pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -84,11 +84,12 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
84
84
|
|
85
85
|
## Example Usage
|
86
86
|
|
87
|
+
<!--Start PulumiCodeChooser -->
|
87
88
|
```python
|
88
89
|
import pulumi
|
89
90
|
import pulumi_vault as vault
|
90
91
|
|
91
|
-
|
92
|
+
example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
92
93
|
path="secret/*",
|
93
94
|
capabilities=[
|
94
95
|
"create",
|
@@ -99,10 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
99
100
|
],
|
100
101
|
description="allow all on secrets",
|
101
102
|
)])
|
102
|
-
example_policy = vault.Policy("
|
103
|
-
name="example_policy",
|
104
|
-
policy=example.hcl)
|
103
|
+
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
105
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
106
106
|
"""
|
107
107
|
__args__ = dict()
|
108
108
|
__args__['namespace'] = namespace
|
@@ -126,11 +126,12 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
126
126
|
|
127
127
|
## Example Usage
|
128
128
|
|
129
|
+
<!--Start PulumiCodeChooser -->
|
129
130
|
```python
|
130
131
|
import pulumi
|
131
132
|
import pulumi_vault as vault
|
132
133
|
|
133
|
-
|
134
|
+
example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
134
135
|
path="secret/*",
|
135
136
|
capabilities=[
|
136
137
|
"create",
|
@@ -141,9 +142,8 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
141
142
|
],
|
142
143
|
description="allow all on secrets",
|
143
144
|
)])
|
144
|
-
example_policy = vault.Policy("
|
145
|
-
name="example_policy",
|
146
|
-
policy=example.hcl)
|
145
|
+
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
147
146
|
```
|
147
|
+
<!--End PulumiCodeChooser -->
|
148
148
|
"""
|
149
149
|
...
|
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
190
190
|
"""
|
191
191
|
## Example Usage
|
192
192
|
|
193
|
+
<!--Start PulumiCodeChooser -->
|
193
194
|
```python
|
194
195
|
import pulumi
|
195
196
|
import pulumi_vault as vault
|
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
197
198
|
main = vault.get_raft_autopilot_state()
|
198
199
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
199
200
|
```
|
201
|
+
<!--End PulumiCodeChooser -->
|
200
202
|
|
201
203
|
|
202
204
|
:param str namespace: The namespace of the target resource.
|
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
231
233
|
"""
|
232
234
|
## Example Usage
|
233
235
|
|
236
|
+
<!--Start PulumiCodeChooser -->
|
234
237
|
```python
|
235
238
|
import pulumi
|
236
239
|
import pulumi_vault as vault
|
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
238
241
|
main = vault.get_raft_autopilot_state()
|
239
242
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
240
243
|
```
|
244
|
+
<!--End PulumiCodeChooser -->
|
241
245
|
|
242
246
|
|
243
247
|
:param str namespace: The namespace of the target resource.
|
@@ -714,12 +714,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
714
|
|
715
715
|
## Example Usage
|
716
716
|
|
717
|
+
<!--Start PulumiCodeChooser -->
|
717
718
|
```python
|
718
719
|
import pulumi
|
719
720
|
import pulumi_vault as vault
|
720
721
|
|
721
722
|
example = vault.github.AuthBackend("example", organization="myorg")
|
722
723
|
```
|
724
|
+
<!--End PulumiCodeChooser -->
|
723
725
|
|
724
726
|
## Import
|
725
727
|
|
@@ -786,12 +788,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
786
788
|
|
787
789
|
## Example Usage
|
788
790
|
|
791
|
+
<!--Start PulumiCodeChooser -->
|
789
792
|
```python
|
790
793
|
import pulumi
|
791
794
|
import pulumi_vault as vault
|
792
795
|
|
793
796
|
example = vault.github.AuthBackend("example", organization="myorg")
|
794
797
|
```
|
798
|
+
<!--End PulumiCodeChooser -->
|
795
799
|
|
796
800
|
## Import
|
797
801
|
|
pulumi_vault/github/team.py
CHANGED
@@ -191,12 +191,13 @@ class Team(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
197
198
|
|
198
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_devs = vault.github.Team("
|
200
|
+
tf_devs = vault.github.Team("tfDevs",
|
200
201
|
backend=example.id,
|
201
202
|
team="terraform-developers",
|
202
203
|
policies=[
|
@@ -204,6 +205,7 @@ class Team(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
@@ -238,12 +240,13 @@ class Team(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
244
247
|
|
245
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_devs = vault.github.Team("
|
249
|
+
tf_devs = vault.github.Team("tfDevs",
|
247
250
|
backend=example.id,
|
248
251
|
team="terraform-developers",
|
249
252
|
policies=[
|
@@ -251,6 +254,7 @@ class Team(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
pulumi_vault/github/user.py
CHANGED
@@ -191,12 +191,13 @@ class User(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
197
198
|
|
198
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_user = vault.github.User("
|
200
|
+
tf_user = vault.github.User("tfUser",
|
200
201
|
backend=example.id,
|
201
202
|
user="john.doe",
|
202
203
|
policies=[
|
@@ -204,6 +205,7 @@ class User(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
@@ -238,12 +240,13 @@ class User(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
244
247
|
|
245
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_user = vault.github.User("
|
249
|
+
tf_user = vault.github.User("tfUser",
|
247
250
|
backend=example.id,
|
248
251
|
user="john.doe",
|
249
252
|
policies=[
|
@@ -251,6 +254,7 @@ class User(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
pulumi_vault/identity/entity.py
CHANGED
@@ -246,17 +246,18 @@ class Entity(pulumi.CustomResource):
|
|
246
246
|
"""
|
247
247
|
## Example Usage
|
248
248
|
|
249
|
+
<!--Start PulumiCodeChooser -->
|
249
250
|
```python
|
250
251
|
import pulumi
|
251
252
|
import pulumi_vault as vault
|
252
253
|
|
253
254
|
test = vault.identity.Entity("test",
|
254
|
-
name="tester1",
|
255
|
-
policies=["test"],
|
256
255
|
metadata={
|
257
256
|
"foo": "bar",
|
258
|
-
}
|
257
|
+
},
|
258
|
+
policies=["test"])
|
259
259
|
```
|
260
|
+
<!--End PulumiCodeChooser -->
|
260
261
|
|
261
262
|
## Import
|
262
263
|
|
@@ -287,17 +288,18 @@ class Entity(pulumi.CustomResource):
|
|
287
288
|
"""
|
288
289
|
## Example Usage
|
289
290
|
|
291
|
+
<!--Start PulumiCodeChooser -->
|
290
292
|
```python
|
291
293
|
import pulumi
|
292
294
|
import pulumi_vault as vault
|
293
295
|
|
294
296
|
test = vault.identity.Entity("test",
|
295
|
-
name="tester1",
|
296
|
-
policies=["test"],
|
297
297
|
metadata={
|
298
298
|
"foo": "bar",
|
299
|
-
}
|
299
|
+
},
|
300
|
+
policies=["test"])
|
300
301
|
```
|
302
|
+
<!--End PulumiCodeChooser -->
|
301
303
|
|
302
304
|
## Import
|
303
305
|
|
@@ -211,15 +211,16 @@ class EntityAlias(pulumi.CustomResource):
|
|
211
211
|
"""
|
212
212
|
## Example Usage
|
213
213
|
|
214
|
+
<!--Start PulumiCodeChooser -->
|
214
215
|
```python
|
215
216
|
import pulumi
|
216
217
|
import pulumi_vault as vault
|
217
218
|
|
218
219
|
test = vault.identity.EntityAlias("test",
|
219
|
-
|
220
|
-
mount_accessor="token_1f2bd5"
|
221
|
-
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
220
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
221
|
+
mount_accessor="token_1f2bd5")
|
222
222
|
```
|
223
|
+
<!--End PulumiCodeChooser -->
|
223
224
|
|
224
225
|
## Import
|
225
226
|
|
@@ -249,15 +250,16 @@ class EntityAlias(pulumi.CustomResource):
|
|
249
250
|
"""
|
250
251
|
## Example Usage
|
251
252
|
|
253
|
+
<!--Start PulumiCodeChooser -->
|
252
254
|
```python
|
253
255
|
import pulumi
|
254
256
|
import pulumi_vault as vault
|
255
257
|
|
256
258
|
test = vault.identity.EntityAlias("test",
|
257
|
-
|
258
|
-
mount_accessor="token_1f2bd5"
|
259
|
-
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
259
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
260
|
+
mount_accessor="token_1f2bd5")
|
260
261
|
```
|
262
|
+
<!--End PulumiCodeChooser -->
|
261
263
|
|
262
264
|
## Import
|
263
265
|
|
@@ -214,13 +214,12 @@ class EntityPolicies(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
### Exclusive Policies
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
|
-
entity = vault.identity.Entity("entity",
|
222
|
-
name="entity",
|
223
|
-
external_policies=True)
|
222
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
224
223
|
policies = vault.identity.EntityPolicies("policies",
|
225
224
|
policies=[
|
226
225
|
"default",
|
@@ -229,16 +228,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
229
228
|
exclusive=True,
|
230
229
|
entity_id=entity.id)
|
231
230
|
```
|
231
|
+
<!--End PulumiCodeChooser -->
|
232
232
|
|
233
233
|
### Non-exclusive Policies
|
234
234
|
|
235
|
+
<!--Start PulumiCodeChooser -->
|
235
236
|
```python
|
236
237
|
import pulumi
|
237
238
|
import pulumi_vault as vault
|
238
239
|
|
239
|
-
entity = vault.identity.Entity("entity",
|
240
|
-
name="entity",
|
241
|
-
external_policies=True)
|
240
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
242
241
|
default = vault.identity.EntityPolicies("default",
|
243
242
|
policies=[
|
244
243
|
"default",
|
@@ -251,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
251
250
|
exclusive=False,
|
252
251
|
entity_id=entity.id)
|
253
252
|
```
|
253
|
+
<!--End PulumiCodeChooser -->
|
254
254
|
|
255
255
|
:param str resource_name: The name of the resource.
|
256
256
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -279,13 +279,12 @@ class EntityPolicies(pulumi.CustomResource):
|
|
279
279
|
|
280
280
|
### Exclusive Policies
|
281
281
|
|
282
|
+
<!--Start PulumiCodeChooser -->
|
282
283
|
```python
|
283
284
|
import pulumi
|
284
285
|
import pulumi_vault as vault
|
285
286
|
|
286
|
-
entity = vault.identity.Entity("entity",
|
287
|
-
name="entity",
|
288
|
-
external_policies=True)
|
287
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
289
288
|
policies = vault.identity.EntityPolicies("policies",
|
290
289
|
policies=[
|
291
290
|
"default",
|
@@ -294,16 +293,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
294
293
|
exclusive=True,
|
295
294
|
entity_id=entity.id)
|
296
295
|
```
|
296
|
+
<!--End PulumiCodeChooser -->
|
297
297
|
|
298
298
|
### Non-exclusive Policies
|
299
299
|
|
300
|
+
<!--Start PulumiCodeChooser -->
|
300
301
|
```python
|
301
302
|
import pulumi
|
302
303
|
import pulumi_vault as vault
|
303
304
|
|
304
|
-
entity = vault.identity.Entity("entity",
|
305
|
-
name="entity",
|
306
|
-
external_policies=True)
|
305
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
307
306
|
default = vault.identity.EntityPolicies("default",
|
308
307
|
policies=[
|
309
308
|
"default",
|
@@ -316,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
316
315
|
exclusive=False,
|
317
316
|
entity_id=entity.id)
|
318
317
|
```
|
318
|
+
<!--End PulumiCodeChooser -->
|
319
319
|
|
320
320
|
:param str resource_name: The name of the resource.
|
321
321
|
:param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
|
@@ -254,12 +254,14 @@ def get_entity(alias_id: Optional[str] = None,
|
|
254
254
|
"""
|
255
255
|
## Example Usage
|
256
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
257
258
|
```python
|
258
259
|
import pulumi
|
259
260
|
import pulumi_vault as vault
|
260
261
|
|
261
262
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
262
263
|
```
|
264
|
+
<!--End PulumiCodeChooser -->
|
263
265
|
|
264
266
|
## Required Vault Capabilities
|
265
267
|
|
@@ -324,12 +326,14 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
324
326
|
"""
|
325
327
|
## Example Usage
|
326
328
|
|
329
|
+
<!--Start PulumiCodeChooser -->
|
327
330
|
```python
|
328
331
|
import pulumi
|
329
332
|
import pulumi_vault as vault
|
330
333
|
|
331
334
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
332
335
|
```
|
336
|
+
<!--End PulumiCodeChooser -->
|
333
337
|
|
334
338
|
## Required Vault Capabilities
|
335
339
|
|
@@ -325,12 +325,14 @@ def get_group(alias_id: Optional[str] = None,
|
|
325
325
|
"""
|
326
326
|
## Example Usage
|
327
327
|
|
328
|
+
<!--Start PulumiCodeChooser -->
|
328
329
|
```python
|
329
330
|
import pulumi
|
330
331
|
import pulumi_vault as vault
|
331
332
|
|
332
333
|
group = vault.identity.get_group(group_name="user")
|
333
334
|
```
|
335
|
+
<!--End PulumiCodeChooser -->
|
334
336
|
|
335
337
|
## Required Vault Capabilities
|
336
338
|
|
@@ -401,12 +403,14 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
401
403
|
"""
|
402
404
|
## Example Usage
|
403
405
|
|
406
|
+
<!--Start PulumiCodeChooser -->
|
404
407
|
```python
|
405
408
|
import pulumi
|
406
409
|
import pulumi_vault as vault
|
407
410
|
|
408
411
|
group = vault.identity.get_group(group_name="user")
|
409
412
|
```
|
413
|
+
<!--End PulumiCodeChooser -->
|
410
414
|
|
411
415
|
## Required Vault Capabilities
|
412
416
|
|
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
93
93
|
"""
|
94
94
|
## Example Usage
|
95
95
|
|
96
|
+
<!--Start PulumiCodeChooser -->
|
96
97
|
```python
|
97
98
|
import pulumi
|
98
99
|
import pulumi_vault as vault
|
99
100
|
|
100
101
|
app = vault.identity.OidcClient("app",
|
101
|
-
name="application",
|
102
102
|
redirect_uris=[
|
103
103
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
104
104
|
"http://127.0.0.1:8251/callback",
|
@@ -108,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
108
108
|
access_token_ttl=7200)
|
109
109
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
110
110
|
```
|
111
|
+
<!--End PulumiCodeChooser -->
|
111
112
|
|
112
113
|
|
113
114
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -137,12 +138,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
137
138
|
"""
|
138
139
|
## Example Usage
|
139
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
140
142
|
```python
|
141
143
|
import pulumi
|
142
144
|
import pulumi_vault as vault
|
143
145
|
|
144
146
|
app = vault.identity.OidcClient("app",
|
145
|
-
name="application",
|
146
147
|
redirect_uris=[
|
147
148
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
148
149
|
"http://127.0.0.1:8251/callback",
|
@@ -152,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
152
153
|
access_token_ttl=7200)
|
153
154
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
154
155
|
```
|
156
|
+
<!--End PulumiCodeChooser -->
|
155
157
|
|
156
158
|
|
157
159
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -214,17 +214,16 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
214
214
|
"""
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
222
|
key = vault.identity.OidcKey("key",
|
222
|
-
name="key",
|
223
223
|
allowed_client_ids=["*"],
|
224
224
|
rotation_period=3600,
|
225
225
|
verification_ttl=3600)
|
226
226
|
app = vault.identity.OidcClient("app",
|
227
|
-
name="application",
|
228
227
|
key=key.name,
|
229
228
|
redirect_uris=[
|
230
229
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -233,11 +232,10 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
233
232
|
],
|
234
233
|
id_token_ttl=2400,
|
235
234
|
access_token_ttl=7200)
|
236
|
-
provider = vault.identity.OidcProvider("provider",
|
237
|
-
name="provider",
|
238
|
-
allowed_client_ids=[test["clientId"]])
|
235
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
239
236
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
240
237
|
```
|
238
|
+
<!--End PulumiCodeChooser -->
|
241
239
|
|
242
240
|
|
243
241
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -277,17 +275,16 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
277
275
|
"""
|
278
276
|
## Example Usage
|
279
277
|
|
278
|
+
<!--Start PulumiCodeChooser -->
|
280
279
|
```python
|
281
280
|
import pulumi
|
282
281
|
import pulumi_vault as vault
|
283
282
|
|
284
283
|
key = vault.identity.OidcKey("key",
|
285
|
-
name="key",
|
286
284
|
allowed_client_ids=["*"],
|
287
285
|
rotation_period=3600,
|
288
286
|
verification_ttl=3600)
|
289
287
|
app = vault.identity.OidcClient("app",
|
290
|
-
name="application",
|
291
288
|
key=key.name,
|
292
289
|
redirect_uris=[
|
293
290
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -296,11 +293,10 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
296
293
|
],
|
297
294
|
id_token_ttl=2400,
|
298
295
|
access_token_ttl=7200)
|
299
|
-
provider = vault.identity.OidcProvider("provider",
|
300
|
-
name="provider",
|
301
|
-
allowed_client_ids=[test["clientId"]])
|
296
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
302
297
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
303
298
|
```
|
299
|
+
<!--End PulumiCodeChooser -->
|
304
300
|
|
305
301
|
|
306
302
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -81,17 +81,16 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
81
81
|
"""
|
82
82
|
## Example Usage
|
83
83
|
|
84
|
+
<!--Start PulumiCodeChooser -->
|
84
85
|
```python
|
85
86
|
import pulumi
|
86
87
|
import pulumi_vault as vault
|
87
88
|
|
88
89
|
key = vault.identity.OidcKey("key",
|
89
|
-
name="key",
|
90
90
|
allowed_client_ids=["*"],
|
91
91
|
rotation_period=3600,
|
92
92
|
verification_ttl=3600)
|
93
93
|
app = vault.identity.OidcClient("app",
|
94
|
-
name="application",
|
95
94
|
key=key.name,
|
96
95
|
redirect_uris=[
|
97
96
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -100,11 +99,10 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
100
99
|
],
|
101
100
|
id_token_ttl=2400,
|
102
101
|
access_token_ttl=7200)
|
103
|
-
provider = vault.identity.OidcProvider("provider",
|
104
|
-
name="provider",
|
105
|
-
allowed_client_ids=[test["clientId"]])
|
102
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
106
103
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
107
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
108
106
|
|
109
107
|
|
110
108
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -133,17 +131,16 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
133
131
|
"""
|
134
132
|
## Example Usage
|
135
133
|
|
134
|
+
<!--Start PulumiCodeChooser -->
|
136
135
|
```python
|
137
136
|
import pulumi
|
138
137
|
import pulumi_vault as vault
|
139
138
|
|
140
139
|
key = vault.identity.OidcKey("key",
|
141
|
-
name="key",
|
142
140
|
allowed_client_ids=["*"],
|
143
141
|
rotation_period=3600,
|
144
142
|
verification_ttl=3600)
|
145
143
|
app = vault.identity.OidcClient("app",
|
146
|
-
name="application",
|
147
144
|
key=key.name,
|
148
145
|
redirect_uris=[
|
149
146
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -152,11 +149,10 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
152
149
|
],
|
153
150
|
id_token_ttl=2400,
|
154
151
|
access_token_ttl=7200)
|
155
|
-
provider = vault.identity.OidcProvider("provider",
|
156
|
-
name="provider",
|
157
|
-
allowed_client_ids=[test["clientId"]])
|
152
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
158
153
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
159
154
|
```
|
155
|
+
<!--End PulumiCodeChooser -->
|
160
156
|
|
161
157
|
|
162
158
|
:param str name: The name of the OIDC Provider in Vault.
|