pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/identity/entity.py
CHANGED
@@ -246,17 +246,18 @@ class Entity(pulumi.CustomResource):
|
|
246
246
|
"""
|
247
247
|
## Example Usage
|
248
248
|
|
249
|
+
<!--Start PulumiCodeChooser -->
|
249
250
|
```python
|
250
251
|
import pulumi
|
251
252
|
import pulumi_vault as vault
|
252
253
|
|
253
254
|
test = vault.identity.Entity("test",
|
254
|
-
name="tester1",
|
255
|
-
policies=["test"],
|
256
255
|
metadata={
|
257
256
|
"foo": "bar",
|
258
|
-
}
|
257
|
+
},
|
258
|
+
policies=["test"])
|
259
259
|
```
|
260
|
+
<!--End PulumiCodeChooser -->
|
260
261
|
|
261
262
|
## Import
|
262
263
|
|
@@ -287,17 +288,18 @@ class Entity(pulumi.CustomResource):
|
|
287
288
|
"""
|
288
289
|
## Example Usage
|
289
290
|
|
291
|
+
<!--Start PulumiCodeChooser -->
|
290
292
|
```python
|
291
293
|
import pulumi
|
292
294
|
import pulumi_vault as vault
|
293
295
|
|
294
296
|
test = vault.identity.Entity("test",
|
295
|
-
name="tester1",
|
296
|
-
policies=["test"],
|
297
297
|
metadata={
|
298
298
|
"foo": "bar",
|
299
|
-
}
|
299
|
+
},
|
300
|
+
policies=["test"])
|
300
301
|
```
|
302
|
+
<!--End PulumiCodeChooser -->
|
301
303
|
|
302
304
|
## Import
|
303
305
|
|
@@ -211,15 +211,16 @@ class EntityAlias(pulumi.CustomResource):
|
|
211
211
|
"""
|
212
212
|
## Example Usage
|
213
213
|
|
214
|
+
<!--Start PulumiCodeChooser -->
|
214
215
|
```python
|
215
216
|
import pulumi
|
216
217
|
import pulumi_vault as vault
|
217
218
|
|
218
219
|
test = vault.identity.EntityAlias("test",
|
219
|
-
|
220
|
-
mount_accessor="token_1f2bd5"
|
221
|
-
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
220
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
221
|
+
mount_accessor="token_1f2bd5")
|
222
222
|
```
|
223
|
+
<!--End PulumiCodeChooser -->
|
223
224
|
|
224
225
|
## Import
|
225
226
|
|
@@ -249,15 +250,16 @@ class EntityAlias(pulumi.CustomResource):
|
|
249
250
|
"""
|
250
251
|
## Example Usage
|
251
252
|
|
253
|
+
<!--Start PulumiCodeChooser -->
|
252
254
|
```python
|
253
255
|
import pulumi
|
254
256
|
import pulumi_vault as vault
|
255
257
|
|
256
258
|
test = vault.identity.EntityAlias("test",
|
257
|
-
|
258
|
-
mount_accessor="token_1f2bd5"
|
259
|
-
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
259
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
|
260
|
+
mount_accessor="token_1f2bd5")
|
260
261
|
```
|
262
|
+
<!--End PulumiCodeChooser -->
|
261
263
|
|
262
264
|
## Import
|
263
265
|
|
@@ -214,13 +214,12 @@ class EntityPolicies(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
### Exclusive Policies
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
|
-
entity = vault.identity.Entity("entity",
|
222
|
-
name="entity",
|
223
|
-
external_policies=True)
|
222
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
224
223
|
policies = vault.identity.EntityPolicies("policies",
|
225
224
|
policies=[
|
226
225
|
"default",
|
@@ -229,16 +228,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
229
228
|
exclusive=True,
|
230
229
|
entity_id=entity.id)
|
231
230
|
```
|
231
|
+
<!--End PulumiCodeChooser -->
|
232
232
|
|
233
233
|
### Non-exclusive Policies
|
234
234
|
|
235
|
+
<!--Start PulumiCodeChooser -->
|
235
236
|
```python
|
236
237
|
import pulumi
|
237
238
|
import pulumi_vault as vault
|
238
239
|
|
239
|
-
entity = vault.identity.Entity("entity",
|
240
|
-
name="entity",
|
241
|
-
external_policies=True)
|
240
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
242
241
|
default = vault.identity.EntityPolicies("default",
|
243
242
|
policies=[
|
244
243
|
"default",
|
@@ -251,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
251
250
|
exclusive=False,
|
252
251
|
entity_id=entity.id)
|
253
252
|
```
|
253
|
+
<!--End PulumiCodeChooser -->
|
254
254
|
|
255
255
|
:param str resource_name: The name of the resource.
|
256
256
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -279,13 +279,12 @@ class EntityPolicies(pulumi.CustomResource):
|
|
279
279
|
|
280
280
|
### Exclusive Policies
|
281
281
|
|
282
|
+
<!--Start PulumiCodeChooser -->
|
282
283
|
```python
|
283
284
|
import pulumi
|
284
285
|
import pulumi_vault as vault
|
285
286
|
|
286
|
-
entity = vault.identity.Entity("entity",
|
287
|
-
name="entity",
|
288
|
-
external_policies=True)
|
287
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
289
288
|
policies = vault.identity.EntityPolicies("policies",
|
290
289
|
policies=[
|
291
290
|
"default",
|
@@ -294,16 +293,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
294
293
|
exclusive=True,
|
295
294
|
entity_id=entity.id)
|
296
295
|
```
|
296
|
+
<!--End PulumiCodeChooser -->
|
297
297
|
|
298
298
|
### Non-exclusive Policies
|
299
299
|
|
300
|
+
<!--Start PulumiCodeChooser -->
|
300
301
|
```python
|
301
302
|
import pulumi
|
302
303
|
import pulumi_vault as vault
|
303
304
|
|
304
|
-
entity = vault.identity.Entity("entity",
|
305
|
-
name="entity",
|
306
|
-
external_policies=True)
|
305
|
+
entity = vault.identity.Entity("entity", external_policies=True)
|
307
306
|
default = vault.identity.EntityPolicies("default",
|
308
307
|
policies=[
|
309
308
|
"default",
|
@@ -316,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
316
315
|
exclusive=False,
|
317
316
|
entity_id=entity.id)
|
318
317
|
```
|
318
|
+
<!--End PulumiCodeChooser -->
|
319
319
|
|
320
320
|
:param str resource_name: The name of the resource.
|
321
321
|
:param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
|
@@ -254,12 +254,14 @@ def get_entity(alias_id: Optional[str] = None,
|
|
254
254
|
"""
|
255
255
|
## Example Usage
|
256
256
|
|
257
|
+
<!--Start PulumiCodeChooser -->
|
257
258
|
```python
|
258
259
|
import pulumi
|
259
260
|
import pulumi_vault as vault
|
260
261
|
|
261
262
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
262
263
|
```
|
264
|
+
<!--End PulumiCodeChooser -->
|
263
265
|
|
264
266
|
## Required Vault Capabilities
|
265
267
|
|
@@ -324,12 +326,14 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
324
326
|
"""
|
325
327
|
## Example Usage
|
326
328
|
|
329
|
+
<!--Start PulumiCodeChooser -->
|
327
330
|
```python
|
328
331
|
import pulumi
|
329
332
|
import pulumi_vault as vault
|
330
333
|
|
331
334
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
332
335
|
```
|
336
|
+
<!--End PulumiCodeChooser -->
|
333
337
|
|
334
338
|
## Required Vault Capabilities
|
335
339
|
|
@@ -325,12 +325,14 @@ def get_group(alias_id: Optional[str] = None,
|
|
325
325
|
"""
|
326
326
|
## Example Usage
|
327
327
|
|
328
|
+
<!--Start PulumiCodeChooser -->
|
328
329
|
```python
|
329
330
|
import pulumi
|
330
331
|
import pulumi_vault as vault
|
331
332
|
|
332
333
|
group = vault.identity.get_group(group_name="user")
|
333
334
|
```
|
335
|
+
<!--End PulumiCodeChooser -->
|
334
336
|
|
335
337
|
## Required Vault Capabilities
|
336
338
|
|
@@ -401,12 +403,14 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
401
403
|
"""
|
402
404
|
## Example Usage
|
403
405
|
|
406
|
+
<!--Start PulumiCodeChooser -->
|
404
407
|
```python
|
405
408
|
import pulumi
|
406
409
|
import pulumi_vault as vault
|
407
410
|
|
408
411
|
group = vault.identity.get_group(group_name="user")
|
409
412
|
```
|
413
|
+
<!--End PulumiCodeChooser -->
|
410
414
|
|
411
415
|
## Required Vault Capabilities
|
412
416
|
|
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
93
93
|
"""
|
94
94
|
## Example Usage
|
95
95
|
|
96
|
+
<!--Start PulumiCodeChooser -->
|
96
97
|
```python
|
97
98
|
import pulumi
|
98
99
|
import pulumi_vault as vault
|
99
100
|
|
100
101
|
app = vault.identity.OidcClient("app",
|
101
|
-
name="application",
|
102
102
|
redirect_uris=[
|
103
103
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
104
104
|
"http://127.0.0.1:8251/callback",
|
@@ -108,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
108
108
|
access_token_ttl=7200)
|
109
109
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
110
110
|
```
|
111
|
+
<!--End PulumiCodeChooser -->
|
111
112
|
|
112
113
|
|
113
114
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -137,12 +138,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
137
138
|
"""
|
138
139
|
## Example Usage
|
139
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
140
142
|
```python
|
141
143
|
import pulumi
|
142
144
|
import pulumi_vault as vault
|
143
145
|
|
144
146
|
app = vault.identity.OidcClient("app",
|
145
|
-
name="application",
|
146
147
|
redirect_uris=[
|
147
148
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
148
149
|
"http://127.0.0.1:8251/callback",
|
@@ -152,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
152
153
|
access_token_ttl=7200)
|
153
154
|
creds = vault.identity.get_oidc_client_creds_output(name=app.name)
|
154
155
|
```
|
156
|
+
<!--End PulumiCodeChooser -->
|
155
157
|
|
156
158
|
|
157
159
|
:param str name: The name of the OIDC Client in Vault.
|
@@ -214,17 +214,16 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
214
214
|
"""
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
220
221
|
|
221
222
|
key = vault.identity.OidcKey("key",
|
222
|
-
name="key",
|
223
223
|
allowed_client_ids=["*"],
|
224
224
|
rotation_period=3600,
|
225
225
|
verification_ttl=3600)
|
226
226
|
app = vault.identity.OidcClient("app",
|
227
|
-
name="application",
|
228
227
|
key=key.name,
|
229
228
|
redirect_uris=[
|
230
229
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -233,11 +232,10 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
233
232
|
],
|
234
233
|
id_token_ttl=2400,
|
235
234
|
access_token_ttl=7200)
|
236
|
-
provider = vault.identity.OidcProvider("provider",
|
237
|
-
name="provider",
|
238
|
-
allowed_client_ids=[test["clientId"]])
|
235
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
239
236
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
240
237
|
```
|
238
|
+
<!--End PulumiCodeChooser -->
|
241
239
|
|
242
240
|
|
243
241
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -277,17 +275,16 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
277
275
|
"""
|
278
276
|
## Example Usage
|
279
277
|
|
278
|
+
<!--Start PulumiCodeChooser -->
|
280
279
|
```python
|
281
280
|
import pulumi
|
282
281
|
import pulumi_vault as vault
|
283
282
|
|
284
283
|
key = vault.identity.OidcKey("key",
|
285
|
-
name="key",
|
286
284
|
allowed_client_ids=["*"],
|
287
285
|
rotation_period=3600,
|
288
286
|
verification_ttl=3600)
|
289
287
|
app = vault.identity.OidcClient("app",
|
290
|
-
name="application",
|
291
288
|
key=key.name,
|
292
289
|
redirect_uris=[
|
293
290
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -296,11 +293,10 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
296
293
|
],
|
297
294
|
id_token_ttl=2400,
|
298
295
|
access_token_ttl=7200)
|
299
|
-
provider = vault.identity.OidcProvider("provider",
|
300
|
-
name="provider",
|
301
|
-
allowed_client_ids=[test["clientId"]])
|
296
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
302
297
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
303
298
|
```
|
299
|
+
<!--End PulumiCodeChooser -->
|
304
300
|
|
305
301
|
|
306
302
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -81,17 +81,16 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
81
81
|
"""
|
82
82
|
## Example Usage
|
83
83
|
|
84
|
+
<!--Start PulumiCodeChooser -->
|
84
85
|
```python
|
85
86
|
import pulumi
|
86
87
|
import pulumi_vault as vault
|
87
88
|
|
88
89
|
key = vault.identity.OidcKey("key",
|
89
|
-
name="key",
|
90
90
|
allowed_client_ids=["*"],
|
91
91
|
rotation_period=3600,
|
92
92
|
verification_ttl=3600)
|
93
93
|
app = vault.identity.OidcClient("app",
|
94
|
-
name="application",
|
95
94
|
key=key.name,
|
96
95
|
redirect_uris=[
|
97
96
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -100,11 +99,10 @@ def get_oidc_public_keys(name: Optional[str] = None,
|
|
100
99
|
],
|
101
100
|
id_token_ttl=2400,
|
102
101
|
access_token_ttl=7200)
|
103
|
-
provider = vault.identity.OidcProvider("provider",
|
104
|
-
name="provider",
|
105
|
-
allowed_client_ids=[test["clientId"]])
|
102
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
106
103
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
107
104
|
```
|
105
|
+
<!--End PulumiCodeChooser -->
|
108
106
|
|
109
107
|
|
110
108
|
:param str name: The name of the OIDC Provider in Vault.
|
@@ -133,17 +131,16 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
133
131
|
"""
|
134
132
|
## Example Usage
|
135
133
|
|
134
|
+
<!--Start PulumiCodeChooser -->
|
136
135
|
```python
|
137
136
|
import pulumi
|
138
137
|
import pulumi_vault as vault
|
139
138
|
|
140
139
|
key = vault.identity.OidcKey("key",
|
141
|
-
name="key",
|
142
140
|
allowed_client_ids=["*"],
|
143
141
|
rotation_period=3600,
|
144
142
|
verification_ttl=3600)
|
145
143
|
app = vault.identity.OidcClient("app",
|
146
|
-
name="application",
|
147
144
|
key=key.name,
|
148
145
|
redirect_uris=[
|
149
146
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -152,11 +149,10 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
|
|
152
149
|
],
|
153
150
|
id_token_ttl=2400,
|
154
151
|
access_token_ttl=7200)
|
155
|
-
provider = vault.identity.OidcProvider("provider",
|
156
|
-
name="provider",
|
157
|
-
allowed_client_ids=[test["clientId"]])
|
152
|
+
provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
|
158
153
|
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
159
154
|
```
|
155
|
+
<!--End PulumiCodeChooser -->
|
160
156
|
|
161
157
|
|
162
158
|
:param str name: The name of the OIDC Provider in Vault.
|
pulumi_vault/identity/group.py
CHANGED
@@ -416,36 +416,38 @@ class Group(pulumi.CustomResource):
|
|
416
416
|
|
417
417
|
### Internal Group
|
418
418
|
|
419
|
+
<!--Start PulumiCodeChooser -->
|
419
420
|
```python
|
420
421
|
import pulumi
|
421
422
|
import pulumi_vault as vault
|
422
423
|
|
423
424
|
internal = vault.identity.Group("internal",
|
424
|
-
|
425
|
-
|
425
|
+
metadata={
|
426
|
+
"version": "2",
|
427
|
+
},
|
426
428
|
policies=[
|
427
429
|
"dev",
|
428
430
|
"test",
|
429
431
|
],
|
430
|
-
|
431
|
-
"version": "2",
|
432
|
-
})
|
432
|
+
type="internal")
|
433
433
|
```
|
434
|
+
<!--End PulumiCodeChooser -->
|
434
435
|
|
435
436
|
### External Group
|
436
437
|
|
438
|
+
<!--Start PulumiCodeChooser -->
|
437
439
|
```python
|
438
440
|
import pulumi
|
439
441
|
import pulumi_vault as vault
|
440
442
|
|
441
443
|
group = vault.identity.Group("group",
|
442
|
-
name="external",
|
443
|
-
type="external",
|
444
|
-
policies=["test"],
|
445
444
|
metadata={
|
446
445
|
"version": "1",
|
447
|
-
}
|
446
|
+
},
|
447
|
+
policies=["test"],
|
448
|
+
type="external")
|
448
449
|
```
|
450
|
+
<!--End PulumiCodeChooser -->
|
449
451
|
|
450
452
|
## Caveats
|
451
453
|
|
@@ -453,31 +455,31 @@ class Group(pulumi.CustomResource):
|
|
453
455
|
Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
|
454
456
|
|
455
457
|
This sort of pattern should be avoided:
|
458
|
+
<!--Start PulumiCodeChooser -->
|
456
459
|
```python
|
457
460
|
import pulumi
|
458
461
|
import pulumi_vault as vault
|
459
462
|
|
460
|
-
|
461
|
-
|
462
|
-
|
463
|
+
internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
|
464
|
+
metadata={
|
465
|
+
"version": "2",
|
466
|
+
},
|
463
467
|
policies=[
|
464
468
|
"dev",
|
465
469
|
"test",
|
466
470
|
],
|
471
|
+
type="internal")
|
472
|
+
internal_group = vault.identity.Group("internalGroup",
|
467
473
|
metadata={
|
468
474
|
"version": "2",
|
469
|
-
}
|
470
|
-
internal_group = vault.identity.Group("Internal",
|
471
|
-
name="Internal",
|
472
|
-
type="internal",
|
475
|
+
},
|
473
476
|
policies=[
|
474
477
|
"dev",
|
475
478
|
"test",
|
476
479
|
],
|
477
|
-
|
478
|
-
"version": "2",
|
479
|
-
})
|
480
|
+
type="internal")
|
480
481
|
```
|
482
|
+
<!--End PulumiCodeChooser -->
|
481
483
|
|
482
484
|
## Import
|
483
485
|
|
@@ -526,36 +528,38 @@ class Group(pulumi.CustomResource):
|
|
526
528
|
|
527
529
|
### Internal Group
|
528
530
|
|
531
|
+
<!--Start PulumiCodeChooser -->
|
529
532
|
```python
|
530
533
|
import pulumi
|
531
534
|
import pulumi_vault as vault
|
532
535
|
|
533
536
|
internal = vault.identity.Group("internal",
|
534
|
-
|
535
|
-
|
537
|
+
metadata={
|
538
|
+
"version": "2",
|
539
|
+
},
|
536
540
|
policies=[
|
537
541
|
"dev",
|
538
542
|
"test",
|
539
543
|
],
|
540
|
-
|
541
|
-
"version": "2",
|
542
|
-
})
|
544
|
+
type="internal")
|
543
545
|
```
|
546
|
+
<!--End PulumiCodeChooser -->
|
544
547
|
|
545
548
|
### External Group
|
546
549
|
|
550
|
+
<!--Start PulumiCodeChooser -->
|
547
551
|
```python
|
548
552
|
import pulumi
|
549
553
|
import pulumi_vault as vault
|
550
554
|
|
551
555
|
group = vault.identity.Group("group",
|
552
|
-
name="external",
|
553
|
-
type="external",
|
554
|
-
policies=["test"],
|
555
556
|
metadata={
|
556
557
|
"version": "1",
|
557
|
-
}
|
558
|
+
},
|
559
|
+
policies=["test"],
|
560
|
+
type="external")
|
558
561
|
```
|
562
|
+
<!--End PulumiCodeChooser -->
|
559
563
|
|
560
564
|
## Caveats
|
561
565
|
|
@@ -563,31 +567,31 @@ class Group(pulumi.CustomResource):
|
|
563
567
|
Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
|
564
568
|
|
565
569
|
This sort of pattern should be avoided:
|
570
|
+
<!--Start PulumiCodeChooser -->
|
566
571
|
```python
|
567
572
|
import pulumi
|
568
573
|
import pulumi_vault as vault
|
569
574
|
|
570
|
-
|
571
|
-
|
572
|
-
|
575
|
+
internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
|
576
|
+
metadata={
|
577
|
+
"version": "2",
|
578
|
+
},
|
573
579
|
policies=[
|
574
580
|
"dev",
|
575
581
|
"test",
|
576
582
|
],
|
583
|
+
type="internal")
|
584
|
+
internal_group = vault.identity.Group("internalGroup",
|
577
585
|
metadata={
|
578
586
|
"version": "2",
|
579
|
-
}
|
580
|
-
internal_group = vault.identity.Group("Internal",
|
581
|
-
name="Internal",
|
582
|
-
type="internal",
|
587
|
+
},
|
583
588
|
policies=[
|
584
589
|
"dev",
|
585
590
|
"test",
|
586
591
|
],
|
587
|
-
|
588
|
-
"version": "2",
|
589
|
-
})
|
592
|
+
type="internal")
|
590
593
|
```
|
594
|
+
<!--End PulumiCodeChooser -->
|
591
595
|
|
592
596
|
## Import
|
593
597
|
|
@@ -181,12 +181,12 @@ class GroupAlias(pulumi.CustomResource):
|
|
181
181
|
|
182
182
|
## Example Usage
|
183
183
|
|
184
|
+
<!--Start PulumiCodeChooser -->
|
184
185
|
```python
|
185
186
|
import pulumi
|
186
187
|
import pulumi_vault as vault
|
187
188
|
|
188
189
|
group = vault.identity.Group("group",
|
189
|
-
name="test",
|
190
190
|
type="external",
|
191
191
|
policies=["test"])
|
192
192
|
github = vault.AuthBackend("github",
|
@@ -197,6 +197,7 @@ class GroupAlias(pulumi.CustomResource):
|
|
197
197
|
mount_accessor=github.accessor,
|
198
198
|
canonical_id=group.id)
|
199
199
|
```
|
200
|
+
<!--End PulumiCodeChooser -->
|
200
201
|
|
201
202
|
## Import
|
202
203
|
|
@@ -235,12 +236,12 @@ class GroupAlias(pulumi.CustomResource):
|
|
235
236
|
|
236
237
|
## Example Usage
|
237
238
|
|
239
|
+
<!--Start PulumiCodeChooser -->
|
238
240
|
```python
|
239
241
|
import pulumi
|
240
242
|
import pulumi_vault as vault
|
241
243
|
|
242
244
|
group = vault.identity.Group("group",
|
243
|
-
name="test",
|
244
245
|
type="external",
|
245
246
|
policies=["test"])
|
246
247
|
github = vault.AuthBackend("github",
|
@@ -251,6 +252,7 @@ class GroupAlias(pulumi.CustomResource):
|
|
251
252
|
mount_accessor=github.accessor,
|
252
253
|
canonical_id=group.id)
|
253
254
|
```
|
255
|
+
<!--End PulumiCodeChooser -->
|
254
256
|
|
255
257
|
## Import
|
256
258
|
|