pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -923,6 +923,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
923
923
|
"""
|
924
924
|
## Example Usage
|
925
925
|
|
926
|
+
<!--Start PulumiCodeChooser -->
|
926
927
|
```python
|
927
928
|
import pulumi
|
928
929
|
import pulumi_vault as vault
|
@@ -932,7 +933,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
932
933
|
type="database")
|
933
934
|
postgres = vault.database.SecretBackendConnection("postgres",
|
934
935
|
backend=db.path,
|
935
|
-
name="postgres",
|
936
936
|
allowed_roles=[
|
937
937
|
"dev",
|
938
938
|
"prod",
|
@@ -941,6 +941,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
941
941
|
connection_url="postgres://username:password@host:port/database",
|
942
942
|
))
|
943
943
|
```
|
944
|
+
<!--End PulumiCodeChooser -->
|
944
945
|
|
945
946
|
## Import
|
946
947
|
|
@@ -995,6 +996,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
995
996
|
"""
|
996
997
|
## Example Usage
|
997
998
|
|
999
|
+
<!--Start PulumiCodeChooser -->
|
998
1000
|
```python
|
999
1001
|
import pulumi
|
1000
1002
|
import pulumi_vault as vault
|
@@ -1004,7 +1006,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1004
1006
|
type="database")
|
1005
1007
|
postgres = vault.database.SecretBackendConnection("postgres",
|
1006
1008
|
backend=db.path,
|
1007
|
-
name="postgres",
|
1008
1009
|
allowed_roles=[
|
1009
1010
|
"dev",
|
1010
1011
|
"prod",
|
@@ -1013,6 +1014,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1013
1014
|
connection_url="postgres://username:password@host:port/database",
|
1014
1015
|
))
|
1015
1016
|
```
|
1017
|
+
<!--End PulumiCodeChooser -->
|
1016
1018
|
|
1017
1019
|
## Import
|
1018
1020
|
|
@@ -489,6 +489,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
489
489
|
"""
|
490
490
|
## Example Usage
|
491
491
|
|
492
|
+
<!--Start PulumiCodeChooser -->
|
492
493
|
```python
|
493
494
|
import pulumi
|
494
495
|
import pulumi_vault as vault
|
@@ -498,7 +499,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
498
499
|
type="database")
|
499
500
|
postgres = vault.database.SecretBackendConnection("postgres",
|
500
501
|
backend=db.path,
|
501
|
-
name="postgres",
|
502
502
|
allowed_roles=[
|
503
503
|
"dev",
|
504
504
|
"prod",
|
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
508
508
|
))
|
509
509
|
role = vault.database.SecretBackendRole("role",
|
510
510
|
backend=db.path,
|
511
|
-
name="dev",
|
512
511
|
db_name=postgres.name,
|
513
512
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
514
513
|
```
|
514
|
+
<!--End PulumiCodeChooser -->
|
515
515
|
|
516
516
|
## Import
|
517
517
|
|
@@ -560,6 +560,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
560
560
|
"""
|
561
561
|
## Example Usage
|
562
562
|
|
563
|
+
<!--Start PulumiCodeChooser -->
|
563
564
|
```python
|
564
565
|
import pulumi
|
565
566
|
import pulumi_vault as vault
|
@@ -569,7 +570,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
569
570
|
type="database")
|
570
571
|
postgres = vault.database.SecretBackendConnection("postgres",
|
571
572
|
backend=db.path,
|
572
|
-
name="postgres",
|
573
573
|
allowed_roles=[
|
574
574
|
"dev",
|
575
575
|
"prod",
|
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
579
579
|
))
|
580
580
|
role = vault.database.SecretBackendRole("role",
|
581
581
|
backend=db.path,
|
582
|
-
name="dev",
|
583
582
|
db_name=postgres.name,
|
584
583
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
585
584
|
```
|
585
|
+
<!--End PulumiCodeChooser -->
|
586
586
|
|
587
587
|
## Import
|
588
588
|
|
@@ -370,6 +370,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
370
370
|
|
371
371
|
## Example Usage
|
372
372
|
|
373
|
+
<!--Start PulumiCodeChooser -->
|
373
374
|
```python
|
374
375
|
import pulumi
|
375
376
|
import pulumi_vault as vault
|
@@ -379,29 +380,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
379
380
|
type="database")
|
380
381
|
postgres = vault.database.SecretBackendConnection("postgres",
|
381
382
|
backend=db.path,
|
382
|
-
name="postgres",
|
383
383
|
allowed_roles=["*"],
|
384
384
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
385
385
|
connection_url="postgres://username:password@host:port/database",
|
386
386
|
))
|
387
387
|
# configure a static role with period-based rotations
|
388
|
-
period_role = vault.database.SecretBackendStaticRole("
|
388
|
+
period_role = vault.database.SecretBackendStaticRole("periodRole",
|
389
389
|
backend=db.path,
|
390
|
-
name="my-period-role",
|
391
390
|
db_name=postgres.name,
|
392
391
|
username="example",
|
393
392
|
rotation_period=3600,
|
394
393
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
395
394
|
# configure a static role with schedule-based rotations
|
396
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
395
|
+
schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
|
397
396
|
backend=db.path,
|
398
|
-
name="my-schedule-role",
|
399
397
|
db_name=postgres.name,
|
400
398
|
username="example",
|
401
399
|
rotation_schedule="0 0 * * SAT",
|
402
400
|
rotation_window=172800,
|
403
401
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
404
402
|
```
|
403
|
+
<!--End PulumiCodeChooser -->
|
405
404
|
|
406
405
|
## Import
|
407
406
|
|
@@ -445,6 +444,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
445
444
|
|
446
445
|
## Example Usage
|
447
446
|
|
447
|
+
<!--Start PulumiCodeChooser -->
|
448
448
|
```python
|
449
449
|
import pulumi
|
450
450
|
import pulumi_vault as vault
|
@@ -454,29 +454,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
454
454
|
type="database")
|
455
455
|
postgres = vault.database.SecretBackendConnection("postgres",
|
456
456
|
backend=db.path,
|
457
|
-
name="postgres",
|
458
457
|
allowed_roles=["*"],
|
459
458
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
460
459
|
connection_url="postgres://username:password@host:port/database",
|
461
460
|
))
|
462
461
|
# configure a static role with period-based rotations
|
463
|
-
period_role = vault.database.SecretBackendStaticRole("
|
462
|
+
period_role = vault.database.SecretBackendStaticRole("periodRole",
|
464
463
|
backend=db.path,
|
465
|
-
name="my-period-role",
|
466
464
|
db_name=postgres.name,
|
467
465
|
username="example",
|
468
466
|
rotation_period=3600,
|
469
467
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
470
468
|
# configure a static role with schedule-based rotations
|
471
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
469
|
+
schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
|
472
470
|
backend=db.path,
|
473
|
-
name="my-schedule-role",
|
474
471
|
db_name=postgres.name,
|
475
472
|
username="example",
|
476
473
|
rotation_schedule="0 0 * * SAT",
|
477
474
|
rotation_window=172800,
|
478
475
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
479
476
|
```
|
477
|
+
<!--End PulumiCodeChooser -->
|
480
478
|
|
481
479
|
## Import
|
482
480
|
|
@@ -1139,6 +1139,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1139
1139
|
"""
|
1140
1140
|
## Example Usage
|
1141
1141
|
|
1142
|
+
<!--Start PulumiCodeChooser -->
|
1142
1143
|
```python
|
1143
1144
|
import pulumi
|
1144
1145
|
import pulumi_vault as vault
|
@@ -1161,7 +1162,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1161
1162
|
allowed_roles=["dev2"],
|
1162
1163
|
)])
|
1163
1164
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1164
|
-
name="dev1",
|
1165
1165
|
backend=db.path,
|
1166
1166
|
db_name=db.mssqls[0].name,
|
1167
1167
|
creation_statements=[
|
@@ -1170,7 +1170,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1170
1170
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1171
1171
|
])
|
1172
1172
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1173
|
-
name="dev2",
|
1174
1173
|
backend=db.path,
|
1175
1174
|
db_name=db.postgresqls[0].name,
|
1176
1175
|
creation_statements=[
|
@@ -1178,6 +1177,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1178
1177
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1179
1178
|
])
|
1180
1179
|
```
|
1180
|
+
<!--End PulumiCodeChooser -->
|
1181
1181
|
|
1182
1182
|
## Import
|
1183
1183
|
|
@@ -1249,6 +1249,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1249
1249
|
"""
|
1250
1250
|
## Example Usage
|
1251
1251
|
|
1252
|
+
<!--Start PulumiCodeChooser -->
|
1252
1253
|
```python
|
1253
1254
|
import pulumi
|
1254
1255
|
import pulumi_vault as vault
|
@@ -1271,7 +1272,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1271
1272
|
allowed_roles=["dev2"],
|
1272
1273
|
)])
|
1273
1274
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1274
|
-
name="dev1",
|
1275
1275
|
backend=db.path,
|
1276
1276
|
db_name=db.mssqls[0].name,
|
1277
1277
|
creation_statements=[
|
@@ -1280,7 +1280,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1280
1280
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1281
1281
|
])
|
1282
1282
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1283
|
-
name="dev2",
|
1284
1283
|
backend=db.path,
|
1285
1284
|
db_name=db.postgresqls[0].name,
|
1286
1285
|
creation_statements=[
|
@@ -1288,6 +1287,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1288
1287
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1289
1288
|
])
|
1290
1289
|
```
|
1290
|
+
<!--End PulumiCodeChooser -->
|
1291
1291
|
|
1292
1292
|
## Import
|
1293
1293
|
|
pulumi_vault/egp_policy.py
CHANGED
@@ -214,19 +214,21 @@ class EgpPolicy(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
222
|
allow_all = vault.EgpPolicy("allow-all",
|
222
|
-
name="allow-all",
|
223
|
-
paths=["*"],
|
224
223
|
enforcement_level="soft-mandatory",
|
224
|
+
paths=["*"],
|
225
225
|
policy=\"\"\"main = rule {
|
226
226
|
true
|
227
227
|
}
|
228
|
+
|
228
229
|
\"\"\")
|
229
230
|
```
|
231
|
+
<!--End PulumiCodeChooser -->
|
230
232
|
|
231
233
|
:param str resource_name: The name of the resource.
|
232
234
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -252,19 +254,21 @@ class EgpPolicy(pulumi.CustomResource):
|
|
252
254
|
|
253
255
|
## Example Usage
|
254
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
255
258
|
```python
|
256
259
|
import pulumi
|
257
260
|
import pulumi_vault as vault
|
258
261
|
|
259
262
|
allow_all = vault.EgpPolicy("allow-all",
|
260
|
-
name="allow-all",
|
261
|
-
paths=["*"],
|
262
263
|
enforcement_level="soft-mandatory",
|
264
|
+
paths=["*"],
|
263
265
|
policy=\"\"\"main = rule {
|
264
266
|
true
|
265
267
|
}
|
268
|
+
|
266
269
|
\"\"\")
|
267
270
|
```
|
271
|
+
<!--End PulumiCodeChooser -->
|
268
272
|
|
269
273
|
:param str resource_name: The name of the resource.
|
270
274
|
:param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -498,6 +498,24 @@ class AuthBackend(pulumi.CustomResource):
|
|
498
498
|
"""
|
499
499
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
500
500
|
|
501
|
+
## Example Usage
|
502
|
+
|
503
|
+
<!--Start PulumiCodeChooser -->
|
504
|
+
```python
|
505
|
+
import pulumi
|
506
|
+
import pulumi_vault as vault
|
507
|
+
|
508
|
+
gcp = vault.gcp.AuthBackend("gcp",
|
509
|
+
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
510
|
+
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
511
|
+
api="www.googleapis.com",
|
512
|
+
iam="iam.googleapis.com",
|
513
|
+
crm="cloudresourcemanager.googleapis.com",
|
514
|
+
compute="compute.googleapis.com",
|
515
|
+
))
|
516
|
+
```
|
517
|
+
<!--End PulumiCodeChooser -->
|
518
|
+
|
501
519
|
## Import
|
502
520
|
|
503
521
|
GCP authentication backends can be imported using the backend name, e.g.
|
@@ -542,6 +560,24 @@ class AuthBackend(pulumi.CustomResource):
|
|
542
560
|
"""
|
543
561
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
544
562
|
|
563
|
+
## Example Usage
|
564
|
+
|
565
|
+
<!--Start PulumiCodeChooser -->
|
566
|
+
```python
|
567
|
+
import pulumi
|
568
|
+
import pulumi_vault as vault
|
569
|
+
|
570
|
+
gcp = vault.gcp.AuthBackend("gcp",
|
571
|
+
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
572
|
+
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
573
|
+
api="www.googleapis.com",
|
574
|
+
iam="iam.googleapis.com",
|
575
|
+
crm="cloudresourcemanager.googleapis.com",
|
576
|
+
compute="compute.googleapis.com",
|
577
|
+
))
|
578
|
+
```
|
579
|
+
<!--End PulumiCodeChooser -->
|
580
|
+
|
545
581
|
## Import
|
546
582
|
|
547
583
|
GCP authentication backends can be imported using the backend name, e.g.
|