pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -328,14 +328,12 @@ class MfaPingid(pulumi.CustomResource):
328
328
 
329
329
  ## Example Usage
330
330
 
331
- <!--Start PulumiCodeChooser -->
332
331
  ```python
333
332
  import pulumi
334
333
  import pulumi_vault as vault
335
334
 
336
335
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
337
336
  ```
338
- <!--End PulumiCodeChooser -->
339
337
 
340
338
  ## Import
341
339
 
@@ -362,14 +360,12 @@ class MfaPingid(pulumi.CustomResource):
362
360
 
363
361
  ## Example Usage
364
362
 
365
- <!--Start PulumiCodeChooser -->
366
363
  ```python
367
364
  import pulumi
368
365
  import pulumi_vault as vault
369
366
 
370
367
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
371
368
  ```
372
- <!--End PulumiCodeChooser -->
373
369
 
374
370
  ## Import
375
371
 
@@ -446,14 +446,12 @@ class MfaTotp(pulumi.CustomResource):
446
446
 
447
447
  ## Example Usage
448
448
 
449
- <!--Start PulumiCodeChooser -->
450
449
  ```python
451
450
  import pulumi
452
451
  import pulumi_vault as vault
453
452
 
454
453
  example = vault.identity.MfaTotp("example", issuer="issuer1")
455
454
  ```
456
- <!--End PulumiCodeChooser -->
457
455
 
458
456
  ## Import
459
457
 
@@ -486,14 +484,12 @@ class MfaTotp(pulumi.CustomResource):
486
484
 
487
485
  ## Example Usage
488
486
 
489
- <!--Start PulumiCodeChooser -->
490
487
  ```python
491
488
  import pulumi
492
489
  import pulumi_vault as vault
493
490
 
494
491
  example = vault.identity.MfaTotp("example", issuer="issuer1")
495
492
  ```
496
- <!--End PulumiCodeChooser -->
497
493
 
498
494
  ## Import
499
495
 
@@ -133,14 +133,12 @@ class Oidc(pulumi.CustomResource):
133
133
 
134
134
  ## Example Usage
135
135
 
136
- <!--Start PulumiCodeChooser -->
137
136
  ```python
138
137
  import pulumi
139
138
  import pulumi_vault as vault
140
139
 
141
140
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
142
141
  ```
143
- <!--End PulumiCodeChooser -->
144
142
 
145
143
  :param str resource_name: The name of the resource.
146
144
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -169,14 +167,12 @@ class Oidc(pulumi.CustomResource):
169
167
 
170
168
  ## Example Usage
171
169
 
172
- <!--Start PulumiCodeChooser -->
173
170
  ```python
174
171
  import pulumi
175
172
  import pulumi_vault as vault
176
173
 
177
174
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
178
175
  ```
179
- <!--End PulumiCodeChooser -->
180
176
 
181
177
  :param str resource_name: The name of the resource.
182
178
  :param OidcArgs args: The arguments to use to populate this resource's properties.
@@ -183,23 +183,25 @@ class OidcAssignment(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
- <!--Start PulumiCodeChooser -->
187
186
  ```python
188
187
  import pulumi
189
188
  import pulumi_vault as vault
190
189
 
191
190
  internal = vault.identity.Group("internal",
191
+ name="internal",
192
192
  type="internal",
193
193
  policies=[
194
194
  "dev",
195
195
  "test",
196
196
  ])
197
- test = vault.identity.Entity("test", policies=["test"])
197
+ test = vault.identity.Entity("test",
198
+ name="test",
199
+ policies=["test"])
198
200
  default = vault.identity.OidcAssignment("default",
201
+ name="assignment",
199
202
  entity_ids=[test.id],
200
203
  group_ids=[internal.id])
201
204
  ```
202
- <!--End PulumiCodeChooser -->
203
205
 
204
206
  ## Import
205
207
 
@@ -231,23 +233,25 @@ class OidcAssignment(pulumi.CustomResource):
231
233
 
232
234
  ## Example Usage
233
235
 
234
- <!--Start PulumiCodeChooser -->
235
236
  ```python
236
237
  import pulumi
237
238
  import pulumi_vault as vault
238
239
 
239
240
  internal = vault.identity.Group("internal",
241
+ name="internal",
240
242
  type="internal",
241
243
  policies=[
242
244
  "dev",
243
245
  "test",
244
246
  ])
245
- test = vault.identity.Entity("test", policies=["test"])
247
+ test = vault.identity.Entity("test",
248
+ name="test",
249
+ policies=["test"])
246
250
  default = vault.identity.OidcAssignment("default",
251
+ name="assignment",
247
252
  entity_ids=[test.id],
248
253
  group_ids=[internal.id])
249
254
  ```
250
- <!--End PulumiCodeChooser -->
251
255
 
252
256
  ## Import
253
257
 
@@ -373,25 +373,25 @@ class OidcClient(pulumi.CustomResource):
373
373
 
374
374
  ## Example Usage
375
375
 
376
- <!--Start PulumiCodeChooser -->
377
376
  ```python
378
377
  import pulumi
379
378
  import pulumi_vault as vault
380
379
 
381
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
380
+ test = vault.identity.OidcAssignment("test",
381
+ name="my-assignment",
382
382
  entity_ids=["ascbascas-2231a-sdfaa"],
383
383
  group_ids=["sajkdsad-32414-sfsada"])
384
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
384
+ test_oidc_client = vault.identity.OidcClient("test",
385
+ name="my-app",
385
386
  redirect_uris=[
386
387
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
387
388
  "http://127.0.0.1:8251/callback",
388
389
  "http://127.0.0.1:8080/callback",
389
390
  ],
390
- assignments=[test_oidc_assignment.name],
391
+ assignments=[test.name],
391
392
  id_token_ttl=2400,
392
393
  access_token_ttl=7200)
393
394
  ```
394
- <!--End PulumiCodeChooser -->
395
395
 
396
396
  ## Import
397
397
 
@@ -433,25 +433,25 @@ class OidcClient(pulumi.CustomResource):
433
433
 
434
434
  ## Example Usage
435
435
 
436
- <!--Start PulumiCodeChooser -->
437
436
  ```python
438
437
  import pulumi
439
438
  import pulumi_vault as vault
440
439
 
441
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
440
+ test = vault.identity.OidcAssignment("test",
441
+ name="my-assignment",
442
442
  entity_ids=["ascbascas-2231a-sdfaa"],
443
443
  group_ids=["sajkdsad-32414-sfsada"])
444
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
444
+ test_oidc_client = vault.identity.OidcClient("test",
445
+ name="my-app",
445
446
  redirect_uris=[
446
447
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
447
448
  "http://127.0.0.1:8251/callback",
448
449
  "http://127.0.0.1:8080/callback",
449
450
  ],
450
- assignments=[test_oidc_assignment.name],
451
+ assignments=[test.name],
451
452
  id_token_ttl=2400,
452
453
  access_token_ttl=7200)
453
454
  ```
454
- <!--End PulumiCodeChooser -->
455
455
 
456
456
  ## Import
457
457
 
@@ -258,18 +258,20 @@ class OidcKey(pulumi.CustomResource):
258
258
  """
259
259
  ## Example Usage
260
260
 
261
- <!--Start PulumiCodeChooser -->
262
261
  ```python
263
262
  import pulumi
264
263
  import pulumi_vault as vault
265
264
 
266
- key = vault.identity.OidcKey("key", algorithm="RS256")
267
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
268
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
265
+ key = vault.identity.OidcKey("key",
266
+ name="key",
267
+ algorithm="RS256")
268
+ role = vault.identity.OidcRole("role",
269
+ name="role",
270
+ key=key.name)
271
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
269
272
  key_name=key.name,
270
- allowed_client_id=role_oidc_role.client_id)
273
+ allowed_client_id=role.client_id)
271
274
  ```
272
- <!--End PulumiCodeChooser -->
273
275
 
274
276
  ## Import
275
277
 
@@ -303,18 +305,20 @@ class OidcKey(pulumi.CustomResource):
303
305
  """
304
306
  ## Example Usage
305
307
 
306
- <!--Start PulumiCodeChooser -->
307
308
  ```python
308
309
  import pulumi
309
310
  import pulumi_vault as vault
310
311
 
311
- key = vault.identity.OidcKey("key", algorithm="RS256")
312
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
313
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
312
+ key = vault.identity.OidcKey("key",
313
+ name="key",
314
+ algorithm="RS256")
315
+ role = vault.identity.OidcRole("role",
316
+ name="role",
317
+ key=key.name)
318
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
314
319
  key_name=key.name,
315
- allowed_client_id=role_oidc_role.client_id)
320
+ allowed_client_id=role.client_id)
316
321
  ```
317
- <!--End PulumiCodeChooser -->
318
322
 
319
323
  ## Import
320
324
 
@@ -145,18 +145,20 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
145
145
  """
146
146
  ## Example Usage
147
147
 
148
- <!--Start PulumiCodeChooser -->
149
148
  ```python
150
149
  import pulumi
151
150
  import pulumi_vault as vault
152
151
 
153
- key = vault.identity.OidcKey("key", algorithm="RS256")
154
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
155
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
152
+ key = vault.identity.OidcKey("key",
153
+ name="key",
154
+ algorithm="RS256")
155
+ role = vault.identity.OidcRole("role",
156
+ name="role",
157
+ key=key.name)
158
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
156
159
  key_name=key.name,
157
- allowed_client_id=role_oidc_role.client_id)
160
+ allowed_client_id=role.client_id)
158
161
  ```
159
- <!--End PulumiCodeChooser -->
160
162
 
161
163
  :param str resource_name: The name of the resource.
162
164
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -176,18 +178,20 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
176
178
  """
177
179
  ## Example Usage
178
180
 
179
- <!--Start PulumiCodeChooser -->
180
181
  ```python
181
182
  import pulumi
182
183
  import pulumi_vault as vault
183
184
 
184
- key = vault.identity.OidcKey("key", algorithm="RS256")
185
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
186
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
185
+ key = vault.identity.OidcKey("key",
186
+ name="key",
187
+ algorithm="RS256")
188
+ role = vault.identity.OidcRole("role",
189
+ name="role",
190
+ key=key.name)
191
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
187
192
  key_name=key.name,
188
- allowed_client_id=role_oidc_role.client_id)
193
+ allowed_client_id=role.client_id)
189
194
  ```
190
- <!--End PulumiCodeChooser -->
191
195
 
192
196
  :param str resource_name: The name of the resource.
193
197
  :param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
@@ -273,21 +273,23 @@ class OidcProvider(pulumi.CustomResource):
273
273
 
274
274
  ## Example Usage
275
275
 
276
- <!--Start PulumiCodeChooser -->
277
276
  ```python
278
277
  import pulumi
279
278
  import json
280
279
  import pulumi_vault as vault
281
280
 
282
- test_oidc_key = vault.identity.OidcKey("testOidcKey",
281
+ test = vault.identity.OidcKey("test",
282
+ name="my-key",
283
283
  allowed_client_ids=["*"],
284
284
  rotation_period=3600,
285
285
  verification_ttl=3600)
286
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
286
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
287
+ name="my-assignment",
287
288
  entity_ids=["fake-ascbascas-2231a-sdfaa"],
288
289
  group_ids=["fake-sajkdsad-32414-sfsada"])
289
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
290
- key=test_oidc_key.name,
290
+ test_oidc_client = vault.identity.OidcClient("test",
291
+ name="application",
292
+ key=test.name,
291
293
  redirect_uris=[
292
294
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
293
295
  "http://127.0.0.1:8251/callback",
@@ -296,18 +298,19 @@ class OidcProvider(pulumi.CustomResource):
296
298
  assignments=[test_oidc_assignment.name],
297
299
  id_token_ttl=2400,
298
300
  access_token_ttl=7200)
299
- test_oidc_scope = vault.identity.OidcScope("testOidcScope",
301
+ test_oidc_scope = vault.identity.OidcScope("test",
302
+ name="groups",
300
303
  template=json.dumps({
301
304
  "groups": "{{identity.entity.groups.names}}",
302
305
  }),
303
306
  description="Groups scope.")
304
- test_oidc_provider = vault.identity.OidcProvider("testOidcProvider",
307
+ test_oidc_provider = vault.identity.OidcProvider("test",
308
+ name="my-provider",
305
309
  https_enabled=False,
306
310
  issuer_host="127.0.0.1:8200",
307
311
  allowed_client_ids=[test_oidc_client.client_id],
308
312
  scopes_supporteds=[test_oidc_scope.name])
309
313
  ```
310
- <!--End PulumiCodeChooser -->
311
314
 
312
315
  ## Import
313
316
 
@@ -342,21 +345,23 @@ class OidcProvider(pulumi.CustomResource):
342
345
 
343
346
  ## Example Usage
344
347
 
345
- <!--Start PulumiCodeChooser -->
346
348
  ```python
347
349
  import pulumi
348
350
  import json
349
351
  import pulumi_vault as vault
350
352
 
351
- test_oidc_key = vault.identity.OidcKey("testOidcKey",
353
+ test = vault.identity.OidcKey("test",
354
+ name="my-key",
352
355
  allowed_client_ids=["*"],
353
356
  rotation_period=3600,
354
357
  verification_ttl=3600)
355
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
358
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
359
+ name="my-assignment",
356
360
  entity_ids=["fake-ascbascas-2231a-sdfaa"],
357
361
  group_ids=["fake-sajkdsad-32414-sfsada"])
358
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
359
- key=test_oidc_key.name,
362
+ test_oidc_client = vault.identity.OidcClient("test",
363
+ name="application",
364
+ key=test.name,
360
365
  redirect_uris=[
361
366
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
362
367
  "http://127.0.0.1:8251/callback",
@@ -365,18 +370,19 @@ class OidcProvider(pulumi.CustomResource):
365
370
  assignments=[test_oidc_assignment.name],
366
371
  id_token_ttl=2400,
367
372
  access_token_ttl=7200)
368
- test_oidc_scope = vault.identity.OidcScope("testOidcScope",
373
+ test_oidc_scope = vault.identity.OidcScope("test",
374
+ name="groups",
369
375
  template=json.dumps({
370
376
  "groups": "{{identity.entity.groups.names}}",
371
377
  }),
372
378
  description="Groups scope.")
373
- test_oidc_provider = vault.identity.OidcProvider("testOidcProvider",
379
+ test_oidc_provider = vault.identity.OidcProvider("test",
380
+ name="my-provider",
374
381
  https_enabled=False,
375
382
  issuer_host="127.0.0.1:8200",
376
383
  allowed_client_ids=[test_oidc_client.client_id],
377
384
  scopes_supporteds=[test_oidc_scope.name])
378
385
  ```
379
- <!--End PulumiCodeChooser -->
380
386
 
381
387
  ## Import
382
388
 
@@ -270,38 +270,42 @@ class OidcRole(pulumi.CustomResource):
270
270
  exist before the role can be used to issue tokens. You must also configure the key with the
271
271
  role's Client ID to allow the role to use the key.
272
272
 
273
- <!--Start PulumiCodeChooser -->
274
273
  ```python
275
274
  import pulumi
276
275
  import pulumi_vault as vault
277
276
 
278
277
  config = pulumi.Config()
278
+ # Name of the OIDC Key
279
279
  key = config.get("key")
280
280
  if key is None:
281
281
  key = "key"
282
- role = vault.identity.OidcRole("role", key=key)
283
- key_oidc_key = vault.identity.OidcKey("keyOidcKey",
282
+ role = vault.identity.OidcRole("role",
283
+ name="role",
284
+ key=key)
285
+ key_oidc_key = vault.identity.OidcKey("key",
286
+ name=key,
284
287
  algorithm="RS256",
285
288
  allowed_client_ids=[role.client_id])
286
289
  ```
287
- <!--End PulumiCodeChooser -->
288
290
 
289
291
  If you want to create the key first before creating the role, you can use a separate
290
292
  resource to configure the allowed Client ID on
291
293
  the key.
292
294
 
293
- <!--Start PulumiCodeChooser -->
294
295
  ```python
295
296
  import pulumi
296
297
  import pulumi_vault as vault
297
298
 
298
- key = vault.identity.OidcKey("key", algorithm="RS256")
299
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
300
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
299
+ key = vault.identity.OidcKey("key",
300
+ name="key",
301
+ algorithm="RS256")
302
+ role = vault.identity.OidcRole("role",
303
+ name="role",
304
+ key=key.name)
305
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
301
306
  key_name=key.name,
302
- allowed_client_id=role_oidc_role.client_id)
307
+ allowed_client_id=role.client_id)
303
308
  ```
304
- <!--End PulumiCodeChooser -->
305
309
 
306
310
  ## Import
307
311
 
@@ -342,38 +346,42 @@ class OidcRole(pulumi.CustomResource):
342
346
  exist before the role can be used to issue tokens. You must also configure the key with the
343
347
  role's Client ID to allow the role to use the key.
344
348
 
345
- <!--Start PulumiCodeChooser -->
346
349
  ```python
347
350
  import pulumi
348
351
  import pulumi_vault as vault
349
352
 
350
353
  config = pulumi.Config()
354
+ # Name of the OIDC Key
351
355
  key = config.get("key")
352
356
  if key is None:
353
357
  key = "key"
354
- role = vault.identity.OidcRole("role", key=key)
355
- key_oidc_key = vault.identity.OidcKey("keyOidcKey",
358
+ role = vault.identity.OidcRole("role",
359
+ name="role",
360
+ key=key)
361
+ key_oidc_key = vault.identity.OidcKey("key",
362
+ name=key,
356
363
  algorithm="RS256",
357
364
  allowed_client_ids=[role.client_id])
358
365
  ```
359
- <!--End PulumiCodeChooser -->
360
366
 
361
367
  If you want to create the key first before creating the role, you can use a separate
362
368
  resource to configure the allowed Client ID on
363
369
  the key.
364
370
 
365
- <!--Start PulumiCodeChooser -->
366
371
  ```python
367
372
  import pulumi
368
373
  import pulumi_vault as vault
369
374
 
370
- key = vault.identity.OidcKey("key", algorithm="RS256")
371
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
372
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
375
+ key = vault.identity.OidcKey("key",
376
+ name="key",
377
+ algorithm="RS256")
378
+ role = vault.identity.OidcRole("role",
379
+ name="role",
380
+ key=key.name)
381
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
373
382
  key_name=key.name,
374
- allowed_client_id=role_oidc_role.client_id)
383
+ allowed_client_id=role.client_id)
375
384
  ```
376
- <!--End PulumiCodeChooser -->
377
385
 
378
386
  ## Import
379
387
 
@@ -183,16 +183,15 @@ class OidcScope(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
- <!--Start PulumiCodeChooser -->
187
186
  ```python
188
187
  import pulumi
189
188
  import pulumi_vault as vault
190
189
 
191
190
  groups = vault.identity.OidcScope("groups",
192
- description="Vault OIDC Groups Scope",
193
- template="{\\"groups\\":{{identity.entity.groups.names}}}")
191
+ name="groups",
192
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
193
+ description="Vault OIDC Groups Scope")
194
194
  ```
195
- <!--End PulumiCodeChooser -->
196
195
 
197
196
  ## Import
198
197
 
@@ -224,16 +223,15 @@ class OidcScope(pulumi.CustomResource):
224
223
 
225
224
  ## Example Usage
226
225
 
227
- <!--Start PulumiCodeChooser -->
228
226
  ```python
229
227
  import pulumi
230
228
  import pulumi_vault as vault
231
229
 
232
230
  groups = vault.identity.OidcScope("groups",
233
- description="Vault OIDC Groups Scope",
234
- template="{\\"groups\\":{{identity.entity.groups.names}}}")
231
+ name="groups",
232
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
233
+ description="Vault OIDC Groups Scope")
235
234
  ```
236
- <!--End PulumiCodeChooser -->
237
235
 
238
236
  ## Import
239
237