pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +2 -2
- pulumi_vault/ad/secret_library.py +2 -0
- pulumi_vault/alicloud/auth_backend_role.py +6 -6
- pulumi_vault/audit.py +12 -12
- pulumi_vault/audit_request_header.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -6
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
- pulumi_vault/aws/secret_backend_role.py +2 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -0
- pulumi_vault/azure/auth_backend_config.py +6 -6
- pulumi_vault/azure/backend.py +16 -16
- pulumi_vault/azure/backend_role.py +14 -14
- pulumi_vault/cert_auth_backend_role.py +12 -8
- pulumi_vault/consul/secret_backend.py +10 -10
- pulumi_vault/consul/secret_backend_role.py +2 -0
- pulumi_vault/database/secret_backend_connection.py +2 -0
- pulumi_vault/database/secret_backend_role.py +4 -0
- pulumi_vault/database/secret_backend_static_role.py +10 -4
- pulumi_vault/database/secrets_mount.py +4 -0
- pulumi_vault/egp_policy.py +4 -4
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/secret_backend.py +4 -2
- pulumi_vault/gcp/secret_impersonated_account.py +12 -10
- pulumi_vault/gcp/secret_roleset.py +4 -2
- pulumi_vault/gcp/secret_static_account.py +14 -12
- pulumi_vault/generic/endpoint.py +4 -4
- pulumi_vault/generic/get_secret.py +44 -0
- pulumi_vault/get_namespaces.py +4 -4
- pulumi_vault/get_policy_document.py +8 -4
- pulumi_vault/github/team.py +2 -2
- pulumi_vault/github/user.py +2 -2
- pulumi_vault/identity/entity.py +6 -4
- pulumi_vault/identity/entity_alias.py +6 -4
- pulumi_vault/identity/entity_policies.py +12 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -0
- pulumi_vault/identity/get_oidc_openid_config.py +10 -2
- pulumi_vault/identity/get_oidc_public_keys.py +10 -2
- pulumi_vault/identity/group.py +38 -30
- pulumi_vault/identity/group_alias.py +2 -0
- pulumi_vault/identity/group_member_entity_ids.py +12 -8
- pulumi_vault/identity/group_member_group_ids.py +24 -12
- pulumi_vault/identity/group_policies.py +4 -0
- pulumi_vault/identity/mfa_duo.py +4 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -4
- pulumi_vault/identity/mfa_okta.py +4 -4
- pulumi_vault/identity/oidc_assignment.py +10 -2
- pulumi_vault/identity/oidc_client.py +10 -6
- pulumi_vault/identity/oidc_key.py +16 -8
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
- pulumi_vault/identity/oidc_provider.py +22 -12
- pulumi_vault/identity/oidc_role.py +28 -12
- pulumi_vault/identity/oidc_scope.py +6 -4
- pulumi_vault/jwt/auth_backend.py +20 -20
- pulumi_vault/kmip/secret_backend.py +10 -10
- pulumi_vault/kubernetes/get_service_account_token.py +8 -4
- pulumi_vault/kubernetes/secret_backend.py +6 -4
- pulumi_vault/kubernetes/secret_backend_role.py +24 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
- pulumi_vault/kv/get_secret_v2.py +62 -0
- pulumi_vault/kv/get_secrets_list.py +4 -4
- pulumi_vault/kv/get_secrets_list_v2.py +14 -8
- pulumi_vault/kv/secret_v2.py +2 -0
- pulumi_vault/ldap/auth_backend.py +10 -10
- pulumi_vault/ldap/secret_backend.py +4 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -0
- pulumi_vault/mfa_duo.py +4 -2
- pulumi_vault/mfa_okta.py +4 -2
- pulumi_vault/mfa_pingid.py +4 -2
- pulumi_vault/mfa_totp.py +10 -8
- pulumi_vault/mongodbatlas/secret_role.py +2 -0
- pulumi_vault/mount.py +26 -26
- pulumi_vault/nomad_secret_backend.py +4 -4
- pulumi_vault/okta/auth_backend.py +6 -6
- pulumi_vault/password_policy.py +6 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
- pulumi_vault/pkisecret/secret_backend_role.py +2 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
- pulumi_vault/quota_lease_count.py +6 -4
- pulumi_vault/quota_rate_limit.py +2 -0
- pulumi_vault/rabbitmq/secret_backend.py +4 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
- pulumi_vault/raft_snapshot_agent_config.py +18 -12
- pulumi_vault/rgp_policy.py +2 -2
- pulumi_vault/saml/auth_backend.py +8 -8
- pulumi_vault/saml/auth_backend_role.py +8 -6
- pulumi_vault/secrets/sync_association.py +12 -6
- pulumi_vault/secrets/sync_aws_destination.py +6 -4
- pulumi_vault/secrets/sync_azure_destination.py +10 -8
- pulumi_vault/secrets/sync_config.py +2 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -4
- pulumi_vault/secrets/sync_github_apps.py +8 -4
- pulumi_vault/secrets/sync_vercel_destination.py +6 -4
- pulumi_vault/ssh/_inputs.py +0 -12
- pulumi_vault/ssh/outputs.py +0 -12
- pulumi_vault/ssh/secret_backend_role.py +4 -0
- pulumi_vault/terraformcloud/secret_creds.py +2 -0
- pulumi_vault/terraformcloud/secret_role.py +2 -0
- pulumi_vault/token.py +14 -14
- pulumi_vault/tokenauth/auth_backend_role.py +8 -8
- pulumi_vault/transform/alphabet.py +4 -2
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -2
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -4
- pulumi_vault/transit/secret_backend_key.py +6 -2
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -155,7 +155,7 @@ class SyncConfig(pulumi.CustomResource):
|
|
155
155
|
import pulumi
|
156
156
|
import pulumi_vault as vault
|
157
157
|
|
158
|
-
global_config = vault.secrets.SyncConfig("
|
158
|
+
global_config = vault.secrets.SyncConfig("global_config",
|
159
159
|
disabled=True,
|
160
160
|
queue_capacity=500000)
|
161
161
|
```
|
@@ -196,7 +196,7 @@ class SyncConfig(pulumi.CustomResource):
|
|
196
196
|
import pulumi
|
197
197
|
import pulumi_vault as vault
|
198
198
|
|
199
|
-
global_config = vault.secrets.SyncConfig("
|
199
|
+
global_config = vault.secrets.SyncConfig("global_config",
|
200
200
|
disabled=True,
|
201
201
|
queue_capacity=500000)
|
202
202
|
```
|
@@ -322,11 +322,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
322
322
|
<!--Start PulumiCodeChooser -->
|
323
323
|
```python
|
324
324
|
import pulumi
|
325
|
+
import pulumi_std as std
|
325
326
|
import pulumi_vault as vault
|
326
327
|
|
327
328
|
gcp = vault.secrets.SyncGcpDestination("gcp",
|
329
|
+
name="gcp-dest",
|
328
330
|
project_id="gcp-project-id",
|
329
|
-
credentials=
|
331
|
+
credentials=std.file(input=credentials_file).result,
|
330
332
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
331
333
|
custom_tags={
|
332
334
|
"foo": "bar",
|
@@ -373,11 +375,13 @@ class SyncGcpDestination(pulumi.CustomResource):
|
|
373
375
|
<!--Start PulumiCodeChooser -->
|
374
376
|
```python
|
375
377
|
import pulumi
|
378
|
+
import pulumi_std as std
|
376
379
|
import pulumi_vault as vault
|
377
380
|
|
378
381
|
gcp = vault.secrets.SyncGcpDestination("gcp",
|
382
|
+
name="gcp-dest",
|
379
383
|
project_id="gcp-project-id",
|
380
|
-
credentials=
|
384
|
+
credentials=std.file(input=credentials_file).result,
|
381
385
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
|
382
386
|
custom_tags={
|
383
387
|
"foo": "bar",
|
@@ -407,8 +407,9 @@ class SyncGhDestination(pulumi.CustomResource):
|
|
407
407
|
import pulumi_vault as vault
|
408
408
|
|
409
409
|
gh = vault.secrets.SyncGhDestination("gh",
|
410
|
-
|
411
|
-
|
410
|
+
name="gh-dest",
|
411
|
+
access_token=access_token,
|
412
|
+
repository_owner=repo_owner,
|
412
413
|
repository_name="repo-name-example",
|
413
414
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
414
415
|
```
|
@@ -462,8 +463,9 @@ class SyncGhDestination(pulumi.CustomResource):
|
|
462
463
|
import pulumi_vault as vault
|
463
464
|
|
464
465
|
gh = vault.secrets.SyncGhDestination("gh",
|
465
|
-
|
466
|
-
|
466
|
+
name="gh-dest",
|
467
|
+
access_token=access_token,
|
468
|
+
repository_owner=repo_owner,
|
467
469
|
repository_name="repo-name-example",
|
468
470
|
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
|
469
471
|
```
|
@@ -193,11 +193,13 @@ class SyncGithubApps(pulumi.CustomResource):
|
|
193
193
|
<!--Start PulumiCodeChooser -->
|
194
194
|
```python
|
195
195
|
import pulumi
|
196
|
+
import pulumi_std as std
|
196
197
|
import pulumi_vault as vault
|
197
198
|
|
198
199
|
github_apps = vault.secrets.SyncGithubApps("github-apps",
|
199
|
-
|
200
|
-
|
200
|
+
name="gh-apps",
|
201
|
+
app_id=app_id,
|
202
|
+
private_key=std.file(input=privatekey_file).result)
|
201
203
|
```
|
202
204
|
<!--End PulumiCodeChooser -->
|
203
205
|
|
@@ -230,11 +232,13 @@ class SyncGithubApps(pulumi.CustomResource):
|
|
230
232
|
<!--Start PulumiCodeChooser -->
|
231
233
|
```python
|
232
234
|
import pulumi
|
235
|
+
import pulumi_std as std
|
233
236
|
import pulumi_vault as vault
|
234
237
|
|
235
238
|
github_apps = vault.secrets.SyncGithubApps("github-apps",
|
236
|
-
|
237
|
-
|
239
|
+
name="gh-apps",
|
240
|
+
app_id=app_id,
|
241
|
+
private_key=std.file(input=privatekey_file).result)
|
238
242
|
```
|
239
243
|
<!--End PulumiCodeChooser -->
|
240
244
|
|
@@ -343,8 +343,9 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
343
343
|
import pulumi_vault as vault
|
344
344
|
|
345
345
|
vercel = vault.secrets.SyncVercelDestination("vercel",
|
346
|
-
|
347
|
-
|
346
|
+
name="vercel-dest",
|
347
|
+
access_token=access_token,
|
348
|
+
project_id=project_id,
|
348
349
|
deployment_environments=[
|
349
350
|
"development",
|
350
351
|
"preview",
|
@@ -394,8 +395,9 @@ class SyncVercelDestination(pulumi.CustomResource):
|
|
394
395
|
import pulumi_vault as vault
|
395
396
|
|
396
397
|
vercel = vault.secrets.SyncVercelDestination("vercel",
|
397
|
-
|
398
|
-
|
398
|
+
name="vercel-dest",
|
399
|
+
access_token=access_token,
|
400
|
+
project_id=project_id,
|
399
401
|
deployment_environments=[
|
400
402
|
"development",
|
401
403
|
"preview",
|
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -25,12 +25,6 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
25
25
|
must be set to a single element list.
|
26
26
|
|
27
27
|
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
28
|
-
|
29
|
-
<!--Start PulumiCodeChooser -->
|
30
|
-
```python
|
31
|
-
import pulumi
|
32
|
-
```
|
33
|
-
<!--End PulumiCodeChooser -->
|
34
28
|
:param pulumi.Input[str] type: The SSH public key type.
|
35
29
|
*Supported key types are:*
|
36
30
|
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
@@ -49,12 +43,6 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
49
43
|
must be set to a single element list.
|
50
44
|
|
51
45
|
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
52
|
-
|
53
|
-
<!--Start PulumiCodeChooser -->
|
54
|
-
```python
|
55
|
-
import pulumi
|
56
|
-
```
|
57
|
-
<!--End PulumiCodeChooser -->
|
58
46
|
"""
|
59
47
|
return pulumi.get(self, "lengths")
|
60
48
|
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -25,12 +25,6 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
25
25
|
must be set to a single element list.
|
26
26
|
|
27
27
|
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
28
|
-
|
29
|
-
<!--Start PulumiCodeChooser -->
|
30
|
-
```python
|
31
|
-
import pulumi
|
32
|
-
```
|
33
|
-
<!--End PulumiCodeChooser -->
|
34
28
|
:param str type: The SSH public key type.
|
35
29
|
*Supported key types are:*
|
36
30
|
`rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
|
@@ -49,12 +43,6 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
49
43
|
must be set to a single element list.
|
50
44
|
|
51
45
|
Example configuration blocks that might be included in the `ssh.SecretBackendRole`
|
52
|
-
|
53
|
-
<!--Start PulumiCodeChooser -->
|
54
|
-
```python
|
55
|
-
import pulumi
|
56
|
-
```
|
57
|
-
<!--End PulumiCodeChooser -->
|
58
46
|
"""
|
59
47
|
return pulumi.get(self, "lengths")
|
60
48
|
|
@@ -928,10 +928,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
928
928
|
|
929
929
|
example = vault.Mount("example", type="ssh")
|
930
930
|
foo = vault.ssh.SecretBackendRole("foo",
|
931
|
+
name="my-role",
|
931
932
|
backend=example.path,
|
932
933
|
key_type="ca",
|
933
934
|
allow_user_certificates=True)
|
934
935
|
bar = vault.ssh.SecretBackendRole("bar",
|
936
|
+
name="otp-role",
|
935
937
|
backend=example.path,
|
936
938
|
key_type="otp",
|
937
939
|
default_user="default",
|
@@ -1002,10 +1004,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1002
1004
|
|
1003
1005
|
example = vault.Mount("example", type="ssh")
|
1004
1006
|
foo = vault.ssh.SecretBackendRole("foo",
|
1007
|
+
name="my-role",
|
1005
1008
|
backend=example.path,
|
1006
1009
|
key_type="ca",
|
1007
1010
|
allow_user_certificates=True)
|
1008
1011
|
bar = vault.ssh.SecretBackendRole("bar",
|
1012
|
+
name="otp-role",
|
1009
1013
|
backend=example.path,
|
1010
1014
|
key_type="otp",
|
1011
1015
|
default_user="default",
|
@@ -242,6 +242,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
242
242
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
243
243
|
example = vault.terraformcloud.SecretRole("example",
|
244
244
|
backend=test.backend,
|
245
|
+
name="test-role",
|
245
246
|
organization="example-organization-name",
|
246
247
|
team_id="team-ieF4isC...")
|
247
248
|
token = vault.terraformcloud.SecretCreds("token",
|
@@ -279,6 +280,7 @@ class SecretCreds(pulumi.CustomResource):
|
|
279
280
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
280
281
|
example = vault.terraformcloud.SecretRole("example",
|
281
282
|
backend=test.backend,
|
283
|
+
name="test-role",
|
282
284
|
organization="example-organization-name",
|
283
285
|
team_id="team-ieF4isC...")
|
284
286
|
token = vault.terraformcloud.SecretCreds("token",
|
@@ -323,6 +323,7 @@ class SecretRole(pulumi.CustomResource):
|
|
323
323
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
324
324
|
example = vault.terraformcloud.SecretRole("example",
|
325
325
|
backend=test.backend,
|
326
|
+
name="test-role",
|
326
327
|
organization="example-organization-name",
|
327
328
|
team_id="team-ieF4isC...")
|
328
329
|
```
|
@@ -370,6 +371,7 @@ class SecretRole(pulumi.CustomResource):
|
|
370
371
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
371
372
|
example = vault.terraformcloud.SecretRole("example",
|
372
373
|
backend=test.backend,
|
374
|
+
name="test-role",
|
373
375
|
organization="example-organization-name",
|
374
376
|
team_id="team-ieF4isC...")
|
375
377
|
```
|
pulumi_vault/token.py
CHANGED
@@ -629,18 +629,18 @@ class Token(pulumi.CustomResource):
|
|
629
629
|
import pulumi_vault as vault
|
630
630
|
|
631
631
|
example = vault.Token("example",
|
632
|
-
|
633
|
-
"purpose": "service-account",
|
634
|
-
},
|
632
|
+
role_name="app",
|
635
633
|
policies=[
|
636
634
|
"policy1",
|
637
635
|
"policy2",
|
638
636
|
],
|
639
|
-
renew_increment=86400,
|
640
|
-
renew_min_lease=43200,
|
641
637
|
renewable=True,
|
642
|
-
|
643
|
-
|
638
|
+
ttl="24h",
|
639
|
+
renew_min_lease=43200,
|
640
|
+
renew_increment=86400,
|
641
|
+
metadata={
|
642
|
+
"purpose": "service-account",
|
643
|
+
})
|
644
644
|
```
|
645
645
|
<!--End PulumiCodeChooser -->
|
646
646
|
|
@@ -688,18 +688,18 @@ class Token(pulumi.CustomResource):
|
|
688
688
|
import pulumi_vault as vault
|
689
689
|
|
690
690
|
example = vault.Token("example",
|
691
|
-
|
692
|
-
"purpose": "service-account",
|
693
|
-
},
|
691
|
+
role_name="app",
|
694
692
|
policies=[
|
695
693
|
"policy1",
|
696
694
|
"policy2",
|
697
695
|
],
|
698
|
-
renew_increment=86400,
|
699
|
-
renew_min_lease=43200,
|
700
696
|
renewable=True,
|
701
|
-
|
702
|
-
|
697
|
+
ttl="24h",
|
698
|
+
renew_min_lease=43200,
|
699
|
+
renew_increment=86400,
|
700
|
+
metadata={
|
701
|
+
"purpose": "service-account",
|
702
|
+
})
|
703
703
|
```
|
704
704
|
<!--End PulumiCodeChooser -->
|
705
705
|
|
@@ -756,18 +756,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
756
756
|
import pulumi_vault as vault
|
757
757
|
|
758
758
|
example = vault.tokenauth.AuthBackendRole("example",
|
759
|
-
|
759
|
+
role_name="my-role",
|
760
760
|
allowed_policies=[
|
761
761
|
"dev",
|
762
762
|
"test",
|
763
763
|
],
|
764
764
|
disallowed_policies=["default"],
|
765
|
+
allowed_entity_aliases=["test_entity"],
|
765
766
|
orphan=True,
|
766
|
-
|
767
|
+
token_period=86400,
|
767
768
|
renewable=True,
|
768
|
-
role_name="my-role",
|
769
769
|
token_explicit_max_ttl=115200,
|
770
|
-
|
770
|
+
path_suffix="path-suffix")
|
771
771
|
```
|
772
772
|
<!--End PulumiCodeChooser -->
|
773
773
|
|
@@ -841,18 +841,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
841
841
|
import pulumi_vault as vault
|
842
842
|
|
843
843
|
example = vault.tokenauth.AuthBackendRole("example",
|
844
|
-
|
844
|
+
role_name="my-role",
|
845
845
|
allowed_policies=[
|
846
846
|
"dev",
|
847
847
|
"test",
|
848
848
|
],
|
849
849
|
disallowed_policies=["default"],
|
850
|
+
allowed_entity_aliases=["test_entity"],
|
850
851
|
orphan=True,
|
851
|
-
|
852
|
+
token_period=86400,
|
852
853
|
renewable=True,
|
853
|
-
role_name="my-role",
|
854
854
|
token_explicit_max_ttl=115200,
|
855
|
-
|
855
|
+
path_suffix="path-suffix")
|
856
856
|
```
|
857
857
|
<!--End PulumiCodeChooser -->
|
858
858
|
|
@@ -188,11 +188,12 @@ class Alphabet(pulumi.CustomResource):
|
|
188
188
|
import pulumi
|
189
189
|
import pulumi_vault as vault
|
190
190
|
|
191
|
-
mount_transform = vault.Mount("
|
191
|
+
mount_transform = vault.Mount("mount_transform",
|
192
192
|
path="transform",
|
193
193
|
type="transform")
|
194
194
|
test = vault.transform.Alphabet("test",
|
195
195
|
path=mount_transform.path,
|
196
|
+
name="numerics",
|
196
197
|
alphabet="0123456789")
|
197
198
|
```
|
198
199
|
<!--End PulumiCodeChooser -->
|
@@ -225,11 +226,12 @@ class Alphabet(pulumi.CustomResource):
|
|
225
226
|
import pulumi
|
226
227
|
import pulumi_vault as vault
|
227
228
|
|
228
|
-
mount_transform = vault.Mount("
|
229
|
+
mount_transform = vault.Mount("mount_transform",
|
229
230
|
path="transform",
|
230
231
|
type="transform")
|
231
232
|
test = vault.transform.Alphabet("test",
|
232
233
|
path=mount_transform.path,
|
234
|
+
name="numerics",
|
233
235
|
alphabet="0123456789")
|
234
236
|
```
|
235
237
|
<!--End PulumiCodeChooser -->
|
@@ -152,12 +152,14 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
152
152
|
type="transform")
|
153
153
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
154
154
|
path=transform.path,
|
155
|
+
name="ccn-fpe",
|
155
156
|
type="fpe",
|
156
157
|
template="builtin/creditcardnumber",
|
157
158
|
tweak_source="internal",
|
158
159
|
allowed_roles=["payments"])
|
159
160
|
payments = vault.transform.Role("payments",
|
160
161
|
path=ccn_fpe.path,
|
162
|
+
name="payments",
|
161
163
|
transformations=["ccn-fpe"])
|
162
164
|
test = vault.transform.get_decode_output(path=payments.path,
|
163
165
|
role_name="payments",
|
@@ -233,12 +235,14 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
233
235
|
type="transform")
|
234
236
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
235
237
|
path=transform.path,
|
238
|
+
name="ccn-fpe",
|
236
239
|
type="fpe",
|
237
240
|
template="builtin/creditcardnumber",
|
238
241
|
tweak_source="internal",
|
239
242
|
allowed_roles=["payments"])
|
240
243
|
payments = vault.transform.Role("payments",
|
241
244
|
path=ccn_fpe.path,
|
245
|
+
name="payments",
|
242
246
|
transformations=["ccn-fpe"])
|
243
247
|
test = vault.transform.get_decode_output(path=payments.path,
|
244
248
|
role_name="payments",
|
@@ -152,12 +152,14 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
152
152
|
type="transform")
|
153
153
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
154
154
|
path=transform.path,
|
155
|
+
name="ccn-fpe",
|
155
156
|
type="fpe",
|
156
157
|
template="builtin/creditcardnumber",
|
157
158
|
tweak_source="internal",
|
158
159
|
allowed_roles=["payments"])
|
159
160
|
payments = vault.transform.Role("payments",
|
160
161
|
path=ccn_fpe.path,
|
162
|
+
name="payments",
|
161
163
|
transformations=["ccn-fpe"])
|
162
164
|
test = vault.transform.get_encode_output(path=payments.path,
|
163
165
|
role_name="payments",
|
@@ -235,12 +237,14 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
235
237
|
type="transform")
|
236
238
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
237
239
|
path=transform.path,
|
240
|
+
name="ccn-fpe",
|
238
241
|
type="fpe",
|
239
242
|
template="builtin/creditcardnumber",
|
240
243
|
tweak_source="internal",
|
241
244
|
allowed_roles=["payments"])
|
242
245
|
payments = vault.transform.Role("payments",
|
243
246
|
path=ccn_fpe.path,
|
247
|
+
name="payments",
|
244
248
|
transformations=["ccn-fpe"])
|
245
249
|
test = vault.transform.get_encode_output(path=payments.path,
|
246
250
|
role_name="payments",
|
pulumi_vault/transform/role.py
CHANGED
@@ -189,11 +189,12 @@ class Role(pulumi.CustomResource):
|
|
189
189
|
import pulumi
|
190
190
|
import pulumi_vault as vault
|
191
191
|
|
192
|
-
mount_transform = vault.Mount("
|
192
|
+
mount_transform = vault.Mount("mount_transform",
|
193
193
|
path="transform",
|
194
194
|
type="transform")
|
195
195
|
test = vault.transform.Role("test",
|
196
196
|
path=mount_transform.path,
|
197
|
+
name="payments",
|
197
198
|
transformations=["ccn-fpe"])
|
198
199
|
```
|
199
200
|
<!--End PulumiCodeChooser -->
|
@@ -227,11 +228,12 @@ class Role(pulumi.CustomResource):
|
|
227
228
|
import pulumi
|
228
229
|
import pulumi_vault as vault
|
229
230
|
|
230
|
-
mount_transform = vault.Mount("
|
231
|
+
mount_transform = vault.Mount("mount_transform",
|
231
232
|
path="transform",
|
232
233
|
type="transform")
|
233
234
|
test = vault.transform.Role("test",
|
234
235
|
path=mount_transform.path,
|
236
|
+
name="payments",
|
235
237
|
transformations=["ccn-fpe"])
|
236
238
|
```
|
237
239
|
<!--End PulumiCodeChooser -->
|
@@ -344,9 +344,11 @@ class Template(pulumi.CustomResource):
|
|
344
344
|
type="transform")
|
345
345
|
numerics = vault.transform.Alphabet("numerics",
|
346
346
|
path=transform.path,
|
347
|
+
name="numerics",
|
347
348
|
alphabet="0123456789")
|
348
349
|
test = vault.transform.Template("test",
|
349
350
|
path=numerics.path,
|
351
|
+
name="ccn",
|
350
352
|
type="regex",
|
351
353
|
pattern="(\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})",
|
352
354
|
alphabet="numerics",
|
@@ -407,9 +409,11 @@ class Template(pulumi.CustomResource):
|
|
407
409
|
type="transform")
|
408
410
|
numerics = vault.transform.Alphabet("numerics",
|
409
411
|
path=transform.path,
|
412
|
+
name="numerics",
|
410
413
|
alphabet="0123456789")
|
411
414
|
test = vault.transform.Template("test",
|
412
415
|
path=numerics.path,
|
416
|
+
name="ccn",
|
413
417
|
type="regex",
|
414
418
|
pattern="(\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})",
|
415
419
|
alphabet="numerics",
|
@@ -118,8 +118,8 @@ def get_decrypt(backend: Optional[str] = None,
|
|
118
118
|
import pulumi_vault as vault
|
119
119
|
|
120
120
|
test = vault.transit.get_decrypt(backend="transit",
|
121
|
-
|
122
|
-
|
121
|
+
key="test",
|
122
|
+
ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
|
123
123
|
```
|
124
124
|
<!--End PulumiCodeChooser -->
|
125
125
|
|
@@ -166,8 +166,8 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
166
166
|
import pulumi_vault as vault
|
167
167
|
|
168
168
|
test = vault.transit.get_decrypt(backend="transit",
|
169
|
-
|
170
|
-
|
169
|
+
key="test",
|
170
|
+
ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
|
171
171
|
```
|
172
172
|
<!--End PulumiCodeChooser -->
|
173
173
|
|
@@ -617,7 +617,9 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
617
617
|
description="Example description",
|
618
618
|
default_lease_ttl_seconds=3600,
|
619
619
|
max_lease_ttl_seconds=86400)
|
620
|
-
key = vault.transit.SecretBackendKey("key",
|
620
|
+
key = vault.transit.SecretBackendKey("key",
|
621
|
+
backend=transit.path,
|
622
|
+
name="my_key")
|
621
623
|
```
|
622
624
|
<!--End PulumiCodeChooser -->
|
623
625
|
|
@@ -673,7 +675,9 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
673
675
|
description="Example description",
|
674
676
|
default_lease_ttl_seconds=3600,
|
675
677
|
max_lease_ttl_seconds=86400)
|
676
|
-
key = vault.transit.SecretBackendKey("key",
|
678
|
+
key = vault.transit.SecretBackendKey("key",
|
679
|
+
backend=transit.path,
|
680
|
+
name="my_key")
|
677
681
|
```
|
678
682
|
<!--End PulumiCodeChooser -->
|
679
683
|
|