pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +2 -2
- pulumi_vault/ad/secret_library.py +2 -0
- pulumi_vault/alicloud/auth_backend_role.py +6 -6
- pulumi_vault/audit.py +12 -12
- pulumi_vault/audit_request_header.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -6
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
- pulumi_vault/aws/secret_backend_role.py +2 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -0
- pulumi_vault/azure/auth_backend_config.py +6 -6
- pulumi_vault/azure/backend.py +16 -16
- pulumi_vault/azure/backend_role.py +14 -14
- pulumi_vault/cert_auth_backend_role.py +12 -8
- pulumi_vault/consul/secret_backend.py +10 -10
- pulumi_vault/consul/secret_backend_role.py +2 -0
- pulumi_vault/database/secret_backend_connection.py +2 -0
- pulumi_vault/database/secret_backend_role.py +4 -0
- pulumi_vault/database/secret_backend_static_role.py +10 -4
- pulumi_vault/database/secrets_mount.py +4 -0
- pulumi_vault/egp_policy.py +4 -4
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/secret_backend.py +4 -2
- pulumi_vault/gcp/secret_impersonated_account.py +12 -10
- pulumi_vault/gcp/secret_roleset.py +4 -2
- pulumi_vault/gcp/secret_static_account.py +14 -12
- pulumi_vault/generic/endpoint.py +4 -4
- pulumi_vault/generic/get_secret.py +44 -0
- pulumi_vault/get_namespaces.py +4 -4
- pulumi_vault/get_policy_document.py +8 -4
- pulumi_vault/github/team.py +2 -2
- pulumi_vault/github/user.py +2 -2
- pulumi_vault/identity/entity.py +6 -4
- pulumi_vault/identity/entity_alias.py +6 -4
- pulumi_vault/identity/entity_policies.py +12 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -0
- pulumi_vault/identity/get_oidc_openid_config.py +10 -2
- pulumi_vault/identity/get_oidc_public_keys.py +10 -2
- pulumi_vault/identity/group.py +38 -30
- pulumi_vault/identity/group_alias.py +2 -0
- pulumi_vault/identity/group_member_entity_ids.py +12 -8
- pulumi_vault/identity/group_member_group_ids.py +24 -12
- pulumi_vault/identity/group_policies.py +4 -0
- pulumi_vault/identity/mfa_duo.py +4 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -4
- pulumi_vault/identity/mfa_okta.py +4 -4
- pulumi_vault/identity/oidc_assignment.py +10 -2
- pulumi_vault/identity/oidc_client.py +10 -6
- pulumi_vault/identity/oidc_key.py +16 -8
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
- pulumi_vault/identity/oidc_provider.py +22 -12
- pulumi_vault/identity/oidc_role.py +28 -12
- pulumi_vault/identity/oidc_scope.py +6 -4
- pulumi_vault/jwt/auth_backend.py +20 -20
- pulumi_vault/kmip/secret_backend.py +10 -10
- pulumi_vault/kubernetes/get_service_account_token.py +8 -4
- pulumi_vault/kubernetes/secret_backend.py +6 -4
- pulumi_vault/kubernetes/secret_backend_role.py +24 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
- pulumi_vault/kv/get_secret_v2.py +62 -0
- pulumi_vault/kv/get_secrets_list.py +4 -4
- pulumi_vault/kv/get_secrets_list_v2.py +14 -8
- pulumi_vault/kv/secret_v2.py +2 -0
- pulumi_vault/ldap/auth_backend.py +10 -10
- pulumi_vault/ldap/secret_backend.py +4 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -0
- pulumi_vault/mfa_duo.py +4 -2
- pulumi_vault/mfa_okta.py +4 -2
- pulumi_vault/mfa_pingid.py +4 -2
- pulumi_vault/mfa_totp.py +10 -8
- pulumi_vault/mongodbatlas/secret_role.py +2 -0
- pulumi_vault/mount.py +26 -26
- pulumi_vault/nomad_secret_backend.py +4 -4
- pulumi_vault/okta/auth_backend.py +6 -6
- pulumi_vault/password_policy.py +6 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
- pulumi_vault/pkisecret/secret_backend_role.py +2 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
- pulumi_vault/quota_lease_count.py +6 -4
- pulumi_vault/quota_rate_limit.py +2 -0
- pulumi_vault/rabbitmq/secret_backend.py +4 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
- pulumi_vault/raft_snapshot_agent_config.py +18 -12
- pulumi_vault/rgp_policy.py +2 -2
- pulumi_vault/saml/auth_backend.py +8 -8
- pulumi_vault/saml/auth_backend_role.py +8 -6
- pulumi_vault/secrets/sync_association.py +12 -6
- pulumi_vault/secrets/sync_aws_destination.py +6 -4
- pulumi_vault/secrets/sync_azure_destination.py +10 -8
- pulumi_vault/secrets/sync_config.py +2 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -4
- pulumi_vault/secrets/sync_github_apps.py +8 -4
- pulumi_vault/secrets/sync_vercel_destination.py +6 -4
- pulumi_vault/ssh/_inputs.py +0 -12
- pulumi_vault/ssh/outputs.py +0 -12
- pulumi_vault/ssh/secret_backend_role.py +4 -0
- pulumi_vault/terraformcloud/secret_creds.py +2 -0
- pulumi_vault/terraformcloud/secret_role.py +2 -0
- pulumi_vault/token.py +14 -14
- pulumi_vault/tokenauth/auth_backend_role.py +8 -8
- pulumi_vault/transform/alphabet.py +4 -2
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -2
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -4
- pulumi_vault/transit/secret_backend_key.py +6 -2
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -93,12 +93,12 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
93
93
|
"version": "1",
|
94
94
|
},
|
95
95
|
description="KV Version 1 secret engine mount")
|
96
|
-
aws_secret = vault.kv.Secret("
|
96
|
+
aws_secret = vault.kv.Secret("aws_secret",
|
97
97
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
98
98
|
data_json=json.dumps({
|
99
99
|
"zip": "zap",
|
100
100
|
}))
|
101
|
-
azure_secret = vault.kv.Secret("
|
101
|
+
azure_secret = vault.kv.Secret("azure_secret",
|
102
102
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
103
103
|
data_json=json.dumps({
|
104
104
|
"foo": "bar",
|
@@ -151,12 +151,12 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
151
151
|
"version": "1",
|
152
152
|
},
|
153
153
|
description="KV Version 1 secret engine mount")
|
154
|
-
aws_secret = vault.kv.Secret("
|
154
|
+
aws_secret = vault.kv.Secret("aws_secret",
|
155
155
|
path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
|
156
156
|
data_json=json.dumps({
|
157
157
|
"zip": "zap",
|
158
158
|
}))
|
159
|
-
azure_secret = vault.kv.Secret("
|
159
|
+
azure_secret = vault.kv.Secret("azure_secret",
|
160
160
|
path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
|
161
161
|
data_json=json.dumps({
|
162
162
|
"foo": "bar",
|
@@ -115,24 +115,27 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
115
115
|
"version": "2",
|
116
116
|
},
|
117
117
|
description="KV Version 2 secret engine mount")
|
118
|
-
aws_secret = vault.kv.SecretV2("
|
118
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
119
119
|
mount=kvv2.path,
|
120
|
+
name="aws_secret",
|
120
121
|
data_json=json.dumps({
|
121
122
|
"zip": "zap",
|
122
123
|
}))
|
123
|
-
azure_secret = vault.kv.SecretV2("
|
124
|
+
azure_secret = vault.kv.SecretV2("azure_secret",
|
124
125
|
mount=kvv2.path,
|
126
|
+
name="azure_secret",
|
125
127
|
data_json=json.dumps({
|
126
128
|
"foo": "bar",
|
127
129
|
}))
|
128
|
-
nested_secret = vault.kv.SecretV2("
|
130
|
+
nested_secret = vault.kv.SecretV2("nested_secret",
|
129
131
|
mount=kvv2.path,
|
132
|
+
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
130
133
|
data_json=json.dumps({
|
131
134
|
"password": "test",
|
132
135
|
}))
|
133
136
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
134
137
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
135
|
-
name=
|
138
|
+
name=test2["name"]))
|
136
139
|
```
|
137
140
|
<!--End PulumiCodeChooser -->
|
138
141
|
|
@@ -188,24 +191,27 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
188
191
|
"version": "2",
|
189
192
|
},
|
190
193
|
description="KV Version 2 secret engine mount")
|
191
|
-
aws_secret = vault.kv.SecretV2("
|
194
|
+
aws_secret = vault.kv.SecretV2("aws_secret",
|
192
195
|
mount=kvv2.path,
|
196
|
+
name="aws_secret",
|
193
197
|
data_json=json.dumps({
|
194
198
|
"zip": "zap",
|
195
199
|
}))
|
196
|
-
azure_secret = vault.kv.SecretV2("
|
200
|
+
azure_secret = vault.kv.SecretV2("azure_secret",
|
197
201
|
mount=kvv2.path,
|
202
|
+
name="azure_secret",
|
198
203
|
data_json=json.dumps({
|
199
204
|
"foo": "bar",
|
200
205
|
}))
|
201
|
-
nested_secret = vault.kv.SecretV2("
|
206
|
+
nested_secret = vault.kv.SecretV2("nested_secret",
|
202
207
|
mount=kvv2.path,
|
208
|
+
name=azure_secret.name.apply(lambda name: f"{name}/dev"),
|
203
209
|
data_json=json.dumps({
|
204
210
|
"password": "test",
|
205
211
|
}))
|
206
212
|
secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
|
207
213
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
208
|
-
name=
|
214
|
+
name=test2["name"]))
|
209
215
|
```
|
210
216
|
<!--End PulumiCodeChooser -->
|
211
217
|
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -463,6 +463,7 @@ class SecretV2(pulumi.CustomResource):
|
|
463
463
|
description="KV Version 2 secret engine mount")
|
464
464
|
example = vault.kv.SecretV2("example",
|
465
465
|
mount=kvv2.path,
|
466
|
+
name="secret",
|
466
467
|
cas=1,
|
467
468
|
delete_all_versions=True,
|
468
469
|
data_json=json.dumps({
|
@@ -561,6 +562,7 @@ class SecretV2(pulumi.CustomResource):
|
|
561
562
|
description="KV Version 2 secret engine mount")
|
562
563
|
example = vault.kv.SecretV2("example",
|
563
564
|
mount=kvv2.path,
|
565
|
+
name="secret",
|
564
566
|
cas=1,
|
565
567
|
delete_all_versions=True,
|
566
568
|
data_json=json.dumps({
|
@@ -1336,14 +1336,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1336
1336
|
import pulumi_vault as vault
|
1337
1337
|
|
1338
1338
|
ldap = vault.ldap.AuthBackend("ldap",
|
1339
|
-
discoverdn=False,
|
1340
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1341
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1342
1339
|
path="ldap",
|
1343
|
-
upndomain="EXAMPLE.ORG",
|
1344
1340
|
url="ldaps://dc-01.example.org",
|
1341
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1345
1342
|
userattr="sAMAccountName",
|
1346
|
-
|
1343
|
+
upndomain="EXAMPLE.ORG",
|
1344
|
+
discoverdn=False,
|
1345
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1346
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1347
1347
|
```
|
1348
1348
|
<!--End PulumiCodeChooser -->
|
1349
1349
|
|
@@ -1428,14 +1428,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1428
1428
|
import pulumi_vault as vault
|
1429
1429
|
|
1430
1430
|
ldap = vault.ldap.AuthBackend("ldap",
|
1431
|
-
discoverdn=False,
|
1432
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1433
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1434
1431
|
path="ldap",
|
1435
|
-
upndomain="EXAMPLE.ORG",
|
1436
1432
|
url="ldaps://dc-01.example.org",
|
1433
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1437
1434
|
userattr="sAMAccountName",
|
1438
|
-
|
1435
|
+
upndomain="EXAMPLE.ORG",
|
1436
|
+
discoverdn=False,
|
1437
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1438
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1439
1439
|
```
|
1440
1440
|
<!--End PulumiCodeChooser -->
|
1441
1441
|
|
@@ -1057,11 +1057,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1057
1057
|
import pulumi_vault as vault
|
1058
1058
|
|
1059
1059
|
config = vault.ldap.SecretBackend("config",
|
1060
|
+
path="my-custom-ldap",
|
1060
1061
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1061
1062
|
bindpass="SuperSecretPassw0rd",
|
1062
|
-
insecure_tls=True,
|
1063
|
-
path="my-custom-ldap",
|
1064
1063
|
url="ldaps://localhost",
|
1064
|
+
insecure_tls=True,
|
1065
1065
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1066
1066
|
```
|
1067
1067
|
<!--End PulumiCodeChooser -->
|
@@ -1132,11 +1132,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1132
1132
|
import pulumi_vault as vault
|
1133
1133
|
|
1134
1134
|
config = vault.ldap.SecretBackend("config",
|
1135
|
+
path="my-custom-ldap",
|
1135
1136
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1136
1137
|
bindpass="SuperSecretPassw0rd",
|
1137
|
-
insecure_tls=True,
|
1138
|
-
path="my-custom-ldap",
|
1139
1138
|
url="ldaps://localhost",
|
1139
|
+
insecure_tls=True,
|
1140
1140
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1141
1141
|
```
|
1142
1142
|
<!--End PulumiCodeChooser -->
|
@@ -312,6 +312,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
312
312
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
313
313
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
314
314
|
mount=config.path,
|
315
|
+
name="qa",
|
315
316
|
service_account_names=[
|
316
317
|
"Bob",
|
317
318
|
"Mary",
|
@@ -371,6 +372,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
371
372
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
372
373
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
373
374
|
mount=config.path,
|
375
|
+
name="qa",
|
374
376
|
service_account_names=[
|
375
377
|
"Bob",
|
376
378
|
"Mary",
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -336,7 +336,8 @@ class MfaDuo(pulumi.CustomResource):
|
|
336
336
|
userpass = vault.AuthBackend("userpass",
|
337
337
|
type="userpass",
|
338
338
|
path="userpass")
|
339
|
-
my_duo = vault.MfaDuo("
|
339
|
+
my_duo = vault.MfaDuo("my_duo",
|
340
|
+
name="my_duo",
|
340
341
|
mount_accessor=userpass.accessor,
|
341
342
|
secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
|
342
343
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
@@ -391,7 +392,8 @@ class MfaDuo(pulumi.CustomResource):
|
|
391
392
|
userpass = vault.AuthBackend("userpass",
|
392
393
|
type="userpass",
|
393
394
|
path="userpass")
|
394
|
-
my_duo = vault.MfaDuo("
|
395
|
+
my_duo = vault.MfaDuo("my_duo",
|
396
|
+
name="my_duo",
|
395
397
|
mount_accessor=userpass.accessor,
|
396
398
|
secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
|
397
399
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -357,7 +357,8 @@ class MfaOkta(pulumi.CustomResource):
|
|
357
357
|
userpass = vault.AuthBackend("userpass",
|
358
358
|
type="userpass",
|
359
359
|
path="userpass")
|
360
|
-
my_okta = vault.MfaOkta("
|
360
|
+
my_okta = vault.MfaOkta("my_okta",
|
361
|
+
name="my_okta",
|
361
362
|
mount_accessor=userpass.accessor,
|
362
363
|
username_format="user@example.com",
|
363
364
|
org_name="hashicorp",
|
@@ -417,7 +418,8 @@ class MfaOkta(pulumi.CustomResource):
|
|
417
418
|
userpass = vault.AuthBackend("userpass",
|
418
419
|
type="userpass",
|
419
420
|
path="userpass")
|
420
|
-
my_okta = vault.MfaOkta("
|
421
|
+
my_okta = vault.MfaOkta("my_okta",
|
422
|
+
name="my_okta",
|
421
423
|
mount_accessor=userpass.accessor,
|
422
424
|
username_format="user@example.com",
|
423
425
|
org_name="hashicorp",
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -369,7 +369,8 @@ class MfaPingid(pulumi.CustomResource):
|
|
369
369
|
userpass = vault.AuthBackend("userpass",
|
370
370
|
type="userpass",
|
371
371
|
path="userpass")
|
372
|
-
my_pingid = vault.MfaPingid("
|
372
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
373
|
+
name="my_pingid",
|
373
374
|
mount_accessor=userpass.accessor,
|
374
375
|
username_format="user@example.com",
|
375
376
|
settings_file_base64=settings_file)
|
@@ -426,7 +427,8 @@ class MfaPingid(pulumi.CustomResource):
|
|
426
427
|
userpass = vault.AuthBackend("userpass",
|
427
428
|
type="userpass",
|
428
429
|
path="userpass")
|
429
|
-
my_pingid = vault.MfaPingid("
|
430
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
431
|
+
name="my_pingid",
|
430
432
|
mount_accessor=userpass.accessor,
|
431
433
|
username_format="user@example.com",
|
432
434
|
settings_file_base64=settings_file)
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -365,12 +365,13 @@ class MfaTotp(pulumi.CustomResource):
|
|
365
365
|
import pulumi
|
366
366
|
import pulumi_vault as vault
|
367
367
|
|
368
|
-
my_totp = vault.MfaTotp("
|
368
|
+
my_totp = vault.MfaTotp("my_totp",
|
369
|
+
name="my_totp",
|
370
|
+
issuer="hashicorp",
|
371
|
+
period=60,
|
369
372
|
algorithm="SHA256",
|
370
373
|
digits=8,
|
371
|
-
|
372
|
-
key_size=20,
|
373
|
-
period=60)
|
374
|
+
key_size=20)
|
374
375
|
```
|
375
376
|
<!--End PulumiCodeChooser -->
|
376
377
|
|
@@ -418,12 +419,13 @@ class MfaTotp(pulumi.CustomResource):
|
|
418
419
|
import pulumi
|
419
420
|
import pulumi_vault as vault
|
420
421
|
|
421
|
-
my_totp = vault.MfaTotp("
|
422
|
+
my_totp = vault.MfaTotp("my_totp",
|
423
|
+
name="my_totp",
|
424
|
+
issuer="hashicorp",
|
425
|
+
period=60,
|
422
426
|
algorithm="SHA256",
|
423
427
|
digits=8,
|
424
|
-
|
425
|
-
key_size=20,
|
426
|
-
period=60)
|
428
|
+
key_size=20)
|
427
429
|
```
|
428
430
|
<!--End PulumiCodeChooser -->
|
429
431
|
|
@@ -432,6 +432,7 @@ class SecretRole(pulumi.CustomResource):
|
|
432
432
|
public_key="publicKey")
|
433
433
|
role = vault.mongodbatlas.SecretRole("role",
|
434
434
|
mount=mongo.path,
|
435
|
+
name="tf-test-role",
|
435
436
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
436
437
|
project_id="5cf5a45a9ccf6400e60981b6",
|
437
438
|
roles=["ORG_READ_ONLY"],
|
@@ -495,6 +496,7 @@ class SecretRole(pulumi.CustomResource):
|
|
495
496
|
public_key="publicKey")
|
496
497
|
role = vault.mongodbatlas.SecretRole("role",
|
497
498
|
mount=mongo.path,
|
499
|
+
name="tf-test-role",
|
498
500
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
499
501
|
project_id="5cf5a45a9ccf6400e60981b6",
|
500
502
|
roles=["ORG_READ_ONLY"],
|
pulumi_vault/mount.py
CHANGED
@@ -499,9 +499,9 @@ class Mount(pulumi.CustomResource):
|
|
499
499
|
import pulumi_vault as vault
|
500
500
|
|
501
501
|
example = vault.Mount("example",
|
502
|
-
description="This is an example mount",
|
503
502
|
path="dummy",
|
504
|
-
type="generic"
|
503
|
+
type="generic",
|
504
|
+
description="This is an example mount")
|
505
505
|
```
|
506
506
|
<!--End PulumiCodeChooser -->
|
507
507
|
|
@@ -511,13 +511,13 @@ class Mount(pulumi.CustomResource):
|
|
511
511
|
import pulumi_vault as vault
|
512
512
|
|
513
513
|
kvv2_example = vault.Mount("kvv2-example",
|
514
|
-
|
514
|
+
path="version2-example",
|
515
|
+
type="kv-v2",
|
515
516
|
options={
|
516
|
-
"type": "kv-v2",
|
517
517
|
"version": "2",
|
518
|
+
"type": "kv-v2",
|
518
519
|
},
|
519
|
-
|
520
|
-
type="kv-v2")
|
520
|
+
description="This is an example KV Version 2 secret engine mount")
|
521
521
|
```
|
522
522
|
<!--End PulumiCodeChooser -->
|
523
523
|
|
@@ -527,12 +527,12 @@ class Mount(pulumi.CustomResource):
|
|
527
527
|
import pulumi_vault as vault
|
528
528
|
|
529
529
|
transit_example = vault.Mount("transit-example",
|
530
|
+
path="transit-example",
|
531
|
+
type="transit",
|
530
532
|
description="This is an example transit secret engine mount",
|
531
533
|
options={
|
532
534
|
"convergent_encryption": False,
|
533
|
-
}
|
534
|
-
path="transit-example",
|
535
|
-
type="transit")
|
535
|
+
})
|
536
536
|
```
|
537
537
|
<!--End PulumiCodeChooser -->
|
538
538
|
|
@@ -542,11 +542,11 @@ class Mount(pulumi.CustomResource):
|
|
542
542
|
import pulumi_vault as vault
|
543
543
|
|
544
544
|
pki_example = vault.Mount("pki-example",
|
545
|
-
default_lease_ttl_seconds=3600,
|
546
|
-
description="This is an example PKI mount",
|
547
|
-
max_lease_ttl_seconds=86400,
|
548
545
|
path="pki-example",
|
549
|
-
type="pki"
|
546
|
+
type="pki",
|
547
|
+
description="This is an example PKI mount",
|
548
|
+
default_lease_ttl_seconds=3600,
|
549
|
+
max_lease_ttl_seconds=86400)
|
550
550
|
```
|
551
551
|
<!--End PulumiCodeChooser -->
|
552
552
|
|
@@ -594,9 +594,9 @@ class Mount(pulumi.CustomResource):
|
|
594
594
|
import pulumi_vault as vault
|
595
595
|
|
596
596
|
example = vault.Mount("example",
|
597
|
-
description="This is an example mount",
|
598
597
|
path="dummy",
|
599
|
-
type="generic"
|
598
|
+
type="generic",
|
599
|
+
description="This is an example mount")
|
600
600
|
```
|
601
601
|
<!--End PulumiCodeChooser -->
|
602
602
|
|
@@ -606,13 +606,13 @@ class Mount(pulumi.CustomResource):
|
|
606
606
|
import pulumi_vault as vault
|
607
607
|
|
608
608
|
kvv2_example = vault.Mount("kvv2-example",
|
609
|
-
|
609
|
+
path="version2-example",
|
610
|
+
type="kv-v2",
|
610
611
|
options={
|
611
|
-
"type": "kv-v2",
|
612
612
|
"version": "2",
|
613
|
+
"type": "kv-v2",
|
613
614
|
},
|
614
|
-
|
615
|
-
type="kv-v2")
|
615
|
+
description="This is an example KV Version 2 secret engine mount")
|
616
616
|
```
|
617
617
|
<!--End PulumiCodeChooser -->
|
618
618
|
|
@@ -622,12 +622,12 @@ class Mount(pulumi.CustomResource):
|
|
622
622
|
import pulumi_vault as vault
|
623
623
|
|
624
624
|
transit_example = vault.Mount("transit-example",
|
625
|
+
path="transit-example",
|
626
|
+
type="transit",
|
625
627
|
description="This is an example transit secret engine mount",
|
626
628
|
options={
|
627
629
|
"convergent_encryption": False,
|
628
|
-
}
|
629
|
-
path="transit-example",
|
630
|
-
type="transit")
|
630
|
+
})
|
631
631
|
```
|
632
632
|
<!--End PulumiCodeChooser -->
|
633
633
|
|
@@ -637,11 +637,11 @@ class Mount(pulumi.CustomResource):
|
|
637
637
|
import pulumi_vault as vault
|
638
638
|
|
639
639
|
pki_example = vault.Mount("pki-example",
|
640
|
-
default_lease_ttl_seconds=3600,
|
641
|
-
description="This is an example PKI mount",
|
642
|
-
max_lease_ttl_seconds=86400,
|
643
640
|
path="pki-example",
|
644
|
-
type="pki"
|
641
|
+
type="pki",
|
642
|
+
description="This is an example PKI mount",
|
643
|
+
default_lease_ttl_seconds=3600,
|
644
|
+
max_lease_ttl_seconds=86400)
|
645
645
|
```
|
646
646
|
<!--End PulumiCodeChooser -->
|
647
647
|
|
@@ -577,12 +577,12 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
577
577
|
import pulumi_vault as vault
|
578
578
|
|
579
579
|
config = vault.NomadSecretBackend("config",
|
580
|
-
address="https://127.0.0.1:4646",
|
581
580
|
backend="nomad",
|
582
|
-
default_lease_ttl_seconds=3600,
|
583
581
|
description="test description",
|
582
|
+
default_lease_ttl_seconds=3600,
|
584
583
|
max_lease_ttl_seconds=7200,
|
585
584
|
max_ttl=240,
|
585
|
+
address="https://127.0.0.1:4646",
|
586
586
|
token="ae20ceaa-...",
|
587
587
|
ttl=120)
|
588
588
|
```
|
@@ -639,12 +639,12 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
639
639
|
import pulumi_vault as vault
|
640
640
|
|
641
641
|
config = vault.NomadSecretBackend("config",
|
642
|
-
address="https://127.0.0.1:4646",
|
643
642
|
backend="nomad",
|
644
|
-
default_lease_ttl_seconds=3600,
|
645
643
|
description="test description",
|
644
|
+
default_lease_ttl_seconds=3600,
|
646
645
|
max_lease_ttl_seconds=7200,
|
647
646
|
max_ttl=240,
|
647
|
+
address="https://127.0.0.1:4646",
|
648
648
|
token="ae20ceaa-...",
|
649
649
|
ttl=120)
|
650
650
|
```
|
@@ -495,6 +495,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
495
495
|
|
496
496
|
example = vault.okta.AuthBackend("example",
|
497
497
|
description="Demonstration of the Terraform Okta auth backend",
|
498
|
+
organization="example",
|
499
|
+
token="something that should be kept secret",
|
498
500
|
groups=[vault.okta.AuthBackendGroupArgs(
|
499
501
|
group_name="foo",
|
500
502
|
policies=[
|
@@ -502,11 +504,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
502
504
|
"two",
|
503
505
|
],
|
504
506
|
)],
|
505
|
-
organization="example",
|
506
|
-
token="something that should be kept secret",
|
507
507
|
users=[vault.okta.AuthBackendUserArgs(
|
508
|
-
groups=["foo"],
|
509
508
|
username="bar",
|
509
|
+
groups=["foo"],
|
510
510
|
)])
|
511
511
|
```
|
512
512
|
<!--End PulumiCodeChooser -->
|
@@ -562,6 +562,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
562
562
|
|
563
563
|
example = vault.okta.AuthBackend("example",
|
564
564
|
description="Demonstration of the Terraform Okta auth backend",
|
565
|
+
organization="example",
|
566
|
+
token="something that should be kept secret",
|
565
567
|
groups=[vault.okta.AuthBackendGroupArgs(
|
566
568
|
group_name="foo",
|
567
569
|
policies=[
|
@@ -569,11 +571,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
569
571
|
"two",
|
570
572
|
],
|
571
573
|
)],
|
572
|
-
organization="example",
|
573
|
-
token="something that should be kept secret",
|
574
574
|
users=[vault.okta.AuthBackendUserArgs(
|
575
|
-
groups=["foo"],
|
576
575
|
username="bar",
|
576
|
+
groups=["foo"],
|
577
577
|
)])
|
578
578
|
```
|
579
579
|
<!--End PulumiCodeChooser -->
|
pulumi_vault/password_policy.py
CHANGED
@@ -155,11 +155,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
155
155
|
import pulumi
|
156
156
|
import pulumi_vault as vault
|
157
157
|
|
158
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
158
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
159
|
+
name="alphanumeric",
|
160
|
+
policy=\"\"\" length = 20
|
159
161
|
rule "charset" {
|
160
162
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
161
163
|
}
|
162
|
-
|
163
164
|
\"\"\")
|
164
165
|
```
|
165
166
|
<!--End PulumiCodeChooser -->
|
@@ -199,11 +200,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
199
200
|
import pulumi
|
200
201
|
import pulumi_vault as vault
|
201
202
|
|
202
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
203
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
204
|
+
name="alphanumeric",
|
205
|
+
policy=\"\"\" length = 20
|
203
206
|
rule "charset" {
|
204
207
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
205
208
|
}
|
206
|
-
|
207
209
|
\"\"\")
|
208
210
|
```
|
209
211
|
<!--End PulumiCodeChooser -->
|
@@ -175,6 +175,26 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
175
175
|
"""
|
176
176
|
## Example Usage
|
177
177
|
|
178
|
+
<!--Start PulumiCodeChooser -->
|
179
|
+
```python
|
180
|
+
import pulumi
|
181
|
+
import pulumi_vault as vault
|
182
|
+
|
183
|
+
pki = vault.Mount("pki",
|
184
|
+
path="pki",
|
185
|
+
type="pki",
|
186
|
+
description="PKI secret engine mount")
|
187
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
188
|
+
backend=pki.path,
|
189
|
+
type="internal",
|
190
|
+
common_name="example",
|
191
|
+
ttl="86400",
|
192
|
+
issuer_name="example")
|
193
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
194
|
+
issuer_ref=issuer_id))
|
195
|
+
```
|
196
|
+
<!--End PulumiCodeChooser -->
|
197
|
+
|
178
198
|
|
179
199
|
:param str backend: The path to the PKI secret backend to
|
180
200
|
read the issuer from, with no leading or trailing `/`s.
|
@@ -214,6 +234,26 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
214
234
|
"""
|
215
235
|
## Example Usage
|
216
236
|
|
237
|
+
<!--Start PulumiCodeChooser -->
|
238
|
+
```python
|
239
|
+
import pulumi
|
240
|
+
import pulumi_vault as vault
|
241
|
+
|
242
|
+
pki = vault.Mount("pki",
|
243
|
+
path="pki",
|
244
|
+
type="pki",
|
245
|
+
description="PKI secret engine mount")
|
246
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
247
|
+
backend=pki.path,
|
248
|
+
type="internal",
|
249
|
+
common_name="example",
|
250
|
+
ttl="86400",
|
251
|
+
issuer_name="example")
|
252
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
253
|
+
issuer_ref=issuer_id))
|
254
|
+
```
|
255
|
+
<!--End PulumiCodeChooser -->
|
256
|
+
|
217
257
|
|
218
258
|
:param str backend: The path to the PKI secret backend to
|
219
259
|
read the issuer from, with no leading or trailing `/`s.
|
@@ -129,7 +129,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
129
129
|
key_name="example",
|
130
130
|
key_type="rsa",
|
131
131
|
key_bits=4096)
|
132
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
132
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
133
133
|
key_ref=key_id))
|
134
134
|
```
|
135
135
|
<!--End PulumiCodeChooser -->
|
@@ -183,7 +183,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
183
183
|
key_name="example",
|
184
184
|
key_type="rsa",
|
185
185
|
key_bits=4096)
|
186
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
186
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
187
187
|
key_ref=key_id))
|
188
188
|
```
|
189
189
|
<!--End PulumiCodeChooser -->
|
@@ -741,9 +741,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
741
741
|
import pulumi_vault as vault
|
742
742
|
|
743
743
|
app = vault.pki_secret.SecretBackendCert("app",
|
744
|
-
backend=
|
744
|
+
backend=intermediate["path"],
|
745
|
+
name=test["name"],
|
745
746
|
common_name="app.my.domain",
|
746
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
747
|
+
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
747
748
|
```
|
748
749
|
<!--End PulumiCodeChooser -->
|
749
750
|
|
@@ -785,9 +786,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
785
786
|
import pulumi_vault as vault
|
786
787
|
|
787
788
|
app = vault.pki_secret.SecretBackendCert("app",
|
788
|
-
backend=
|
789
|
+
backend=intermediate["path"],
|
790
|
+
name=test["name"],
|
789
791
|
common_name="app.my.domain",
|
790
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
792
|
+
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
791
793
|
```
|
792
794
|
<!--End PulumiCodeChooser -->
|
793
795
|
|