pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +2 -2
- pulumi_vault/ad/secret_library.py +2 -0
- pulumi_vault/alicloud/auth_backend_role.py +6 -6
- pulumi_vault/audit.py +12 -12
- pulumi_vault/audit_request_header.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -6
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
- pulumi_vault/aws/secret_backend_role.py +2 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -0
- pulumi_vault/azure/auth_backend_config.py +6 -6
- pulumi_vault/azure/backend.py +16 -16
- pulumi_vault/azure/backend_role.py +14 -14
- pulumi_vault/cert_auth_backend_role.py +12 -8
- pulumi_vault/consul/secret_backend.py +10 -10
- pulumi_vault/consul/secret_backend_role.py +2 -0
- pulumi_vault/database/secret_backend_connection.py +2 -0
- pulumi_vault/database/secret_backend_role.py +4 -0
- pulumi_vault/database/secret_backend_static_role.py +10 -4
- pulumi_vault/database/secrets_mount.py +4 -0
- pulumi_vault/egp_policy.py +4 -4
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/secret_backend.py +4 -2
- pulumi_vault/gcp/secret_impersonated_account.py +12 -10
- pulumi_vault/gcp/secret_roleset.py +4 -2
- pulumi_vault/gcp/secret_static_account.py +14 -12
- pulumi_vault/generic/endpoint.py +4 -4
- pulumi_vault/generic/get_secret.py +44 -0
- pulumi_vault/get_namespaces.py +4 -4
- pulumi_vault/get_policy_document.py +8 -4
- pulumi_vault/github/team.py +2 -2
- pulumi_vault/github/user.py +2 -2
- pulumi_vault/identity/entity.py +6 -4
- pulumi_vault/identity/entity_alias.py +6 -4
- pulumi_vault/identity/entity_policies.py +12 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -0
- pulumi_vault/identity/get_oidc_openid_config.py +10 -2
- pulumi_vault/identity/get_oidc_public_keys.py +10 -2
- pulumi_vault/identity/group.py +38 -30
- pulumi_vault/identity/group_alias.py +2 -0
- pulumi_vault/identity/group_member_entity_ids.py +12 -8
- pulumi_vault/identity/group_member_group_ids.py +24 -12
- pulumi_vault/identity/group_policies.py +4 -0
- pulumi_vault/identity/mfa_duo.py +4 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -4
- pulumi_vault/identity/mfa_okta.py +4 -4
- pulumi_vault/identity/oidc_assignment.py +10 -2
- pulumi_vault/identity/oidc_client.py +10 -6
- pulumi_vault/identity/oidc_key.py +16 -8
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
- pulumi_vault/identity/oidc_provider.py +22 -12
- pulumi_vault/identity/oidc_role.py +28 -12
- pulumi_vault/identity/oidc_scope.py +6 -4
- pulumi_vault/jwt/auth_backend.py +20 -20
- pulumi_vault/kmip/secret_backend.py +10 -10
- pulumi_vault/kubernetes/get_service_account_token.py +8 -4
- pulumi_vault/kubernetes/secret_backend.py +6 -4
- pulumi_vault/kubernetes/secret_backend_role.py +24 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
- pulumi_vault/kv/get_secret_v2.py +62 -0
- pulumi_vault/kv/get_secrets_list.py +4 -4
- pulumi_vault/kv/get_secrets_list_v2.py +14 -8
- pulumi_vault/kv/secret_v2.py +2 -0
- pulumi_vault/ldap/auth_backend.py +10 -10
- pulumi_vault/ldap/secret_backend.py +4 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -0
- pulumi_vault/mfa_duo.py +4 -2
- pulumi_vault/mfa_okta.py +4 -2
- pulumi_vault/mfa_pingid.py +4 -2
- pulumi_vault/mfa_totp.py +10 -8
- pulumi_vault/mongodbatlas/secret_role.py +2 -0
- pulumi_vault/mount.py +26 -26
- pulumi_vault/nomad_secret_backend.py +4 -4
- pulumi_vault/okta/auth_backend.py +6 -6
- pulumi_vault/password_policy.py +6 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
- pulumi_vault/pkisecret/secret_backend_role.py +2 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
- pulumi_vault/quota_lease_count.py +6 -4
- pulumi_vault/quota_rate_limit.py +2 -0
- pulumi_vault/rabbitmq/secret_backend.py +4 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
- pulumi_vault/raft_snapshot_agent_config.py +18 -12
- pulumi_vault/rgp_policy.py +2 -2
- pulumi_vault/saml/auth_backend.py +8 -8
- pulumi_vault/saml/auth_backend_role.py +8 -6
- pulumi_vault/secrets/sync_association.py +12 -6
- pulumi_vault/secrets/sync_aws_destination.py +6 -4
- pulumi_vault/secrets/sync_azure_destination.py +10 -8
- pulumi_vault/secrets/sync_config.py +2 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -4
- pulumi_vault/secrets/sync_github_apps.py +8 -4
- pulumi_vault/secrets/sync_vercel_destination.py +6 -4
- pulumi_vault/ssh/_inputs.py +0 -12
- pulumi_vault/ssh/outputs.py +0 -12
- pulumi_vault/ssh/secret_backend_role.py +4 -0
- pulumi_vault/terraformcloud/secret_creds.py +2 -0
- pulumi_vault/terraformcloud/secret_role.py +2 -0
- pulumi_vault/token.py +14 -14
- pulumi_vault/tokenauth/auth_backend_role.py +8 -8
- pulumi_vault/transform/alphabet.py +4 -2
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -2
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -4
- pulumi_vault/transit/secret_backend_key.py +6 -2
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -1261,8 +1261,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
1261
1261
|
backend="ad",
|
1262
1262
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1263
1263
|
bindpass="SuperSecretPassw0rd",
|
1264
|
-
insecure_tls=True,
|
1265
1264
|
url="ldaps://ad",
|
1265
|
+
insecure_tls=True,
|
1266
1266
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1267
1267
|
```
|
1268
1268
|
<!--End PulumiCodeChooser -->
|
@@ -1354,8 +1354,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
1354
1354
|
backend="ad",
|
1355
1355
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1356
1356
|
bindpass="SuperSecretPassw0rd",
|
1357
|
-
insecure_tls=True,
|
1358
1357
|
url="ldaps://ad",
|
1358
|
+
insecure_tls=True,
|
1359
1359
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1360
1360
|
```
|
1361
1361
|
<!--End PulumiCodeChooser -->
|
@@ -307,6 +307,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
307
307
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
308
308
|
qa = vault.ad.SecretLibrary("qa",
|
309
309
|
backend=config.backend,
|
310
|
+
name="qa",
|
310
311
|
service_account_names=[
|
311
312
|
"Bob",
|
312
313
|
"Mary",
|
@@ -365,6 +366,7 @@ class SecretLibrary(pulumi.CustomResource):
|
|
365
366
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
366
367
|
qa = vault.ad.SecretLibrary("qa",
|
367
368
|
backend=config.backend,
|
369
|
+
name="qa",
|
368
370
|
service_account_names=[
|
369
371
|
"Bob",
|
370
372
|
"Mary",
|
@@ -566,11 +566,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
566
566
|
import pulumi
|
567
567
|
import pulumi_vault as vault
|
568
568
|
|
569
|
-
|
569
|
+
alicloud = vault.AuthBackend("alicloud",
|
570
570
|
type="alicloud",
|
571
571
|
path="alicloud")
|
572
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
573
|
-
backend=
|
572
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
573
|
+
backend=alicloud.path,
|
574
574
|
role="example",
|
575
575
|
arn="acs:ram:123456:tf:role/foobar")
|
576
576
|
```
|
@@ -640,11 +640,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
640
640
|
import pulumi
|
641
641
|
import pulumi_vault as vault
|
642
642
|
|
643
|
-
|
643
|
+
alicloud = vault.AuthBackend("alicloud",
|
644
644
|
type="alicloud",
|
645
645
|
path="alicloud")
|
646
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
647
|
-
backend=
|
646
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
647
|
+
backend=alicloud.path,
|
648
648
|
role="example",
|
649
649
|
arn="acs:ram:123456:tf:role/foobar")
|
650
650
|
```
|
pulumi_vault/audit.py
CHANGED
@@ -260,10 +260,10 @@ class Audit(pulumi.CustomResource):
|
|
260
260
|
import pulumi_vault as vault
|
261
261
|
|
262
262
|
test = vault.Audit("test",
|
263
|
+
type="file",
|
263
264
|
options={
|
264
265
|
"file_path": "C:/temp/audit.txt",
|
265
|
-
}
|
266
|
-
type="file")
|
266
|
+
})
|
267
267
|
```
|
268
268
|
<!--End PulumiCodeChooser -->
|
269
269
|
|
@@ -275,14 +275,14 @@ class Audit(pulumi.CustomResource):
|
|
275
275
|
import pulumi_vault as vault
|
276
276
|
|
277
277
|
test = vault.Audit("test",
|
278
|
+
type="socket",
|
279
|
+
path="app_socket",
|
278
280
|
local=False,
|
279
281
|
options={
|
280
282
|
"address": "127.0.0.1:8000",
|
281
|
-
"description": "application x socket",
|
282
283
|
"socket_type": "tcp",
|
283
|
-
|
284
|
-
|
285
|
-
type="socket")
|
284
|
+
"description": "application x socket",
|
285
|
+
})
|
286
286
|
```
|
287
287
|
<!--End PulumiCodeChooser -->
|
288
288
|
|
@@ -325,10 +325,10 @@ class Audit(pulumi.CustomResource):
|
|
325
325
|
import pulumi_vault as vault
|
326
326
|
|
327
327
|
test = vault.Audit("test",
|
328
|
+
type="file",
|
328
329
|
options={
|
329
330
|
"file_path": "C:/temp/audit.txt",
|
330
|
-
}
|
331
|
-
type="file")
|
331
|
+
})
|
332
332
|
```
|
333
333
|
<!--End PulumiCodeChooser -->
|
334
334
|
|
@@ -340,14 +340,14 @@ class Audit(pulumi.CustomResource):
|
|
340
340
|
import pulumi_vault as vault
|
341
341
|
|
342
342
|
test = vault.Audit("test",
|
343
|
+
type="socket",
|
344
|
+
path="app_socket",
|
343
345
|
local=False,
|
344
346
|
options={
|
345
347
|
"address": "127.0.0.1:8000",
|
346
|
-
"description": "application x socket",
|
347
348
|
"socket_type": "tcp",
|
348
|
-
|
349
|
-
|
350
|
-
type="socket")
|
349
|
+
"description": "application x socket",
|
350
|
+
})
|
351
351
|
```
|
352
352
|
<!--End PulumiCodeChooser -->
|
353
353
|
|
@@ -147,7 +147,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
147
147
|
import pulumi
|
148
148
|
import pulumi_vault as vault
|
149
149
|
|
150
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
150
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
151
|
+
name="X-Forwarded-For",
|
152
|
+
hmac=False)
|
151
153
|
```
|
152
154
|
<!--End PulumiCodeChooser -->
|
153
155
|
|
@@ -178,7 +180,9 @@ class AuditRequestHeader(pulumi.CustomResource):
|
|
178
180
|
import pulumi
|
179
181
|
import pulumi_vault as vault
|
180
182
|
|
181
|
-
x_forwarded_for = vault.AuditRequestHeader("
|
183
|
+
x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
|
184
|
+
name="X-Forwarded-For",
|
185
|
+
hmac=False)
|
182
186
|
```
|
183
187
|
<!--End PulumiCodeChooser -->
|
184
188
|
|
@@ -435,9 +435,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
435
435
|
import pulumi
|
436
436
|
import pulumi_vault as vault
|
437
437
|
|
438
|
-
|
439
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
440
|
-
backend=
|
438
|
+
example = vault.AuthBackend("example", type="aws")
|
439
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
440
|
+
backend=example.path,
|
441
441
|
access_key="INSERT_AWS_ACCESS_KEY",
|
442
442
|
secret_key="INSERT_AWS_SECRET_KEY")
|
443
443
|
```
|
@@ -494,9 +494,9 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
494
494
|
import pulumi
|
495
495
|
import pulumi_vault as vault
|
496
496
|
|
497
|
-
|
498
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
499
|
-
backend=
|
497
|
+
example = vault.AuthBackend("example", type="aws")
|
498
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
499
|
+
backend=example.path,
|
500
500
|
access_key="INSERT_AWS_ACCESS_KEY",
|
501
501
|
secret_key="INSERT_AWS_SECRET_KEY")
|
502
502
|
```
|
@@ -202,9 +202,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
202
202
|
import pulumi
|
203
203
|
import pulumi_vault as vault
|
204
204
|
|
205
|
-
|
206
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
207
|
-
backend=
|
205
|
+
example = vault.AuthBackend("example", type="aws")
|
206
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
207
|
+
backend=example.path,
|
208
208
|
safety_buffer=3600)
|
209
209
|
```
|
210
210
|
<!--End PulumiCodeChooser -->
|
@@ -249,9 +249,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
249
249
|
import pulumi
|
250
250
|
import pulumi_vault as vault
|
251
251
|
|
252
|
-
|
253
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
254
|
-
backend=
|
252
|
+
example = vault.AuthBackend("example", type="aws")
|
253
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
254
|
+
backend=example.path,
|
255
255
|
safety_buffer=3600)
|
256
256
|
```
|
257
257
|
<!--End PulumiCodeChooser -->
|
@@ -202,9 +202,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
202
202
|
import pulumi
|
203
203
|
import pulumi_vault as vault
|
204
204
|
|
205
|
-
|
206
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
207
|
-
backend=
|
205
|
+
example = vault.AuthBackend("example", type="aws")
|
206
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
|
207
|
+
backend=example.path,
|
208
208
|
safety_buffer=360)
|
209
209
|
```
|
210
210
|
<!--End PulumiCodeChooser -->
|
@@ -239,9 +239,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
239
239
|
import pulumi
|
240
240
|
import pulumi_vault as vault
|
241
241
|
|
242
|
-
|
243
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
244
|
-
backend=
|
242
|
+
example = vault.AuthBackend("example", type="aws")
|
243
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
|
244
|
+
backend=example.path,
|
245
245
|
safety_buffer=360)
|
246
246
|
```
|
247
247
|
<!--End PulumiCodeChooser -->
|
@@ -576,6 +576,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
576
576
|
secret_key="AWS secret key")
|
577
577
|
role = vault.aws.SecretBackendRole("role",
|
578
578
|
backend=aws.path,
|
579
|
+
name="deploy",
|
579
580
|
credential_type="iam_user",
|
580
581
|
policy_document=\"\"\"{
|
581
582
|
"Version": "2012-10-17",
|
@@ -667,6 +668,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
667
668
|
secret_key="AWS secret key")
|
668
669
|
role = vault.aws.SecretBackendRole("role",
|
669
670
|
backend=aws.path,
|
671
|
+
name="deploy",
|
670
672
|
credential_type="iam_user",
|
671
673
|
policy_document=\"\"\"{
|
672
674
|
"Version": "2012-10-17",
|
@@ -229,6 +229,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
229
229
|
description="Obtain AWS credentials.")
|
230
230
|
role = vault.aws.SecretBackendStaticRole("role",
|
231
231
|
backend=aws.path,
|
232
|
+
name="test",
|
232
233
|
username="my-test-user",
|
233
234
|
rotation_period=3600)
|
234
235
|
```
|
@@ -275,6 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
275
276
|
description="Obtain AWS credentials.")
|
276
277
|
role = vault.aws.SecretBackendStaticRole("role",
|
277
278
|
backend=aws.path,
|
279
|
+
name="test",
|
278
280
|
username="my-test-user",
|
279
281
|
rotation_period=3600)
|
280
282
|
```
|
@@ -310,9 +310,9 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
310
310
|
import pulumi
|
311
311
|
import pulumi_vault as vault
|
312
312
|
|
313
|
-
|
314
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
315
|
-
backend=
|
313
|
+
example = vault.AuthBackend("example", type="azure")
|
314
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
315
|
+
backend=example.path,
|
316
316
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
317
317
|
client_id="11111111-2222-3333-4444-555555555555",
|
318
318
|
client_secret="01234567890123456789",
|
@@ -362,9 +362,9 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
362
362
|
import pulumi
|
363
363
|
import pulumi_vault as vault
|
364
364
|
|
365
|
-
|
366
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
367
|
-
backend=
|
365
|
+
example = vault.AuthBackend("example", type="azure")
|
366
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
367
|
+
backend=example.path,
|
368
368
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
369
369
|
client_id="11111111-2222-3333-4444-555555555555",
|
370
370
|
client_secret="01234567890123456789",
|
pulumi_vault/azure/backend.py
CHANGED
@@ -388,12 +388,12 @@ class Backend(pulumi.CustomResource):
|
|
388
388
|
import pulumi_vault as vault
|
389
389
|
|
390
390
|
azure = vault.azure.Backend("azure",
|
391
|
-
|
392
|
-
client_secret="12345678901234567890",
|
393
|
-
environment="AzurePublicCloud",
|
391
|
+
use_microsoft_graph_api=True,
|
394
392
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
395
393
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
396
|
-
|
394
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
395
|
+
client_secret="12345678901234567890",
|
396
|
+
environment="AzurePublicCloud")
|
397
397
|
```
|
398
398
|
<!--End PulumiCodeChooser -->
|
399
399
|
|
@@ -405,12 +405,12 @@ class Backend(pulumi.CustomResource):
|
|
405
405
|
import pulumi_vault as vault
|
406
406
|
|
407
407
|
azure = vault.azure.Backend("azure",
|
408
|
-
|
409
|
-
client_secret="12345678901234567890",
|
410
|
-
environment="AzurePublicCloud",
|
408
|
+
use_microsoft_graph_api=False,
|
411
409
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
412
410
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
413
|
-
|
411
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
412
|
+
client_secret="12345678901234567890",
|
413
|
+
environment="AzurePublicCloud")
|
414
414
|
```
|
415
415
|
<!--End PulumiCodeChooser -->
|
416
416
|
|
@@ -448,12 +448,12 @@ class Backend(pulumi.CustomResource):
|
|
448
448
|
import pulumi_vault as vault
|
449
449
|
|
450
450
|
azure = vault.azure.Backend("azure",
|
451
|
-
|
452
|
-
client_secret="12345678901234567890",
|
453
|
-
environment="AzurePublicCloud",
|
451
|
+
use_microsoft_graph_api=True,
|
454
452
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
455
453
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
456
|
-
|
454
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
455
|
+
client_secret="12345678901234567890",
|
456
|
+
environment="AzurePublicCloud")
|
457
457
|
```
|
458
458
|
<!--End PulumiCodeChooser -->
|
459
459
|
|
@@ -465,12 +465,12 @@ class Backend(pulumi.CustomResource):
|
|
465
465
|
import pulumi_vault as vault
|
466
466
|
|
467
467
|
azure = vault.azure.Backend("azure",
|
468
|
-
|
469
|
-
client_secret="12345678901234567890",
|
470
|
-
environment="AzurePublicCloud",
|
468
|
+
use_microsoft_graph_api=False,
|
471
469
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
472
470
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
473
|
-
|
471
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
472
|
+
client_secret="12345678901234567890",
|
473
|
+
environment="AzurePublicCloud")
|
474
474
|
```
|
475
475
|
<!--End PulumiCodeChooser -->
|
476
476
|
|
@@ -471,11 +471,11 @@ class BackendRole(pulumi.CustomResource):
|
|
471
471
|
import pulumi_vault as vault
|
472
472
|
|
473
473
|
azure = vault.azure.Backend("azure",
|
474
|
-
subscription_id=
|
475
|
-
tenant_id=
|
476
|
-
client_secret=
|
477
|
-
client_id=
|
478
|
-
generated_role = vault.azure.BackendRole("
|
474
|
+
subscription_id=subscription_id,
|
475
|
+
tenant_id=tenant_id,
|
476
|
+
client_secret=client_secret,
|
477
|
+
client_id=client_id)
|
478
|
+
generated_role = vault.azure.BackendRole("generated_role",
|
479
479
|
backend=azure.path,
|
480
480
|
role="generated_role",
|
481
481
|
sign_in_audience="AzureADMyOrg",
|
@@ -487,9 +487,9 @@ class BackendRole(pulumi.CustomResource):
|
|
487
487
|
max_ttl="600",
|
488
488
|
azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
|
489
489
|
role_name="Reader",
|
490
|
-
scope=f"/subscriptions/{
|
490
|
+
scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
|
491
491
|
)])
|
492
|
-
existing_object_id = vault.azure.BackendRole("
|
492
|
+
existing_object_id = vault.azure.BackendRole("existing_object_id",
|
493
493
|
backend=azure.path,
|
494
494
|
role="existing_object_id",
|
495
495
|
application_object_id="11111111-2222-3333-4444-44444444444",
|
@@ -536,11 +536,11 @@ class BackendRole(pulumi.CustomResource):
|
|
536
536
|
import pulumi_vault as vault
|
537
537
|
|
538
538
|
azure = vault.azure.Backend("azure",
|
539
|
-
subscription_id=
|
540
|
-
tenant_id=
|
541
|
-
client_secret=
|
542
|
-
client_id=
|
543
|
-
generated_role = vault.azure.BackendRole("
|
539
|
+
subscription_id=subscription_id,
|
540
|
+
tenant_id=tenant_id,
|
541
|
+
client_secret=client_secret,
|
542
|
+
client_id=client_id)
|
543
|
+
generated_role = vault.azure.BackendRole("generated_role",
|
544
544
|
backend=azure.path,
|
545
545
|
role="generated_role",
|
546
546
|
sign_in_audience="AzureADMyOrg",
|
@@ -552,9 +552,9 @@ class BackendRole(pulumi.CustomResource):
|
|
552
552
|
max_ttl="600",
|
553
553
|
azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
|
554
554
|
role_name="Reader",
|
555
|
-
scope=f"/subscriptions/{
|
555
|
+
scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
|
556
556
|
)])
|
557
|
-
existing_object_id = vault.azure.BackendRole("
|
557
|
+
existing_object_id = vault.azure.BackendRole("existing_object_id",
|
558
558
|
backend=azure.path,
|
559
559
|
role="existing_object_id",
|
560
560
|
application_object_id="11111111-2222-3333-4444-44444444444",
|
@@ -1038,14 +1038,16 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1038
1038
|
<!--Start PulumiCodeChooser -->
|
1039
1039
|
```python
|
1040
1040
|
import pulumi
|
1041
|
+
import pulumi_std as std
|
1041
1042
|
import pulumi_vault as vault
|
1042
1043
|
|
1043
|
-
|
1044
|
+
cert = vault.AuthBackend("cert",
|
1044
1045
|
path="cert",
|
1045
1046
|
type="cert")
|
1046
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
1047
|
-
|
1048
|
-
|
1047
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
|
1048
|
+
name="foo",
|
1049
|
+
certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
|
1050
|
+
backend=cert.path,
|
1049
1051
|
allowed_names=[
|
1050
1052
|
"foo.example.org",
|
1051
1053
|
"baz.example.org",
|
@@ -1134,14 +1136,16 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1134
1136
|
<!--Start PulumiCodeChooser -->
|
1135
1137
|
```python
|
1136
1138
|
import pulumi
|
1139
|
+
import pulumi_std as std
|
1137
1140
|
import pulumi_vault as vault
|
1138
1141
|
|
1139
|
-
|
1142
|
+
cert = vault.AuthBackend("cert",
|
1140
1143
|
path="cert",
|
1141
1144
|
type="cert")
|
1142
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
1143
|
-
|
1144
|
-
|
1145
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
|
1146
|
+
name="foo",
|
1147
|
+
certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
|
1148
|
+
backend=cert.path,
|
1145
1149
|
allowed_names=[
|
1146
1150
|
"foo.example.org",
|
1147
1151
|
"baz.example.org",
|
@@ -536,9 +536,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
536
536
|
import pulumi_vault as vault
|
537
537
|
|
538
538
|
test = vault.consul.SecretBackend("test",
|
539
|
-
address="127.0.0.1:8500",
|
540
|
-
description="Manages the Consul backend",
|
541
539
|
path="consul",
|
540
|
+
description="Manages the Consul backend",
|
541
|
+
address="127.0.0.1:8500",
|
542
542
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
543
543
|
```
|
544
544
|
<!--End PulumiCodeChooser -->
|
@@ -550,10 +550,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
550
550
|
import pulumi_vault as vault
|
551
551
|
|
552
552
|
test = vault.consul.SecretBackend("test",
|
553
|
-
|
554
|
-
bootstrap=True,
|
553
|
+
path="consul",
|
555
554
|
description="Bootstrap the Consul backend",
|
556
|
-
|
555
|
+
address="127.0.0.1:8500",
|
556
|
+
bootstrap=True)
|
557
557
|
```
|
558
558
|
<!--End PulumiCodeChooser -->
|
559
559
|
|
@@ -606,9 +606,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
606
606
|
import pulumi_vault as vault
|
607
607
|
|
608
608
|
test = vault.consul.SecretBackend("test",
|
609
|
-
address="127.0.0.1:8500",
|
610
|
-
description="Manages the Consul backend",
|
611
609
|
path="consul",
|
610
|
+
description="Manages the Consul backend",
|
611
|
+
address="127.0.0.1:8500",
|
612
612
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
613
613
|
```
|
614
614
|
<!--End PulumiCodeChooser -->
|
@@ -620,10 +620,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
620
620
|
import pulumi_vault as vault
|
621
621
|
|
622
622
|
test = vault.consul.SecretBackend("test",
|
623
|
-
|
624
|
-
bootstrap=True,
|
623
|
+
path="consul",
|
625
624
|
description="Bootstrap the Consul backend",
|
626
|
-
|
625
|
+
address="127.0.0.1:8500",
|
626
|
+
bootstrap=True)
|
627
627
|
```
|
628
628
|
<!--End PulumiCodeChooser -->
|
629
629
|
|
@@ -518,6 +518,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
518
518
|
address="127.0.0.1:8500",
|
519
519
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
520
520
|
example = vault.consul.SecretBackendRole("example",
|
521
|
+
name="test-role",
|
521
522
|
backend=test.path,
|
522
523
|
consul_policies=["example-policy"])
|
523
524
|
```
|
@@ -585,6 +586,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
585
586
|
address="127.0.0.1:8500",
|
586
587
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
587
588
|
example = vault.consul.SecretBackendRole("example",
|
589
|
+
name="test-role",
|
588
590
|
backend=test.path,
|
589
591
|
consul_policies=["example-policy"])
|
590
592
|
```
|
@@ -933,6 +933,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
933
933
|
type="database")
|
934
934
|
postgres = vault.database.SecretBackendConnection("postgres",
|
935
935
|
backend=db.path,
|
936
|
+
name="postgres",
|
936
937
|
allowed_roles=[
|
937
938
|
"dev",
|
938
939
|
"prod",
|
@@ -1006,6 +1007,7 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1006
1007
|
type="database")
|
1007
1008
|
postgres = vault.database.SecretBackendConnection("postgres",
|
1008
1009
|
backend=db.path,
|
1010
|
+
name="postgres",
|
1009
1011
|
allowed_roles=[
|
1010
1012
|
"dev",
|
1011
1013
|
"prod",
|
@@ -499,6 +499,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
499
499
|
type="database")
|
500
500
|
postgres = vault.database.SecretBackendConnection("postgres",
|
501
501
|
backend=db.path,
|
502
|
+
name="postgres",
|
502
503
|
allowed_roles=[
|
503
504
|
"dev",
|
504
505
|
"prod",
|
@@ -508,6 +509,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
508
509
|
))
|
509
510
|
role = vault.database.SecretBackendRole("role",
|
510
511
|
backend=db.path,
|
512
|
+
name="dev",
|
511
513
|
db_name=postgres.name,
|
512
514
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
513
515
|
```
|
@@ -570,6 +572,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
570
572
|
type="database")
|
571
573
|
postgres = vault.database.SecretBackendConnection("postgres",
|
572
574
|
backend=db.path,
|
575
|
+
name="postgres",
|
573
576
|
allowed_roles=[
|
574
577
|
"dev",
|
575
578
|
"prod",
|
@@ -579,6 +582,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
579
582
|
))
|
580
583
|
role = vault.database.SecretBackendRole("role",
|
581
584
|
backend=db.path,
|
585
|
+
name="dev",
|
582
586
|
db_name=postgres.name,
|
583
587
|
creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
|
584
588
|
```
|
@@ -380,20 +380,23 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
380
380
|
type="database")
|
381
381
|
postgres = vault.database.SecretBackendConnection("postgres",
|
382
382
|
backend=db.path,
|
383
|
+
name="postgres",
|
383
384
|
allowed_roles=["*"],
|
384
385
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
385
386
|
connection_url="postgres://username:password@host:port/database",
|
386
387
|
))
|
387
388
|
# configure a static role with period-based rotations
|
388
|
-
period_role = vault.database.SecretBackendStaticRole("
|
389
|
+
period_role = vault.database.SecretBackendStaticRole("period_role",
|
389
390
|
backend=db.path,
|
391
|
+
name="my-period-role",
|
390
392
|
db_name=postgres.name,
|
391
393
|
username="example",
|
392
394
|
rotation_period=3600,
|
393
395
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
394
396
|
# configure a static role with schedule-based rotations
|
395
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
397
|
+
schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
|
396
398
|
backend=db.path,
|
399
|
+
name="my-schedule-role",
|
397
400
|
db_name=postgres.name,
|
398
401
|
username="example",
|
399
402
|
rotation_schedule="0 0 * * SAT",
|
@@ -454,20 +457,23 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
454
457
|
type="database")
|
455
458
|
postgres = vault.database.SecretBackendConnection("postgres",
|
456
459
|
backend=db.path,
|
460
|
+
name="postgres",
|
457
461
|
allowed_roles=["*"],
|
458
462
|
postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
|
459
463
|
connection_url="postgres://username:password@host:port/database",
|
460
464
|
))
|
461
465
|
# configure a static role with period-based rotations
|
462
|
-
period_role = vault.database.SecretBackendStaticRole("
|
466
|
+
period_role = vault.database.SecretBackendStaticRole("period_role",
|
463
467
|
backend=db.path,
|
468
|
+
name="my-period-role",
|
464
469
|
db_name=postgres.name,
|
465
470
|
username="example",
|
466
471
|
rotation_period=3600,
|
467
472
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
468
473
|
# configure a static role with schedule-based rotations
|
469
|
-
schedule_role = vault.database.SecretBackendStaticRole("
|
474
|
+
schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
|
470
475
|
backend=db.path,
|
476
|
+
name="my-schedule-role",
|
471
477
|
db_name=postgres.name,
|
472
478
|
username="example",
|
473
479
|
rotation_schedule="0 0 * * SAT",
|