pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +2 -4
- pulumi_vault/terraformcloud/secret_role.py +2 -4
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -311,7 +311,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
311
311
|
|
312
312
|
## Example Usage
|
313
313
|
|
314
|
-
<!--Start PulumiCodeChooser -->
|
315
314
|
```python
|
316
315
|
import pulumi
|
317
316
|
import pulumi_vault as vault
|
@@ -320,7 +319,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
|
|
320
319
|
role_name="my-role")
|
321
320
|
pulumi.export("role-id", role.role_id)
|
322
321
|
```
|
323
|
-
<!--End PulumiCodeChooser -->
|
324
322
|
|
325
323
|
|
326
324
|
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
@@ -416,7 +414,6 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
416
414
|
|
417
415
|
## Example Usage
|
418
416
|
|
419
|
-
<!--Start PulumiCodeChooser -->
|
420
417
|
```python
|
421
418
|
import pulumi
|
422
419
|
import pulumi_vault as vault
|
@@ -425,7 +422,6 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
|
|
425
422
|
role_name="my-role")
|
426
423
|
pulumi.export("role-id", role.role_id)
|
427
424
|
```
|
428
|
-
<!--End PulumiCodeChooser -->
|
429
425
|
|
430
426
|
|
431
427
|
:param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
@@ -328,14 +328,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
328
328
|
"""
|
329
329
|
## Example Usage
|
330
330
|
|
331
|
-
<!--Start PulumiCodeChooser -->
|
332
331
|
```python
|
333
332
|
import pulumi
|
333
|
+
import pulumi_std as std
|
334
334
|
import pulumi_vault as vault
|
335
335
|
|
336
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
336
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
|
337
337
|
```
|
338
|
-
<!--End PulumiCodeChooser -->
|
339
338
|
|
340
339
|
:param str resource_name: The name of the resource.
|
341
340
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -364,14 +363,13 @@ class SecretBackend(pulumi.CustomResource):
|
|
364
363
|
"""
|
365
364
|
## Example Usage
|
366
365
|
|
367
|
-
<!--Start PulumiCodeChooser -->
|
368
366
|
```python
|
369
367
|
import pulumi
|
368
|
+
import pulumi_std as std
|
370
369
|
import pulumi_vault as vault
|
371
370
|
|
372
|
-
gcp = vault.gcp.SecretBackend("gcp", credentials=
|
371
|
+
gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
|
373
372
|
```
|
374
|
-
<!--End PulumiCodeChooser -->
|
375
373
|
|
376
374
|
:param str resource_name: The name of the resource.
|
377
375
|
:param SecretBackendArgs args: The arguments to use to populate this resource's properties.
|
@@ -219,23 +219,22 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
219
219
|
|
220
220
|
## Example Usage
|
221
221
|
|
222
|
-
<!--Start PulumiCodeChooser -->
|
223
222
|
```python
|
224
223
|
import pulumi
|
225
|
-
import
|
224
|
+
import pulumi_google as google
|
225
|
+
import pulumi_std as std
|
226
226
|
import pulumi_vault as vault
|
227
227
|
|
228
|
-
this =
|
228
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
229
229
|
gcp = vault.gcp.SecretBackend("gcp",
|
230
230
|
path="gcp",
|
231
|
-
credentials=
|
232
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
231
|
+
credentials=std.file(input="credentials.json").result)
|
232
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
|
233
233
|
backend=gcp.path,
|
234
234
|
impersonated_account="this",
|
235
|
-
service_account_email=this
|
235
|
+
service_account_email=this["email"],
|
236
236
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
237
237
|
```
|
238
|
-
<!--End PulumiCodeChooser -->
|
239
238
|
|
240
239
|
## Import
|
241
240
|
|
@@ -267,23 +266,22 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
|
|
267
266
|
|
268
267
|
## Example Usage
|
269
268
|
|
270
|
-
<!--Start PulumiCodeChooser -->
|
271
269
|
```python
|
272
270
|
import pulumi
|
273
|
-
import
|
271
|
+
import pulumi_google as google
|
272
|
+
import pulumi_std as std
|
274
273
|
import pulumi_vault as vault
|
275
274
|
|
276
|
-
this =
|
275
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
277
276
|
gcp = vault.gcp.SecretBackend("gcp",
|
278
277
|
path="gcp",
|
279
|
-
credentials=
|
280
|
-
impersonated_account = vault.gcp.SecretImpersonatedAccount("
|
278
|
+
credentials=std.file(input="credentials.json").result)
|
279
|
+
impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
|
281
280
|
backend=gcp.path,
|
282
281
|
impersonated_account="this",
|
283
|
-
service_account_email=this
|
282
|
+
service_account_email=this["email"],
|
284
283
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
|
285
284
|
```
|
286
|
-
<!--End PulumiCodeChooser -->
|
287
285
|
|
288
286
|
## Import
|
289
287
|
|
@@ -297,15 +297,15 @@ class SecretRoleset(pulumi.CustomResource):
|
|
297
297
|
|
298
298
|
## Example Usage
|
299
299
|
|
300
|
-
<!--Start PulumiCodeChooser -->
|
301
300
|
```python
|
302
301
|
import pulumi
|
302
|
+
import pulumi_std as std
|
303
303
|
import pulumi_vault as vault
|
304
304
|
|
305
305
|
project = "my-awesome-project"
|
306
306
|
gcp = vault.gcp.SecretBackend("gcp",
|
307
307
|
path="gcp",
|
308
|
-
credentials=
|
308
|
+
credentials=std.file(input="credentials.json").result)
|
309
309
|
roleset = vault.gcp.SecretRoleset("roleset",
|
310
310
|
backend=gcp.path,
|
311
311
|
roleset="project_viewer",
|
@@ -317,7 +317,6 @@ class SecretRoleset(pulumi.CustomResource):
|
|
317
317
|
roles=["roles/viewer"],
|
318
318
|
)])
|
319
319
|
```
|
320
|
-
<!--End PulumiCodeChooser -->
|
321
320
|
|
322
321
|
## Import
|
323
322
|
|
@@ -353,15 +352,15 @@ class SecretRoleset(pulumi.CustomResource):
|
|
353
352
|
|
354
353
|
## Example Usage
|
355
354
|
|
356
|
-
<!--Start PulumiCodeChooser -->
|
357
355
|
```python
|
358
356
|
import pulumi
|
357
|
+
import pulumi_std as std
|
359
358
|
import pulumi_vault as vault
|
360
359
|
|
361
360
|
project = "my-awesome-project"
|
362
361
|
gcp = vault.gcp.SecretBackend("gcp",
|
363
362
|
path="gcp",
|
364
|
-
credentials=
|
363
|
+
credentials=std.file(input="credentials.json").result)
|
365
364
|
roleset = vault.gcp.SecretRoleset("roleset",
|
366
365
|
backend=gcp.path,
|
367
366
|
roleset="project_viewer",
|
@@ -373,7 +372,6 @@ class SecretRoleset(pulumi.CustomResource):
|
|
373
372
|
roles=["roles/viewer"],
|
374
373
|
)])
|
375
374
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
375
|
|
378
376
|
## Import
|
379
377
|
|
@@ -299,28 +299,27 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
-
<!--Start PulumiCodeChooser -->
|
303
302
|
```python
|
304
303
|
import pulumi
|
305
|
-
import
|
304
|
+
import pulumi_google as google
|
305
|
+
import pulumi_std as std
|
306
306
|
import pulumi_vault as vault
|
307
307
|
|
308
|
-
this =
|
308
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
309
309
|
gcp = vault.gcp.SecretBackend("gcp",
|
310
310
|
path="gcp",
|
311
|
-
credentials=
|
312
|
-
static_account = vault.gcp.SecretStaticAccount("
|
311
|
+
credentials=std.file(input="credentials.json").result)
|
312
|
+
static_account = vault.gcp.SecretStaticAccount("static_account",
|
313
313
|
backend=gcp.path,
|
314
314
|
static_account="project_viewer",
|
315
315
|
secret_type="access_token",
|
316
316
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
317
|
-
service_account_email=this
|
317
|
+
service_account_email=this["email"],
|
318
318
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
319
|
-
resource=
|
319
|
+
resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
|
320
320
|
roles=["roles/viewer"],
|
321
321
|
)])
|
322
322
|
```
|
323
|
-
<!--End PulumiCodeChooser -->
|
324
323
|
|
325
324
|
## Import
|
326
325
|
|
@@ -357,28 +356,27 @@ class SecretStaticAccount(pulumi.CustomResource):
|
|
357
356
|
|
358
357
|
## Example Usage
|
359
358
|
|
360
|
-
<!--Start PulumiCodeChooser -->
|
361
359
|
```python
|
362
360
|
import pulumi
|
363
|
-
import
|
361
|
+
import pulumi_google as google
|
362
|
+
import pulumi_std as std
|
364
363
|
import pulumi_vault as vault
|
365
364
|
|
366
|
-
this =
|
365
|
+
this = google.index.ServiceAccount("this", account_id=my-awesome-account)
|
367
366
|
gcp = vault.gcp.SecretBackend("gcp",
|
368
367
|
path="gcp",
|
369
|
-
credentials=
|
370
|
-
static_account = vault.gcp.SecretStaticAccount("
|
368
|
+
credentials=std.file(input="credentials.json").result)
|
369
|
+
static_account = vault.gcp.SecretStaticAccount("static_account",
|
371
370
|
backend=gcp.path,
|
372
371
|
static_account="project_viewer",
|
373
372
|
secret_type="access_token",
|
374
373
|
token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
|
375
|
-
service_account_email=this
|
374
|
+
service_account_email=this["email"],
|
376
375
|
bindings=[vault.gcp.SecretStaticAccountBindingArgs(
|
377
|
-
resource=
|
376
|
+
resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
|
378
377
|
roles=["roles/viewer"],
|
379
378
|
)])
|
380
379
|
```
|
381
|
-
<!--End PulumiCodeChooser -->
|
382
380
|
|
383
381
|
## Import
|
384
382
|
|
pulumi_vault/generic/endpoint.py
CHANGED
@@ -407,7 +407,6 @@ class Endpoint(pulumi.CustomResource):
|
|
407
407
|
"""
|
408
408
|
## Example Usage
|
409
409
|
|
410
|
-
<!--Start PulumiCodeChooser -->
|
411
410
|
```python
|
412
411
|
import pulumi
|
413
412
|
import pulumi_vault as vault
|
@@ -422,7 +421,7 @@ class Endpoint(pulumi.CustomResource):
|
|
422
421
|
}
|
423
422
|
\"\"\",
|
424
423
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
425
|
-
u1_token = vault.generic.Endpoint("
|
424
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
426
425
|
path="auth/userpass/login/u1",
|
427
426
|
disable_read=True,
|
428
427
|
disable_delete=True,
|
@@ -431,7 +430,7 @@ class Endpoint(pulumi.CustomResource):
|
|
431
430
|
}
|
432
431
|
\"\"\",
|
433
432
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
434
|
-
u1_entity = vault.generic.Endpoint("
|
433
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
435
434
|
disable_read=True,
|
436
435
|
disable_delete=True,
|
437
436
|
path="identity/lookup/entity",
|
@@ -445,7 +444,6 @@ class Endpoint(pulumi.CustomResource):
|
|
445
444
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
446
445
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
447
446
|
```
|
448
|
-
<!--End PulumiCodeChooser -->
|
449
447
|
|
450
448
|
## Required Vault Capabilities
|
451
449
|
|
@@ -502,7 +500,6 @@ class Endpoint(pulumi.CustomResource):
|
|
502
500
|
"""
|
503
501
|
## Example Usage
|
504
502
|
|
505
|
-
<!--Start PulumiCodeChooser -->
|
506
503
|
```python
|
507
504
|
import pulumi
|
508
505
|
import pulumi_vault as vault
|
@@ -517,7 +514,7 @@ class Endpoint(pulumi.CustomResource):
|
|
517
514
|
}
|
518
515
|
\"\"\",
|
519
516
|
opts=pulumi.ResourceOptions(depends_on=[userpass]))
|
520
|
-
u1_token = vault.generic.Endpoint("
|
517
|
+
u1_token = vault.generic.Endpoint("u1_token",
|
521
518
|
path="auth/userpass/login/u1",
|
522
519
|
disable_read=True,
|
523
520
|
disable_delete=True,
|
@@ -526,7 +523,7 @@ class Endpoint(pulumi.CustomResource):
|
|
526
523
|
}
|
527
524
|
\"\"\",
|
528
525
|
opts=pulumi.ResourceOptions(depends_on=[u1]))
|
529
|
-
u1_entity = vault.generic.Endpoint("
|
526
|
+
u1_entity = vault.generic.Endpoint("u1_entity",
|
530
527
|
disable_read=True,
|
531
528
|
disable_delete=True,
|
532
529
|
path="identity/lookup/entity",
|
@@ -540,7 +537,6 @@ class Endpoint(pulumi.CustomResource):
|
|
540
537
|
opts=pulumi.ResourceOptions(depends_on=[u1_token]))
|
541
538
|
pulumi.export("u1Id", u1_entity.write_data["id"])
|
542
539
|
```
|
543
|
-
<!--End PulumiCodeChooser -->
|
544
540
|
|
545
541
|
## Required Vault Capabilities
|
546
542
|
|
@@ -162,14 +162,32 @@ def get_secret(namespace: Optional[str] = None,
|
|
162
162
|
|
163
163
|
### Generic secret
|
164
164
|
|
165
|
-
<!--Start PulumiCodeChooser -->
|
166
165
|
```python
|
167
166
|
import pulumi
|
168
167
|
import pulumi_vault as vault
|
169
168
|
|
170
169
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
171
170
|
```
|
172
|
-
|
171
|
+
|
172
|
+
### KV
|
173
|
+
|
174
|
+
For this example, consider `example` as a path for a KV engine.
|
175
|
+
|
176
|
+
```python
|
177
|
+
import pulumi
|
178
|
+
import pulumi_vault as vault
|
179
|
+
|
180
|
+
|
181
|
+
def not_implemented(msg):
|
182
|
+
raise NotImplementedError(msg)
|
183
|
+
|
184
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
185
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
186
|
+
```
|
187
|
+
|
188
|
+
## Required Vault Capabilities
|
189
|
+
|
190
|
+
Use of this resource requires the `read` capability on the given path.
|
173
191
|
|
174
192
|
|
175
193
|
:param str namespace: The namespace of the target resource.
|
@@ -221,14 +239,32 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
221
239
|
|
222
240
|
### Generic secret
|
223
241
|
|
224
|
-
<!--Start PulumiCodeChooser -->
|
225
242
|
```python
|
226
243
|
import pulumi
|
227
244
|
import pulumi_vault as vault
|
228
245
|
|
229
246
|
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
230
247
|
```
|
231
|
-
|
248
|
+
|
249
|
+
### KV
|
250
|
+
|
251
|
+
For this example, consider `example` as a path for a KV engine.
|
252
|
+
|
253
|
+
```python
|
254
|
+
import pulumi
|
255
|
+
import pulumi_vault as vault
|
256
|
+
|
257
|
+
|
258
|
+
def not_implemented(msg):
|
259
|
+
raise NotImplementedError(msg)
|
260
|
+
|
261
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
262
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
263
|
+
```
|
264
|
+
|
265
|
+
## Required Vault Capabilities
|
266
|
+
|
267
|
+
Use of this resource requires the `read` capability on the given path.
|
232
268
|
|
233
269
|
|
234
270
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_auth_backend.py
CHANGED
@@ -152,14 +152,12 @@ def get_auth_backend(namespace: Optional[str] = None,
|
|
152
152
|
"""
|
153
153
|
## Example Usage
|
154
154
|
|
155
|
-
<!--Start PulumiCodeChooser -->
|
156
155
|
```python
|
157
156
|
import pulumi
|
158
157
|
import pulumi_vault as vault
|
159
158
|
|
160
159
|
example = vault.get_auth_backend(path="userpass")
|
161
160
|
```
|
162
|
-
<!--End PulumiCodeChooser -->
|
163
161
|
|
164
162
|
|
165
163
|
:param str namespace: The namespace of the target resource.
|
@@ -194,14 +192,12 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
194
192
|
"""
|
195
193
|
## Example Usage
|
196
194
|
|
197
|
-
<!--Start PulumiCodeChooser -->
|
198
195
|
```python
|
199
196
|
import pulumi
|
200
197
|
import pulumi_vault as vault
|
201
198
|
|
202
199
|
example = vault.get_auth_backend(path="userpass")
|
203
200
|
```
|
204
|
-
<!--End PulumiCodeChooser -->
|
205
201
|
|
206
202
|
|
207
203
|
:param str namespace: The namespace of the target resource.
|
@@ -92,23 +92,19 @@ def get_auth_backends(namespace: Optional[str] = None,
|
|
92
92
|
"""
|
93
93
|
## Example Usage
|
94
94
|
|
95
|
-
<!--Start PulumiCodeChooser -->
|
96
95
|
```python
|
97
96
|
import pulumi
|
98
97
|
import pulumi_vault as vault
|
99
98
|
|
100
99
|
example = vault.get_auth_backends()
|
101
100
|
```
|
102
|
-
<!--End PulumiCodeChooser -->
|
103
101
|
|
104
|
-
<!--Start PulumiCodeChooser -->
|
105
102
|
```python
|
106
103
|
import pulumi
|
107
104
|
import pulumi_vault as vault
|
108
105
|
|
109
106
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
110
107
|
```
|
111
|
-
<!--End PulumiCodeChooser -->
|
112
108
|
|
113
109
|
|
114
110
|
:param str namespace: The namespace of the target resource.
|
@@ -138,23 +134,19 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
|
|
138
134
|
"""
|
139
135
|
## Example Usage
|
140
136
|
|
141
|
-
<!--Start PulumiCodeChooser -->
|
142
137
|
```python
|
143
138
|
import pulumi
|
144
139
|
import pulumi_vault as vault
|
145
140
|
|
146
141
|
example = vault.get_auth_backends()
|
147
142
|
```
|
148
|
-
<!--End PulumiCodeChooser -->
|
149
143
|
|
150
|
-
<!--Start PulumiCodeChooser -->
|
151
144
|
```python
|
152
145
|
import pulumi
|
153
146
|
import pulumi_vault as vault
|
154
147
|
|
155
148
|
example_filter = vault.get_auth_backends(type="kubernetes")
|
156
149
|
```
|
157
|
-
<!--End PulumiCodeChooser -->
|
158
150
|
|
159
151
|
|
160
152
|
:param str namespace: The namespace of the target resource.
|
pulumi_vault/get_namespace.py
CHANGED
@@ -110,29 +110,24 @@ def get_namespace(namespace: Optional[str] = None,
|
|
110
110
|
|
111
111
|
### Current namespace
|
112
112
|
|
113
|
-
<!--Start PulumiCodeChooser -->
|
114
113
|
```python
|
115
114
|
import pulumi
|
116
115
|
import pulumi_vault as vault
|
117
116
|
|
118
117
|
current = vault.get_namespace()
|
119
118
|
```
|
120
|
-
<!--End PulumiCodeChooser -->
|
121
119
|
|
122
120
|
### Single namespace
|
123
121
|
|
124
|
-
<!--Start PulumiCodeChooser -->
|
125
122
|
```python
|
126
123
|
import pulumi
|
127
124
|
import pulumi_vault as vault
|
128
125
|
|
129
126
|
ns1 = vault.get_namespace(path="ns1")
|
130
127
|
```
|
131
|
-
<!--End PulumiCodeChooser -->
|
132
128
|
|
133
129
|
### Nested namespace
|
134
130
|
|
135
|
-
<!--Start PulumiCodeChooser -->
|
136
131
|
```python
|
137
132
|
import pulumi
|
138
133
|
import pulumi_vault as vault
|
@@ -143,7 +138,6 @@ def get_namespace(namespace: Optional[str] = None,
|
|
143
138
|
# -> foo/parent/child/
|
144
139
|
path_fq = child.path_fq
|
145
140
|
```
|
146
|
-
<!--End PulumiCodeChooser -->
|
147
141
|
|
148
142
|
|
149
143
|
:param str namespace: The namespace to provision the resource in.
|
@@ -178,29 +172,24 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
178
172
|
|
179
173
|
### Current namespace
|
180
174
|
|
181
|
-
<!--Start PulumiCodeChooser -->
|
182
175
|
```python
|
183
176
|
import pulumi
|
184
177
|
import pulumi_vault as vault
|
185
178
|
|
186
179
|
current = vault.get_namespace()
|
187
180
|
```
|
188
|
-
<!--End PulumiCodeChooser -->
|
189
181
|
|
190
182
|
### Single namespace
|
191
183
|
|
192
|
-
<!--Start PulumiCodeChooser -->
|
193
184
|
```python
|
194
185
|
import pulumi
|
195
186
|
import pulumi_vault as vault
|
196
187
|
|
197
188
|
ns1 = vault.get_namespace(path="ns1")
|
198
189
|
```
|
199
|
-
<!--End PulumiCodeChooser -->
|
200
190
|
|
201
191
|
### Nested namespace
|
202
192
|
|
203
|
-
<!--Start PulumiCodeChooser -->
|
204
193
|
```python
|
205
194
|
import pulumi
|
206
195
|
import pulumi_vault as vault
|
@@ -211,7 +200,6 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
|
|
211
200
|
# -> foo/parent/child/
|
212
201
|
path_fq = child.path_fq
|
213
202
|
```
|
214
|
-
<!--End PulumiCodeChooser -->
|
215
203
|
|
216
204
|
|
217
205
|
:param str namespace: The namespace to provision the resource in.
|
pulumi_vault/get_namespaces.py
CHANGED
@@ -72,29 +72,25 @@ def get_namespaces(namespace: Optional[str] = None,
|
|
72
72
|
|
73
73
|
### Child namespaces
|
74
74
|
|
75
|
-
<!--Start PulumiCodeChooser -->
|
76
75
|
```python
|
77
76
|
import pulumi
|
78
77
|
import pulumi_vault as vault
|
79
78
|
|
80
79
|
children = vault.get_namespaces()
|
81
80
|
```
|
82
|
-
<!--End PulumiCodeChooser -->
|
83
81
|
|
84
82
|
### Nested namespace
|
85
83
|
|
86
84
|
To fetch the details of nested namespaces:
|
87
85
|
|
88
|
-
<!--Start PulumiCodeChooser -->
|
89
86
|
```python
|
90
87
|
import pulumi
|
91
88
|
import pulumi_vault as vault
|
92
89
|
|
93
90
|
children = vault.get_namespaces(namespace="parent")
|
94
|
-
child =
|
95
|
-
path=__key) for __key, __value in children.paths
|
91
|
+
child = {__key: vault.get_namespace(namespace=children.namespace,
|
92
|
+
path=__key) for __key, __value in children.paths}
|
96
93
|
```
|
97
|
-
<!--End PulumiCodeChooser -->
|
98
94
|
|
99
95
|
|
100
96
|
:param str namespace: The namespace to provision the resource in.
|
@@ -120,29 +116,25 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
|
|
120
116
|
|
121
117
|
### Child namespaces
|
122
118
|
|
123
|
-
<!--Start PulumiCodeChooser -->
|
124
119
|
```python
|
125
120
|
import pulumi
|
126
121
|
import pulumi_vault as vault
|
127
122
|
|
128
123
|
children = vault.get_namespaces()
|
129
124
|
```
|
130
|
-
<!--End PulumiCodeChooser -->
|
131
125
|
|
132
126
|
### Nested namespace
|
133
127
|
|
134
128
|
To fetch the details of nested namespaces:
|
135
129
|
|
136
|
-
<!--Start PulumiCodeChooser -->
|
137
130
|
```python
|
138
131
|
import pulumi
|
139
132
|
import pulumi_vault as vault
|
140
133
|
|
141
134
|
children = vault.get_namespaces(namespace="parent")
|
142
|
-
child =
|
143
|
-
path=__key) for __key, __value in children.paths
|
135
|
+
child = {__key: vault.get_namespace(namespace=children.namespace,
|
136
|
+
path=__key) for __key, __value in children.paths}
|
144
137
|
```
|
145
|
-
<!--End PulumiCodeChooser -->
|
146
138
|
|
147
139
|
|
148
140
|
:param str namespace: The namespace to provision the resource in.
|
@@ -103,7 +103,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
103
103
|
"""
|
104
104
|
## Example Usage
|
105
105
|
|
106
|
-
<!--Start PulumiCodeChooser -->
|
107
106
|
```python
|
108
107
|
import pulumi
|
109
108
|
import pulumi_vault as vault
|
@@ -123,7 +122,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
|
|
123
122
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
124
123
|
role=role))
|
125
124
|
```
|
126
|
-
<!--End PulumiCodeChooser -->
|
127
125
|
|
128
126
|
|
129
127
|
:param str backend: The path to the Nomad secret backend to
|
@@ -159,7 +157,6 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
159
157
|
"""
|
160
158
|
## Example Usage
|
161
159
|
|
162
|
-
<!--Start PulumiCodeChooser -->
|
163
160
|
```python
|
164
161
|
import pulumi
|
165
162
|
import pulumi_vault as vault
|
@@ -179,7 +176,6 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
|
|
179
176
|
token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
|
180
177
|
role=role))
|
181
178
|
```
|
182
|
-
<!--End PulumiCodeChooser -->
|
183
179
|
|
184
180
|
|
185
181
|
:param str backend: The path to the Nomad secret backend to
|