pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -591,21 +591,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
591
591
|
|
592
592
|
Example using `service_account_name` mode:
|
593
593
|
|
594
|
+
<!--Start PulumiCodeChooser -->
|
594
595
|
```python
|
595
596
|
import pulumi
|
596
|
-
import pulumi_std as std
|
597
597
|
import pulumi_vault as vault
|
598
598
|
|
599
599
|
config = vault.kubernetes.SecretBackend("config",
|
600
600
|
path="kubernetes",
|
601
601
|
description="kubernetes secrets engine description",
|
602
602
|
kubernetes_host="https://127.0.0.1:61233",
|
603
|
-
kubernetes_ca_cert=
|
604
|
-
service_account_jwt=
|
603
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
604
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
605
605
|
disable_local_ca_jwt=False)
|
606
606
|
sa_example = vault.kubernetes.SecretBackendRole("sa-example",
|
607
607
|
backend=config.path,
|
608
|
-
name="service-account-name-role",
|
609
608
|
allowed_kubernetes_namespaces=["*"],
|
610
609
|
token_max_ttl=43200,
|
611
610
|
token_default_ttl=21600,
|
@@ -619,24 +618,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
619
618
|
"location": "earth",
|
620
619
|
})
|
621
620
|
```
|
621
|
+
<!--End PulumiCodeChooser -->
|
622
622
|
|
623
623
|
Example using `kubernetes_role_name` mode:
|
624
624
|
|
625
|
+
<!--Start PulumiCodeChooser -->
|
625
626
|
```python
|
626
627
|
import pulumi
|
627
|
-
import pulumi_std as std
|
628
628
|
import pulumi_vault as vault
|
629
629
|
|
630
630
|
config = vault.kubernetes.SecretBackend("config",
|
631
631
|
path="kubernetes",
|
632
632
|
description="kubernetes secrets engine description",
|
633
633
|
kubernetes_host="https://127.0.0.1:61233",
|
634
|
-
kubernetes_ca_cert=
|
635
|
-
service_account_jwt=
|
634
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
635
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
636
636
|
disable_local_ca_jwt=False)
|
637
637
|
name_example = vault.kubernetes.SecretBackendRole("name-example",
|
638
638
|
backend=config.path,
|
639
|
-
name="service-account-name-role",
|
640
639
|
allowed_kubernetes_namespaces=["*"],
|
641
640
|
token_max_ttl=43200,
|
642
641
|
token_default_ttl=21600,
|
@@ -650,24 +649,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
650
649
|
"location": "earth",
|
651
650
|
})
|
652
651
|
```
|
652
|
+
<!--End PulumiCodeChooser -->
|
653
653
|
|
654
654
|
Example using `generated_role_rules` mode:
|
655
655
|
|
656
|
+
<!--Start PulumiCodeChooser -->
|
656
657
|
```python
|
657
658
|
import pulumi
|
658
|
-
import pulumi_std as std
|
659
659
|
import pulumi_vault as vault
|
660
660
|
|
661
661
|
config = vault.kubernetes.SecretBackend("config",
|
662
662
|
path="kubernetes",
|
663
663
|
description="kubernetes secrets engine description",
|
664
664
|
kubernetes_host="https://127.0.0.1:61233",
|
665
|
-
kubernetes_ca_cert=
|
666
|
-
service_account_jwt=
|
665
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
666
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
667
667
|
disable_local_ca_jwt=False)
|
668
668
|
rules_example = vault.kubernetes.SecretBackendRole("rules-example",
|
669
669
|
backend=config.path,
|
670
|
-
name="service-account-name-role",
|
671
670
|
allowed_kubernetes_namespaces=["*"],
|
672
671
|
token_max_ttl=43200,
|
673
672
|
token_default_ttl=21600,
|
@@ -686,6 +685,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
686
685
|
"location": "earth",
|
687
686
|
})
|
688
687
|
```
|
688
|
+
<!--End PulumiCodeChooser -->
|
689
689
|
|
690
690
|
## Import
|
691
691
|
|
@@ -748,21 +748,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
748
748
|
|
749
749
|
Example using `service_account_name` mode:
|
750
750
|
|
751
|
+
<!--Start PulumiCodeChooser -->
|
751
752
|
```python
|
752
753
|
import pulumi
|
753
|
-
import pulumi_std as std
|
754
754
|
import pulumi_vault as vault
|
755
755
|
|
756
756
|
config = vault.kubernetes.SecretBackend("config",
|
757
757
|
path="kubernetes",
|
758
758
|
description="kubernetes secrets engine description",
|
759
759
|
kubernetes_host="https://127.0.0.1:61233",
|
760
|
-
kubernetes_ca_cert=
|
761
|
-
service_account_jwt=
|
760
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
761
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
762
762
|
disable_local_ca_jwt=False)
|
763
763
|
sa_example = vault.kubernetes.SecretBackendRole("sa-example",
|
764
764
|
backend=config.path,
|
765
|
-
name="service-account-name-role",
|
766
765
|
allowed_kubernetes_namespaces=["*"],
|
767
766
|
token_max_ttl=43200,
|
768
767
|
token_default_ttl=21600,
|
@@ -776,24 +775,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
776
775
|
"location": "earth",
|
777
776
|
})
|
778
777
|
```
|
778
|
+
<!--End PulumiCodeChooser -->
|
779
779
|
|
780
780
|
Example using `kubernetes_role_name` mode:
|
781
781
|
|
782
|
+
<!--Start PulumiCodeChooser -->
|
782
783
|
```python
|
783
784
|
import pulumi
|
784
|
-
import pulumi_std as std
|
785
785
|
import pulumi_vault as vault
|
786
786
|
|
787
787
|
config = vault.kubernetes.SecretBackend("config",
|
788
788
|
path="kubernetes",
|
789
789
|
description="kubernetes secrets engine description",
|
790
790
|
kubernetes_host="https://127.0.0.1:61233",
|
791
|
-
kubernetes_ca_cert=
|
792
|
-
service_account_jwt=
|
791
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
792
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
793
793
|
disable_local_ca_jwt=False)
|
794
794
|
name_example = vault.kubernetes.SecretBackendRole("name-example",
|
795
795
|
backend=config.path,
|
796
|
-
name="service-account-name-role",
|
797
796
|
allowed_kubernetes_namespaces=["*"],
|
798
797
|
token_max_ttl=43200,
|
799
798
|
token_default_ttl=21600,
|
@@ -807,24 +806,24 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
807
806
|
"location": "earth",
|
808
807
|
})
|
809
808
|
```
|
809
|
+
<!--End PulumiCodeChooser -->
|
810
810
|
|
811
811
|
Example using `generated_role_rules` mode:
|
812
812
|
|
813
|
+
<!--Start PulumiCodeChooser -->
|
813
814
|
```python
|
814
815
|
import pulumi
|
815
|
-
import pulumi_std as std
|
816
816
|
import pulumi_vault as vault
|
817
817
|
|
818
818
|
config = vault.kubernetes.SecretBackend("config",
|
819
819
|
path="kubernetes",
|
820
820
|
description="kubernetes secrets engine description",
|
821
821
|
kubernetes_host="https://127.0.0.1:61233",
|
822
|
-
kubernetes_ca_cert=
|
823
|
-
service_account_jwt=
|
822
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
823
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
824
824
|
disable_local_ca_jwt=False)
|
825
825
|
rules_example = vault.kubernetes.SecretBackendRole("rules-example",
|
826
826
|
backend=config.path,
|
827
|
-
name="service-account-name-role",
|
828
827
|
allowed_kubernetes_namespaces=["*"],
|
829
828
|
token_max_ttl=43200,
|
830
829
|
token_default_ttl=21600,
|
@@ -843,6 +842,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
843
842
|
"location": "earth",
|
844
843
|
})
|
845
844
|
```
|
845
|
+
<!--End PulumiCodeChooser -->
|
846
846
|
|
847
847
|
## Import
|
848
848
|
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -134,6 +134,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
+
<!--Start PulumiCodeChooser -->
|
137
138
|
```python
|
138
139
|
import pulumi
|
139
140
|
import json
|
@@ -154,6 +155,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
154
155
|
}))
|
155
156
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
156
157
|
```
|
158
|
+
<!--End PulumiCodeChooser -->
|
157
159
|
|
158
160
|
## Required Vault Capabilities
|
159
161
|
|
@@ -190,6 +192,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
190
192
|
"""
|
191
193
|
## Example Usage
|
192
194
|
|
195
|
+
<!--Start PulumiCodeChooser -->
|
193
196
|
```python
|
194
197
|
import pulumi
|
195
198
|
import json
|
@@ -210,6 +213,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
210
213
|
}))
|
211
214
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
212
215
|
```
|
216
|
+
<!--End PulumiCodeChooser -->
|
213
217
|
|
214
218
|
## Required Vault Capabilities
|
215
219
|
|
@@ -134,6 +134,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
+
<!--Start PulumiCodeChooser -->
|
137
138
|
```python
|
138
139
|
import pulumi
|
139
140
|
import json
|
@@ -146,9 +147,8 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
146
147
|
"version": "2",
|
147
148
|
},
|
148
149
|
description="KV Version 2 secret engine mount")
|
149
|
-
aws_secret = vault.kv.SecretV2("
|
150
|
+
aws_secret = vault.kv.SecretV2("awsSecret",
|
150
151
|
mount=kvv2.path,
|
151
|
-
name="aws_secret",
|
152
152
|
data_json=json.dumps({
|
153
153
|
"zip": "zap",
|
154
154
|
"foo": "bar",
|
@@ -156,6 +156,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
156
156
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
157
157
|
name=aws_secret.name)
|
158
158
|
```
|
159
|
+
<!--End PulumiCodeChooser -->
|
159
160
|
|
160
161
|
## Required Vault Capabilities
|
161
162
|
|
@@ -209,6 +210,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
209
210
|
"""
|
210
211
|
## Example Usage
|
211
212
|
|
213
|
+
<!--Start PulumiCodeChooser -->
|
212
214
|
```python
|
213
215
|
import pulumi
|
214
216
|
import json
|
@@ -221,9 +223,8 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
221
223
|
"version": "2",
|
222
224
|
},
|
223
225
|
description="KV Version 2 secret engine mount")
|
224
|
-
aws_secret = vault.kv.SecretV2("
|
226
|
+
aws_secret = vault.kv.SecretV2("awsSecret",
|
225
227
|
mount=kvv2.path,
|
226
|
-
name="aws_secret",
|
227
228
|
data_json=json.dumps({
|
228
229
|
"zip": "zap",
|
229
230
|
"foo": "bar",
|
@@ -231,6 +232,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
231
232
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
232
233
|
name=aws_secret.name)
|
233
234
|
```
|
235
|
+
<!--End PulumiCodeChooser -->
|
234
236
|
|
235
237
|
## Required Vault Capabilities
|
236
238
|
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -179,35 +179,6 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
179
179
|
"""
|
180
180
|
## Example Usage
|
181
181
|
|
182
|
-
```python
|
183
|
-
import pulumi
|
184
|
-
import json
|
185
|
-
import pulumi_vault as vault
|
186
|
-
|
187
|
-
kvv2 = vault.Mount("kvv2",
|
188
|
-
path="kvv2",
|
189
|
-
type="kv",
|
190
|
-
options={
|
191
|
-
"version": "2",
|
192
|
-
},
|
193
|
-
description="KV Version 2 secret engine mount")
|
194
|
-
example_secret_v2 = vault.kv.SecretV2("example",
|
195
|
-
mount=kvv2.path,
|
196
|
-
name="secret",
|
197
|
-
cas=1,
|
198
|
-
delete_all_versions=True,
|
199
|
-
data_json=json.dumps({
|
200
|
-
"zip": "zap",
|
201
|
-
"foo": "bar",
|
202
|
-
}))
|
203
|
-
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
204
|
-
name=example_secret_v2.name)
|
205
|
-
```
|
206
|
-
|
207
|
-
## Required Vault Capabilities
|
208
|
-
|
209
|
-
Use of this resource requires the `read` capability on the given path.
|
210
|
-
|
211
182
|
|
212
183
|
:param str mount: Path where KV-V2 engine is mounted.
|
213
184
|
:param str name: Full name of the secret. For a nested secret
|
@@ -252,35 +223,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
252
223
|
"""
|
253
224
|
## Example Usage
|
254
225
|
|
255
|
-
```python
|
256
|
-
import pulumi
|
257
|
-
import json
|
258
|
-
import pulumi_vault as vault
|
259
|
-
|
260
|
-
kvv2 = vault.Mount("kvv2",
|
261
|
-
path="kvv2",
|
262
|
-
type="kv",
|
263
|
-
options={
|
264
|
-
"version": "2",
|
265
|
-
},
|
266
|
-
description="KV Version 2 secret engine mount")
|
267
|
-
example_secret_v2 = vault.kv.SecretV2("example",
|
268
|
-
mount=kvv2.path,
|
269
|
-
name="secret",
|
270
|
-
cas=1,
|
271
|
-
delete_all_versions=True,
|
272
|
-
data_json=json.dumps({
|
273
|
-
"zip": "zap",
|
274
|
-
"foo": "bar",
|
275
|
-
}))
|
276
|
-
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
277
|
-
name=example_secret_v2.name)
|
278
|
-
```
|
279
|
-
|
280
|
-
## Required Vault Capabilities
|
281
|
-
|
282
|
-
Use of this resource requires the `read` capability on the given path.
|
283
|
-
|
284
226
|
|
285
227
|
:param str mount: Path where KV-V2 engine is mounted.
|
286
228
|
:param str name: Full name of the secret. For a nested secret
|
@@ -80,6 +80,7 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
80
80
|
"""
|
81
81
|
## Example Usage
|
82
82
|
|
83
|
+
<!--Start PulumiCodeChooser -->
|
83
84
|
```python
|
84
85
|
import pulumi
|
85
86
|
import json
|
@@ -92,18 +93,19 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
92
93
|
"version": "1",
|
93
94
|
},
|
94
95
|
description="KV Version 1 secret engine mount")
|
95
|
-
aws_secret = vault.kv.Secret("
|
96
|
+
aws_secret = vault.kv.Secret("awsSecret",
|
96
97
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
97
98
|
data_json=json.dumps({
|
98
99
|
"zip": "zap",
|
99
100
|
}))
|
100
|
-
azure_secret = vault.kv.Secret("
|
101
|
+
azure_secret = vault.kv.Secret("azureSecret",
|
101
102
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
102
103
|
data_json=json.dumps({
|
103
104
|
"foo": "bar",
|
104
105
|
}))
|
105
106
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
106
107
|
```
|
108
|
+
<!--End PulumiCodeChooser -->
|
107
109
|
|
108
110
|
## Required Vault Capabilities
|
109
111
|
|
@@ -136,6 +138,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
136
138
|
"""
|
137
139
|
## Example Usage
|
138
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
139
142
|
```python
|
140
143
|
import pulumi
|
141
144
|
import json
|
@@ -148,18 +151,19 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
148
151
|
"version": "1",
|
149
152
|
},
|
150
153
|
description="KV Version 1 secret engine mount")
|
151
|
-
aws_secret = vault.kv.Secret("
|
154
|
+
aws_secret = vault.kv.Secret("awsSecret",
|
152
155
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
153
156
|
data_json=json.dumps({
|
154
157
|
"zip": "zap",
|
155
158
|
}))
|
156
|
-
azure_secret = vault.kv.Secret("
|
159
|
+
azure_secret = vault.kv.Secret("azureSecret",
|
157
160
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
158
161
|
data_json=json.dumps({
|
159
162
|
"foo": "bar",
|
160
163
|
}))
|
161
164
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
162
165
|
```
|
166
|
+
<!--End PulumiCodeChooser -->
|
163
167
|
|
164
168
|
## Required Vault Capabilities
|
165
169
|
|
@@ -102,6 +102,7 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
102
102
|
"""
|
103
103
|
## Example Usage
|
104
104
|
|
105
|
+
<!--Start PulumiCodeChooser -->
|
105
106
|
```python
|
106
107
|
import pulumi
|
107
108
|
import json
|
@@ -114,28 +115,26 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
114
115
|
"version": "2",
|
115
116
|
},
|
116
117
|
description="KV Version 2 secret engine mount")
|
117
|
-
aws_secret = vault.kv.SecretV2("
|
118
|
+
aws_secret = vault.kv.SecretV2("awsSecret",
|
118
119
|
mount=kvv2.path,
|
119
|
-
name="aws_secret",
|
120
120
|
data_json=json.dumps({
|
121
121
|
"zip": "zap",
|
122
122
|
}))
|
123
|
-
azure_secret = vault.kv.SecretV2("
|
123
|
+
azure_secret = vault.kv.SecretV2("azureSecret",
|
124
124
|
mount=kvv2.path,
|
125
|
-
name="azure_secret",
|
126
125
|
data_json=json.dumps({
|
127
126
|
"foo": "bar",
|
128
127
|
}))
|
129
|
-
nested_secret = vault.kv.SecretV2("
|
128
|
+
nested_secret = vault.kv.SecretV2("nestedSecret",
|
130
129
|
mount=kvv2.path,
|
131
|
-
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
132
130
|
data_json=json.dumps({
|
133
131
|
"password": "test",
|
134
132
|
}))
|
135
133
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
136
134
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
137
|
-
name=
|
135
|
+
name=vault_kv_secret_v2["test_2"]["name"]))
|
138
136
|
```
|
137
|
+
<!--End PulumiCodeChooser -->
|
139
138
|
|
140
139
|
## Required Vault Capabilities
|
141
140
|
|
@@ -176,6 +175,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
176
175
|
"""
|
177
176
|
## Example Usage
|
178
177
|
|
178
|
+
<!--Start PulumiCodeChooser -->
|
179
179
|
```python
|
180
180
|
import pulumi
|
181
181
|
import json
|
@@ -188,28 +188,26 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
188
188
|
"version": "2",
|
189
189
|
},
|
190
190
|
description="KV Version 2 secret engine mount")
|
191
|
-
aws_secret = vault.kv.SecretV2("
|
191
|
+
aws_secret = vault.kv.SecretV2("awsSecret",
|
192
192
|
mount=kvv2.path,
|
193
|
-
name="aws_secret",
|
194
193
|
data_json=json.dumps({
|
195
194
|
"zip": "zap",
|
196
195
|
}))
|
197
|
-
azure_secret = vault.kv.SecretV2("
|
196
|
+
azure_secret = vault.kv.SecretV2("azureSecret",
|
198
197
|
mount=kvv2.path,
|
199
|
-
name="azure_secret",
|
200
198
|
data_json=json.dumps({
|
201
199
|
"foo": "bar",
|
202
200
|
}))
|
203
|
-
nested_secret = vault.kv.SecretV2("
|
201
|
+
nested_secret = vault.kv.SecretV2("nestedSecret",
|
204
202
|
mount=kvv2.path,
|
205
|
-
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
206
203
|
data_json=json.dumps({
|
207
204
|
"password": "test",
|
208
205
|
}))
|
209
206
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
210
207
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
211
|
-
name=
|
208
|
+
name=vault_kv_secret_v2["test_2"]["name"]))
|
212
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
213
211
|
|
214
212
|
## Required Vault Capabilities
|
215
213
|
|
pulumi_vault/kv/secret.py
CHANGED
@@ -176,6 +176,7 @@ class Secret(pulumi.CustomResource):
|
|
176
176
|
|
177
177
|
## Example Usage
|
178
178
|
|
179
|
+
<!--Start PulumiCodeChooser -->
|
179
180
|
```python
|
180
181
|
import pulumi
|
181
182
|
import json
|
@@ -195,6 +196,7 @@ class Secret(pulumi.CustomResource):
|
|
195
196
|
"foo": "bar",
|
196
197
|
}))
|
197
198
|
```
|
199
|
+
<!--End PulumiCodeChooser -->
|
198
200
|
|
199
201
|
## Required Vault Capabilities
|
200
202
|
|
@@ -235,6 +237,7 @@ class Secret(pulumi.CustomResource):
|
|
235
237
|
|
236
238
|
## Example Usage
|
237
239
|
|
240
|
+
<!--Start PulumiCodeChooser -->
|
238
241
|
```python
|
239
242
|
import pulumi
|
240
243
|
import json
|
@@ -254,6 +257,7 @@ class Secret(pulumi.CustomResource):
|
|
254
257
|
"foo": "bar",
|
255
258
|
}))
|
256
259
|
```
|
260
|
+
<!--End PulumiCodeChooser -->
|
257
261
|
|
258
262
|
## Required Vault Capabilities
|
259
263
|
|
@@ -226,6 +226,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
226
226
|
|
227
227
|
## Example Usage
|
228
228
|
|
229
|
+
<!--Start PulumiCodeChooser -->
|
229
230
|
```python
|
230
231
|
import pulumi
|
231
232
|
import pulumi_vault as vault
|
@@ -243,6 +244,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
243
244
|
delete_version_after=12600,
|
244
245
|
cas_required=True)
|
245
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
246
248
|
|
247
249
|
## Required Vault Capabilities
|
248
250
|
|
@@ -288,6 +290,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
288
290
|
|
289
291
|
## Example Usage
|
290
292
|
|
293
|
+
<!--Start PulumiCodeChooser -->
|
291
294
|
```python
|
292
295
|
import pulumi
|
293
296
|
import pulumi_vault as vault
|
@@ -305,6 +308,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
305
308
|
delete_version_after=12600,
|
306
309
|
cas_required=True)
|
307
310
|
```
|
311
|
+
<!--End PulumiCodeChooser -->
|
308
312
|
|
309
313
|
## Required Vault Capabilities
|
310
314
|
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -448,6 +448,7 @@ class SecretV2(pulumi.CustomResource):
|
|
448
448
|
|
449
449
|
## Example Usage
|
450
450
|
|
451
|
+
<!--Start PulumiCodeChooser -->
|
451
452
|
```python
|
452
453
|
import pulumi
|
453
454
|
import json
|
@@ -462,7 +463,6 @@ class SecretV2(pulumi.CustomResource):
|
|
462
463
|
description="KV Version 2 secret engine mount")
|
463
464
|
example = vault.kv.SecretV2("example",
|
464
465
|
mount=kvv2.path,
|
465
|
-
name="secret",
|
466
466
|
cas=1,
|
467
467
|
delete_all_versions=True,
|
468
468
|
data_json=json.dumps({
|
@@ -477,6 +477,7 @@ class SecretV2(pulumi.CustomResource):
|
|
477
477
|
},
|
478
478
|
))
|
479
479
|
```
|
480
|
+
<!--End PulumiCodeChooser -->
|
480
481
|
|
481
482
|
## Required Vault Capabilities
|
482
483
|
|
@@ -545,6 +546,7 @@ class SecretV2(pulumi.CustomResource):
|
|
545
546
|
|
546
547
|
## Example Usage
|
547
548
|
|
549
|
+
<!--Start PulumiCodeChooser -->
|
548
550
|
```python
|
549
551
|
import pulumi
|
550
552
|
import json
|
@@ -559,7 +561,6 @@ class SecretV2(pulumi.CustomResource):
|
|
559
561
|
description="KV Version 2 secret engine mount")
|
560
562
|
example = vault.kv.SecretV2("example",
|
561
563
|
mount=kvv2.path,
|
562
|
-
name="secret",
|
563
564
|
cas=1,
|
564
565
|
delete_all_versions=True,
|
565
566
|
data_json=json.dumps({
|
@@ -574,6 +575,7 @@ class SecretV2(pulumi.CustomResource):
|
|
574
575
|
},
|
575
576
|
))
|
576
577
|
```
|
578
|
+
<!--End PulumiCodeChooser -->
|
577
579
|
|
578
580
|
## Required Vault Capabilities
|
579
581
|
|