pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -328,14 +328,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
328
328
|
|
329
329
|
## Example Usage
|
330
330
|
|
331
|
-
<!--Start PulumiCodeChooser -->
|
332
331
|
```python
|
333
332
|
import pulumi
|
334
333
|
import pulumi_vault as vault
|
335
334
|
|
336
335
|
example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
|
337
336
|
```
|
338
|
-
<!--End PulumiCodeChooser -->
|
339
337
|
|
340
338
|
## Import
|
341
339
|
|
@@ -362,14 +360,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
362
360
|
|
363
361
|
## Example Usage
|
364
362
|
|
365
|
-
<!--Start PulumiCodeChooser -->
|
366
363
|
```python
|
367
364
|
import pulumi
|
368
365
|
import pulumi_vault as vault
|
369
366
|
|
370
367
|
example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
|
371
368
|
```
|
372
|
-
<!--End PulumiCodeChooser -->
|
373
369
|
|
374
370
|
## Import
|
375
371
|
|
@@ -446,14 +446,12 @@ class MfaTotp(pulumi.CustomResource):
|
|
446
446
|
|
447
447
|
## Example Usage
|
448
448
|
|
449
|
-
<!--Start PulumiCodeChooser -->
|
450
449
|
```python
|
451
450
|
import pulumi
|
452
451
|
import pulumi_vault as vault
|
453
452
|
|
454
453
|
example = vault.identity.MfaTotp("example", issuer="issuer1")
|
455
454
|
```
|
456
|
-
<!--End PulumiCodeChooser -->
|
457
455
|
|
458
456
|
## Import
|
459
457
|
|
@@ -486,14 +484,12 @@ class MfaTotp(pulumi.CustomResource):
|
|
486
484
|
|
487
485
|
## Example Usage
|
488
486
|
|
489
|
-
<!--Start PulumiCodeChooser -->
|
490
487
|
```python
|
491
488
|
import pulumi
|
492
489
|
import pulumi_vault as vault
|
493
490
|
|
494
491
|
example = vault.identity.MfaTotp("example", issuer="issuer1")
|
495
492
|
```
|
496
|
-
<!--End PulumiCodeChooser -->
|
497
493
|
|
498
494
|
## Import
|
499
495
|
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -133,14 +133,12 @@ class Oidc(pulumi.CustomResource):
|
|
133
133
|
|
134
134
|
## Example Usage
|
135
135
|
|
136
|
-
<!--Start PulumiCodeChooser -->
|
137
136
|
```python
|
138
137
|
import pulumi
|
139
138
|
import pulumi_vault as vault
|
140
139
|
|
141
140
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
142
141
|
```
|
143
|
-
<!--End PulumiCodeChooser -->
|
144
142
|
|
145
143
|
:param str resource_name: The name of the resource.
|
146
144
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -169,14 +167,12 @@ class Oidc(pulumi.CustomResource):
|
|
169
167
|
|
170
168
|
## Example Usage
|
171
169
|
|
172
|
-
<!--Start PulumiCodeChooser -->
|
173
170
|
```python
|
174
171
|
import pulumi
|
175
172
|
import pulumi_vault as vault
|
176
173
|
|
177
174
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
178
175
|
```
|
179
|
-
<!--End PulumiCodeChooser -->
|
180
176
|
|
181
177
|
:param str resource_name: The name of the resource.
|
182
178
|
:param OidcArgs args: The arguments to use to populate this resource's properties.
|
@@ -183,23 +183,25 @@ class OidcAssignment(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
190
189
|
|
191
190
|
internal = vault.identity.Group("internal",
|
191
|
+
name="internal",
|
192
192
|
type="internal",
|
193
193
|
policies=[
|
194
194
|
"dev",
|
195
195
|
"test",
|
196
196
|
])
|
197
|
-
test = vault.identity.Entity("test",
|
197
|
+
test = vault.identity.Entity("test",
|
198
|
+
name="test",
|
199
|
+
policies=["test"])
|
198
200
|
default = vault.identity.OidcAssignment("default",
|
201
|
+
name="assignment",
|
199
202
|
entity_ids=[test.id],
|
200
203
|
group_ids=[internal.id])
|
201
204
|
```
|
202
|
-
<!--End PulumiCodeChooser -->
|
203
205
|
|
204
206
|
## Import
|
205
207
|
|
@@ -231,23 +233,25 @@ class OidcAssignment(pulumi.CustomResource):
|
|
231
233
|
|
232
234
|
## Example Usage
|
233
235
|
|
234
|
-
<!--Start PulumiCodeChooser -->
|
235
236
|
```python
|
236
237
|
import pulumi
|
237
238
|
import pulumi_vault as vault
|
238
239
|
|
239
240
|
internal = vault.identity.Group("internal",
|
241
|
+
name="internal",
|
240
242
|
type="internal",
|
241
243
|
policies=[
|
242
244
|
"dev",
|
243
245
|
"test",
|
244
246
|
])
|
245
|
-
test = vault.identity.Entity("test",
|
247
|
+
test = vault.identity.Entity("test",
|
248
|
+
name="test",
|
249
|
+
policies=["test"])
|
246
250
|
default = vault.identity.OidcAssignment("default",
|
251
|
+
name="assignment",
|
247
252
|
entity_ids=[test.id],
|
248
253
|
group_ids=[internal.id])
|
249
254
|
```
|
250
|
-
<!--End PulumiCodeChooser -->
|
251
255
|
|
252
256
|
## Import
|
253
257
|
|
@@ -373,25 +373,25 @@ class OidcClient(pulumi.CustomResource):
|
|
373
373
|
|
374
374
|
## Example Usage
|
375
375
|
|
376
|
-
<!--Start PulumiCodeChooser -->
|
377
376
|
```python
|
378
377
|
import pulumi
|
379
378
|
import pulumi_vault as vault
|
380
379
|
|
381
|
-
|
380
|
+
test = vault.identity.OidcAssignment("test",
|
381
|
+
name="my-assignment",
|
382
382
|
entity_ids=["ascbascas-2231a-sdfaa"],
|
383
383
|
group_ids=["sajkdsad-32414-sfsada"])
|
384
|
-
test_oidc_client = vault.identity.OidcClient("
|
384
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
385
|
+
name="my-app",
|
385
386
|
redirect_uris=[
|
386
387
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
387
388
|
"http://127.0.0.1:8251/callback",
|
388
389
|
"http://127.0.0.1:8080/callback",
|
389
390
|
],
|
390
|
-
assignments=[
|
391
|
+
assignments=[test.name],
|
391
392
|
id_token_ttl=2400,
|
392
393
|
access_token_ttl=7200)
|
393
394
|
```
|
394
|
-
<!--End PulumiCodeChooser -->
|
395
395
|
|
396
396
|
## Import
|
397
397
|
|
@@ -433,25 +433,25 @@ class OidcClient(pulumi.CustomResource):
|
|
433
433
|
|
434
434
|
## Example Usage
|
435
435
|
|
436
|
-
<!--Start PulumiCodeChooser -->
|
437
436
|
```python
|
438
437
|
import pulumi
|
439
438
|
import pulumi_vault as vault
|
440
439
|
|
441
|
-
|
440
|
+
test = vault.identity.OidcAssignment("test",
|
441
|
+
name="my-assignment",
|
442
442
|
entity_ids=["ascbascas-2231a-sdfaa"],
|
443
443
|
group_ids=["sajkdsad-32414-sfsada"])
|
444
|
-
test_oidc_client = vault.identity.OidcClient("
|
444
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
445
|
+
name="my-app",
|
445
446
|
redirect_uris=[
|
446
447
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
447
448
|
"http://127.0.0.1:8251/callback",
|
448
449
|
"http://127.0.0.1:8080/callback",
|
449
450
|
],
|
450
|
-
assignments=[
|
451
|
+
assignments=[test.name],
|
451
452
|
id_token_ttl=2400,
|
452
453
|
access_token_ttl=7200)
|
453
454
|
```
|
454
|
-
<!--End PulumiCodeChooser -->
|
455
455
|
|
456
456
|
## Import
|
457
457
|
|
@@ -258,18 +258,20 @@ class OidcKey(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
-
<!--Start PulumiCodeChooser -->
|
262
261
|
```python
|
263
262
|
import pulumi
|
264
263
|
import pulumi_vault as vault
|
265
264
|
|
266
|
-
key = vault.identity.OidcKey("key",
|
267
|
-
|
268
|
-
|
265
|
+
key = vault.identity.OidcKey("key",
|
266
|
+
name="key",
|
267
|
+
algorithm="RS256")
|
268
|
+
role = vault.identity.OidcRole("role",
|
269
|
+
name="role",
|
270
|
+
key=key.name)
|
271
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
269
272
|
key_name=key.name,
|
270
|
-
allowed_client_id=
|
273
|
+
allowed_client_id=role.client_id)
|
271
274
|
```
|
272
|
-
<!--End PulumiCodeChooser -->
|
273
275
|
|
274
276
|
## Import
|
275
277
|
|
@@ -303,18 +305,20 @@ class OidcKey(pulumi.CustomResource):
|
|
303
305
|
"""
|
304
306
|
## Example Usage
|
305
307
|
|
306
|
-
<!--Start PulumiCodeChooser -->
|
307
308
|
```python
|
308
309
|
import pulumi
|
309
310
|
import pulumi_vault as vault
|
310
311
|
|
311
|
-
key = vault.identity.OidcKey("key",
|
312
|
-
|
313
|
-
|
312
|
+
key = vault.identity.OidcKey("key",
|
313
|
+
name="key",
|
314
|
+
algorithm="RS256")
|
315
|
+
role = vault.identity.OidcRole("role",
|
316
|
+
name="role",
|
317
|
+
key=key.name)
|
318
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
314
319
|
key_name=key.name,
|
315
|
-
allowed_client_id=
|
320
|
+
allowed_client_id=role.client_id)
|
316
321
|
```
|
317
|
-
<!--End PulumiCodeChooser -->
|
318
322
|
|
319
323
|
## Import
|
320
324
|
|
@@ -145,18 +145,20 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
145
145
|
"""
|
146
146
|
## Example Usage
|
147
147
|
|
148
|
-
<!--Start PulumiCodeChooser -->
|
149
148
|
```python
|
150
149
|
import pulumi
|
151
150
|
import pulumi_vault as vault
|
152
151
|
|
153
|
-
key = vault.identity.OidcKey("key",
|
154
|
-
|
155
|
-
|
152
|
+
key = vault.identity.OidcKey("key",
|
153
|
+
name="key",
|
154
|
+
algorithm="RS256")
|
155
|
+
role = vault.identity.OidcRole("role",
|
156
|
+
name="role",
|
157
|
+
key=key.name)
|
158
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
156
159
|
key_name=key.name,
|
157
|
-
allowed_client_id=
|
160
|
+
allowed_client_id=role.client_id)
|
158
161
|
```
|
159
|
-
<!--End PulumiCodeChooser -->
|
160
162
|
|
161
163
|
:param str resource_name: The name of the resource.
|
162
164
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -176,18 +178,20 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
176
178
|
"""
|
177
179
|
## Example Usage
|
178
180
|
|
179
|
-
<!--Start PulumiCodeChooser -->
|
180
181
|
```python
|
181
182
|
import pulumi
|
182
183
|
import pulumi_vault as vault
|
183
184
|
|
184
|
-
key = vault.identity.OidcKey("key",
|
185
|
-
|
186
|
-
|
185
|
+
key = vault.identity.OidcKey("key",
|
186
|
+
name="key",
|
187
|
+
algorithm="RS256")
|
188
|
+
role = vault.identity.OidcRole("role",
|
189
|
+
name="role",
|
190
|
+
key=key.name)
|
191
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
187
192
|
key_name=key.name,
|
188
|
-
allowed_client_id=
|
193
|
+
allowed_client_id=role.client_id)
|
189
194
|
```
|
190
|
-
<!--End PulumiCodeChooser -->
|
191
195
|
|
192
196
|
:param str resource_name: The name of the resource.
|
193
197
|
:param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
|
@@ -273,21 +273,23 @@ class OidcProvider(pulumi.CustomResource):
|
|
273
273
|
|
274
274
|
## Example Usage
|
275
275
|
|
276
|
-
<!--Start PulumiCodeChooser -->
|
277
276
|
```python
|
278
277
|
import pulumi
|
279
278
|
import json
|
280
279
|
import pulumi_vault as vault
|
281
280
|
|
282
|
-
|
281
|
+
test = vault.identity.OidcKey("test",
|
282
|
+
name="my-key",
|
283
283
|
allowed_client_ids=["*"],
|
284
284
|
rotation_period=3600,
|
285
285
|
verification_ttl=3600)
|
286
|
-
test_oidc_assignment = vault.identity.OidcAssignment("
|
286
|
+
test_oidc_assignment = vault.identity.OidcAssignment("test",
|
287
|
+
name="my-assignment",
|
287
288
|
entity_ids=["fake-ascbascas-2231a-sdfaa"],
|
288
289
|
group_ids=["fake-sajkdsad-32414-sfsada"])
|
289
|
-
test_oidc_client = vault.identity.OidcClient("
|
290
|
-
|
290
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
291
|
+
name="application",
|
292
|
+
key=test.name,
|
291
293
|
redirect_uris=[
|
292
294
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
293
295
|
"http://127.0.0.1:8251/callback",
|
@@ -296,18 +298,19 @@ class OidcProvider(pulumi.CustomResource):
|
|
296
298
|
assignments=[test_oidc_assignment.name],
|
297
299
|
id_token_ttl=2400,
|
298
300
|
access_token_ttl=7200)
|
299
|
-
test_oidc_scope = vault.identity.OidcScope("
|
301
|
+
test_oidc_scope = vault.identity.OidcScope("test",
|
302
|
+
name="groups",
|
300
303
|
template=json.dumps({
|
301
304
|
"groups": "{{identity.entity.groups.names}}",
|
302
305
|
}),
|
303
306
|
description="Groups scope.")
|
304
|
-
test_oidc_provider = vault.identity.OidcProvider("
|
307
|
+
test_oidc_provider = vault.identity.OidcProvider("test",
|
308
|
+
name="my-provider",
|
305
309
|
https_enabled=False,
|
306
310
|
issuer_host="127.0.0.1:8200",
|
307
311
|
allowed_client_ids=[test_oidc_client.client_id],
|
308
312
|
scopes_supporteds=[test_oidc_scope.name])
|
309
313
|
```
|
310
|
-
<!--End PulumiCodeChooser -->
|
311
314
|
|
312
315
|
## Import
|
313
316
|
|
@@ -342,21 +345,23 @@ class OidcProvider(pulumi.CustomResource):
|
|
342
345
|
|
343
346
|
## Example Usage
|
344
347
|
|
345
|
-
<!--Start PulumiCodeChooser -->
|
346
348
|
```python
|
347
349
|
import pulumi
|
348
350
|
import json
|
349
351
|
import pulumi_vault as vault
|
350
352
|
|
351
|
-
|
353
|
+
test = vault.identity.OidcKey("test",
|
354
|
+
name="my-key",
|
352
355
|
allowed_client_ids=["*"],
|
353
356
|
rotation_period=3600,
|
354
357
|
verification_ttl=3600)
|
355
|
-
test_oidc_assignment = vault.identity.OidcAssignment("
|
358
|
+
test_oidc_assignment = vault.identity.OidcAssignment("test",
|
359
|
+
name="my-assignment",
|
356
360
|
entity_ids=["fake-ascbascas-2231a-sdfaa"],
|
357
361
|
group_ids=["fake-sajkdsad-32414-sfsada"])
|
358
|
-
test_oidc_client = vault.identity.OidcClient("
|
359
|
-
|
362
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
363
|
+
name="application",
|
364
|
+
key=test.name,
|
360
365
|
redirect_uris=[
|
361
366
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
362
367
|
"http://127.0.0.1:8251/callback",
|
@@ -365,18 +370,19 @@ class OidcProvider(pulumi.CustomResource):
|
|
365
370
|
assignments=[test_oidc_assignment.name],
|
366
371
|
id_token_ttl=2400,
|
367
372
|
access_token_ttl=7200)
|
368
|
-
test_oidc_scope = vault.identity.OidcScope("
|
373
|
+
test_oidc_scope = vault.identity.OidcScope("test",
|
374
|
+
name="groups",
|
369
375
|
template=json.dumps({
|
370
376
|
"groups": "{{identity.entity.groups.names}}",
|
371
377
|
}),
|
372
378
|
description="Groups scope.")
|
373
|
-
test_oidc_provider = vault.identity.OidcProvider("
|
379
|
+
test_oidc_provider = vault.identity.OidcProvider("test",
|
380
|
+
name="my-provider",
|
374
381
|
https_enabled=False,
|
375
382
|
issuer_host="127.0.0.1:8200",
|
376
383
|
allowed_client_ids=[test_oidc_client.client_id],
|
377
384
|
scopes_supporteds=[test_oidc_scope.name])
|
378
385
|
```
|
379
|
-
<!--End PulumiCodeChooser -->
|
380
386
|
|
381
387
|
## Import
|
382
388
|
|
@@ -270,38 +270,42 @@ class OidcRole(pulumi.CustomResource):
|
|
270
270
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
271
271
|
role's Client ID to allow the role to use the key.
|
272
272
|
|
273
|
-
<!--Start PulumiCodeChooser -->
|
274
273
|
```python
|
275
274
|
import pulumi
|
276
275
|
import pulumi_vault as vault
|
277
276
|
|
278
277
|
config = pulumi.Config()
|
278
|
+
# Name of the OIDC Key
|
279
279
|
key = config.get("key")
|
280
280
|
if key is None:
|
281
281
|
key = "key"
|
282
|
-
role = vault.identity.OidcRole("role",
|
283
|
-
|
282
|
+
role = vault.identity.OidcRole("role",
|
283
|
+
name="role",
|
284
|
+
key=key)
|
285
|
+
key_oidc_key = vault.identity.OidcKey("key",
|
286
|
+
name=key,
|
284
287
|
algorithm="RS256",
|
285
288
|
allowed_client_ids=[role.client_id])
|
286
289
|
```
|
287
|
-
<!--End PulumiCodeChooser -->
|
288
290
|
|
289
291
|
If you want to create the key first before creating the role, you can use a separate
|
290
292
|
resource to configure the allowed Client ID on
|
291
293
|
the key.
|
292
294
|
|
293
|
-
<!--Start PulumiCodeChooser -->
|
294
295
|
```python
|
295
296
|
import pulumi
|
296
297
|
import pulumi_vault as vault
|
297
298
|
|
298
|
-
key = vault.identity.OidcKey("key",
|
299
|
-
|
300
|
-
|
299
|
+
key = vault.identity.OidcKey("key",
|
300
|
+
name="key",
|
301
|
+
algorithm="RS256")
|
302
|
+
role = vault.identity.OidcRole("role",
|
303
|
+
name="role",
|
304
|
+
key=key.name)
|
305
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
301
306
|
key_name=key.name,
|
302
|
-
allowed_client_id=
|
307
|
+
allowed_client_id=role.client_id)
|
303
308
|
```
|
304
|
-
<!--End PulumiCodeChooser -->
|
305
309
|
|
306
310
|
## Import
|
307
311
|
|
@@ -342,38 +346,42 @@ class OidcRole(pulumi.CustomResource):
|
|
342
346
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
343
347
|
role's Client ID to allow the role to use the key.
|
344
348
|
|
345
|
-
<!--Start PulumiCodeChooser -->
|
346
349
|
```python
|
347
350
|
import pulumi
|
348
351
|
import pulumi_vault as vault
|
349
352
|
|
350
353
|
config = pulumi.Config()
|
354
|
+
# Name of the OIDC Key
|
351
355
|
key = config.get("key")
|
352
356
|
if key is None:
|
353
357
|
key = "key"
|
354
|
-
role = vault.identity.OidcRole("role",
|
355
|
-
|
358
|
+
role = vault.identity.OidcRole("role",
|
359
|
+
name="role",
|
360
|
+
key=key)
|
361
|
+
key_oidc_key = vault.identity.OidcKey("key",
|
362
|
+
name=key,
|
356
363
|
algorithm="RS256",
|
357
364
|
allowed_client_ids=[role.client_id])
|
358
365
|
```
|
359
|
-
<!--End PulumiCodeChooser -->
|
360
366
|
|
361
367
|
If you want to create the key first before creating the role, you can use a separate
|
362
368
|
resource to configure the allowed Client ID on
|
363
369
|
the key.
|
364
370
|
|
365
|
-
<!--Start PulumiCodeChooser -->
|
366
371
|
```python
|
367
372
|
import pulumi
|
368
373
|
import pulumi_vault as vault
|
369
374
|
|
370
|
-
key = vault.identity.OidcKey("key",
|
371
|
-
|
372
|
-
|
375
|
+
key = vault.identity.OidcKey("key",
|
376
|
+
name="key",
|
377
|
+
algorithm="RS256")
|
378
|
+
role = vault.identity.OidcRole("role",
|
379
|
+
name="role",
|
380
|
+
key=key.name)
|
381
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
373
382
|
key_name=key.name,
|
374
|
-
allowed_client_id=
|
383
|
+
allowed_client_id=role.client_id)
|
375
384
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
385
|
|
378
386
|
## Import
|
379
387
|
|
@@ -183,16 +183,15 @@ class OidcScope(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
190
189
|
|
191
190
|
groups = vault.identity.OidcScope("groups",
|
192
|
-
|
193
|
-
template="{\\"groups\\":{{identity.entity.groups.names}}}"
|
191
|
+
name="groups",
|
192
|
+
template="{\\"groups\\":{{identity.entity.groups.names}}}",
|
193
|
+
description="Vault OIDC Groups Scope")
|
194
194
|
```
|
195
|
-
<!--End PulumiCodeChooser -->
|
196
195
|
|
197
196
|
## Import
|
198
197
|
|
@@ -224,16 +223,15 @@ class OidcScope(pulumi.CustomResource):
|
|
224
223
|
|
225
224
|
## Example Usage
|
226
225
|
|
227
|
-
<!--Start PulumiCodeChooser -->
|
228
226
|
```python
|
229
227
|
import pulumi
|
230
228
|
import pulumi_vault as vault
|
231
229
|
|
232
230
|
groups = vault.identity.OidcScope("groups",
|
233
|
-
|
234
|
-
template="{\\"groups\\":{{identity.entity.groups.names}}}"
|
231
|
+
name="groups",
|
232
|
+
template="{\\"groups\\":{{identity.entity.groups.names}}}",
|
233
|
+
description="Vault OIDC Groups Scope")
|
235
234
|
```
|
236
|
-
<!--End PulumiCodeChooser -->
|
237
235
|
|
238
236
|
## Import
|
239
237
|
|