pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -181,6 +181,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
181
181
|
|
182
182
|
## Example Usage
|
183
183
|
|
184
|
+
<!--Start PulumiCodeChooser -->
|
184
185
|
```python
|
185
186
|
import pulumi
|
186
187
|
import pulumi_vault as vault
|
@@ -196,6 +197,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
196
197
|
"two",
|
197
198
|
])
|
198
199
|
```
|
200
|
+
<!--End PulumiCodeChooser -->
|
199
201
|
|
200
202
|
## Import
|
201
203
|
|
@@ -227,6 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
227
229
|
|
228
230
|
## Example Usage
|
229
231
|
|
232
|
+
<!--Start PulumiCodeChooser -->
|
230
233
|
```python
|
231
234
|
import pulumi
|
232
235
|
import pulumi_vault as vault
|
@@ -242,6 +245,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
242
245
|
"two",
|
243
246
|
])
|
244
247
|
```
|
248
|
+
<!--End PulumiCodeChooser -->
|
245
249
|
|
246
250
|
## Import
|
247
251
|
|
@@ -214,6 +214,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
@@ -229,6 +230,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
229
230
|
"two",
|
230
231
|
])
|
231
232
|
```
|
233
|
+
<!--End PulumiCodeChooser -->
|
232
234
|
|
233
235
|
## Import
|
234
236
|
|
@@ -261,6 +263,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
261
263
|
|
262
264
|
## Example Usage
|
263
265
|
|
266
|
+
<!--Start PulumiCodeChooser -->
|
264
267
|
```python
|
265
268
|
import pulumi
|
266
269
|
import pulumi_vault as vault
|
@@ -276,6 +279,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
276
279
|
"two",
|
277
280
|
])
|
278
281
|
```
|
282
|
+
<!--End PulumiCodeChooser -->
|
279
283
|
|
280
284
|
## Import
|
281
285
|
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -37,8 +37,8 @@ class AuthBackendGroup(dict):
|
|
37
37
|
group_name: str,
|
38
38
|
policies: Sequence[str]):
|
39
39
|
"""
|
40
|
-
:param str group_name: Name of the Okta
|
41
|
-
:param Sequence[str] policies:
|
40
|
+
:param str group_name: Name of the group within the Okta
|
41
|
+
:param Sequence[str] policies: Vault policies to associate with this group
|
42
42
|
"""
|
43
43
|
pulumi.set(__self__, "group_name", group_name)
|
44
44
|
pulumi.set(__self__, "policies", policies)
|
@@ -47,7 +47,7 @@ class AuthBackendGroup(dict):
|
|
47
47
|
@pulumi.getter(name="groupName")
|
48
48
|
def group_name(self) -> str:
|
49
49
|
"""
|
50
|
-
Name of the Okta
|
50
|
+
Name of the group within the Okta
|
51
51
|
"""
|
52
52
|
return pulumi.get(self, "group_name")
|
53
53
|
|
@@ -55,7 +55,7 @@ class AuthBackendGroup(dict):
|
|
55
55
|
@pulumi.getter
|
56
56
|
def policies(self) -> Sequence[str]:
|
57
57
|
"""
|
58
|
-
|
58
|
+
Vault policies to associate with this group
|
59
59
|
"""
|
60
60
|
return pulumi.get(self, "policies")
|
61
61
|
|
@@ -68,8 +68,8 @@ class AuthBackendUser(dict):
|
|
68
68
|
policies: Optional[Sequence[str]] = None):
|
69
69
|
"""
|
70
70
|
:param str username: Name of the user within Okta
|
71
|
-
:param Sequence[str] groups:
|
72
|
-
:param Sequence[str] policies:
|
71
|
+
:param Sequence[str] groups: List of Okta groups to associate with this user
|
72
|
+
:param Sequence[str] policies: Vault policies to associate with this group
|
73
73
|
"""
|
74
74
|
pulumi.set(__self__, "username", username)
|
75
75
|
if groups is not None:
|
@@ -89,7 +89,7 @@ class AuthBackendUser(dict):
|
|
89
89
|
@pulumi.getter
|
90
90
|
def groups(self) -> Optional[Sequence[str]]:
|
91
91
|
"""
|
92
|
-
|
92
|
+
List of Okta groups to associate with this user
|
93
93
|
"""
|
94
94
|
return pulumi.get(self, "groups")
|
95
95
|
|
@@ -97,7 +97,7 @@ class AuthBackendUser(dict):
|
|
97
97
|
@pulumi.getter
|
98
98
|
def policies(self) -> Optional[Sequence[str]]:
|
99
99
|
"""
|
100
|
-
|
100
|
+
Vault policies to associate with this group
|
101
101
|
"""
|
102
102
|
return pulumi.get(self, "policies")
|
103
103
|
|
pulumi_vault/outputs.py
CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
+
"""
|
281
|
+
:param str key: name of permitted or denied parameter.
|
282
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
+
"""
|
280
284
|
pulumi.set(__self__, "key", key)
|
281
285
|
pulumi.set(__self__, "values", values)
|
282
286
|
|
283
287
|
@property
|
284
288
|
@pulumi.getter
|
285
289
|
def key(self) -> str:
|
290
|
+
"""
|
291
|
+
name of permitted or denied parameter.
|
292
|
+
"""
|
286
293
|
return pulumi.get(self, "key")
|
287
294
|
|
288
295
|
@property
|
289
296
|
@pulumi.getter
|
290
297
|
def values(self) -> Sequence[str]:
|
298
|
+
"""
|
299
|
+
list of values what are permitted or denied by policy rule.
|
300
|
+
"""
|
291
301
|
return pulumi.get(self, "values")
|
292
302
|
|
293
303
|
|
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
296
306
|
def __init__(__self__, *,
|
297
307
|
key: str,
|
298
308
|
values: Sequence[str]):
|
309
|
+
"""
|
310
|
+
:param str key: name of permitted or denied parameter.
|
311
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
+
"""
|
299
313
|
pulumi.set(__self__, "key", key)
|
300
314
|
pulumi.set(__self__, "values", values)
|
301
315
|
|
302
316
|
@property
|
303
317
|
@pulumi.getter
|
304
318
|
def key(self) -> str:
|
319
|
+
"""
|
320
|
+
name of permitted or denied parameter.
|
321
|
+
"""
|
305
322
|
return pulumi.get(self, "key")
|
306
323
|
|
307
324
|
@property
|
308
325
|
@pulumi.getter
|
309
326
|
def values(self) -> Sequence[str]:
|
327
|
+
"""
|
328
|
+
list of values what are permitted or denied by policy rule.
|
329
|
+
"""
|
310
330
|
return pulumi.get(self, "values")
|
311
331
|
|
312
332
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -150,18 +150,19 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
150
150
|
|
151
151
|
## Example Usage
|
152
152
|
|
153
|
+
<!--Start PulumiCodeChooser -->
|
153
154
|
```python
|
154
155
|
import pulumi
|
155
156
|
import pulumi_vault as vault
|
156
157
|
|
157
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
158
|
-
name="alphanumeric",
|
159
|
-
policy=\"\"\" length = 20
|
158
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
|
160
159
|
rule "charset" {
|
161
160
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
162
161
|
}
|
162
|
+
|
163
163
|
\"\"\")
|
164
164
|
```
|
165
|
+
<!--End PulumiCodeChooser -->
|
165
166
|
|
166
167
|
## Import
|
167
168
|
|
@@ -193,18 +194,19 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
193
194
|
|
194
195
|
## Example Usage
|
195
196
|
|
197
|
+
<!--Start PulumiCodeChooser -->
|
196
198
|
```python
|
197
199
|
import pulumi
|
198
200
|
import pulumi_vault as vault
|
199
201
|
|
200
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
201
|
-
name="alphanumeric",
|
202
|
-
policy=\"\"\" length = 20
|
202
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
|
203
203
|
rule "charset" {
|
204
204
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
205
205
|
}
|
206
|
+
|
206
207
|
\"\"\")
|
207
208
|
```
|
209
|
+
<!--End PulumiCodeChooser -->
|
208
210
|
|
209
211
|
## Import
|
210
212
|
|
@@ -6,8 +6,6 @@ from .. import _utilities
|
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
8
|
from .backend_config_cluster import *
|
9
|
-
from .backend_config_est import *
|
10
|
-
from .get_backend_config_est import *
|
11
9
|
from .get_backend_issuer import *
|
12
10
|
from .get_backend_issuers import *
|
13
11
|
from .get_backend_key import *
|
@@ -10,39 +10,9 @@ from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
10
|
from .. import _utilities
|
11
11
|
|
12
12
|
__all__ = [
|
13
|
-
'BackendConfigEstAuthenticatorsArgs',
|
14
13
|
'SecretBackendRolePolicyIdentifierArgs',
|
15
14
|
]
|
16
15
|
|
17
|
-
@pulumi.input_type
|
18
|
-
class BackendConfigEstAuthenticatorsArgs:
|
19
|
-
def __init__(__self__, *,
|
20
|
-
cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
21
|
-
userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
22
|
-
if cert is not None:
|
23
|
-
pulumi.set(__self__, "cert", cert)
|
24
|
-
if userpass is not None:
|
25
|
-
pulumi.set(__self__, "userpass", userpass)
|
26
|
-
|
27
|
-
@property
|
28
|
-
@pulumi.getter
|
29
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
30
|
-
return pulumi.get(self, "cert")
|
31
|
-
|
32
|
-
@cert.setter
|
33
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
34
|
-
pulumi.set(self, "cert", value)
|
35
|
-
|
36
|
-
@property
|
37
|
-
@pulumi.getter
|
38
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
39
|
-
return pulumi.get(self, "userpass")
|
40
|
-
|
41
|
-
@userpass.setter
|
42
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
43
|
-
pulumi.set(self, "userpass", value)
|
44
|
-
|
45
|
-
|
46
16
|
@pulumi.input_type
|
47
17
|
class SecretBackendRolePolicyIdentifierArgs:
|
48
18
|
def __init__(__self__, *,
|
@@ -181,6 +181,7 @@ class BackendConfigCluster(pulumi.CustomResource):
|
|
181
181
|
|
182
182
|
## Example Usage
|
183
183
|
|
184
|
+
<!--Start PulumiCodeChooser -->
|
184
185
|
```python
|
185
186
|
import pulumi
|
186
187
|
import pulumi_vault as vault
|
@@ -196,6 +197,7 @@ class BackendConfigCluster(pulumi.CustomResource):
|
|
196
197
|
path="http://127.0.0.1:8200/v1/pki-root",
|
197
198
|
aia_path="http://127.0.0.1:8200/v1/pki-root")
|
198
199
|
```
|
200
|
+
<!--End PulumiCodeChooser -->
|
199
201
|
|
200
202
|
## Import
|
201
203
|
|
@@ -228,6 +230,7 @@ class BackendConfigCluster(pulumi.CustomResource):
|
|
228
230
|
|
229
231
|
## Example Usage
|
230
232
|
|
233
|
+
<!--Start PulumiCodeChooser -->
|
231
234
|
```python
|
232
235
|
import pulumi
|
233
236
|
import pulumi_vault as vault
|
@@ -243,6 +246,7 @@ class BackendConfigCluster(pulumi.CustomResource):
|
|
243
246
|
path="http://127.0.0.1:8200/v1/pki-root",
|
244
247
|
aia_path="http://127.0.0.1:8200/v1/pki-root")
|
245
248
|
```
|
249
|
+
<!--End PulumiCodeChooser -->
|
246
250
|
|
247
251
|
## Import
|
248
252
|
|
@@ -175,24 +175,6 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
175
175
|
"""
|
176
176
|
## Example Usage
|
177
177
|
|
178
|
-
```python
|
179
|
-
import pulumi
|
180
|
-
import pulumi_vault as vault
|
181
|
-
|
182
|
-
pki = vault.Mount("pki",
|
183
|
-
path="pki",
|
184
|
-
type="pki",
|
185
|
-
description="PKI secret engine mount")
|
186
|
-
root = vault.pki_secret.SecretBackendRootCert("root",
|
187
|
-
backend=pki.path,
|
188
|
-
type="internal",
|
189
|
-
common_name="example",
|
190
|
-
ttl="86400",
|
191
|
-
issuer_name="example")
|
192
|
-
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
193
|
-
issuer_ref=issuer_id))
|
194
|
-
```
|
195
|
-
|
196
178
|
|
197
179
|
:param str backend: The path to the PKI secret backend to
|
198
180
|
read the issuer from, with no leading or trailing `/`s.
|
@@ -232,24 +214,6 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
232
214
|
"""
|
233
215
|
## Example Usage
|
234
216
|
|
235
|
-
```python
|
236
|
-
import pulumi
|
237
|
-
import pulumi_vault as vault
|
238
|
-
|
239
|
-
pki = vault.Mount("pki",
|
240
|
-
path="pki",
|
241
|
-
type="pki",
|
242
|
-
description="PKI secret engine mount")
|
243
|
-
root = vault.pki_secret.SecretBackendRootCert("root",
|
244
|
-
backend=pki.path,
|
245
|
-
type="internal",
|
246
|
-
common_name="example",
|
247
|
-
ttl="86400",
|
248
|
-
issuer_name="example")
|
249
|
-
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
250
|
-
issuer_ref=issuer_id))
|
251
|
-
```
|
252
|
-
|
253
217
|
|
254
218
|
:param str backend: The path to the PKI secret backend to
|
255
219
|
read the issuer from, with no leading or trailing `/`s.
|
@@ -104,6 +104,7 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
104
104
|
"""
|
105
105
|
## Example Usage
|
106
106
|
|
107
|
+
<!--Start PulumiCodeChooser -->
|
107
108
|
```python
|
108
109
|
import pulumi
|
109
110
|
import pulumi_vault as vault
|
@@ -120,6 +121,7 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
120
121
|
issuer_name="example")
|
121
122
|
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
122
123
|
```
|
124
|
+
<!--End PulumiCodeChooser -->
|
123
125
|
|
124
126
|
|
125
127
|
:param str backend: The path to the PKI secret backend to
|
@@ -151,6 +153,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
151
153
|
"""
|
152
154
|
## Example Usage
|
153
155
|
|
156
|
+
<!--Start PulumiCodeChooser -->
|
154
157
|
```python
|
155
158
|
import pulumi
|
156
159
|
import pulumi_vault as vault
|
@@ -167,6 +170,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
167
170
|
issuer_name="example")
|
168
171
|
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
169
172
|
```
|
173
|
+
<!--End PulumiCodeChooser -->
|
170
174
|
|
171
175
|
|
172
176
|
:param str backend: The path to the PKI secret backend to
|
@@ -114,6 +114,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
114
114
|
"""
|
115
115
|
## Example Usage
|
116
116
|
|
117
|
+
<!--Start PulumiCodeChooser -->
|
117
118
|
```python
|
118
119
|
import pulumi
|
119
120
|
import pulumi_vault as vault
|
@@ -128,9 +129,10 @@ def get_backend_key(backend: Optional[str] = None,
|
|
128
129
|
key_name="example",
|
129
130
|
key_type="rsa",
|
130
131
|
key_bits=4096)
|
131
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
132
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
|
132
133
|
key_ref=key_id))
|
133
134
|
```
|
135
|
+
<!--End PulumiCodeChooser -->
|
134
136
|
|
135
137
|
|
136
138
|
:param str backend: The path to the PKI secret backend to
|
@@ -166,6 +168,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
166
168
|
"""
|
167
169
|
## Example Usage
|
168
170
|
|
171
|
+
<!--Start PulumiCodeChooser -->
|
169
172
|
```python
|
170
173
|
import pulumi
|
171
174
|
import pulumi_vault as vault
|
@@ -180,9 +183,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
180
183
|
key_name="example",
|
181
184
|
key_type="rsa",
|
182
185
|
key_bits=4096)
|
183
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
186
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
|
184
187
|
key_ref=key_id))
|
185
188
|
```
|
189
|
+
<!--End PulumiCodeChooser -->
|
186
190
|
|
187
191
|
|
188
192
|
:param str backend: The path to the PKI secret backend to
|
@@ -104,6 +104,7 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
104
104
|
"""
|
105
105
|
## Example Usage
|
106
106
|
|
107
|
+
<!--Start PulumiCodeChooser -->
|
107
108
|
```python
|
108
109
|
import pulumi
|
109
110
|
import pulumi_vault as vault
|
@@ -120,6 +121,7 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
120
121
|
key_name="example")
|
121
122
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
122
123
|
```
|
124
|
+
<!--End PulumiCodeChooser -->
|
123
125
|
|
124
126
|
|
125
127
|
:param str backend: The path to the PKI secret backend to
|
@@ -151,6 +153,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
151
153
|
"""
|
152
154
|
## Example Usage
|
153
155
|
|
156
|
+
<!--Start PulumiCodeChooser -->
|
154
157
|
```python
|
155
158
|
import pulumi
|
156
159
|
import pulumi_vault as vault
|
@@ -167,6 +170,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
167
170
|
key_name="example")
|
168
171
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
169
172
|
```
|
173
|
+
<!--End PulumiCodeChooser -->
|
170
174
|
|
171
175
|
|
172
176
|
:param str backend: The path to the PKI secret backend to
|
@@ -10,32 +10,9 @@ from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
10
|
from .. import _utilities
|
11
11
|
|
12
12
|
__all__ = [
|
13
|
-
'BackendConfigEstAuthenticators',
|
14
13
|
'SecretBackendRolePolicyIdentifier',
|
15
|
-
'GetBackendConfigEstAuthenticatorResult',
|
16
14
|
]
|
17
15
|
|
18
|
-
@pulumi.output_type
|
19
|
-
class BackendConfigEstAuthenticators(dict):
|
20
|
-
def __init__(__self__, *,
|
21
|
-
cert: Optional[Mapping[str, Any]] = None,
|
22
|
-
userpass: Optional[Mapping[str, Any]] = None):
|
23
|
-
if cert is not None:
|
24
|
-
pulumi.set(__self__, "cert", cert)
|
25
|
-
if userpass is not None:
|
26
|
-
pulumi.set(__self__, "userpass", userpass)
|
27
|
-
|
28
|
-
@property
|
29
|
-
@pulumi.getter
|
30
|
-
def cert(self) -> Optional[Mapping[str, Any]]:
|
31
|
-
return pulumi.get(self, "cert")
|
32
|
-
|
33
|
-
@property
|
34
|
-
@pulumi.getter
|
35
|
-
def userpass(self) -> Optional[Mapping[str, Any]]:
|
36
|
-
return pulumi.get(self, "userpass")
|
37
|
-
|
38
|
-
|
39
16
|
@pulumi.output_type
|
40
17
|
class SecretBackendRolePolicyIdentifier(dict):
|
41
18
|
def __init__(__self__, *,
|
@@ -82,34 +59,3 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
82
59
|
return pulumi.get(self, "notice")
|
83
60
|
|
84
61
|
|
85
|
-
@pulumi.output_type
|
86
|
-
class GetBackendConfigEstAuthenticatorResult(dict):
|
87
|
-
def __init__(__self__, *,
|
88
|
-
cert: Optional[Mapping[str, Any]] = None,
|
89
|
-
userpass: Optional[Mapping[str, Any]] = None):
|
90
|
-
"""
|
91
|
-
:param Mapping[str, Any] cert: "The accessor and cert_role properties for cert auth backends".
|
92
|
-
:param Mapping[str, Any] userpass: "The accessor property for user pass auth backends".
|
93
|
-
"""
|
94
|
-
if cert is not None:
|
95
|
-
pulumi.set(__self__, "cert", cert)
|
96
|
-
if userpass is not None:
|
97
|
-
pulumi.set(__self__, "userpass", userpass)
|
98
|
-
|
99
|
-
@property
|
100
|
-
@pulumi.getter
|
101
|
-
def cert(self) -> Optional[Mapping[str, Any]]:
|
102
|
-
"""
|
103
|
-
"The accessor and cert_role properties for cert auth backends".
|
104
|
-
"""
|
105
|
-
return pulumi.get(self, "cert")
|
106
|
-
|
107
|
-
@property
|
108
|
-
@pulumi.getter
|
109
|
-
def userpass(self) -> Optional[Mapping[str, Any]]:
|
110
|
-
"""
|
111
|
-
"The accessor property for user pass auth backends".
|
112
|
-
"""
|
113
|
-
return pulumi.get(self, "userpass")
|
114
|
-
|
115
|
-
|
@@ -735,16 +735,17 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
735
735
|
"""
|
736
736
|
## Example Usage
|
737
737
|
|
738
|
+
<!--Start PulumiCodeChooser -->
|
738
739
|
```python
|
739
740
|
import pulumi
|
740
741
|
import pulumi_vault as vault
|
741
742
|
|
742
743
|
app = vault.pki_secret.SecretBackendCert("app",
|
743
|
-
backend=intermediate["path"],
|
744
|
-
name=test["name"],
|
744
|
+
backend=vault_mount["intermediate"]["path"],
|
745
745
|
common_name="app.my.domain",
|
746
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
746
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
|
747
747
|
```
|
748
|
+
<!--End PulumiCodeChooser -->
|
748
749
|
|
749
750
|
:param str resource_name: The name of the resource.
|
750
751
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -778,16 +779,17 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
778
779
|
"""
|
779
780
|
## Example Usage
|
780
781
|
|
782
|
+
<!--Start PulumiCodeChooser -->
|
781
783
|
```python
|
782
784
|
import pulumi
|
783
785
|
import pulumi_vault as vault
|
784
786
|
|
785
787
|
app = vault.pki_secret.SecretBackendCert("app",
|
786
|
-
backend=intermediate["path"],
|
787
|
-
name=test["name"],
|
788
|
+
backend=vault_mount["intermediate"]["path"],
|
788
789
|
common_name="app.my.domain",
|
789
|
-
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
790
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
|
790
791
|
```
|
792
|
+
<!--End PulumiCodeChooser -->
|
791
793
|
|
792
794
|
:param str resource_name: The name of the resource.
|
793
795
|
:param SecretBackendCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -145,12 +145,13 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
145
145
|
"""
|
146
146
|
## Example Usage
|
147
147
|
|
148
|
+
<!--Start PulumiCodeChooser -->
|
148
149
|
```python
|
149
150
|
import pulumi
|
150
151
|
import pulumi_vault as vault
|
151
152
|
|
152
153
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
153
|
-
backend=
|
154
|
+
backend=vault_mount["intermediate"]["path"],
|
154
155
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
155
156
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
156
157
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -200,8 +201,9 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
200
201
|
MUR4qFxeUOW/GJGccMUd
|
201
202
|
-----END CERTIFICATE-----
|
202
203
|
\"\"\",
|
203
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
204
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
|
204
205
|
```
|
206
|
+
<!--End PulumiCodeChooser -->
|
205
207
|
|
206
208
|
:param str resource_name: The name of the resource.
|
207
209
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -221,12 +223,13 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
221
223
|
"""
|
222
224
|
## Example Usage
|
223
225
|
|
226
|
+
<!--Start PulumiCodeChooser -->
|
224
227
|
```python
|
225
228
|
import pulumi
|
226
229
|
import pulumi_vault as vault
|
227
230
|
|
228
231
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
229
|
-
backend=
|
232
|
+
backend=vault_mount["intermediate"]["path"],
|
230
233
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
231
234
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
232
235
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -276,8 +279,9 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
276
279
|
MUR4qFxeUOW/GJGccMUd
|
277
280
|
-----END CERTIFICATE-----
|
278
281
|
\"\"\",
|
279
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
282
|
+
opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
|
280
283
|
```
|
284
|
+
<!--End PulumiCodeChooser -->
|
281
285
|
|
282
286
|
:param str resource_name: The name of the resource.
|
283
287
|
:param SecretBackendConfigCaArgs args: The arguments to use to populate this resource's properties.
|
@@ -187,6 +187,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
187
187
|
"""
|
188
188
|
## Example Usage
|
189
189
|
|
190
|
+
<!--Start PulumiCodeChooser -->
|
190
191
|
```python
|
191
192
|
import pulumi
|
192
193
|
import pulumi_vault as vault
|
@@ -210,6 +211,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
210
211
|
default=example.issuer_id,
|
211
212
|
default_follows_latest_issuer=True)
|
212
213
|
```
|
214
|
+
<!--End PulumiCodeChooser -->
|
213
215
|
|
214
216
|
## Import
|
215
217
|
|
@@ -240,6 +242,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
240
242
|
"""
|
241
243
|
## Example Usage
|
242
244
|
|
245
|
+
<!--Start PulumiCodeChooser -->
|
243
246
|
```python
|
244
247
|
import pulumi
|
245
248
|
import pulumi_vault as vault
|
@@ -263,6 +266,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
263
266
|
default=example.issuer_id,
|
264
267
|
default_follows_latest_issuer=True)
|
265
268
|
```
|
269
|
+
<!--End PulumiCodeChooser -->
|
266
270
|
|
267
271
|
## Import
|
268
272
|
|
@@ -247,6 +247,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
247
247
|
|
248
248
|
## Example Usage
|
249
249
|
|
250
|
+
<!--Start PulumiCodeChooser -->
|
250
251
|
```python
|
251
252
|
import pulumi
|
252
253
|
import pulumi_vault as vault
|
@@ -261,6 +262,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
261
262
|
backend=root.path,
|
262
263
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
263
264
|
```
|
265
|
+
<!--End PulumiCodeChooser -->
|
264
266
|
|
265
267
|
## Import
|
266
268
|
|
@@ -295,6 +297,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
295
297
|
|
296
298
|
## Example Usage
|
297
299
|
|
300
|
+
<!--Start PulumiCodeChooser -->
|
298
301
|
```python
|
299
302
|
import pulumi
|
300
303
|
import pulumi_vault as vault
|
@@ -309,6 +312,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
309
312
|
backend=root.path,
|
310
313
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
311
314
|
```
|
315
|
+
<!--End PulumiCodeChooser -->
|
312
316
|
|
313
317
|
## Import
|
314
318
|
|