pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -311,6 +311,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
311
311
|
|
312
312
|
## Example Usage
|
313
313
|
|
314
|
+
<!--Start PulumiCodeChooser -->
|
314
315
|
```python
|
315
316
|
import pulumi
|
316
317
|
import pulumi_vault as vault
|
@@ -319,6 +320,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
319
320
|
role_name="my-role")
|
320
321
|
pulumi.export("role-id", role.role_id)
|
321
322
|
```
|
323
|
+
<!--End PulumiCodeChooser -->
|
322
324
|
|
323
325
|
|
324
326
|
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
@@ -414,6 +416,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
414
416
|
|
415
417
|
## Example Usage
|
416
418
|
|
419
|
+
<!--Start PulumiCodeChooser -->
|
417
420
|
```python
|
418
421
|
import pulumi
|
419
422
|
import pulumi_vault as vault
|
@@ -422,6 +425,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
422
425
|
role_name="my-role")
|
423
426
|
pulumi.export("role-id", role.role_id)
|
424
427
|
```
|
428
|
+
<!--End PulumiCodeChooser -->
|
425
429
|
|
426
430
|
|
427
431
|
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
@@ -328,13 +328,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
328
328
|
"""
|
329
329
|
## Example Usage
|
330
330
|
|
331
|
+
<!--Start PulumiCodeChooser -->
|
331
332
|
```python
|
332
333
|
import pulumi
|
333
|
-
import pulumi_std as std
|
334
334
|
import pulumi_vault as vault
|
335
335
|
|
336
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
336
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
|
337
337
|
```
|
338
|
+
<!--End PulumiCodeChooser -->
|
338
339
|
|
339
340
|
:param str resource_name: The name of the resource.
|
340
341
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -363,13 +364,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
363
364
|
"""
|
364
365
|
## Example Usage
|
365
366
|
|
367
|
+
<!--Start PulumiCodeChooser -->
|
366
368
|
```python
|
367
369
|
import pulumi
|
368
|
-
import pulumi_std as std
|
369
370
|
import pulumi_vault as vault
|
370
371
|
|
371
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
372
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
|
372
373
|
```
|
374
|
+
<!--End PulumiCodeChooser -->
|
373
375
|
|
374
376
|
:param str resource_name: The name of the resource.
|
375
377
|
:param SecretBackendArgs args: The arguments to use to populate this resource's properties.
|
@@ -219,22 +219,23 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
219
219
|
|
220
220
|
## Example Usage
|
221
221
|
|
222
|
+
<!--Start PulumiCodeChooser -->
|
222
223
|
```python
|
223
224
|
import pulumi
|
224
|
-
import
|
225
|
-
import pulumi_std as std
|
225
|
+
import pulumi_gcp as gcp
|
226
226
|
import pulumi_vault as vault
|
227
227
|
|
228
|
-
this =
|
228
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
229
229
|
gcp = vault.gcp.SecretBackend("gcp",
|
230
230
|
path="gcp",
|
231
|
-
credentials=
|
232
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
231
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
232
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
|
233
233
|
backend=gcp.path,
|
234
234
|
impersonated_account="this",
|
235
|
-
service_account_email=this
|
235
|
+
service_account_email=this.email,
|
236
236
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
237
237
|
```
|
238
|
+
<!--End PulumiCodeChooser -->
|
238
239
|
|
239
240
|
## Import
|
240
241
|
|
@@ -266,22 +267,23 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
266
267
|
|
267
268
|
## Example Usage
|
268
269
|
|
270
|
+
<!--Start PulumiCodeChooser -->
|
269
271
|
```python
|
270
272
|
import pulumi
|
271
|
-
import
|
272
|
-
import pulumi_std as std
|
273
|
+
import pulumi_gcp as gcp
|
273
274
|
import pulumi_vault as vault
|
274
275
|
|
275
|
-
this =
|
276
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
276
277
|
gcp = vault.gcp.SecretBackend("gcp",
|
277
278
|
path="gcp",
|
278
|
-
credentials=
|
279
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
279
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
280
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
|
280
281
|
backend=gcp.path,
|
281
282
|
impersonated_account="this",
|
282
|
-
service_account_email=this
|
283
|
+
service_account_email=this.email,
|
283
284
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
284
285
|
```
|
286
|
+
<!--End PulumiCodeChooser -->
|
285
287
|
|
286
288
|
## Import
|
287
289
|
|
@@ -297,15 +297,15 @@ class SecretRoleset(pulumi.CustomResource):
|
|
297
297
|
|
298
298
|
## Example Usage
|
299
299
|
|
300
|
+
<!--Start PulumiCodeChooser -->
|
300
301
|
```python
|
301
302
|
import pulumi
|
302
|
-
import pulumi_std as std
|
303
303
|
import pulumi_vault as vault
|
304
304
|
|
305
305
|
project = "my-awesome-project"
|
306
306
|
gcp = vault.gcp.SecretBackend("gcp",
|
307
307
|
path="gcp",
|
308
|
-
credentials=
|
308
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
309
309
|
roleset = vault.gcp.SecretRoleset("roleset",
|
310
310
|
backend=gcp.path,
|
311
311
|
roleset="project_viewer",
|
@@ -317,6 +317,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
317
317
|
roles=["roles/viewer"],
|
318
318
|
)])
|
319
319
|
```
|
320
|
+
<!--End PulumiCodeChooser -->
|
320
321
|
|
321
322
|
## Import
|
322
323
|
|
@@ -352,15 +353,15 @@ class SecretRoleset(pulumi.CustomResource):
|
|
352
353
|
|
353
354
|
## Example Usage
|
354
355
|
|
356
|
+
<!--Start PulumiCodeChooser -->
|
355
357
|
```python
|
356
358
|
import pulumi
|
357
|
-
import pulumi_std as std
|
358
359
|
import pulumi_vault as vault
|
359
360
|
|
360
361
|
project = "my-awesome-project"
|
361
362
|
gcp = vault.gcp.SecretBackend("gcp",
|
362
363
|
path="gcp",
|
363
|
-
credentials=
|
364
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
364
365
|
roleset = vault.gcp.SecretRoleset("roleset",
|
365
366
|
backend=gcp.path,
|
366
367
|
roleset="project_viewer",
|
@@ -372,6 +373,7 @@ class SecretRoleset(pulumi.CustomResource):
|
|
372
373
|
roles=["roles/viewer"],
|
373
374
|
)])
|
374
375
|
```
|
376
|
+
<!--End PulumiCodeChooser -->
|
375
377
|
|
376
378
|
## Import
|
377
379
|
|
@@ -299,27 +299,28 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
+
<!--Start PulumiCodeChooser -->
|
302
303
|
```python
|
303
304
|
import pulumi
|
304
|
-
import
|
305
|
-
import pulumi_std as std
|
305
|
+
import pulumi_gcp as gcp
|
306
306
|
import pulumi_vault as vault
|
307
307
|
|
308
|
-
this =
|
308
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
309
309
|
gcp = vault.gcp.SecretBackend("gcp",
|
310
310
|
path="gcp",
|
311
|
-
credentials=
|
312
|
-
static_account = vault.gcp.SecretStaticAccount("
|
311
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
312
|
+
static_account = vault.gcp.SecretStaticAccount("staticAccount",
|
313
313
|
backend=gcp.path,
|
314
314
|
static_account="project_viewer",
|
315
315
|
secret_type="access_token",
|
316
316
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
317
|
-
service_account_email=this
|
317
|
+
service_account_email=this.email,
|
318
318
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
319
|
-
resource=f"//cloudresourcemanager.googleapis.com/projects/{
|
319
|
+
resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
|
320
320
|
roles=["roles/viewer"],
|
321
321
|
)])
|
322
322
|
```
|
323
|
+
<!--End PulumiCodeChooser -->
|
323
324
|
|
324
325
|
## Import
|
325
326
|
|
@@ -356,27 +357,28 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
356
357
|
|
357
358
|
## Example Usage
|
358
359
|
|
360
|
+
<!--Start PulumiCodeChooser -->
|
359
361
|
```python
|
360
362
|
import pulumi
|
361
|
-
import
|
362
|
-
import pulumi_std as std
|
363
|
+
import pulumi_gcp as gcp
|
363
364
|
import pulumi_vault as vault
|
364
365
|
|
365
|
-
this =
|
366
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
366
367
|
gcp = vault.gcp.SecretBackend("gcp",
|
367
368
|
path="gcp",
|
368
|
-
credentials=
|
369
|
-
static_account = vault.gcp.SecretStaticAccount("
|
369
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
370
|
+
static_account = vault.gcp.SecretStaticAccount("staticAccount",
|
370
371
|
backend=gcp.path,
|
371
372
|
static_account="project_viewer",
|
372
373
|
secret_type="access_token",
|
373
374
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
374
|
-
service_account_email=this
|
375
|
+
service_account_email=this.email,
|
375
376
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
376
|
-
resource=f"//cloudresourcemanager.googleapis.com/projects/{
|
377
|
+
resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
|
377
378
|
roles=["roles/viewer"],
|
378
379
|
)])
|
379
380
|
```
|
381
|
+
<!--End PulumiCodeChooser -->
|
380
382
|
|
381
383
|
## Import
|
382
384
|
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -407,6 +407,7 @@ class Endpoint(pulumi.CustomResource):
|
|
407
407
|
"""
|
408
408
|
## Example Usage
|
409
409
|
|
410
|
+
<!--Start PulumiCodeChooser -->
|
410
411
|
```python
|
411
412
|
import pulumi
|
412
413
|
import pulumi_vault as vault
|
@@ -421,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
|
|
421
422
|
}
|
422
423
|
\"\"\",
|
423
424
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
424
|
-
u1_token = vault.generic.Endpoint("
|
425
|
+
u1_token = vault.generic.Endpoint("u1Token",
|
425
426
|
path="auth/userpass/login/u1",
|
426
427
|
disable_read=True,
|
427
428
|
disable_delete=True,
|
@@ -430,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
|
|
430
431
|
}
|
431
432
|
\"\"\",
|
432
433
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
433
|
-
u1_entity = vault.generic.Endpoint("
|
434
|
+
u1_entity = vault.generic.Endpoint("u1Entity",
|
434
435
|
disable_read=True,
|
435
436
|
disable_delete=True,
|
436
437
|
path="identity/lookup/entity",
|
@@ -444,6 +445,7 @@ class Endpoint(pulumi.CustomResource):
|
|
444
445
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
445
446
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
446
447
|
```
|
448
|
+
<!--End PulumiCodeChooser -->
|
447
449
|
|
448
450
|
## Required Vault Capabilities
|
449
451
|
|
@@ -500,6 +502,7 @@ class Endpoint(pulumi.CustomResource):
|
|
500
502
|
"""
|
501
503
|
## Example Usage
|
502
504
|
|
505
|
+
<!--Start PulumiCodeChooser -->
|
503
506
|
```python
|
504
507
|
import pulumi
|
505
508
|
import pulumi_vault as vault
|
@@ -514,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
|
|
514
517
|
}
|
515
518
|
\"\"\",
|
516
519
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
517
|
-
u1_token = vault.generic.Endpoint("
|
520
|
+
u1_token = vault.generic.Endpoint("u1Token",
|
518
521
|
path="auth/userpass/login/u1",
|
519
522
|
disable_read=True,
|
520
523
|
disable_delete=True,
|
@@ -523,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
|
|
523
526
|
}
|
524
527
|
\"\"\",
|
525
528
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
526
|
-
u1_entity = vault.generic.Endpoint("
|
529
|
+
u1_entity = vault.generic.Endpoint("u1Entity",
|
527
530
|
disable_read=True,
|
528
531
|
disable_delete=True,
|
529
532
|
path="identity/lookup/entity",
|
@@ -537,6 +540,7 @@ class Endpoint(pulumi.CustomResource):
|
|
537
540
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
538
541
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
539
542
|
```
|
543
|
+
<!--End PulumiCodeChooser -->
|
540
544
|
|
541
545
|
## Required Vault Capabilities
|
542
546
|
|
@@ -162,32 +162,14 @@ def get_secret(namespace: Optional[str] = None,
|
|
162
162
|
|
163
163
|
### Generic secret
|
164
164
|
|
165
|
+
<!--Start PulumiCodeChooser -->
|
165
166
|
```python
|
166
167
|
import pulumi
|
167
168
|
import pulumi_vault as vault
|
168
169
|
|
169
170
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
170
171
|
```
|
171
|
-
|
172
|
-
### KV
|
173
|
-
|
174
|
-
For this example, consider `example` as a path for a KV engine.
|
175
|
-
|
176
|
-
```python
|
177
|
-
import pulumi
|
178
|
-
import pulumi_vault as vault
|
179
|
-
|
180
|
-
|
181
|
-
def not_implemented(msg):
|
182
|
-
raise NotImplementedError(msg)
|
183
|
-
|
184
|
-
example_creds = vault.generic.get_secret(path="example/creds")
|
185
|
-
example_template = not_implemented("The template_file data resource is not yet supported.")
|
186
|
-
```
|
187
|
-
|
188
|
-
## Required Vault Capabilities
|
189
|
-
|
190
|
-
Use of this resource requires the `read` capability on the given path.
|
172
|
+
<!--End PulumiCodeChooser -->
|
191
173
|
|
192
174
|
|
193
175
|
:param str namespace: The namespace of the target resource.
|
@@ -239,32 +221,14 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
239
221
|
|
240
222
|
### Generic secret
|
241
223
|
|
224
|
+
<!--Start PulumiCodeChooser -->
|
242
225
|
```python
|
243
226
|
import pulumi
|
244
227
|
import pulumi_vault as vault
|
245
228
|
|
246
229
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
247
230
|
```
|
248
|
-
|
249
|
-
### KV
|
250
|
-
|
251
|
-
For this example, consider `example` as a path for a KV engine.
|
252
|
-
|
253
|
-
```python
|
254
|
-
import pulumi
|
255
|
-
import pulumi_vault as vault
|
256
|
-
|
257
|
-
|
258
|
-
def not_implemented(msg):
|
259
|
-
raise NotImplementedError(msg)
|
260
|
-
|
261
|
-
example_creds = vault.generic.get_secret(path="example/creds")
|
262
|
-
example_template = not_implemented("The template_file data resource is not yet supported.")
|
263
|
-
```
|
264
|
-
|
265
|
-
## Required Vault Capabilities
|
266
|
-
|
267
|
-
Use of this resource requires the `read` capability on the given path.
|
231
|
+
<!--End PulumiCodeChooser -->
|
268
232
|
|
269
233
|
|
270
234
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -152,12 +152,14 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
152
152
|
"""
|
153
153
|
## Example Usage
|
154
154
|
|
155
|
+
<!--Start PulumiCodeChooser -->
|
155
156
|
```python
|
156
157
|
import pulumi
|
157
158
|
import pulumi_vault as vault
|
158
159
|
|
159
160
|
example = vault.get_auth_backend(path="userpass")
|
160
161
|
```
|
162
|
+
<!--End PulumiCodeChooser -->
|
161
163
|
|
162
164
|
|
163
165
|
:param str namespace: The namespace of the target resource.
|
@@ -192,12 +194,14 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
192
194
|
"""
|
193
195
|
## Example Usage
|
194
196
|
|
197
|
+
<!--Start PulumiCodeChooser -->
|
195
198
|
```python
|
196
199
|
import pulumi
|
197
200
|
import pulumi_vault as vault
|
198
201
|
|
199
202
|
example = vault.get_auth_backend(path="userpass")
|
200
203
|
```
|
204
|
+
<!--End PulumiCodeChooser -->
|
201
205
|
|
202
206
|
|
203
207
|
:param str namespace: The namespace of the target resource.
|
@@ -92,19 +92,23 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
92
92
|
"""
|
93
93
|
## Example Usage
|
94
94
|
|
95
|
+
<!--Start PulumiCodeChooser -->
|
95
96
|
```python
|
96
97
|
import pulumi
|
97
98
|
import pulumi_vault as vault
|
98
99
|
|
99
100
|
example = vault.get_auth_backends()
|
100
101
|
```
|
102
|
+
<!--End PulumiCodeChooser -->
|
101
103
|
|
104
|
+
<!--Start PulumiCodeChooser -->
|
102
105
|
```python
|
103
106
|
import pulumi
|
104
107
|
import pulumi_vault as vault
|
105
108
|
|
106
109
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
107
110
|
```
|
111
|
+
<!--End PulumiCodeChooser -->
|
108
112
|
|
109
113
|
|
110
114
|
:param str namespace: The namespace of the target resource.
|
@@ -134,19 +138,23 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
134
138
|
"""
|
135
139
|
## Example Usage
|
136
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
137
142
|
```python
|
138
143
|
import pulumi
|
139
144
|
import pulumi_vault as vault
|
140
145
|
|
141
146
|
example = vault.get_auth_backends()
|
142
147
|
```
|
148
|
+
<!--End PulumiCodeChooser -->
|
143
149
|
|
150
|
+
<!--Start PulumiCodeChooser -->
|
144
151
|
```python
|
145
152
|
import pulumi
|
146
153
|
import pulumi_vault as vault
|
147
154
|
|
148
155
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
149
156
|
```
|
157
|
+
<!--End PulumiCodeChooser -->
|
150
158
|
|
151
159
|
|
152
160
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_namespace.py
CHANGED
@@ -110,24 +110,29 @@ def get_namespace(namespace: Optional[str] = None,
|
|
110
110
|
|
111
111
|
### Current namespace
|
112
112
|
|
113
|
+
<!--Start PulumiCodeChooser -->
|
113
114
|
```python
|
114
115
|
import pulumi
|
115
116
|
import pulumi_vault as vault
|
116
117
|
|
117
118
|
current = vault.get_namespace()
|
118
119
|
```
|
120
|
+
<!--End PulumiCodeChooser -->
|
119
121
|
|
120
122
|
### Single namespace
|
121
123
|
|
124
|
+
<!--Start PulumiCodeChooser -->
|
122
125
|
```python
|
123
126
|
import pulumi
|
124
127
|
import pulumi_vault as vault
|
125
128
|
|
126
129
|
ns1 = vault.get_namespace(path="ns1")
|
127
130
|
```
|
131
|
+
<!--End PulumiCodeChooser -->
|
128
132
|
|
129
133
|
### Nested namespace
|
130
134
|
|
135
|
+
<!--Start PulumiCodeChooser -->
|
131
136
|
```python
|
132
137
|
import pulumi
|
133
138
|
import pulumi_vault as vault
|
@@ -138,6 +143,7 @@ def get_namespace(namespace: Optional[str] = None,
|
|
138
143
|
# -> foo/parent/child/
|
139
144
|
path_fq = child.path_fq
|
140
145
|
```
|
146
|
+
<!--End PulumiCodeChooser -->
|
141
147
|
|
142
148
|
|
143
149
|
:param str namespace: The namespace to provision the resource in.
|
@@ -172,24 +178,29 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
172
178
|
|
173
179
|
### Current namespace
|
174
180
|
|
181
|
+
<!--Start PulumiCodeChooser -->
|
175
182
|
```python
|
176
183
|
import pulumi
|
177
184
|
import pulumi_vault as vault
|
178
185
|
|
179
186
|
current = vault.get_namespace()
|
180
187
|
```
|
188
|
+
<!--End PulumiCodeChooser -->
|
181
189
|
|
182
190
|
### Single namespace
|
183
191
|
|
192
|
+
<!--Start PulumiCodeChooser -->
|
184
193
|
```python
|
185
194
|
import pulumi
|
186
195
|
import pulumi_vault as vault
|
187
196
|
|
188
197
|
ns1 = vault.get_namespace(path="ns1")
|
189
198
|
```
|
199
|
+
<!--End PulumiCodeChooser -->
|
190
200
|
|
191
201
|
### Nested namespace
|
192
202
|
|
203
|
+
<!--Start PulumiCodeChooser -->
|
193
204
|
```python
|
194
205
|
import pulumi
|
195
206
|
import pulumi_vault as vault
|
@@ -200,6 +211,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
200
211
|
# -> foo/parent/child/
|
201
212
|
path_fq = child.path_fq
|
202
213
|
```
|
214
|
+
<!--End PulumiCodeChooser -->
|
203
215
|
|
204
216
|
|
205
217
|
:param str namespace: The namespace to provision the resource in.
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -72,25 +72,29 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
72
72
|
|
73
73
|
### Child namespaces
|
74
74
|
|
75
|
+
<!--Start PulumiCodeChooser -->
|
75
76
|
```python
|
76
77
|
import pulumi
|
77
78
|
import pulumi_vault as vault
|
78
79
|
|
79
80
|
children = vault.get_namespaces()
|
80
81
|
```
|
82
|
+
<!--End PulumiCodeChooser -->
|
81
83
|
|
82
84
|
### Nested namespace
|
83
85
|
|
84
86
|
To fetch the details of nested namespaces:
|
85
87
|
|
88
|
+
<!--Start PulumiCodeChooser -->
|
86
89
|
```python
|
87
90
|
import pulumi
|
88
91
|
import pulumi_vault as vault
|
89
92
|
|
90
93
|
children = vault.get_namespaces(namespace="parent")
|
91
|
-
child =
|
92
|
-
path=__key) for __key, __value in children.paths
|
94
|
+
child = [vault.get_namespace(namespace=children.namespace,
|
95
|
+
path=__key) for __key, __value in children.paths]
|
93
96
|
```
|
97
|
+
<!--End PulumiCodeChooser -->
|
94
98
|
|
95
99
|
|
96
100
|
:param str namespace: The namespace to provision the resource in.
|
@@ -116,25 +120,29 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
116
120
|
|
117
121
|
### Child namespaces
|
118
122
|
|
123
|
+
<!--Start PulumiCodeChooser -->
|
119
124
|
```python
|
120
125
|
import pulumi
|
121
126
|
import pulumi_vault as vault
|
122
127
|
|
123
128
|
children = vault.get_namespaces()
|
124
129
|
```
|
130
|
+
<!--End PulumiCodeChooser -->
|
125
131
|
|
126
132
|
### Nested namespace
|
127
133
|
|
128
134
|
To fetch the details of nested namespaces:
|
129
135
|
|
136
|
+
<!--Start PulumiCodeChooser -->
|
130
137
|
```python
|
131
138
|
import pulumi
|
132
139
|
import pulumi_vault as vault
|
133
140
|
|
134
141
|
children = vault.get_namespaces(namespace="parent")
|
135
|
-
child =
|
136
|
-
path=__key) for __key, __value in children.paths
|
142
|
+
child = [vault.get_namespace(namespace=children.namespace,
|
143
|
+
path=__key) for __key, __value in children.paths]
|
137
144
|
```
|
145
|
+
<!--End PulumiCodeChooser -->
|
138
146
|
|
139
147
|
|
140
148
|
:param str namespace: The namespace to provision the resource in.
|
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
103
103
|
"""
|
104
104
|
## Example Usage
|
105
105
|
|
106
|
+
<!--Start PulumiCodeChooser -->
|
106
107
|
```python
|
107
108
|
import pulumi
|
108
109
|
import pulumi_vault as vault
|
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
122
123
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
123
124
|
role=role))
|
124
125
|
```
|
126
|
+
<!--End PulumiCodeChooser -->
|
125
127
|
|
126
128
|
|
127
129
|
:param str backend: The path to the Nomad secret backend to
|
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
157
159
|
"""
|
158
160
|
## Example Usage
|
159
161
|
|
162
|
+
<!--Start PulumiCodeChooser -->
|
160
163
|
```python
|
161
164
|
import pulumi
|
162
165
|
import pulumi_vault as vault
|
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
176
179
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
177
180
|
role=role))
|
178
181
|
```
|
182
|
+
<!--End PulumiCodeChooser -->
|
179
183
|
|
180
184
|
|
181
185
|
:param str backend: The path to the Nomad secret backend to
|