pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/secret_backend.py +2 -2
- pulumi_vault/ad/secret_library.py +2 -0
- pulumi_vault/alicloud/auth_backend_role.py +6 -6
- pulumi_vault/audit.py +12 -12
- pulumi_vault/audit_request_header.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -6
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
- pulumi_vault/aws/secret_backend_role.py +2 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -0
- pulumi_vault/azure/auth_backend_config.py +6 -6
- pulumi_vault/azure/backend.py +16 -16
- pulumi_vault/azure/backend_role.py +14 -14
- pulumi_vault/cert_auth_backend_role.py +12 -8
- pulumi_vault/consul/secret_backend.py +10 -10
- pulumi_vault/consul/secret_backend_role.py +2 -0
- pulumi_vault/database/secret_backend_connection.py +2 -0
- pulumi_vault/database/secret_backend_role.py +4 -0
- pulumi_vault/database/secret_backend_static_role.py +10 -4
- pulumi_vault/database/secrets_mount.py +4 -0
- pulumi_vault/egp_policy.py +4 -4
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/secret_backend.py +4 -2
- pulumi_vault/gcp/secret_impersonated_account.py +12 -10
- pulumi_vault/gcp/secret_roleset.py +4 -2
- pulumi_vault/gcp/secret_static_account.py +14 -12
- pulumi_vault/generic/endpoint.py +4 -4
- pulumi_vault/generic/get_secret.py +44 -0
- pulumi_vault/get_namespaces.py +4 -4
- pulumi_vault/get_policy_document.py +8 -4
- pulumi_vault/github/team.py +2 -2
- pulumi_vault/github/user.py +2 -2
- pulumi_vault/identity/entity.py +6 -4
- pulumi_vault/identity/entity_alias.py +6 -4
- pulumi_vault/identity/entity_policies.py +12 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -0
- pulumi_vault/identity/get_oidc_openid_config.py +10 -2
- pulumi_vault/identity/get_oidc_public_keys.py +10 -2
- pulumi_vault/identity/group.py +38 -30
- pulumi_vault/identity/group_alias.py +2 -0
- pulumi_vault/identity/group_member_entity_ids.py +12 -8
- pulumi_vault/identity/group_member_group_ids.py +24 -12
- pulumi_vault/identity/group_policies.py +4 -0
- pulumi_vault/identity/mfa_duo.py +4 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -4
- pulumi_vault/identity/mfa_okta.py +4 -4
- pulumi_vault/identity/oidc_assignment.py +10 -2
- pulumi_vault/identity/oidc_client.py +10 -6
- pulumi_vault/identity/oidc_key.py +16 -8
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
- pulumi_vault/identity/oidc_provider.py +22 -12
- pulumi_vault/identity/oidc_role.py +28 -12
- pulumi_vault/identity/oidc_scope.py +6 -4
- pulumi_vault/jwt/auth_backend.py +20 -20
- pulumi_vault/kmip/secret_backend.py +10 -10
- pulumi_vault/kubernetes/get_service_account_token.py +8 -4
- pulumi_vault/kubernetes/secret_backend.py +6 -4
- pulumi_vault/kubernetes/secret_backend_role.py +24 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
- pulumi_vault/kv/get_secret_v2.py +62 -0
- pulumi_vault/kv/get_secrets_list.py +4 -4
- pulumi_vault/kv/get_secrets_list_v2.py +14 -8
- pulumi_vault/kv/secret_v2.py +2 -0
- pulumi_vault/ldap/auth_backend.py +10 -10
- pulumi_vault/ldap/secret_backend.py +4 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -0
- pulumi_vault/mfa_duo.py +4 -2
- pulumi_vault/mfa_okta.py +4 -2
- pulumi_vault/mfa_pingid.py +4 -2
- pulumi_vault/mfa_totp.py +10 -8
- pulumi_vault/mongodbatlas/secret_role.py +2 -0
- pulumi_vault/mount.py +26 -26
- pulumi_vault/nomad_secret_backend.py +4 -4
- pulumi_vault/okta/auth_backend.py +6 -6
- pulumi_vault/password_policy.py +6 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
- pulumi_vault/pkisecret/secret_backend_role.py +2 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
- pulumi_vault/quota_lease_count.py +6 -4
- pulumi_vault/quota_rate_limit.py +2 -0
- pulumi_vault/rabbitmq/secret_backend.py +4 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
- pulumi_vault/raft_snapshot_agent_config.py +18 -12
- pulumi_vault/rgp_policy.py +2 -2
- pulumi_vault/saml/auth_backend.py +8 -8
- pulumi_vault/saml/auth_backend_role.py +8 -6
- pulumi_vault/secrets/sync_association.py +12 -6
- pulumi_vault/secrets/sync_aws_destination.py +6 -4
- pulumi_vault/secrets/sync_azure_destination.py +10 -8
- pulumi_vault/secrets/sync_config.py +2 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -4
- pulumi_vault/secrets/sync_github_apps.py +8 -4
- pulumi_vault/secrets/sync_vercel_destination.py +6 -4
- pulumi_vault/ssh/_inputs.py +0 -12
- pulumi_vault/ssh/outputs.py +0 -12
- pulumi_vault/ssh/secret_backend_role.py +4 -0
- pulumi_vault/terraformcloud/secret_creds.py +2 -0
- pulumi_vault/terraformcloud/secret_role.py +2 -0
- pulumi_vault/token.py +14 -14
- pulumi_vault/tokenauth/auth_backend_role.py +8 -8
- pulumi_vault/transform/alphabet.py +4 -2
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -2
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -4
- pulumi_vault/transit/secret_backend_key.py +6 -2
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -1162,6 +1162,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1162
1162
|
allowed_roles=["dev2"],
|
1163
1163
|
)])
|
1164
1164
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1165
|
+
name="dev1",
|
1165
1166
|
backend=db.path,
|
1166
1167
|
db_name=db.mssqls[0].name,
|
1167
1168
|
creation_statements=[
|
@@ -1170,6 +1171,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1170
1171
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1171
1172
|
])
|
1172
1173
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1174
|
+
name="dev2",
|
1173
1175
|
backend=db.path,
|
1174
1176
|
db_name=db.postgresqls[0].name,
|
1175
1177
|
creation_statements=[
|
@@ -1272,6 +1274,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1272
1274
|
allowed_roles=["dev2"],
|
1273
1275
|
)])
|
1274
1276
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1277
|
+
name="dev1",
|
1275
1278
|
backend=db.path,
|
1276
1279
|
db_name=db.mssqls[0].name,
|
1277
1280
|
creation_statements=[
|
@@ -1280,6 +1283,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1280
1283
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1281
1284
|
])
|
1282
1285
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1286
|
+
name="dev2",
|
1283
1287
|
backend=db.path,
|
1284
1288
|
db_name=db.postgresqls[0].name,
|
1285
1289
|
creation_statements=[
|
pulumi_vault/egp_policy.py
CHANGED
@@ -220,12 +220,12 @@ class EgpPolicy(pulumi.CustomResource):
|
|
220
220
|
import pulumi_vault as vault
|
221
221
|
|
222
222
|
allow_all = vault.EgpPolicy("allow-all",
|
223
|
-
|
223
|
+
name="allow-all",
|
224
224
|
paths=["*"],
|
225
|
+
enforcement_level="soft-mandatory",
|
225
226
|
policy=\"\"\"main = rule {
|
226
227
|
true
|
227
228
|
}
|
228
|
-
|
229
229
|
\"\"\")
|
230
230
|
```
|
231
231
|
<!--End PulumiCodeChooser -->
|
@@ -260,12 +260,12 @@ class EgpPolicy(pulumi.CustomResource):
|
|
260
260
|
import pulumi_vault as vault
|
261
261
|
|
262
262
|
allow_all = vault.EgpPolicy("allow-all",
|
263
|
-
|
263
|
+
name="allow-all",
|
264
264
|
paths=["*"],
|
265
|
+
enforcement_level="soft-mandatory",
|
265
266
|
policy=\"\"\"main = rule {
|
266
267
|
true
|
267
268
|
}
|
268
|
-
|
269
269
|
\"\"\")
|
270
270
|
```
|
271
271
|
<!--End PulumiCodeChooser -->
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -498,24 +498,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
498
498
|
"""
|
499
499
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
500
500
|
|
501
|
-
## Example Usage
|
502
|
-
|
503
|
-
<!--Start PulumiCodeChooser -->
|
504
|
-
```python
|
505
|
-
import pulumi
|
506
|
-
import pulumi_vault as vault
|
507
|
-
|
508
|
-
gcp = vault.gcp.AuthBackend("gcp",
|
509
|
-
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
510
|
-
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
511
|
-
api="www.googleapis.com",
|
512
|
-
iam="iam.googleapis.com",
|
513
|
-
crm="cloudresourcemanager.googleapis.com",
|
514
|
-
compute="compute.googleapis.com",
|
515
|
-
))
|
516
|
-
```
|
517
|
-
<!--End PulumiCodeChooser -->
|
518
|
-
|
519
501
|
## Import
|
520
502
|
|
521
503
|
GCP authentication backends can be imported using the backend name, e.g.
|
@@ -560,24 +542,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
560
542
|
"""
|
561
543
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
562
544
|
|
563
|
-
## Example Usage
|
564
|
-
|
565
|
-
<!--Start PulumiCodeChooser -->
|
566
|
-
```python
|
567
|
-
import pulumi
|
568
|
-
import pulumi_vault as vault
|
569
|
-
|
570
|
-
gcp = vault.gcp.AuthBackend("gcp",
|
571
|
-
credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
|
572
|
-
custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
|
573
|
-
api="www.googleapis.com",
|
574
|
-
iam="iam.googleapis.com",
|
575
|
-
crm="cloudresourcemanager.googleapis.com",
|
576
|
-
compute="compute.googleapis.com",
|
577
|
-
))
|
578
|
-
```
|
579
|
-
<!--End PulumiCodeChooser -->
|
580
|
-
|
581
545
|
## Import
|
582
546
|
|
583
547
|
GCP authentication backends can be imported using the backend name, e.g.
|
@@ -331,9 +331,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
331
331
|
<!--Start PulumiCodeChooser -->
|
332
332
|
```python
|
333
333
|
import pulumi
|
334
|
+
import pulumi_std as std
|
334
335
|
import pulumi_vault as vault
|
335
336
|
|
336
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
337
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
|
337
338
|
```
|
338
339
|
<!--End PulumiCodeChooser -->
|
339
340
|
|
@@ -367,9 +368,10 @@ class SecretBackend(pulumi.CustomResource):
|
|
367
368
|
<!--Start PulumiCodeChooser -->
|
368
369
|
```python
|
369
370
|
import pulumi
|
371
|
+
import pulumi_std as std
|
370
372
|
import pulumi_vault as vault
|
371
373
|
|
372
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
374
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
|
373
375
|
```
|
374
376
|
<!--End PulumiCodeChooser -->
|
375
377
|
|
@@ -222,17 +222,18 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
222
222
|
<!--Start PulumiCodeChooser -->
|
223
223
|
```python
|
224
224
|
import pulumi
|
225
|
-
import
|
225
|
+
import pulumi_google as google
|
226
|
+
import pulumi_std as std
|
226
227
|
import pulumi_vault as vault
|
227
228
|
|
228
|
-
this =
|
229
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
229
230
|
gcp = vault.gcp.SecretBackend("gcp",
|
230
231
|
path="gcp",
|
231
|
-
credentials=
|
232
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
232
|
+
credentials=std.file(input="credentials.json").result)
|
233
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
|
233
234
|
backend=gcp.path,
|
234
235
|
impersonated_account="this",
|
235
|
-
service_account_email=this
|
236
|
+
service_account_email=this["email"],
|
236
237
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
237
238
|
```
|
238
239
|
<!--End PulumiCodeChooser -->
|
@@ -270,17 +271,18 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
270
271
|
<!--Start PulumiCodeChooser -->
|
271
272
|
```python
|
272
273
|
import pulumi
|
273
|
-
import
|
274
|
+
import pulumi_google as google
|
275
|
+
import pulumi_std as std
|
274
276
|
import pulumi_vault as vault
|
275
277
|
|
276
|
-
this =
|
278
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
277
279
|
gcp = vault.gcp.SecretBackend("gcp",
|
278
280
|
path="gcp",
|
279
|
-
credentials=
|
280
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
281
|
+
credentials=std.file(input="credentials.json").result)
|
282
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
|
281
283
|
backend=gcp.path,
|
282
284
|
impersonated_account="this",
|
283
|
-
service_account_email=this
|
285
|
+
service_account_email=this["email"],
|
284
286
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
285
287
|
```
|
286
288
|
<!--End PulumiCodeChooser -->
|
@@ -300,12 +300,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
300
300
|
<!--Start PulumiCodeChooser -->
|
301
301
|
```python
|
302
302
|
import pulumi
|
303
|
+
import pulumi_std as std
|
303
304
|
import pulumi_vault as vault
|
304
305
|
|
305
306
|
project = "my-awesome-project"
|
306
307
|
gcp = vault.gcp.SecretBackend("gcp",
|
307
308
|
path="gcp",
|
308
|
-
credentials=
|
309
|
+
credentials=std.file(input="credentials.json").result)
|
309
310
|
roleset = vault.gcp.SecretRoleset("roleset",
|
310
311
|
backend=gcp.path,
|
311
312
|
roleset="project_viewer",
|
@@ -356,12 +357,13 @@ class SecretRoleset(pulumi.CustomResource):
|
|
356
357
|
<!--Start PulumiCodeChooser -->
|
357
358
|
```python
|
358
359
|
import pulumi
|
360
|
+
import pulumi_std as std
|
359
361
|
import pulumi_vault as vault
|
360
362
|
|
361
363
|
project = "my-awesome-project"
|
362
364
|
gcp = vault.gcp.SecretBackend("gcp",
|
363
365
|
path="gcp",
|
364
|
-
credentials=
|
366
|
+
credentials=std.file(input="credentials.json").result)
|
365
367
|
roleset = vault.gcp.SecretRoleset("roleset",
|
366
368
|
backend=gcp.path,
|
367
369
|
roleset="project_viewer",
|
@@ -302,21 +302,22 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
302
302
|
<!--Start PulumiCodeChooser -->
|
303
303
|
```python
|
304
304
|
import pulumi
|
305
|
-
import
|
305
|
+
import pulumi_google as google
|
306
|
+
import pulumi_std as std
|
306
307
|
import pulumi_vault as vault
|
307
308
|
|
308
|
-
this =
|
309
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
309
310
|
gcp = vault.gcp.SecretBackend("gcp",
|
310
311
|
path="gcp",
|
311
|
-
credentials=
|
312
|
-
static_account = vault.gcp.SecretStaticAccount("
|
312
|
+
credentials=std.file(input="credentials.json").result)
|
313
|
+
static_account = vault.gcp.SecretStaticAccount("static_account",
|
313
314
|
backend=gcp.path,
|
314
315
|
static_account="project_viewer",
|
315
316
|
secret_type="access_token",
|
316
317
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
317
|
-
service_account_email=this
|
318
|
+
service_account_email=this["email"],
|
318
319
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
319
|
-
resource=
|
320
|
+
resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
|
320
321
|
roles=["roles/viewer"],
|
321
322
|
)])
|
322
323
|
```
|
@@ -360,21 +361,22 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
360
361
|
<!--Start PulumiCodeChooser -->
|
361
362
|
```python
|
362
363
|
import pulumi
|
363
|
-
import
|
364
|
+
import pulumi_google as google
|
365
|
+
import pulumi_std as std
|
364
366
|
import pulumi_vault as vault
|
365
367
|
|
366
|
-
this =
|
368
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
367
369
|
gcp = vault.gcp.SecretBackend("gcp",
|
368
370
|
path="gcp",
|
369
|
-
credentials=
|
370
|
-
static_account = vault.gcp.SecretStaticAccount("
|
371
|
+
credentials=std.file(input="credentials.json").result)
|
372
|
+
static_account = vault.gcp.SecretStaticAccount("static_account",
|
371
373
|
backend=gcp.path,
|
372
374
|
static_account="project_viewer",
|
373
375
|
secret_type="access_token",
|
374
376
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
375
|
-
service_account_email=this
|
377
|
+
service_account_email=this["email"],
|
376
378
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
377
|
-
resource=
|
379
|
+
resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
|
378
380
|
roles=["roles/viewer"],
|
379
381
|
)])
|
380
382
|
```
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -422,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
|
|
422
422
|
}
|
423
423
|
\"\"\",
|
424
424
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
425
|
-
u1_token = vault.generic.Endpoint("
|
425
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
426
426
|
path="auth/userpass/login/u1",
|
427
427
|
disable_read=True,
|
428
428
|
disable_delete=True,
|
@@ -431,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
|
|
431
431
|
}
|
432
432
|
\"\"\",
|
433
433
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
434
|
-
u1_entity = vault.generic.Endpoint("
|
434
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
435
435
|
disable_read=True,
|
436
436
|
disable_delete=True,
|
437
437
|
path="identity/lookup/entity",
|
@@ -517,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
|
|
517
517
|
}
|
518
518
|
\"\"\",
|
519
519
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
520
|
-
u1_token = vault.generic.Endpoint("
|
520
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
521
521
|
path="auth/userpass/login/u1",
|
522
522
|
disable_read=True,
|
523
523
|
disable_delete=True,
|
@@ -526,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
|
|
526
526
|
}
|
527
527
|
\"\"\",
|
528
528
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
529
|
-
u1_entity = vault.generic.Endpoint("
|
529
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
530
530
|
disable_read=True,
|
531
531
|
disable_delete=True,
|
532
532
|
path="identity/lookup/entity",
|
@@ -171,6 +171,28 @@ def get_secret(namespace: Optional[str] = None,
|
|
171
171
|
```
|
172
172
|
<!--End PulumiCodeChooser -->
|
173
173
|
|
174
|
+
### KV
|
175
|
+
|
176
|
+
For this example, consider `example` as a path for a KV engine.
|
177
|
+
|
178
|
+
<!--Start PulumiCodeChooser -->
|
179
|
+
```python
|
180
|
+
import pulumi
|
181
|
+
import pulumi_vault as vault
|
182
|
+
|
183
|
+
|
184
|
+
def not_implemented(msg):
|
185
|
+
raise NotImplementedError(msg)
|
186
|
+
|
187
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
188
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
189
|
+
```
|
190
|
+
<!--End PulumiCodeChooser -->
|
191
|
+
|
192
|
+
## Required Vault Capabilities
|
193
|
+
|
194
|
+
Use of this resource requires the `read` capability on the given path.
|
195
|
+
|
174
196
|
|
175
197
|
:param str namespace: The namespace of the target resource.
|
176
198
|
The value should not contain leading or trailing forward slashes.
|
@@ -230,6 +252,28 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
230
252
|
```
|
231
253
|
<!--End PulumiCodeChooser -->
|
232
254
|
|
255
|
+
### KV
|
256
|
+
|
257
|
+
For this example, consider `example` as a path for a KV engine.
|
258
|
+
|
259
|
+
<!--Start PulumiCodeChooser -->
|
260
|
+
```python
|
261
|
+
import pulumi
|
262
|
+
import pulumi_vault as vault
|
263
|
+
|
264
|
+
|
265
|
+
def not_implemented(msg):
|
266
|
+
raise NotImplementedError(msg)
|
267
|
+
|
268
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
269
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
270
|
+
```
|
271
|
+
<!--End PulumiCodeChooser -->
|
272
|
+
|
273
|
+
## Required Vault Capabilities
|
274
|
+
|
275
|
+
Use of this resource requires the `read` capability on the given path.
|
276
|
+
|
233
277
|
|
234
278
|
:param str namespace: The namespace of the target resource.
|
235
279
|
The value should not contain leading or trailing forward slashes.
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -91,8 +91,8 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
91
91
|
import pulumi_vault as vault
|
92
92
|
|
93
93
|
children = vault.get_namespaces(namespace="parent")
|
94
|
-
child =
|
95
|
-
path=__key) for __key, __value in children.paths
|
94
|
+
child = {__key: vault.get_namespace(namespace=children.namespace,
|
95
|
+
path=__key) for __key, __value in children.paths}
|
96
96
|
```
|
97
97
|
<!--End PulumiCodeChooser -->
|
98
98
|
|
@@ -139,8 +139,8 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
139
139
|
import pulumi_vault as vault
|
140
140
|
|
141
141
|
children = vault.get_namespaces(namespace="parent")
|
142
|
-
child =
|
143
|
-
path=__key) for __key, __value in children.paths
|
142
|
+
child = {__key: vault.get_namespace(namespace=children.namespace,
|
143
|
+
path=__key) for __key, __value in children.paths}
|
144
144
|
```
|
145
145
|
<!--End PulumiCodeChooser -->
|
146
146
|
|
@@ -89,7 +89,7 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
89
89
|
import pulumi
|
90
90
|
import pulumi_vault as vault
|
91
91
|
|
92
|
-
|
92
|
+
example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
93
93
|
path="secret/*",
|
94
94
|
capabilities=[
|
95
95
|
"create",
|
@@ -100,7 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
|
|
100
100
|
],
|
101
101
|
description="allow all on secrets",
|
102
102
|
)])
|
103
|
-
example_policy = vault.Policy("
|
103
|
+
example_policy = vault.Policy("example",
|
104
|
+
name="example_policy",
|
105
|
+
policy=example.hcl)
|
104
106
|
```
|
105
107
|
<!--End PulumiCodeChooser -->
|
106
108
|
"""
|
@@ -131,7 +133,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
131
133
|
import pulumi
|
132
134
|
import pulumi_vault as vault
|
133
135
|
|
134
|
-
|
136
|
+
example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
|
135
137
|
path="secret/*",
|
136
138
|
capabilities=[
|
137
139
|
"create",
|
@@ -142,7 +144,9 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
|
|
142
144
|
],
|
143
145
|
description="allow all on secrets",
|
144
146
|
)])
|
145
|
-
example_policy = vault.Policy("
|
147
|
+
example_policy = vault.Policy("example",
|
148
|
+
name="example_policy",
|
149
|
+
policy=example.hcl)
|
146
150
|
```
|
147
151
|
<!--End PulumiCodeChooser -->
|
148
152
|
"""
|
pulumi_vault/github/team.py
CHANGED
@@ -197,7 +197,7 @@ class Team(pulumi.CustomResource):
|
|
197
197
|
import pulumi_vault as vault
|
198
198
|
|
199
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_devs = vault.github.Team("
|
200
|
+
tf_devs = vault.github.Team("tf_devs",
|
201
201
|
backend=example.id,
|
202
202
|
team="terraform-developers",
|
203
203
|
policies=[
|
@@ -246,7 +246,7 @@ class Team(pulumi.CustomResource):
|
|
246
246
|
import pulumi_vault as vault
|
247
247
|
|
248
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_devs = vault.github.Team("
|
249
|
+
tf_devs = vault.github.Team("tf_devs",
|
250
250
|
backend=example.id,
|
251
251
|
team="terraform-developers",
|
252
252
|
policies=[
|
pulumi_vault/github/user.py
CHANGED
@@ -197,7 +197,7 @@ class User(pulumi.CustomResource):
|
|
197
197
|
import pulumi_vault as vault
|
198
198
|
|
199
199
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_user = vault.github.User("
|
200
|
+
tf_user = vault.github.User("tf_user",
|
201
201
|
backend=example.id,
|
202
202
|
user="john.doe",
|
203
203
|
policies=[
|
@@ -246,7 +246,7 @@ class User(pulumi.CustomResource):
|
|
246
246
|
import pulumi_vault as vault
|
247
247
|
|
248
248
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_user = vault.github.User("
|
249
|
+
tf_user = vault.github.User("tf_user",
|
250
250
|
backend=example.id,
|
251
251
|
user="john.doe",
|
252
252
|
policies=[
|
pulumi_vault/identity/entity.py
CHANGED
@@ -252,10 +252,11 @@ class Entity(pulumi.CustomResource):
|
|
252
252
|
import pulumi_vault as vault
|
253
253
|
|
254
254
|
test = vault.identity.Entity("test",
|
255
|
+
name="tester1",
|
256
|
+
policies=["test"],
|
255
257
|
metadata={
|
256
258
|
"foo": "bar",
|
257
|
-
}
|
258
|
-
policies=["test"])
|
259
|
+
})
|
259
260
|
```
|
260
261
|
<!--End PulumiCodeChooser -->
|
261
262
|
|
@@ -294,10 +295,11 @@ class Entity(pulumi.CustomResource):
|
|
294
295
|
import pulumi_vault as vault
|
295
296
|
|
296
297
|
test = vault.identity.Entity("test",
|
298
|
+
name="tester1",
|
299
|
+
policies=["test"],
|
297
300
|
metadata={
|
298
301
|
"foo": "bar",
|
299
|
-
}
|
300
|
-
policies=["test"])
|
302
|
+
})
|
301
303
|
```
|
302
304
|
<!--End PulumiCodeChooser -->
|
303
305
|
|
@@ -217,8 +217,9 @@ class EntityAlias(pulumi.CustomResource):
|
|
217
217
|
import pulumi_vault as vault
|
218
218
|
|
219
219
|
test = vault.identity.EntityAlias("test",
|
220
|
-
|
221
|
-
mount_accessor="token_1f2bd5"
|
220
|
+
name="user_1",
|
221
|
+
mount_accessor="token_1f2bd5",
|
222
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
222
223
|
```
|
223
224
|
<!--End PulumiCodeChooser -->
|
224
225
|
|
@@ -256,8 +257,9 @@ class EntityAlias(pulumi.CustomResource):
|
|
256
257
|
import pulumi_vault as vault
|
257
258
|
|
258
259
|
test = vault.identity.EntityAlias("test",
|
259
|
-
|
260
|
-
mount_accessor="token_1f2bd5"
|
260
|
+
name="user_1",
|
261
|
+
mount_accessor="token_1f2bd5",
|
262
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
261
263
|
```
|
262
264
|
<!--End PulumiCodeChooser -->
|
263
265
|
|
@@ -219,7 +219,9 @@ class EntityPolicies(pulumi.CustomResource):
|
|
219
219
|
import pulumi
|
220
220
|
import pulumi_vault as vault
|
221
221
|
|
222
|
-
entity = vault.identity.Entity("entity",
|
222
|
+
entity = vault.identity.Entity("entity",
|
223
|
+
name="entity",
|
224
|
+
external_policies=True)
|
223
225
|
policies = vault.identity.EntityPolicies("policies",
|
224
226
|
policies=[
|
225
227
|
"default",
|
@@ -237,7 +239,9 @@ class EntityPolicies(pulumi.CustomResource):
|
|
237
239
|
import pulumi
|
238
240
|
import pulumi_vault as vault
|
239
241
|
|
240
|
-
entity = vault.identity.Entity("entity",
|
242
|
+
entity = vault.identity.Entity("entity",
|
243
|
+
name="entity",
|
244
|
+
external_policies=True)
|
241
245
|
default = vault.identity.EntityPolicies("default",
|
242
246
|
policies=[
|
243
247
|
"default",
|
@@ -284,7 +288,9 @@ class EntityPolicies(pulumi.CustomResource):
|
|
284
288
|
import pulumi
|
285
289
|
import pulumi_vault as vault
|
286
290
|
|
287
|
-
entity = vault.identity.Entity("entity",
|
291
|
+
entity = vault.identity.Entity("entity",
|
292
|
+
name="entity",
|
293
|
+
external_policies=True)
|
288
294
|
policies = vault.identity.EntityPolicies("policies",
|
289
295
|
policies=[
|
290
296
|
"default",
|
@@ -302,7 +308,9 @@ class EntityPolicies(pulumi.CustomResource):
|
|
302
308
|
import pulumi
|
303
309
|
import pulumi_vault as vault
|
304
310
|
|
305
|
-
entity = vault.identity.Entity("entity",
|
311
|
+
entity = vault.identity.Entity("entity",
|
312
|
+
name="entity",
|
313
|
+
external_policies=True)
|
306
314
|
default = vault.identity.EntityPolicies("default",
|
307
315
|
policies=[
|
308
316
|
"default",
|
@@ -99,6 +99,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
99
99
|
import pulumi_vault as vault
|
100
100
|
|
101
101
|
app = vault.identity.OidcClient("app",
|
102
|
+
name="application",
|
102
103
|
redirect_uris=[
|
103
104
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
104
105
|
"http://127.0.0.1:8251/callback",
|
@@ -144,6 +145,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
144
145
|
import pulumi_vault as vault
|
145
146
|
|
146
147
|
app = vault.identity.OidcClient("app",
|
148
|
+
name="application",
|
147
149
|
redirect_uris=[
|
148
150
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
149
151
|
"http://127.0.0.1:8251/callback",
|
@@ -220,10 +220,12 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
220
220
|
import pulumi_vault as vault
|
221
221
|
|
222
222
|
key = vault.identity.OidcKey("key",
|
223
|
+
name="key",
|
223
224
|
allowed_client_ids=["*"],
|
224
225
|
rotation_period=3600,
|
225
226
|
verification_ttl=3600)
|
226
227
|
app = vault.identity.OidcClient("app",
|
228
|
+
name="application",
|
227
229
|
key=key.name,
|
228
230
|
redirect_uris=[
|
229
231
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -232,7 +234,9 @@ def get_oidc_openid_config(name: Optional[str] = None,
|
|
232
234
|
],
|
233
235
|
id_token_ttl=2400,
|
234
236
|
access_token_ttl=7200)
|
235
|
-
provider = vault.identity.OidcProvider("provider",
|
237
|
+
provider = vault.identity.OidcProvider("provider",
|
238
|
+
name="provider",
|
239
|
+
allowed_client_ids=[test["clientId"]])
|
236
240
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
237
241
|
```
|
238
242
|
<!--End PulumiCodeChooser -->
|
@@ -281,10 +285,12 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
281
285
|
import pulumi_vault as vault
|
282
286
|
|
283
287
|
key = vault.identity.OidcKey("key",
|
288
|
+
name="key",
|
284
289
|
allowed_client_ids=["*"],
|
285
290
|
rotation_period=3600,
|
286
291
|
verification_ttl=3600)
|
287
292
|
app = vault.identity.OidcClient("app",
|
293
|
+
name="application",
|
288
294
|
key=key.name,
|
289
295
|
redirect_uris=[
|
290
296
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
@@ -293,7 +299,9 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
|
|
293
299
|
],
|
294
300
|
id_token_ttl=2400,
|
295
301
|
access_token_ttl=7200)
|
296
|
-
provider = vault.identity.OidcProvider("provider",
|
302
|
+
provider = vault.identity.OidcProvider("provider",
|
303
|
+
name="provider",
|
304
|
+
allowed_client_ids=[test["clientId"]])
|
297
305
|
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
298
306
|
```
|
299
307
|
<!--End PulumiCodeChooser -->
|