pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +2 -2
- pulumi_vault/ad/secret_library.py +2 -0
- pulumi_vault/alicloud/auth_backend_role.py +6 -6
- pulumi_vault/audit.py +12 -12
- pulumi_vault/audit_request_header.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -6
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
- pulumi_vault/aws/secret_backend_role.py +2 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -0
- pulumi_vault/azure/auth_backend_config.py +6 -6
- pulumi_vault/azure/backend.py +16 -16
- pulumi_vault/azure/backend_role.py +14 -14
- pulumi_vault/cert_auth_backend_role.py +12 -8
- pulumi_vault/consul/secret_backend.py +10 -10
- pulumi_vault/consul/secret_backend_role.py +2 -0
- pulumi_vault/database/secret_backend_connection.py +2 -0
- pulumi_vault/database/secret_backend_role.py +4 -0
- pulumi_vault/database/secret_backend_static_role.py +10 -4
- pulumi_vault/database/secrets_mount.py +4 -0
- pulumi_vault/egp_policy.py +4 -4
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/secret_backend.py +4 -2
- pulumi_vault/gcp/secret_impersonated_account.py +12 -10
- pulumi_vault/gcp/secret_roleset.py +4 -2
- pulumi_vault/gcp/secret_static_account.py +14 -12
- pulumi_vault/generic/endpoint.py +4 -4
- pulumi_vault/generic/get_secret.py +44 -0
- pulumi_vault/get_namespaces.py +4 -4
- pulumi_vault/get_policy_document.py +8 -4
- pulumi_vault/github/team.py +2 -2
- pulumi_vault/github/user.py +2 -2
- pulumi_vault/identity/entity.py +6 -4
- pulumi_vault/identity/entity_alias.py +6 -4
- pulumi_vault/identity/entity_policies.py +12 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -0
- pulumi_vault/identity/get_oidc_openid_config.py +10 -2
- pulumi_vault/identity/get_oidc_public_keys.py +10 -2
- pulumi_vault/identity/group.py +38 -30
- pulumi_vault/identity/group_alias.py +2 -0
- pulumi_vault/identity/group_member_entity_ids.py +12 -8
- pulumi_vault/identity/group_member_group_ids.py +24 -12
- pulumi_vault/identity/group_policies.py +4 -0
- pulumi_vault/identity/mfa_duo.py +4 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -4
- pulumi_vault/identity/mfa_okta.py +4 -4
- pulumi_vault/identity/oidc_assignment.py +10 -2
- pulumi_vault/identity/oidc_client.py +10 -6
- pulumi_vault/identity/oidc_key.py +16 -8
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
- pulumi_vault/identity/oidc_provider.py +22 -12
- pulumi_vault/identity/oidc_role.py +28 -12
- pulumi_vault/identity/oidc_scope.py +6 -4
- pulumi_vault/jwt/auth_backend.py +20 -20
- pulumi_vault/kmip/secret_backend.py +10 -10
- pulumi_vault/kubernetes/get_service_account_token.py +8 -4
- pulumi_vault/kubernetes/secret_backend.py +6 -4
- pulumi_vault/kubernetes/secret_backend_role.py +24 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
- pulumi_vault/kv/get_secret_v2.py +62 -0
- pulumi_vault/kv/get_secrets_list.py +4 -4
- pulumi_vault/kv/get_secrets_list_v2.py +14 -8
- pulumi_vault/kv/secret_v2.py +2 -0
- pulumi_vault/ldap/auth_backend.py +10 -10
- pulumi_vault/ldap/secret_backend.py +4 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -0
- pulumi_vault/mfa_duo.py +4 -2
- pulumi_vault/mfa_okta.py +4 -2
- pulumi_vault/mfa_pingid.py +4 -2
- pulumi_vault/mfa_totp.py +10 -8
- pulumi_vault/mongodbatlas/secret_role.py +2 -0
- pulumi_vault/mount.py +26 -26
- pulumi_vault/nomad_secret_backend.py +4 -4
- pulumi_vault/okta/auth_backend.py +6 -6
- pulumi_vault/password_policy.py +6 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
- pulumi_vault/pkisecret/secret_backend_role.py +2 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
- pulumi_vault/quota_lease_count.py +6 -4
- pulumi_vault/quota_rate_limit.py +2 -0
- pulumi_vault/rabbitmq/secret_backend.py +4 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
- pulumi_vault/raft_snapshot_agent_config.py +18 -12
- pulumi_vault/rgp_policy.py +2 -2
- pulumi_vault/saml/auth_backend.py +8 -8
- pulumi_vault/saml/auth_backend_role.py +8 -6
- pulumi_vault/secrets/sync_association.py +12 -6
- pulumi_vault/secrets/sync_aws_destination.py +6 -4
- pulumi_vault/secrets/sync_azure_destination.py +10 -8
- pulumi_vault/secrets/sync_config.py +2 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -4
- pulumi_vault/secrets/sync_github_apps.py +8 -4
- pulumi_vault/secrets/sync_vercel_destination.py +6 -4
- pulumi_vault/ssh/_inputs.py +0 -12
- pulumi_vault/ssh/outputs.py +0 -12
- pulumi_vault/ssh/secret_backend_role.py +4 -0
- pulumi_vault/terraformcloud/secret_creds.py +2 -0
- pulumi_vault/terraformcloud/secret_role.py +2 -0
- pulumi_vault/token.py +14 -14
- pulumi_vault/tokenauth/auth_backend_role.py +8 -8
- pulumi_vault/transform/alphabet.py +4 -2
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -2
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -4
- pulumi_vault/transit/secret_backend_key.py +6 -2
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -151,7 +151,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
151
151
|
import pulumi_vault as vault
|
152
152
|
|
153
153
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
154
|
-
backend=
|
154
|
+
backend=intermediate_vault_mount["path"],
|
155
155
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
156
156
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
157
157
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -201,7 +201,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
201
201
|
MUR4qFxeUOW/GJGccMUd
|
202
202
|
-----END CERTIFICATE-----
|
203
203
|
\"\"\",
|
204
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
204
|
+
opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
205
205
|
```
|
206
206
|
<!--End PulumiCodeChooser -->
|
207
207
|
|
@@ -229,7 +229,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
229
229
|
import pulumi_vault as vault
|
230
230
|
|
231
231
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
232
|
-
backend=
|
232
|
+
backend=intermediate_vault_mount["path"],
|
233
233
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
234
234
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
235
235
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -279,7 +279,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
279
279
|
MUR4qFxeUOW/GJGccMUd
|
280
280
|
-----END CERTIFICATE-----
|
281
281
|
\"\"\",
|
282
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
282
|
+
opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
283
283
|
```
|
284
284
|
<!--End PulumiCodeChooser -->
|
285
285
|
|
@@ -500,7 +500,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
500
500
|
type="pki",
|
501
501
|
default_lease_ttl_seconds=3600,
|
502
502
|
max_lease_ttl_seconds=86400)
|
503
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
503
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
504
504
|
backend=pki.path,
|
505
505
|
expiry="72h",
|
506
506
|
disable=False)
|
@@ -550,7 +550,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
550
550
|
type="pki",
|
551
551
|
default_lease_ttl_seconds=3600,
|
552
552
|
max_lease_ttl_seconds=86400)
|
553
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
553
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
554
554
|
backend=pki.path,
|
555
555
|
expiry="72h",
|
556
556
|
disable=False)
|
@@ -968,10 +968,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
968
968
|
import pulumi_vault as vault
|
969
969
|
|
970
970
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
971
|
-
backend=
|
971
|
+
backend=pki["path"],
|
972
972
|
type="internal",
|
973
973
|
common_name="app.my.domain",
|
974
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
974
|
+
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
975
975
|
```
|
976
976
|
<!--End PulumiCodeChooser -->
|
977
977
|
|
@@ -1028,10 +1028,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1028
1028
|
import pulumi_vault as vault
|
1029
1029
|
|
1030
1030
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
1031
|
-
backend=
|
1031
|
+
backend=pki["path"],
|
1032
1032
|
type="internal",
|
1033
1033
|
common_name="app.my.domain",
|
1034
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1034
|
+
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1035
1035
|
```
|
1036
1036
|
<!--End PulumiCodeChooser -->
|
1037
1037
|
|
@@ -204,7 +204,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
204
204
|
description="intermediate",
|
205
205
|
default_lease_ttl_seconds=86400,
|
206
206
|
max_lease_ttl_seconds=86400)
|
207
|
-
|
207
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
208
208
|
backend=root.path,
|
209
209
|
type="internal",
|
210
210
|
common_name="RootOrg Root CA",
|
@@ -219,11 +219,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
219
219
|
country="US",
|
220
220
|
locality="San Francisco",
|
221
221
|
province="CA")
|
222
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
222
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
223
223
|
backend=intermediate.path,
|
224
|
-
type=
|
224
|
+
type=example.type,
|
225
225
|
common_name="SubOrg Intermediate CA")
|
226
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
226
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
227
227
|
backend=root.path,
|
228
228
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
229
229
|
common_name="SubOrg Intermediate CA",
|
@@ -234,7 +234,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
234
234
|
locality="San Francisco",
|
235
235
|
province="CA",
|
236
236
|
revoke=True)
|
237
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
237
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
238
238
|
backend=intermediate.path,
|
239
239
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
240
240
|
```
|
@@ -277,7 +277,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
277
277
|
description="intermediate",
|
278
278
|
default_lease_ttl_seconds=86400,
|
279
279
|
max_lease_ttl_seconds=86400)
|
280
|
-
|
280
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
281
281
|
backend=root.path,
|
282
282
|
type="internal",
|
283
283
|
common_name="RootOrg Root CA",
|
@@ -292,11 +292,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
292
292
|
country="US",
|
293
293
|
locality="San Francisco",
|
294
294
|
province="CA")
|
295
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
295
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
296
296
|
backend=intermediate.path,
|
297
|
-
type=
|
297
|
+
type=example.type,
|
298
298
|
common_name="SubOrg Intermediate CA")
|
299
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
299
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
300
300
|
backend=root.path,
|
301
301
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
302
302
|
common_name="SubOrg Intermediate CA",
|
@@ -307,7 +307,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
307
307
|
locality="San Francisco",
|
308
308
|
province="CA",
|
309
309
|
revoke=True)
|
310
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
310
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
311
311
|
backend=intermediate.path,
|
312
312
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
313
313
|
```
|
@@ -1605,6 +1605,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1605
1605
|
max_lease_ttl_seconds=86400)
|
1606
1606
|
role = vault.pki_secret.SecretBackendRole("role",
|
1607
1607
|
backend=pki.path,
|
1608
|
+
name="my_role",
|
1608
1609
|
ttl="3600",
|
1609
1610
|
allow_ip_sans=True,
|
1610
1611
|
key_type="rsa",
|
@@ -1706,6 +1707,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1706
1707
|
max_lease_ttl_seconds=86400)
|
1707
1708
|
role = vault.pki_secret.SecretBackendRole("role",
|
1708
1709
|
backend=pki.path,
|
1710
|
+
name="my_role",
|
1709
1711
|
ttl="3600",
|
1710
1712
|
allow_ip_sans=True,
|
1711
1713
|
key_type="rsa",
|
@@ -1079,7 +1079,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1079
1079
|
import pulumi_vault as vault
|
1080
1080
|
|
1081
1081
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1082
|
-
backend=
|
1082
|
+
backend=pki["path"],
|
1083
1083
|
type="internal",
|
1084
1084
|
common_name="Root CA",
|
1085
1085
|
ttl="315360000",
|
@@ -1090,7 +1090,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1090
1090
|
exclude_cn_from_sans=True,
|
1091
1091
|
ou="My OU",
|
1092
1092
|
organization="My organization",
|
1093
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1093
|
+
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1094
1094
|
```
|
1095
1095
|
<!--End PulumiCodeChooser -->
|
1096
1096
|
|
@@ -1149,7 +1149,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1149
1149
|
import pulumi_vault as vault
|
1150
1150
|
|
1151
1151
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1152
|
-
backend=
|
1152
|
+
backend=pki["path"],
|
1153
1153
|
type="internal",
|
1154
1154
|
common_name="Root CA",
|
1155
1155
|
ttl="315360000",
|
@@ -1160,7 +1160,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1160
1160
|
exclude_cn_from_sans=True,
|
1161
1161
|
ou="My OU",
|
1162
1162
|
organization="My organization",
|
1163
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1163
|
+
opts=pulumi.ResourceOptions(depends_on=[pki]))
|
1164
1164
|
```
|
1165
1165
|
<!--End PulumiCodeChooser -->
|
1166
1166
|
|
@@ -906,13 +906,13 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
906
906
|
import pulumi_vault as vault
|
907
907
|
|
908
908
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
909
|
-
backend=
|
910
|
-
csr=
|
909
|
+
backend=root_vault_mount["path"],
|
910
|
+
csr=intermediate["csr"],
|
911
911
|
common_name="Intermediate CA",
|
912
912
|
exclude_cn_from_sans=True,
|
913
913
|
ou="My OU",
|
914
914
|
organization="My organization",
|
915
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
915
|
+
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
916
916
|
```
|
917
917
|
<!--End PulumiCodeChooser -->
|
918
918
|
|
@@ -965,13 +965,13 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
965
965
|
import pulumi_vault as vault
|
966
966
|
|
967
967
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
968
|
-
backend=
|
969
|
-
csr=
|
968
|
+
backend=root_vault_mount["path"],
|
969
|
+
csr=intermediate["csr"],
|
970
970
|
common_name="Intermediate CA",
|
971
971
|
exclude_cn_from_sans=True,
|
972
972
|
ou="My OU",
|
973
973
|
organization="My organization",
|
974
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
974
|
+
opts=pulumi.ResourceOptions(depends_on=[intermediate]))
|
975
975
|
```
|
976
976
|
<!--End PulumiCodeChooser -->
|
977
977
|
|
@@ -654,7 +654,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
654
654
|
import pulumi_vault as vault
|
655
655
|
|
656
656
|
test = vault.pki_secret.SecretBackendSign("test",
|
657
|
-
backend=
|
657
|
+
backend=pki["path"],
|
658
|
+
name=admin["name"],
|
658
659
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
659
660
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
660
661
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -684,7 +685,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
684
685
|
-----END CERTIFICATE REQUEST-----
|
685
686
|
\"\"\",
|
686
687
|
common_name="test.my.domain",
|
687
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
688
|
+
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
688
689
|
```
|
689
690
|
<!--End PulumiCodeChooser -->
|
690
691
|
|
@@ -727,7 +728,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
727
728
|
import pulumi_vault as vault
|
728
729
|
|
729
730
|
test = vault.pki_secret.SecretBackendSign("test",
|
730
|
-
backend=
|
731
|
+
backend=pki["path"],
|
732
|
+
name=admin["name"],
|
731
733
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
732
734
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
733
735
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -757,7 +759,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
757
759
|
-----END CERTIFICATE REQUEST-----
|
758
760
|
\"\"\",
|
759
761
|
common_name="test.my.domain",
|
760
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
762
|
+
opts=pulumi.ResourceOptions(depends_on=[admin]))
|
761
763
|
```
|
762
764
|
<!--End PulumiCodeChooser -->
|
763
765
|
|
@@ -251,8 +251,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
251
251
|
import pulumi_vault as vault
|
252
252
|
|
253
253
|
global_ = vault.QuotaLeaseCount("global",
|
254
|
-
|
255
|
-
path=""
|
254
|
+
name="global",
|
255
|
+
path="",
|
256
|
+
max_leases=100)
|
256
257
|
```
|
257
258
|
<!--End PulumiCodeChooser -->
|
258
259
|
|
@@ -305,8 +306,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
305
306
|
import pulumi_vault as vault
|
306
307
|
|
307
308
|
global_ = vault.QuotaLeaseCount("global",
|
308
|
-
|
309
|
-
path=""
|
309
|
+
name="global",
|
310
|
+
path="",
|
311
|
+
max_leases=100)
|
310
312
|
```
|
311
313
|
<!--End PulumiCodeChooser -->
|
312
314
|
|
pulumi_vault/quota_rate_limit.py
CHANGED
@@ -319,6 +319,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
319
319
|
import pulumi_vault as vault
|
320
320
|
|
321
321
|
global_ = vault.QuotaRateLimit("global",
|
322
|
+
name="global",
|
322
323
|
path="",
|
323
324
|
rate=100)
|
324
325
|
```
|
@@ -374,6 +375,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
374
375
|
import pulumi_vault as vault
|
375
376
|
|
376
377
|
global_ = vault.QuotaRateLimit("global",
|
378
|
+
name="global",
|
377
379
|
path="",
|
378
380
|
rate=100)
|
379
381
|
```
|
@@ -468,8 +468,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
468
468
|
|
469
469
|
rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
|
470
470
|
connection_uri="https://.....",
|
471
|
-
|
472
|
-
|
471
|
+
username="user",
|
472
|
+
password="password")
|
473
473
|
```
|
474
474
|
<!--End PulumiCodeChooser -->
|
475
475
|
|
@@ -520,8 +520,8 @@ class SecretBackend(pulumi.CustomResource):
|
|
520
520
|
|
521
521
|
rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
|
522
522
|
connection_uri="https://.....",
|
523
|
-
|
524
|
-
|
523
|
+
username="user",
|
524
|
+
password="password")
|
525
525
|
```
|
526
526
|
<!--End PulumiCodeChooser -->
|
527
527
|
|
@@ -266,6 +266,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
266
266
|
password="password")
|
267
267
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
268
268
|
backend=rabbitmq.path,
|
269
|
+
name="deploy",
|
269
270
|
tags="tag1,tag2",
|
270
271
|
vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
|
271
272
|
host="/",
|
@@ -326,6 +327,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
326
327
|
password="password")
|
327
328
|
role = vault.rabbit_mq.SecretBackendRole("role",
|
328
329
|
backend=rabbitmq.path,
|
330
|
+
name="deploy",
|
329
331
|
tags="tag1,tag2",
|
330
332
|
vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
|
331
333
|
host="/",
|
@@ -1119,12 +1119,13 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1119
1119
|
import pulumi
|
1120
1120
|
import pulumi_vault as vault
|
1121
1121
|
|
1122
|
-
local_backups = vault.RaftSnapshotAgentConfig("
|
1122
|
+
local_backups = vault.RaftSnapshotAgentConfig("local_backups",
|
1123
|
+
name="local",
|
1123
1124
|
interval_seconds=86400,
|
1124
|
-
local_max_space=10000000,
|
1125
|
-
path_prefix="/opt/vault/snapshots/",
|
1126
1125
|
retain=7,
|
1127
|
-
|
1126
|
+
path_prefix="/opt/vault/snapshots/",
|
1127
|
+
storage_type="local",
|
1128
|
+
local_max_space=10000000)
|
1128
1129
|
```
|
1129
1130
|
<!--End PulumiCodeChooser -->
|
1130
1131
|
|
@@ -1139,7 +1140,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1139
1140
|
aws_access_key_id = config.require_object("awsAccessKeyId")
|
1140
1141
|
aws_secret_access_key = config.require_object("awsSecretAccessKey")
|
1141
1142
|
current = aws.get_region()
|
1142
|
-
s3_backups = vault.RaftSnapshotAgentConfig("
|
1143
|
+
s3_backups = vault.RaftSnapshotAgentConfig("s3_backups",
|
1144
|
+
name="s3",
|
1143
1145
|
interval_seconds=86400,
|
1144
1146
|
retain=7,
|
1145
1147
|
path_prefix="/path/in/bucket",
|
@@ -1162,7 +1164,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1162
1164
|
config = pulumi.Config()
|
1163
1165
|
azure_account_name = config.require_object("azureAccountName")
|
1164
1166
|
azure_account_key = config.require_object("azureAccountKey")
|
1165
|
-
azure_backups = vault.RaftSnapshotAgentConfig("
|
1167
|
+
azure_backups = vault.RaftSnapshotAgentConfig("azure_backups",
|
1168
|
+
name="azure_backup",
|
1166
1169
|
interval_seconds=86400,
|
1167
1170
|
retain=7,
|
1168
1171
|
path_prefix="/",
|
@@ -1266,12 +1269,13 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1266
1269
|
import pulumi
|
1267
1270
|
import pulumi_vault as vault
|
1268
1271
|
|
1269
|
-
local_backups = vault.RaftSnapshotAgentConfig("
|
1272
|
+
local_backups = vault.RaftSnapshotAgentConfig("local_backups",
|
1273
|
+
name="local",
|
1270
1274
|
interval_seconds=86400,
|
1271
|
-
local_max_space=10000000,
|
1272
|
-
path_prefix="/opt/vault/snapshots/",
|
1273
1275
|
retain=7,
|
1274
|
-
|
1276
|
+
path_prefix="/opt/vault/snapshots/",
|
1277
|
+
storage_type="local",
|
1278
|
+
local_max_space=10000000)
|
1275
1279
|
```
|
1276
1280
|
<!--End PulumiCodeChooser -->
|
1277
1281
|
|
@@ -1286,7 +1290,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1286
1290
|
aws_access_key_id = config.require_object("awsAccessKeyId")
|
1287
1291
|
aws_secret_access_key = config.require_object("awsSecretAccessKey")
|
1288
1292
|
current = aws.get_region()
|
1289
|
-
s3_backups = vault.RaftSnapshotAgentConfig("
|
1293
|
+
s3_backups = vault.RaftSnapshotAgentConfig("s3_backups",
|
1294
|
+
name="s3",
|
1290
1295
|
interval_seconds=86400,
|
1291
1296
|
retain=7,
|
1292
1297
|
path_prefix="/path/in/bucket",
|
@@ -1309,7 +1314,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
|
|
1309
1314
|
config = pulumi.Config()
|
1310
1315
|
azure_account_name = config.require_object("azureAccountName")
|
1311
1316
|
azure_account_key = config.require_object("azureAccountKey")
|
1312
|
-
azure_backups = vault.RaftSnapshotAgentConfig("
|
1317
|
+
azure_backups = vault.RaftSnapshotAgentConfig("azure_backups",
|
1318
|
+
name="azure_backup",
|
1313
1319
|
interval_seconds=86400,
|
1314
1320
|
retain=7,
|
1315
1321
|
path_prefix="/",
|
pulumi_vault/rgp_policy.py
CHANGED
@@ -188,11 +188,11 @@ class RgpPolicy(pulumi.CustomResource):
|
|
188
188
|
import pulumi_vault as vault
|
189
189
|
|
190
190
|
allow_all = vault.RgpPolicy("allow-all",
|
191
|
+
name="allow-all",
|
191
192
|
enforcement_level="soft-mandatory",
|
192
193
|
policy=\"\"\"main = rule {
|
193
194
|
true
|
194
195
|
}
|
195
|
-
|
196
196
|
\"\"\")
|
197
197
|
```
|
198
198
|
<!--End PulumiCodeChooser -->
|
@@ -226,11 +226,11 @@ class RgpPolicy(pulumi.CustomResource):
|
|
226
226
|
import pulumi_vault as vault
|
227
227
|
|
228
228
|
allow_all = vault.RgpPolicy("allow-all",
|
229
|
+
name="allow-all",
|
229
230
|
enforcement_level="soft-mandatory",
|
230
231
|
policy=\"\"\"main = rule {
|
231
232
|
true
|
232
233
|
}
|
233
|
-
|
234
234
|
\"\"\")
|
235
235
|
```
|
236
236
|
<!--End PulumiCodeChooser -->
|
@@ -451,11 +451,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
451
451
|
import pulumi_vault as vault
|
452
452
|
|
453
453
|
test = vault.saml.AuthBackend("test",
|
454
|
-
|
455
|
-
default_role="admin",
|
456
|
-
entity_id="https://my.vault/v1/auth/saml",
|
454
|
+
path="saml",
|
457
455
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
458
|
-
|
456
|
+
entity_id="https://my.vault/v1/auth/saml",
|
457
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
458
|
+
default_role="admin")
|
459
459
|
```
|
460
460
|
<!--End PulumiCodeChooser -->
|
461
461
|
|
@@ -511,11 +511,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
511
511
|
import pulumi_vault as vault
|
512
512
|
|
513
513
|
test = vault.saml.AuthBackend("test",
|
514
|
-
|
515
|
-
default_role="admin",
|
516
|
-
entity_id="https://my.vault/v1/auth/saml",
|
514
|
+
path="saml",
|
517
515
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
518
|
-
|
516
|
+
entity_id="https://my.vault/v1/auth/saml",
|
517
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
518
|
+
default_role="admin")
|
519
519
|
```
|
520
520
|
<!--End PulumiCodeChooser -->
|
521
521
|
|
@@ -693,14 +693,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
693
693
|
import pulumi
|
694
694
|
import pulumi_vault as vault
|
695
695
|
|
696
|
-
|
696
|
+
example = vault.saml.AuthBackend("example",
|
697
697
|
path="saml",
|
698
698
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
699
699
|
entity_id="https://my.vault/v1/auth/saml",
|
700
700
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
701
701
|
default_role="default-role")
|
702
|
-
example_auth_backend_role = vault.saml.AuthBackendRole("
|
703
|
-
path=
|
702
|
+
example_auth_backend_role = vault.saml.AuthBackendRole("example",
|
703
|
+
path=example.path,
|
704
|
+
name="my-role",
|
704
705
|
groups_attribute="groups",
|
705
706
|
bound_attributes={
|
706
707
|
"group": "admin",
|
@@ -779,14 +780,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
779
780
|
import pulumi
|
780
781
|
import pulumi_vault as vault
|
781
782
|
|
782
|
-
|
783
|
+
example = vault.saml.AuthBackend("example",
|
783
784
|
path="saml",
|
784
785
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
785
786
|
entity_id="https://my.vault/v1/auth/saml",
|
786
787
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
787
788
|
default_role="default-role")
|
788
|
-
example_auth_backend_role = vault.saml.AuthBackendRole("
|
789
|
-
path=
|
789
|
+
example_auth_backend_role = vault.saml.AuthBackendRole("example",
|
790
|
+
path=example.path,
|
791
|
+
name="my-role",
|
790
792
|
groups_attribute="groups",
|
791
793
|
bound_attributes={
|
792
794
|
"group": "admin",
|
@@ -239,16 +239,19 @@ class SyncAssociation(pulumi.CustomResource):
|
|
239
239
|
description="KV Version 2 secret engine mount")
|
240
240
|
token = vault.kv.SecretV2("token",
|
241
241
|
mount=kvv2.path,
|
242
|
+
name="token",
|
242
243
|
data_json=json.dumps({
|
243
244
|
"dev": "B!gS3cr3t",
|
244
245
|
"prod": "S3cureP4$$",
|
245
246
|
}))
|
246
247
|
gh = vault.secrets.SyncGhDestination("gh",
|
247
|
-
|
248
|
-
|
248
|
+
name="gh-dest",
|
249
|
+
access_token=access_token,
|
250
|
+
repository_owner=repo_owner,
|
249
251
|
repository_name="repo-name-example",
|
250
252
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
251
|
-
gh_token = vault.secrets.SyncAssociation("
|
253
|
+
gh_token = vault.secrets.SyncAssociation("gh_token",
|
254
|
+
name=gh.name,
|
252
255
|
type=gh.type,
|
253
256
|
mount=kvv2.path,
|
254
257
|
secret_name=token.name)
|
@@ -289,16 +292,19 @@ class SyncAssociation(pulumi.CustomResource):
|
|
289
292
|
description="KV Version 2 secret engine mount")
|
290
293
|
token = vault.kv.SecretV2("token",
|
291
294
|
mount=kvv2.path,
|
295
|
+
name="token",
|
292
296
|
data_json=json.dumps({
|
293
297
|
"dev": "B!gS3cr3t",
|
294
298
|
"prod": "S3cureP4$$",
|
295
299
|
}))
|
296
300
|
gh = vault.secrets.SyncGhDestination("gh",
|
297
|
-
|
298
|
-
|
301
|
+
name="gh-dest",
|
302
|
+
access_token=access_token,
|
303
|
+
repository_owner=repo_owner,
|
299
304
|
repository_name="repo-name-example",
|
300
305
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
301
|
-
gh_token = vault.secrets.SyncAssociation("
|
306
|
+
gh_token = vault.secrets.SyncAssociation("gh_token",
|
307
|
+
name=gh.name,
|
302
308
|
type=gh.type,
|
303
309
|
mount=kvv2.path,
|
304
310
|
secret_name=token.name)
|
@@ -460,8 +460,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
460
460
|
import pulumi_vault as vault
|
461
461
|
|
462
462
|
aws = vault.secrets.SyncAwsDestination("aws",
|
463
|
-
|
464
|
-
|
463
|
+
name="aws-dest",
|
464
|
+
access_key_id=access_key_id,
|
465
|
+
secret_access_key=secret_access_key,
|
465
466
|
region="us-east-1",
|
466
467
|
role_arn="role-arn",
|
467
468
|
external_id="external-id",
|
@@ -526,8 +527,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
526
527
|
import pulumi_vault as vault
|
527
528
|
|
528
529
|
aws = vault.secrets.SyncAwsDestination("aws",
|
529
|
-
|
530
|
-
|
530
|
+
name="aws-dest",
|
531
|
+
access_key_id=access_key_id,
|
532
|
+
secret_access_key=secret_access_key,
|
531
533
|
region="us-east-1",
|
532
534
|
role_arn="role-arn",
|
533
535
|
external_id="external-id",
|
@@ -436,10 +436,11 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
436
436
|
import pulumi_vault as vault
|
437
437
|
|
438
438
|
az = vault.secrets.SyncAzureDestination("az",
|
439
|
-
|
440
|
-
|
441
|
-
|
442
|
-
|
439
|
+
name="az-dest",
|
440
|
+
key_vault_uri=key_vault_uri,
|
441
|
+
client_id=client_id,
|
442
|
+
client_secret=client_secret,
|
443
|
+
tenant_id=tenant_id,
|
443
444
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
444
445
|
custom_tags={
|
445
446
|
"foo": "bar",
|
@@ -495,10 +496,11 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
495
496
|
import pulumi_vault as vault
|
496
497
|
|
497
498
|
az = vault.secrets.SyncAzureDestination("az",
|
498
|
-
|
499
|
-
|
500
|
-
|
501
|
-
|
499
|
+
name="az-dest",
|
500
|
+
key_vault_uri=key_vault_uri,
|
501
|
+
client_id=client_id,
|
502
|
+
client_secret=client_secret,
|
503
|
+
tenant_id=tenant_id,
|
502
504
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
503
505
|
custom_tags={
|
504
506
|
"foo": "bar",
|