pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/__init__.py +59 -0
  2. pulumi_vault/_inputs.py +380 -0
  3. pulumi_vault/_utilities.py +2 -2
  4. pulumi_vault/aws/secret_backend.py +188 -0
  5. pulumi_vault/aws/secret_backend_static_role.py +2 -2
  6. pulumi_vault/azure/backend.py +7 -21
  7. pulumi_vault/azure/backend_role.py +111 -0
  8. pulumi_vault/config/__init__.pyi +0 -3
  9. pulumi_vault/config/outputs.py +380 -0
  10. pulumi_vault/config/vars.py +0 -3
  11. pulumi_vault/consul/secret_backend.py +7 -35
  12. pulumi_vault/database/_inputs.py +536 -0
  13. pulumi_vault/database/outputs.py +483 -3
  14. pulumi_vault/gcp/_inputs.py +162 -4
  15. pulumi_vault/gcp/auth_backend.py +64 -3
  16. pulumi_vault/gcp/outputs.py +161 -4
  17. pulumi_vault/get_raft_autopilot_state.py +0 -12
  18. pulumi_vault/identity/group_alias.py +6 -6
  19. pulumi_vault/kubernetes/auth_backend_config.py +7 -7
  20. pulumi_vault/kubernetes/secret_backend_role.py +8 -4
  21. pulumi_vault/kv/_inputs.py +12 -0
  22. pulumi_vault/kv/outputs.py +12 -0
  23. pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
  24. pulumi_vault/ldap/secret_backend_static_role.py +2 -2
  25. pulumi_vault/managed/_inputs.py +12 -0
  26. pulumi_vault/managed/keys.py +20 -0
  27. pulumi_vault/managed/outputs.py +12 -0
  28. pulumi_vault/mongodbatlas/secret_role.py +2 -2
  29. pulumi_vault/namespace.py +46 -14
  30. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
  31. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
  32. pulumi_vault/pkisecret/secret_backend_role.py +54 -7
  33. pulumi_vault/rabbitmq/_inputs.py +36 -0
  34. pulumi_vault/rabbitmq/outputs.py +36 -0
  35. pulumi_vault/saml/auth_backend_role.py +7 -14
  36. pulumi_vault/secrets/__init__.py +14 -0
  37. pulumi_vault/secrets/sync_association.py +464 -0
  38. pulumi_vault/secrets/sync_aws_destination.py +564 -0
  39. pulumi_vault/secrets/sync_azure_destination.py +674 -0
  40. pulumi_vault/secrets/sync_config.py +297 -0
  41. pulumi_vault/secrets/sync_gcp_destination.py +438 -0
  42. pulumi_vault/secrets/sync_gh_destination.py +511 -0
  43. pulumi_vault/secrets/sync_vercel_destination.py +541 -0
  44. pulumi_vault/ssh/secret_backend_role.py +7 -14
  45. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
  46. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
  47. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
  48. {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -36,7 +36,7 @@ class AuthBackendConfigArgs:
36
36
  The `namespace` is always relative to the provider's configured namespace.
37
37
  *Available only for Vault Enterprise*.
38
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
39
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
39
+ :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
40
40
  """
41
41
  pulumi.set(__self__, "kubernetes_host", kubernetes_host)
42
42
  if backend is not None:
@@ -159,7 +159,7 @@ class AuthBackendConfigArgs:
159
159
  @pulumi.getter(name="tokenReviewerJwt")
160
160
  def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
161
161
  """
162
- A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
162
+ A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
163
163
  """
164
164
  return pulumi.get(self, "token_reviewer_jwt")
165
165
 
@@ -193,7 +193,7 @@ class _AuthBackendConfigState:
193
193
  The `namespace` is always relative to the provider's configured namespace.
194
194
  *Available only for Vault Enterprise*.
195
195
  :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
196
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
196
+ :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
197
197
  """
198
198
  if backend is not None:
199
199
  pulumi.set(__self__, "backend", backend)
@@ -317,7 +317,7 @@ class _AuthBackendConfigState:
317
317
  @pulumi.getter(name="tokenReviewerJwt")
318
318
  def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
319
319
  """
320
- A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
320
+ A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
321
321
  """
322
322
  return pulumi.get(self, "token_reviewer_jwt")
323
323
 
@@ -385,7 +385,7 @@ class AuthBackendConfig(pulumi.CustomResource):
385
385
  The `namespace` is always relative to the provider's configured namespace.
386
386
  *Available only for Vault Enterprise*.
387
387
  :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
388
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
388
+ :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
389
389
  """
390
390
  ...
391
391
  @overload
@@ -507,7 +507,7 @@ class AuthBackendConfig(pulumi.CustomResource):
507
507
  The `namespace` is always relative to the provider's configured namespace.
508
508
  *Available only for Vault Enterprise*.
509
509
  :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
510
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
510
+ :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
511
511
  """
512
512
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
513
513
 
@@ -595,7 +595,7 @@ class AuthBackendConfig(pulumi.CustomResource):
595
595
  @pulumi.getter(name="tokenReviewerJwt")
596
596
  def token_reviewer_jwt(self) -> pulumi.Output[Optional[str]]:
597
597
  """
598
- A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
598
+ A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
599
599
  """
600
600
  return pulumi.get(self, "token_reviewer_jwt")
601
601
 
@@ -633,10 +633,12 @@ class SecretBackendRole(pulumi.CustomResource):
633
633
 
634
634
  ## Import
635
635
 
636
- The Kubernetes secret backend role can be imported using the full path to the role of the form`<backend_path>/roles/<role_name>` e.g.
636
+ The Kubernetes secret backend role can be imported using the full path to the role
637
+
638
+ of the form: `<backend_path>/roles/<role_name>` e.g.
637
639
 
638
640
  ```sh
639
- $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
641
+ $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
640
642
  ```
641
643
 
642
644
  :param str resource_name: The name of the resource.
@@ -777,10 +779,12 @@ class SecretBackendRole(pulumi.CustomResource):
777
779
 
778
780
  ## Import
779
781
 
780
- The Kubernetes secret backend role can be imported using the full path to the role of the form`<backend_path>/roles/<role_name>` e.g.
782
+ The Kubernetes secret backend role can be imported using the full path to the role
783
+
784
+ of the form: `<backend_path>/roles/<role_name>` e.g.
781
785
 
782
786
  ```sh
783
- $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
787
+ $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
784
788
  ```
785
789
 
786
790
  :param str resource_name: The name of the resource.
@@ -21,10 +21,13 @@ class SecretV2CustomMetadataArgs:
21
21
  delete_version_after: Optional[pulumi.Input[int]] = None,
22
22
  max_versions: Optional[pulumi.Input[int]] = None):
23
23
  """
24
+ :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
24
25
  :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
25
26
  Vault and whose values are the corresponding values. This map can only
26
27
  represent string data, so any non-string values returned from Vault are
27
28
  serialized as JSON.
29
+ :param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
30
+ :param pulumi.Input[int] max_versions: The number of versions to keep per key.
28
31
  """
29
32
  if cas_required is not None:
30
33
  pulumi.set(__self__, "cas_required", cas_required)
@@ -38,6 +41,9 @@ class SecretV2CustomMetadataArgs:
38
41
  @property
39
42
  @pulumi.getter(name="casRequired")
40
43
  def cas_required(self) -> Optional[pulumi.Input[bool]]:
44
+ """
45
+ If true, all keys will require the cas parameter to be set on all write requests.
46
+ """
41
47
  return pulumi.get(self, "cas_required")
42
48
 
43
49
  @cas_required.setter
@@ -62,6 +68,9 @@ class SecretV2CustomMetadataArgs:
62
68
  @property
63
69
  @pulumi.getter(name="deleteVersionAfter")
64
70
  def delete_version_after(self) -> Optional[pulumi.Input[int]]:
71
+ """
72
+ If set, specifies the length of time before a version is deleted.
73
+ """
65
74
  return pulumi.get(self, "delete_version_after")
66
75
 
67
76
  @delete_version_after.setter
@@ -71,6 +80,9 @@ class SecretV2CustomMetadataArgs:
71
80
  @property
72
81
  @pulumi.getter(name="maxVersions")
73
82
  def max_versions(self) -> Optional[pulumi.Input[int]]:
83
+ """
84
+ The number of versions to keep per key.
85
+ """
74
86
  return pulumi.get(self, "max_versions")
75
87
 
76
88
  @max_versions.setter
@@ -42,10 +42,13 @@ class SecretV2CustomMetadata(dict):
42
42
  delete_version_after: Optional[int] = None,
43
43
  max_versions: Optional[int] = None):
44
44
  """
45
+ :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
45
46
  :param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
46
47
  Vault and whose values are the corresponding values. This map can only
47
48
  represent string data, so any non-string values returned from Vault are
48
49
  serialized as JSON.
50
+ :param int delete_version_after: If set, specifies the length of time before a version is deleted.
51
+ :param int max_versions: The number of versions to keep per key.
49
52
  """
50
53
  if cas_required is not None:
51
54
  pulumi.set(__self__, "cas_required", cas_required)
@@ -59,6 +62,9 @@ class SecretV2CustomMetadata(dict):
59
62
  @property
60
63
  @pulumi.getter(name="casRequired")
61
64
  def cas_required(self) -> Optional[bool]:
65
+ """
66
+ If true, all keys will require the cas parameter to be set on all write requests.
67
+ """
62
68
  return pulumi.get(self, "cas_required")
63
69
 
64
70
  @property
@@ -75,11 +81,17 @@ class SecretV2CustomMetadata(dict):
75
81
  @property
76
82
  @pulumi.getter(name="deleteVersionAfter")
77
83
  def delete_version_after(self) -> Optional[int]:
84
+ """
85
+ If set, specifies the length of time before a version is deleted.
86
+ """
78
87
  return pulumi.get(self, "delete_version_after")
79
88
 
80
89
  @property
81
90
  @pulumi.getter(name="maxVersions")
82
91
  def max_versions(self) -> Optional[int]:
92
+ """
93
+ The number of versions to keep per key.
94
+ """
83
95
  return pulumi.get(self, "max_versions")
84
96
 
85
97
 
@@ -453,7 +453,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
453
453
 
454
454
  ## Import
455
455
 
456
- LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
456
+ LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
457
457
 
458
458
  ```sh
459
459
  $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
@@ -534,7 +534,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
534
534
 
535
535
  ## Import
536
536
 
537
- LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
537
+ LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
538
538
 
539
539
  ```sh
540
540
  $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
@@ -276,7 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
276
276
 
277
277
  ## Import
278
278
 
279
- LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
279
+ LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
280
280
 
281
281
  ```sh
282
282
  $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
@@ -327,7 +327,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
327
327
 
328
328
  ## Import
329
329
 
330
- LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
330
+ LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
331
331
 
332
332
  ```sh
333
333
  $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
@@ -53,6 +53,7 @@ class KeysAwArgs:
53
53
  is `ECDSA`. Required if `allow_generate_key` is `true`.
54
54
  :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
55
55
  :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
56
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
56
57
  """
57
58
  pulumi.set(__self__, "access_key", access_key)
58
59
  pulumi.set(__self__, "key_bits", key_bits)
@@ -243,6 +244,9 @@ class KeysAwArgs:
243
244
  @property
244
245
  @pulumi.getter
245
246
  def uuid(self) -> Optional[pulumi.Input[str]]:
247
+ """
248
+ ID of the managed key read from Vault
249
+ """
246
250
  return pulumi.get(self, "uuid")
247
251
 
248
252
  @uuid.setter
@@ -289,6 +293,7 @@ class KeysAzureArgs:
289
293
  :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
290
294
  :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
291
295
  :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
296
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
292
297
  """
293
298
  pulumi.set(__self__, "client_id", client_id)
294
299
  pulumi.set(__self__, "client_secret", client_secret)
@@ -491,6 +496,9 @@ class KeysAzureArgs:
491
496
  @property
492
497
  @pulumi.getter
493
498
  def uuid(self) -> Optional[pulumi.Input[str]]:
499
+ """
500
+ ID of the managed key read from Vault
501
+ """
494
502
  return pulumi.get(self, "uuid")
495
503
 
496
504
  @uuid.setter
@@ -544,6 +552,7 @@ class KeysPkcArgs:
544
552
  :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
545
553
  (e.g. `2305843009213693953`).
546
554
  :param pulumi.Input[str] token_label: The slot token label to use.
555
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
547
556
  """
548
557
  pulumi.set(__self__, "key_id", key_id)
549
558
  pulumi.set(__self__, "key_label", key_label)
@@ -766,6 +775,9 @@ class KeysPkcArgs:
766
775
  @property
767
776
  @pulumi.getter
768
777
  def uuid(self) -> Optional[pulumi.Input[str]]:
778
+ """
779
+ ID of the managed key read from Vault
780
+ """
769
781
  return pulumi.get(self, "uuid")
770
782
 
771
783
  @uuid.setter
@@ -180,6 +180,16 @@ class Keys(pulumi.CustomResource):
180
180
  pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
181
181
  __props__=None):
182
182
  """
183
+ A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
184
+
185
+ **Note** this feature is available only with Vault Enterprise.
186
+
187
+ ## Caveats
188
+
189
+ This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
190
+ There can only be one such resource in the TF state, and if there are already provisioned managed
191
+ keys in Vault, we recommend using `pulumi import` instead.
192
+
183
193
  ## Import
184
194
 
185
195
  Mounts can be imported using the `id` of `default`, e.g.
@@ -205,6 +215,16 @@ class Keys(pulumi.CustomResource):
205
215
  args: Optional[KeysArgs] = None,
206
216
  opts: Optional[pulumi.ResourceOptions] = None):
207
217
  """
218
+ A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
219
+
220
+ **Note** this feature is available only with Vault Enterprise.
221
+
222
+ ## Caveats
223
+
224
+ This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
225
+ There can only be one such resource in the TF state, and if there are already provisioned managed
226
+ keys in Vault, we recommend using `pulumi import` instead.
227
+
208
228
  ## Import
209
229
 
210
230
  Mounts can be imported using the `id` of `default`, e.g.
@@ -86,6 +86,7 @@ class KeysAw(dict):
86
86
  is `ECDSA`. Required if `allow_generate_key` is `true`.
87
87
  :param str endpoint: Used to specify a custom AWS endpoint.
88
88
  :param str region: The AWS region where the keys are stored (or will be stored).
89
+ :param str uuid: ID of the managed key read from Vault
89
90
  """
90
91
  pulumi.set(__self__, "access_key", access_key)
91
92
  pulumi.set(__self__, "key_bits", key_bits)
@@ -224,6 +225,9 @@ class KeysAw(dict):
224
225
  @property
225
226
  @pulumi.getter
226
227
  def uuid(self) -> Optional[str]:
228
+ """
229
+ ID of the managed key read from Vault
230
+ """
227
231
  return pulumi.get(self, "uuid")
228
232
 
229
233
 
@@ -303,6 +307,7 @@ class KeysAzure(dict):
303
307
  :param str environment: The Azure Cloud environment API endpoints to use.
304
308
  :param str key_bits: The size in bits for an RSA key.
305
309
  :param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
310
+ :param str uuid: ID of the managed key read from Vault
306
311
  """
307
312
  pulumi.set(__self__, "client_id", client_id)
308
313
  pulumi.set(__self__, "client_secret", client_secret)
@@ -449,6 +454,9 @@ class KeysAzure(dict):
449
454
  @property
450
455
  @pulumi.getter
451
456
  def uuid(self) -> Optional[str]:
457
+ """
458
+ ID of the managed key read from Vault
459
+ """
452
460
  return pulumi.get(self, "uuid")
453
461
 
454
462
 
@@ -531,6 +539,7 @@ class KeysPkc(dict):
531
539
  :param str slot: The slot number to use, specified as a string in a decimal format
532
540
  (e.g. `2305843009213693953`).
533
541
  :param str token_label: The slot token label to use.
542
+ :param str uuid: ID of the managed key read from Vault
534
543
  """
535
544
  pulumi.set(__self__, "key_id", key_id)
536
545
  pulumi.set(__self__, "key_label", key_label)
@@ -693,6 +702,9 @@ class KeysPkc(dict):
693
702
  @property
694
703
  @pulumi.getter
695
704
  def uuid(self) -> Optional[str]:
705
+ """
706
+ ID of the managed key read from Vault
707
+ """
696
708
  return pulumi.get(self, "uuid")
697
709
 
698
710
 
@@ -443,7 +443,7 @@ class SecretRole(pulumi.CustomResource):
443
443
 
444
444
  ## Import
445
445
 
446
- The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
446
+ The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
447
447
 
448
448
  ```sh
449
449
  $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
@@ -503,7 +503,7 @@ class SecretRole(pulumi.CustomResource):
503
503
 
504
504
  ## Import
505
505
 
506
- The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
506
+ The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
507
507
 
508
508
  ```sh
509
509
  $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
pulumi_vault/namespace.py CHANGED
@@ -206,10 +206,14 @@ class Namespace(pulumi.CustomResource):
206
206
  Namespaces can be imported using its `name` as accessor id
207
207
 
208
208
  ```sh
209
- $ pulumi import vault:index/namespace:Namespace example <name>
209
+ $ pulumi import vault:index/namespace:Namespace example <name>
210
210
  ```
211
211
 
212
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path. hcl provider "vault" {
212
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
213
+
214
+ hcl
215
+
216
+ provider "vault" {
213
217
 
214
218
  # Configuration options
215
219
 
@@ -217,19 +221,29 @@ class Namespace(pulumi.CustomResource):
217
221
 
218
222
  alias
219
223
 
220
- = "example" } resource "vault_namespace" "example2" {
224
+ = "example"
225
+
226
+ }
227
+
228
+ resource "vault_namespace" "example2" {
221
229
 
222
230
  provider = vault.example
223
231
 
224
232
  path
225
233
 
226
- = "example2" }
234
+ = "example2"
235
+
236
+ }
227
237
 
228
238
  ```sh
229
- $ pulumi import vault:index/namespace:Namespace example2 example2
239
+ $ pulumi import vault:index/namespace:Namespace example2 example2
230
240
  ```
231
241
 
232
- $ terraform state show vault_namespace.example2 vault_namespace.example2resource "vault_namespace" "example2" {
242
+ $ terraform state show vault_namespace.example2
243
+
244
+ vault_namespace.example2:
245
+
246
+ resource "vault_namespace" "example2" {
233
247
 
234
248
  id
235
249
 
@@ -243,7 +257,9 @@ class Namespace(pulumi.CustomResource):
243
257
 
244
258
  path_fq
245
259
 
246
- = "example2" }
260
+ = "example2"
261
+
262
+ }
247
263
 
248
264
  :param str resource_name: The name of the resource.
249
265
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -269,10 +285,14 @@ class Namespace(pulumi.CustomResource):
269
285
  Namespaces can be imported using its `name` as accessor id
270
286
 
271
287
  ```sh
272
- $ pulumi import vault:index/namespace:Namespace example <name>
288
+ $ pulumi import vault:index/namespace:Namespace example <name>
273
289
  ```
274
290
 
275
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path. hcl provider "vault" {
291
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
292
+
293
+ hcl
294
+
295
+ provider "vault" {
276
296
 
277
297
  # Configuration options
278
298
 
@@ -280,19 +300,29 @@ class Namespace(pulumi.CustomResource):
280
300
 
281
301
  alias
282
302
 
283
- = "example" } resource "vault_namespace" "example2" {
303
+ = "example"
304
+
305
+ }
306
+
307
+ resource "vault_namespace" "example2" {
284
308
 
285
309
  provider = vault.example
286
310
 
287
311
  path
288
312
 
289
- = "example2" }
313
+ = "example2"
314
+
315
+ }
290
316
 
291
317
  ```sh
292
- $ pulumi import vault:index/namespace:Namespace example2 example2
318
+ $ pulumi import vault:index/namespace:Namespace example2 example2
293
319
  ```
294
320
 
295
- $ terraform state show vault_namespace.example2 vault_namespace.example2resource "vault_namespace" "example2" {
321
+ $ terraform state show vault_namespace.example2
322
+
323
+ vault_namespace.example2:
324
+
325
+ resource "vault_namespace" "example2" {
296
326
 
297
327
  id
298
328
 
@@ -306,7 +336,9 @@ class Namespace(pulumi.CustomResource):
306
336
 
307
337
  path_fq
308
338
 
309
- = "example2" }
339
+ = "example2"
340
+
341
+ }
310
342
 
311
343
  :param str resource_name: The name of the resource.
312
344
  :param NamespaceArgs args: The arguments to use to populate this resource's properties.
@@ -185,9 +185,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
185
185
  namespace: Optional[pulumi.Input[str]] = None,
186
186
  __props__=None):
187
187
  """
188
- Allows setting the value of the default issuer. For more information, see the
189
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
190
-
191
188
  ## Example Usage
192
189
 
193
190
  ```python
@@ -241,9 +238,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
241
238
  args: SecretBackendConfigIssuersArgs,
242
239
  opts: Optional[pulumi.ResourceOptions] = None):
243
240
  """
244
- Allows setting the value of the default issuer. For more information, see the
245
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
246
-
247
241
  ## Example Usage
248
242
 
249
243
  ```python
@@ -484,11 +484,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
484
484
  usage: Optional[pulumi.Input[str]] = None,
485
485
  __props__=None):
486
486
  """
487
- Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
488
- create issuers. It instead tracks and performs updates made to an existing issuer that was
489
- created by one of the PKI generate endpoints. For more information, see the
490
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
491
-
492
487
  ## Example Usage
493
488
 
494
489
  ```python
@@ -551,11 +546,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
551
546
  args: SecretBackendIssuerArgs,
552
547
  opts: Optional[pulumi.ResourceOptions] = None):
553
548
  """
554
- Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
555
- create issuers. It instead tracks and performs updates made to an existing issuer that was
556
- created by one of the PKI generate endpoints. For more information, see the
557
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
558
-
559
549
  ## Example Usage
560
550
 
561
551
  ```python