pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -299,27 +299,28 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
+
<!--Start PulumiCodeChooser -->
|
302
303
|
```python
|
303
304
|
import pulumi
|
304
|
-
import
|
305
|
-
import pulumi_std as std
|
305
|
+
import pulumi_gcp as gcp
|
306
306
|
import pulumi_vault as vault
|
307
307
|
|
308
|
-
this =
|
308
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
309
309
|
gcp = vault.gcp.SecretBackend("gcp",
|
310
310
|
path="gcp",
|
311
|
-
credentials=
|
312
|
-
static_account = vault.gcp.SecretStaticAccount("
|
311
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
312
|
+
static_account = vault.gcp.SecretStaticAccount("staticAccount",
|
313
313
|
backend=gcp.path,
|
314
314
|
static_account="project_viewer",
|
315
315
|
secret_type="access_token",
|
316
316
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
317
|
-
service_account_email=this
|
317
|
+
service_account_email=this.email,
|
318
318
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
319
|
-
resource=f"//cloudresourcemanager.googleapis.com/projects/{
|
319
|
+
resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
|
320
320
|
roles=["roles/viewer"],
|
321
321
|
)])
|
322
322
|
```
|
323
|
+
<!--End PulumiCodeChooser -->
|
323
324
|
|
324
325
|
## Import
|
325
326
|
|
@@ -356,27 +357,28 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
356
357
|
|
357
358
|
## Example Usage
|
358
359
|
|
360
|
+
<!--Start PulumiCodeChooser -->
|
359
361
|
```python
|
360
362
|
import pulumi
|
361
|
-
import
|
362
|
-
import pulumi_std as std
|
363
|
+
import pulumi_gcp as gcp
|
363
364
|
import pulumi_vault as vault
|
364
365
|
|
365
|
-
this =
|
366
|
+
this = gcp.service_account.Account("this", account_id="my-awesome-account")
|
366
367
|
gcp = vault.gcp.SecretBackend("gcp",
|
367
368
|
path="gcp",
|
368
|
-
credentials=
|
369
|
-
static_account = vault.gcp.SecretStaticAccount("
|
369
|
+
credentials=(lambda path: open(path).read())("credentials.json"))
|
370
|
+
static_account = vault.gcp.SecretStaticAccount("staticAccount",
|
370
371
|
backend=gcp.path,
|
371
372
|
static_account="project_viewer",
|
372
373
|
secret_type="access_token",
|
373
374
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
374
|
-
service_account_email=this
|
375
|
+
service_account_email=this.email,
|
375
376
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
376
|
-
resource=f"//cloudresourcemanager.googleapis.com/projects/{
|
377
|
+
resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
|
377
378
|
roles=["roles/viewer"],
|
378
379
|
)])
|
379
380
|
```
|
381
|
+
<!--End PulumiCodeChooser -->
|
380
382
|
|
381
383
|
## Import
|
382
384
|
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -407,6 +407,7 @@ class Endpoint(pulumi.CustomResource):
|
|
407
407
|
"""
|
408
408
|
## Example Usage
|
409
409
|
|
410
|
+
<!--Start PulumiCodeChooser -->
|
410
411
|
```python
|
411
412
|
import pulumi
|
412
413
|
import pulumi_vault as vault
|
@@ -421,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
|
|
421
422
|
}
|
422
423
|
\"\"\",
|
423
424
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
424
|
-
u1_token = vault.generic.Endpoint("
|
425
|
+
u1_token = vault.generic.Endpoint("u1Token",
|
425
426
|
path="auth/userpass/login/u1",
|
426
427
|
disable_read=True,
|
427
428
|
disable_delete=True,
|
@@ -430,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
|
|
430
431
|
}
|
431
432
|
\"\"\",
|
432
433
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
433
|
-
u1_entity = vault.generic.Endpoint("
|
434
|
+
u1_entity = vault.generic.Endpoint("u1Entity",
|
434
435
|
disable_read=True,
|
435
436
|
disable_delete=True,
|
436
437
|
path="identity/lookup/entity",
|
@@ -444,6 +445,7 @@ class Endpoint(pulumi.CustomResource):
|
|
444
445
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
445
446
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
446
447
|
```
|
448
|
+
<!--End PulumiCodeChooser -->
|
447
449
|
|
448
450
|
## Required Vault Capabilities
|
449
451
|
|
@@ -500,6 +502,7 @@ class Endpoint(pulumi.CustomResource):
|
|
500
502
|
"""
|
501
503
|
## Example Usage
|
502
504
|
|
505
|
+
<!--Start PulumiCodeChooser -->
|
503
506
|
```python
|
504
507
|
import pulumi
|
505
508
|
import pulumi_vault as vault
|
@@ -514,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
|
|
514
517
|
}
|
515
518
|
\"\"\",
|
516
519
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
517
|
-
u1_token = vault.generic.Endpoint("
|
520
|
+
u1_token = vault.generic.Endpoint("u1Token",
|
518
521
|
path="auth/userpass/login/u1",
|
519
522
|
disable_read=True,
|
520
523
|
disable_delete=True,
|
@@ -523,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
|
|
523
526
|
}
|
524
527
|
\"\"\",
|
525
528
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
526
|
-
u1_entity = vault.generic.Endpoint("
|
529
|
+
u1_entity = vault.generic.Endpoint("u1Entity",
|
527
530
|
disable_read=True,
|
528
531
|
disable_delete=True,
|
529
532
|
path="identity/lookup/entity",
|
@@ -537,6 +540,7 @@ class Endpoint(pulumi.CustomResource):
|
|
537
540
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
538
541
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
539
542
|
```
|
543
|
+
<!--End PulumiCodeChooser -->
|
540
544
|
|
541
545
|
## Required Vault Capabilities
|
542
546
|
|
@@ -162,32 +162,14 @@ def get_secret(namespace: Optional[str] = None,
|
|
162
162
|
|
163
163
|
### Generic secret
|
164
164
|
|
165
|
+
<!--Start PulumiCodeChooser -->
|
165
166
|
```python
|
166
167
|
import pulumi
|
167
168
|
import pulumi_vault as vault
|
168
169
|
|
169
170
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
170
171
|
```
|
171
|
-
|
172
|
-
### KV
|
173
|
-
|
174
|
-
For this example, consider `example` as a path for a KV engine.
|
175
|
-
|
176
|
-
```python
|
177
|
-
import pulumi
|
178
|
-
import pulumi_vault as vault
|
179
|
-
|
180
|
-
|
181
|
-
def not_implemented(msg):
|
182
|
-
raise NotImplementedError(msg)
|
183
|
-
|
184
|
-
example_creds = vault.generic.get_secret(path="example/creds")
|
185
|
-
example_template = not_implemented("The template_file data resource is not yet supported.")
|
186
|
-
```
|
187
|
-
|
188
|
-
## Required Vault Capabilities
|
189
|
-
|
190
|
-
Use of this resource requires the `read` capability on the given path.
|
172
|
+
<!--End PulumiCodeChooser -->
|
191
173
|
|
192
174
|
|
193
175
|
:param str namespace: The namespace of the target resource.
|
@@ -239,32 +221,14 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
239
221
|
|
240
222
|
### Generic secret
|
241
223
|
|
224
|
+
<!--Start PulumiCodeChooser -->
|
242
225
|
```python
|
243
226
|
import pulumi
|
244
227
|
import pulumi_vault as vault
|
245
228
|
|
246
229
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
247
230
|
```
|
248
|
-
|
249
|
-
### KV
|
250
|
-
|
251
|
-
For this example, consider `example` as a path for a KV engine.
|
252
|
-
|
253
|
-
```python
|
254
|
-
import pulumi
|
255
|
-
import pulumi_vault as vault
|
256
|
-
|
257
|
-
|
258
|
-
def not_implemented(msg):
|
259
|
-
raise NotImplementedError(msg)
|
260
|
-
|
261
|
-
example_creds = vault.generic.get_secret(path="example/creds")
|
262
|
-
example_template = not_implemented("The template_file data resource is not yet supported.")
|
263
|
-
```
|
264
|
-
|
265
|
-
## Required Vault Capabilities
|
266
|
-
|
267
|
-
Use of this resource requires the `read` capability on the given path.
|
231
|
+
<!--End PulumiCodeChooser -->
|
268
232
|
|
269
233
|
|
270
234
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -152,12 +152,14 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
152
152
|
"""
|
153
153
|
## Example Usage
|
154
154
|
|
155
|
+
<!--Start PulumiCodeChooser -->
|
155
156
|
```python
|
156
157
|
import pulumi
|
157
158
|
import pulumi_vault as vault
|
158
159
|
|
159
160
|
example = vault.get_auth_backend(path="userpass")
|
160
161
|
```
|
162
|
+
<!--End PulumiCodeChooser -->
|
161
163
|
|
162
164
|
|
163
165
|
:param str namespace: The namespace of the target resource.
|
@@ -192,12 +194,14 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
192
194
|
"""
|
193
195
|
## Example Usage
|
194
196
|
|
197
|
+
<!--Start PulumiCodeChooser -->
|
195
198
|
```python
|
196
199
|
import pulumi
|
197
200
|
import pulumi_vault as vault
|
198
201
|
|
199
202
|
example = vault.get_auth_backend(path="userpass")
|
200
203
|
```
|
204
|
+
<!--End PulumiCodeChooser -->
|
201
205
|
|
202
206
|
|
203
207
|
:param str namespace: The namespace of the target resource.
|
@@ -92,19 +92,23 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
92
92
|
"""
|
93
93
|
## Example Usage
|
94
94
|
|
95
|
+
<!--Start PulumiCodeChooser -->
|
95
96
|
```python
|
96
97
|
import pulumi
|
97
98
|
import pulumi_vault as vault
|
98
99
|
|
99
100
|
example = vault.get_auth_backends()
|
100
101
|
```
|
102
|
+
<!--End PulumiCodeChooser -->
|
101
103
|
|
104
|
+
<!--Start PulumiCodeChooser -->
|
102
105
|
```python
|
103
106
|
import pulumi
|
104
107
|
import pulumi_vault as vault
|
105
108
|
|
106
109
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
107
110
|
```
|
111
|
+
<!--End PulumiCodeChooser -->
|
108
112
|
|
109
113
|
|
110
114
|
:param str namespace: The namespace of the target resource.
|
@@ -134,19 +138,23 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
134
138
|
"""
|
135
139
|
## Example Usage
|
136
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
137
142
|
```python
|
138
143
|
import pulumi
|
139
144
|
import pulumi_vault as vault
|
140
145
|
|
141
146
|
example = vault.get_auth_backends()
|
142
147
|
```
|
148
|
+
<!--End PulumiCodeChooser -->
|
143
149
|
|
150
|
+
<!--Start PulumiCodeChooser -->
|
144
151
|
```python
|
145
152
|
import pulumi
|
146
153
|
import pulumi_vault as vault
|
147
154
|
|
148
155
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
149
156
|
```
|
157
|
+
<!--End PulumiCodeChooser -->
|
150
158
|
|
151
159
|
|
152
160
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_namespace.py
CHANGED
@@ -110,24 +110,29 @@ def get_namespace(namespace: Optional[str] = None,
|
|
110
110
|
|
111
111
|
### Current namespace
|
112
112
|
|
113
|
+
<!--Start PulumiCodeChooser -->
|
113
114
|
```python
|
114
115
|
import pulumi
|
115
116
|
import pulumi_vault as vault
|
116
117
|
|
117
118
|
current = vault.get_namespace()
|
118
119
|
```
|
120
|
+
<!--End PulumiCodeChooser -->
|
119
121
|
|
120
122
|
### Single namespace
|
121
123
|
|
124
|
+
<!--Start PulumiCodeChooser -->
|
122
125
|
```python
|
123
126
|
import pulumi
|
124
127
|
import pulumi_vault as vault
|
125
128
|
|
126
129
|
ns1 = vault.get_namespace(path="ns1")
|
127
130
|
```
|
131
|
+
<!--End PulumiCodeChooser -->
|
128
132
|
|
129
133
|
### Nested namespace
|
130
134
|
|
135
|
+
<!--Start PulumiCodeChooser -->
|
131
136
|
```python
|
132
137
|
import pulumi
|
133
138
|
import pulumi_vault as vault
|
@@ -138,6 +143,7 @@ def get_namespace(namespace: Optional[str] = None,
|
|
138
143
|
# -> foo/parent/child/
|
139
144
|
path_fq = child.path_fq
|
140
145
|
```
|
146
|
+
<!--End PulumiCodeChooser -->
|
141
147
|
|
142
148
|
|
143
149
|
:param str namespace: The namespace to provision the resource in.
|
@@ -172,24 +178,29 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
172
178
|
|
173
179
|
### Current namespace
|
174
180
|
|
181
|
+
<!--Start PulumiCodeChooser -->
|
175
182
|
```python
|
176
183
|
import pulumi
|
177
184
|
import pulumi_vault as vault
|
178
185
|
|
179
186
|
current = vault.get_namespace()
|
180
187
|
```
|
188
|
+
<!--End PulumiCodeChooser -->
|
181
189
|
|
182
190
|
### Single namespace
|
183
191
|
|
192
|
+
<!--Start PulumiCodeChooser -->
|
184
193
|
```python
|
185
194
|
import pulumi
|
186
195
|
import pulumi_vault as vault
|
187
196
|
|
188
197
|
ns1 = vault.get_namespace(path="ns1")
|
189
198
|
```
|
199
|
+
<!--End PulumiCodeChooser -->
|
190
200
|
|
191
201
|
### Nested namespace
|
192
202
|
|
203
|
+
<!--Start PulumiCodeChooser -->
|
193
204
|
```python
|
194
205
|
import pulumi
|
195
206
|
import pulumi_vault as vault
|
@@ -200,6 +211,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
200
211
|
# -> foo/parent/child/
|
201
212
|
path_fq = child.path_fq
|
202
213
|
```
|
214
|
+
<!--End PulumiCodeChooser -->
|
203
215
|
|
204
216
|
|
205
217
|
:param str namespace: The namespace to provision the resource in.
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -72,25 +72,29 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
72
72
|
|
73
73
|
### Child namespaces
|
74
74
|
|
75
|
+
<!--Start PulumiCodeChooser -->
|
75
76
|
```python
|
76
77
|
import pulumi
|
77
78
|
import pulumi_vault as vault
|
78
79
|
|
79
80
|
children = vault.get_namespaces()
|
80
81
|
```
|
82
|
+
<!--End PulumiCodeChooser -->
|
81
83
|
|
82
84
|
### Nested namespace
|
83
85
|
|
84
86
|
To fetch the details of nested namespaces:
|
85
87
|
|
88
|
+
<!--Start PulumiCodeChooser -->
|
86
89
|
```python
|
87
90
|
import pulumi
|
88
91
|
import pulumi_vault as vault
|
89
92
|
|
90
93
|
children = vault.get_namespaces(namespace="parent")
|
91
|
-
child =
|
92
|
-
path=__key) for __key, __value in children.paths
|
94
|
+
child = [vault.get_namespace(namespace=children.namespace,
|
95
|
+
path=__key) for __key, __value in children.paths]
|
93
96
|
```
|
97
|
+
<!--End PulumiCodeChooser -->
|
94
98
|
|
95
99
|
|
96
100
|
:param str namespace: The namespace to provision the resource in.
|
@@ -116,25 +120,29 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
116
120
|
|
117
121
|
### Child namespaces
|
118
122
|
|
123
|
+
<!--Start PulumiCodeChooser -->
|
119
124
|
```python
|
120
125
|
import pulumi
|
121
126
|
import pulumi_vault as vault
|
122
127
|
|
123
128
|
children = vault.get_namespaces()
|
124
129
|
```
|
130
|
+
<!--End PulumiCodeChooser -->
|
125
131
|
|
126
132
|
### Nested namespace
|
127
133
|
|
128
134
|
To fetch the details of nested namespaces:
|
129
135
|
|
136
|
+
<!--Start PulumiCodeChooser -->
|
130
137
|
```python
|
131
138
|
import pulumi
|
132
139
|
import pulumi_vault as vault
|
133
140
|
|
134
141
|
children = vault.get_namespaces(namespace="parent")
|
135
|
-
child =
|
136
|
-
path=__key) for __key, __value in children.paths
|
142
|
+
child = [vault.get_namespace(namespace=children.namespace,
|
143
|
+
path=__key) for __key, __value in children.paths]
|
137
144
|
```
|
145
|
+
<!--End PulumiCodeChooser -->
|
138
146
|
|
139
147
|
|
140
148
|
:param str namespace: The namespace to provision the resource in.
|
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
103
103
|
"""
|
104
104
|
## Example Usage
|
105
105
|
|
106
|
+
<!--Start PulumiCodeChooser -->
|
106
107
|
```python
|
107
108
|
import pulumi
|
108
109
|
import pulumi_vault as vault
|
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
122
123
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
123
124
|
role=role))
|
124
125
|
```
|
126
|
+
<!--End PulumiCodeChooser -->
|
125
127
|
|
126
128
|
|
127
129
|
:param str backend: The path to the Nomad secret backend to
|
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
157
159
|
"""
|
158
160
|
## Example Usage
|
159
161
|
|
162
|
+
<!--Start PulumiCodeChooser -->
|
160
163
|
```python
|
161
164
|
import pulumi
|
162
165
|
import pulumi_vault as vault
|
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
176
179
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
177
180
|
role=role))
|
178
181
|
```
|
182
|
+
<!--End PulumiCodeChooser -->
|
179
183
|
|
180
184
|
|
181
185
|
:param str backend: The path to the Nomad secret backend to
|
@@ -84,11 +84,12 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
84
84
|
|
85
85
|
## Example Usage
|
86
86
|
|
87
|
+
<!--Start PulumiCodeChooser -->
|
87
88
|
```python
|
88
89
|
import pulumi
|
89
90
|
import pulumi_vault as vault
|
90
91
|
|
91
|
-
|
92
|
+
example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
92
93
|
path="secret/*",
|
93
94
|
capabilities=[
|
94
95
|
"create",
|
@@ -99,10 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
99
100
|
],
|
100
101
|
description="allow all on secrets",
|
101
102
|
)])
|
102
|
-
example_policy = vault.Policy("
|
103
|
-
name="example_policy",
|
104
|
-
policy=example.hcl)
|
103
|
+
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
105
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
106
106
|
"""
|
107
107
|
__args__ = dict()
|
108
108
|
__args__['namespace'] = namespace
|
@@ -126,11 +126,12 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
126
126
|
|
127
127
|
## Example Usage
|
128
128
|
|
129
|
+
<!--Start PulumiCodeChooser -->
|
129
130
|
```python
|
130
131
|
import pulumi
|
131
132
|
import pulumi_vault as vault
|
132
133
|
|
133
|
-
|
134
|
+
example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
134
135
|
path="secret/*",
|
135
136
|
capabilities=[
|
136
137
|
"create",
|
@@ -141,9 +142,8 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
141
142
|
],
|
142
143
|
description="allow all on secrets",
|
143
144
|
)])
|
144
|
-
example_policy = vault.Policy("
|
145
|
-
name="example_policy",
|
146
|
-
policy=example.hcl)
|
145
|
+
example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
|
147
146
|
```
|
147
|
+
<!--End PulumiCodeChooser -->
|
148
148
|
"""
|
149
149
|
...
|
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
190
190
|
"""
|
191
191
|
## Example Usage
|
192
192
|
|
193
|
+
<!--Start PulumiCodeChooser -->
|
193
194
|
```python
|
194
195
|
import pulumi
|
195
196
|
import pulumi_vault as vault
|
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
197
198
|
main = vault.get_raft_autopilot_state()
|
198
199
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
199
200
|
```
|
201
|
+
<!--End PulumiCodeChooser -->
|
200
202
|
|
201
203
|
|
202
204
|
:param str namespace: The namespace of the target resource.
|
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
231
233
|
"""
|
232
234
|
## Example Usage
|
233
235
|
|
236
|
+
<!--Start PulumiCodeChooser -->
|
234
237
|
```python
|
235
238
|
import pulumi
|
236
239
|
import pulumi_vault as vault
|
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
238
241
|
main = vault.get_raft_autopilot_state()
|
239
242
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
240
243
|
```
|
244
|
+
<!--End PulumiCodeChooser -->
|
241
245
|
|
242
246
|
|
243
247
|
:param str namespace: The namespace of the target resource.
|
@@ -714,12 +714,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
714
|
|
715
715
|
## Example Usage
|
716
716
|
|
717
|
+
<!--Start PulumiCodeChooser -->
|
717
718
|
```python
|
718
719
|
import pulumi
|
719
720
|
import pulumi_vault as vault
|
720
721
|
|
721
722
|
example = vault.github.AuthBackend("example", organization="myorg")
|
722
723
|
```
|
724
|
+
<!--End PulumiCodeChooser -->
|
723
725
|
|
724
726
|
## Import
|
725
727
|
|
@@ -786,12 +788,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
786
788
|
|
787
789
|
## Example Usage
|
788
790
|
|
791
|
+
<!--Start PulumiCodeChooser -->
|
789
792
|
```python
|
790
793
|
import pulumi
|
791
794
|
import pulumi_vault as vault
|
792
795
|
|
793
796
|
example = vault.github.AuthBackend("example", organization="myorg")
|
794
797
|
```
|
798
|
+
<!--End PulumiCodeChooser -->
|
795
799
|
|
796
800
|
## Import
|
797
801
|
|
pulumi_vault/github/team.py
CHANGED
@@ -191,12 +191,13 @@ class Team(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
197
198
|
|
198
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_devs = vault.github.Team("
|
200
|
+
tf_devs = vault.github.Team("tfDevs",
|
200
201
|
backend=example.id,
|
201
202
|
team="terraform-developers",
|
202
203
|
policies=[
|
@@ -204,6 +205,7 @@ class Team(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
@@ -238,12 +240,13 @@ class Team(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
244
247
|
|
245
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_devs = vault.github.Team("
|
249
|
+
tf_devs = vault.github.Team("tfDevs",
|
247
250
|
backend=example.id,
|
248
251
|
team="terraform-developers",
|
249
252
|
policies=[
|
@@ -251,6 +254,7 @@ class Team(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
pulumi_vault/github/user.py
CHANGED
@@ -191,12 +191,13 @@ class User(pulumi.CustomResource):
|
|
191
191
|
|
192
192
|
## Example Usage
|
193
193
|
|
194
|
+
<!--Start PulumiCodeChooser -->
|
194
195
|
```python
|
195
196
|
import pulumi
|
196
197
|
import pulumi_vault as vault
|
197
198
|
|
198
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_user = vault.github.User("
|
200
|
+
tf_user = vault.github.User("tfUser",
|
200
201
|
backend=example.id,
|
201
202
|
user="john.doe",
|
202
203
|
policies=[
|
@@ -204,6 +205,7 @@ class User(pulumi.CustomResource):
|
|
204
205
|
"read-only",
|
205
206
|
])
|
206
207
|
```
|
208
|
+
<!--End PulumiCodeChooser -->
|
207
209
|
|
208
210
|
## Import
|
209
211
|
|
@@ -238,12 +240,13 @@ class User(pulumi.CustomResource):
|
|
238
240
|
|
239
241
|
## Example Usage
|
240
242
|
|
243
|
+
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
244
247
|
|
245
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_user = vault.github.User("
|
249
|
+
tf_user = vault.github.User("tfUser",
|
247
250
|
backend=example.id,
|
248
251
|
user="john.doe",
|
249
252
|
policies=[
|
@@ -251,6 +254,7 @@ class User(pulumi.CustomResource):
|
|
251
254
|
"read-only",
|
252
255
|
])
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|