260
|
|
262
261
|
## Import
|
263
262
|
|
@@ -288,18 +287,17 @@ class Entity(pulumi.CustomResource):
|
|
288
287
|
"""
|
289
288
|
## Example Usage
|
290
289
|
|
291
|
-
<!--Start PulumiCodeChooser -->
|
292
290
|
```python
|
293
291
|
import pulumi
|
294
292
|
import pulumi_vault as vault
|
295
293
|
|
296
294
|
test = vault.identity.Entity("test",
|
295
|
+
name="tester1",
|
296
|
+
policies=["test"],
|
297
297
|
metadata={
|
298
298
|
"foo": "bar",
|
299
|
-
}
|
300
|
-
policies=["test"])
|
299
|
+
})
|
301
300
|
```
|
302
|
-
<!--End PulumiCodeChooser -->
|
303
301
|
|
304
302
|
## Import
|
305
303
|
|
@@ -211,16 +211,15 @@ class EntityAlias(pulumi.CustomResource):
|
|
211
211
|
"""
|
212
212
|
## Example Usage
|
213
213
|
|
214
|
-
<!--Start PulumiCodeChooser -->
|
215
214
|
```python
|
216
215
|
import pulumi
|
217
216
|
import pulumi_vault as vault
|
218
217
|
|
219
218
|
test = vault.identity.EntityAlias("test",
|
220
|
-
|
221
|
-
mount_accessor="token_1f2bd5"
|
219
|
+
name="user_1",
|
220
|
+
mount_accessor="token_1f2bd5",
|
221
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
222
222
|
```
|
223
|
-
<!--End PulumiCodeChooser -->
|
224
223
|
|
225
224
|
## Import
|
226
225
|
|
@@ -250,16 +249,15 @@ class EntityAlias(pulumi.CustomResource):
|
|
250
249
|
"""
|
251
250
|
## Example Usage
|
252
251
|
|
253
|
-
<!--Start PulumiCodeChooser -->
|
254
252
|
```python
|
255
253
|
import pulumi
|
256
254
|
import pulumi_vault as vault
|
257
255
|
|
258
256
|
test = vault.identity.EntityAlias("test",
|
259
|
-
|
260
|
-
mount_accessor="token_1f2bd5"
|
257
|
+
name="user_1",
|
258
|
+
mount_accessor="token_1f2bd5",
|
259
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
261
260
|
```
|
262
|
-
<!--End PulumiCodeChooser -->
|
263
261
|
|
264
262
|
## Import
|
265
263
|
|
@@ -214,12 +214,13 @@ class EntityPolicies(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
### Exclusive Policies
|
216
216
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
217
|
```python
|
219
218
|
import pulumi
|
220
219
|
import pulumi_vault as vault
|
221
220
|
|
222
|
-
entity = vault.identity.Entity("entity",
|
221
|
+
entity = vault.identity.Entity("entity",
|
222
|
+
name="entity",
|
223
|
+
external_policies=True)
|
223
224
|
policies = vault.identity.EntityPolicies("policies",
|
224
225
|
policies=[
|
225
226
|
"default",
|
@@ -228,16 +229,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
228
229
|
exclusive=True,
|
229
230
|
entity_id=entity.id)
|
230
231
|
```
|
231
|
-
<!--End PulumiCodeChooser -->
|
232
232
|
|
233
233
|
### Non-exclusive Policies
|
234
234
|
|
235
|
-
<!--Start PulumiCodeChooser -->
|
236
235
|
```python
|
237
236
|
import pulumi
|
238
237
|
import pulumi_vault as vault
|
239
238
|
|
240
|
-
entity = vault.identity.Entity("entity",
|
239
|
+
entity = vault.identity.Entity("entity",
|
240
|
+
name="entity",
|
241
|
+
external_policies=True)
|
241
242
|
default = vault.identity.EntityPolicies("default",
|
242
243
|
policies=[
|
243
244
|
"default",
|
@@ -250,7 +251,6 @@ class EntityPolicies(pulumi.CustomResource):
|
|
250
251
|
exclusive=False,
|
251
252
|
entity_id=entity.id)
|
252
253
|
```
|
253
|
-
<!--End PulumiCodeChooser -->
|
254
254
|
|
255
255
|
:param str resource_name: The name of the resource.
|
256
256
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -279,12 +279,13 @@ class EntityPolicies(pulumi.CustomResource):
|
|
279
279
|
|
280
280
|
### Exclusive Policies
|
281
281
|
|
282
|
-
<!--Start PulumiCodeChooser -->
|
283
282
|
```python
|
284
283
|
import pulumi
|
285
284
|
import pulumi_vault as vault
|
286
285
|
|
287
|
-
entity = vault.identity.Entity("entity",
|
286
|
+
entity = vault.identity.Entity("entity",
|
287
|
+
name="entity",
|
288
|
+
external_policies=True)
|
288
289
|
policies = vault.identity.EntityPolicies("policies",
|
289
290
|
policies=[
|
290
291
|
"default",
|
@@ -293,16 +294,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
293
294
|
exclusive=True,
|
294
295
|
entity_id=entity.id)
|
295
296
|
```
|
296
|
-
<!--End PulumiCodeChooser -->
|
297
297
|
|
298
298
|
### Non-exclusive Policies
|
299
299
|
|
300
|
-
<!--Start PulumiCodeChooser -->
|
301
300
|
```python
|
302
301
|
import pulumi
|
303
302
|
import pulumi_vault as vault
|
304
303
|
|
305
|
-
entity = vault.identity.Entity("entity",
|
304
|
+
entity = vault.identity.Entity("entity",
|
305
|
+
name="entity",
|
306
|
+
external_policies=True)
|
306
307
|
default = vault.identity.EntityPolicies("default",
|
307
308
|
policies=[
|
308
309
|
"default",
|
@@ -315,7 +316,6 @@ class EntityPolicies(pulumi.CustomResource):
|
|
315
316
|
exclusive=False,
|
316
317
|
entity_id=entity.id)
|
317
318
|
```
|
318
|
-
<!--End PulumiCodeChooser -->
|
319
319
|
|
320
320
|
:param str resource_name: The name of the resource.
|
321
321
|
:param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
|
@@ -254,14 +254,12 @@ def get_entity(alias_id: Optional[str] = None,
|
|
254
254
|
"""
|
255
255
|
## Example Usage
|
256
256
|
|
257
|
-
<!--Start PulumiCodeChooser -->
|
258
257
|
```python
|
259
258
|
import pulumi
|
260
259
|
import pulumi_vault as vault
|
261
260
|
|
262
261
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
263
262
|
```
|
264
|
-
<!--End PulumiCodeChooser -->
|
265
263
|
|
266
264
|
## Required Vault Capabilities
|
267
265
|
|
@@ -326,14 +324,12 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
326
324
|
"""
|
327
325
|
## Example Usage
|
328
326
|
|
329
|
-
<!--Start PulumiCodeChooser -->
|
330
327
|
```python
|
331
328
|
import pulumi
|
332
329
|
import pulumi_vault as vault
|
333
330
|
|
334
331
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
335
332
|
```
|
336
|
-
<!--End PulumiCodeChooser -->
|
337
333
|
|
338
334
|
## Required Vault Capabilities
|
339
335
|
|
@@ -325,14 +325,12 @@ def get_group(alias_id: Optional[str] = None,
|
|
325
325
|
"""
|
326
326
|
## Example Usage
|
327
327
|
|
328
|
-
<!--Start PulumiCodeChooser -->
|
329
328
|
```python
|
330
329
|
import pulumi
|
331
330
|
import pulumi_vault as vault
|
332
331
|
|
333
332
|
group = vault.identity.get_group(group_name="user")
|
334
333
|
```
|
335
|
-
<!--End PulumiCodeChooser -->
|
336
334
|
|
337
335
|
## Required Vault Capabilities
|
338
336
|
|
@@ -403,14 +401,12 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
403
401
|
"""
|
404
402
|
## Example Usage
|
405
403
|
|
406
|
-
<!--Start PulumiCodeChooser -->
|
407
404
|
```python
|
408
405
|
import pulumi
|
409
406
|
import pulumi_vault as vault
|
410
407
|
|
411
408
|
group = vault.identity.get_group(group_name="user")
|
412
409
|
```
|
413
|
-
<!--End PulumiCodeChooser -->
|
414
410
|
|
415
411
|
## Required Vault Capabilities
|
416
412
|
|
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
93
93
|
"""
|
94
94
|
## Example Usage
|
95
95
|
|
96
|
-
<!--Start PulumiCodeChooser -->
|
97
96
|
```python
|
98
97
|
import pulumi
|
99
98
|
import pulumi_vault as vault
|
100
99
|
|
101
100
|
app = vault.identity.OidcClient("app",
|
101
|
+
name="application",
|
102
102
|
redirect_uris=[
|
103
103
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
104
104
|
"http://127.0.0.1:8251/callback",
|
@@ -108,7 +108,6 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
108
108
|
access_token_ttl=7200)
|
109
109
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
110
110
|
```
|
111
|
-
<!--End PulumiCodeChooser -->
|
112
111
|
|
113
112
|
|
114
113
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -138,12 +137,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
138
137
|
"""
|
139
138
|
## Example Usage
|
140
139
|
|
141
|
-
<!--Start PulumiCodeChooser -->
|
142
140
|
```python
|
143
141
|
import pulumi
|
144
142
|
import pulumi_vault as vault
|
145
143
|
|
146
144
|
app = vault.identity.OidcClient("app",
|
145
|
+
name="application",
|
147
146
|
redirect_uris=[
|
148
147
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
149
148
|
"http://127.0.0.1:8251/callback",
|
@@ -153,7 +152,6 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
153
152
|
access_token_ttl=7200)
|
154
153
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
155
154
|
```
|
156
|
-
<!--End PulumiCodeChooser -->
|
157
155
|
|
158
156
|
|
159
157
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -214,16 +214,17 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
214
214
|
"""
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
217
|
```python
|
219
218
|
import pulumi
|
220
219
|
import pulumi_vault as vault
|
221
220
|
|
222
221
|
key = vault.identity.OidcKey("key",
|
222
|
+
name="key",
|
223
223
|
allowed_client_ids=["*"],
|
224
224
|
rotation_period=3600,
|
225
225
|
verification_ttl=3600)
|
226
226
|
app = vault.identity.OidcClient("app",
|
227
|
+
name="application",
|
227
228
|
key=key.name,
|
228
229
|
redirect_uris=[
|
229
230
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -232,10 +233,11 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
232
233
|
],
|
233
234
|
id_token_ttl=2400,
|
234
235
|
access_token_ttl=7200)
|
235
|
-
provider = vault.identity.OidcProvider("provider",
|
236
|
+
provider = vault.identity.OidcProvider("provider",
|
237
|
+
name="provider",
|
238
|
+
allowed_client_ids=[test["clientId"]])
|
236
239
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
237
240
|
```
|
238
|
-
<!--End PulumiCodeChooser -->
|
239
241
|
|
240
242
|
|
241
243
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -275,16 +277,17 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
275
277
|
"""
|
276
278
|
## Example Usage
|
277
279
|
|
278
|
-
<!--Start PulumiCodeChooser -->
|
279
280
|
```python
|
280
281
|
import pulumi
|
281
282
|
import pulumi_vault as vault
|
282
283
|
|
283
284
|
key = vault.identity.OidcKey("key",
|
285
|
+
name="key",
|
284
286
|
allowed_client_ids=["*"],
|
285
287
|
rotation_period=3600,
|
286
288
|
verification_ttl=3600)
|
287
289
|
app = vault.identity.OidcClient("app",
|
290
|
+
name="application",
|
288
291
|
key=key.name,
|
289
292
|
redirect_uris=[
|
290
293
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -293,10 +296,11 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
293
296
|
],
|
294
297
|
id_token_ttl=2400,
|
295
298
|
access_token_ttl=7200)
|
296
|
-
provider = vault.identity.OidcProvider("provider",
|
299
|
+
provider = vault.identity.OidcProvider("provider",
|
300
|
+
name="provider",
|
301
|
+
allowed_client_ids=[test["clientId"]])
|
297
302
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
298
303
|
```
|
299
|
-
<!--End PulumiCodeChooser -->
|
300
304
|
|
301
305
|
|
302
306
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -81,16 +81,17 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
81
81
|
"""
|
82
82
|
## Example Usage
|
83
83
|
|
84
|
-
<!--Start PulumiCodeChooser -->
|
85
84
|
```python
|
86
85
|
import pulumi
|
87
86
|
import pulumi_vault as vault
|
88
87
|
|
89
88
|
key = vault.identity.OidcKey("key",
|
89
|
+
name="key",
|
90
90
|
allowed_client_ids=["*"],
|
91
91
|
rotation_period=3600,
|
92
92
|
verification_ttl=3600)
|
93
93
|
app = vault.identity.OidcClient("app",
|
94
|
+
name="application",
|
94
95
|
key=key.name,
|
95
96
|
redirect_uris=[
|
96
97
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -99,10 +100,11 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
99
100
|
],
|
100
101
|
id_token_ttl=2400,
|
101
102
|
access_token_ttl=7200)
|
102
|
-
provider = vault.identity.OidcProvider("provider",
|
103
|
+
provider = vault.identity.OidcProvider("provider",
|
104
|
+
name="provider",
|
105
|
+
allowed_client_ids=[test["clientId"]])
|
103
106
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
104
107
|
```
|
105
|
-
<!--End PulumiCodeChooser -->
|
106
108
|
|
107
109
|
|
108
110
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -131,16 +133,17 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
131
133
|
"""
|
132
134
|
## Example Usage
|
133
135
|
|
134
|
-
<!--Start PulumiCodeChooser -->
|
135
136
|
```python
|
136
137
|
import pulumi
|
137
138
|
import pulumi_vault as vault
|
138
139
|
|
139
140
|
key = vault.identity.OidcKey("key",
|
141
|
+
name="key",
|
140
142
|
allowed_client_ids=["*"],
|
141
143
|
rotation_period=3600,
|
142
144
|
verification_ttl=3600)
|
143
145
|
app = vault.identity.OidcClient("app",
|
146
|
+
name="application",
|
144
147
|
key=key.name,
|
145
148
|
redirect_uris=[
|
146
149
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -149,10 +152,11 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
149
152
|
],
|
150
153
|
id_token_ttl=2400,
|
151
154
|
access_token_ttl=7200)
|
152
|
-
provider = vault.identity.OidcProvider("provider",
|
155
|
+
provider = vault.identity.OidcProvider("provider",
|
156
|
+
name="provider",
|
157
|
+
allowed_client_ids=[test["clientId"]])
|
153
158
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
154
159
|
```
|
155
|
-
<!--End PulumiCodeChooser -->
|
156
160
|
|
157
161
|
|
158
162
|
:param str name: The name of the OIDC Provider in Vault.
|