pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/azure/backend_role.py +111 -0
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +536 -0
- pulumi_vault/database/outputs.py +483 -3
- pulumi_vault/gcp/_inputs.py +162 -4
- pulumi_vault/gcp/auth_backend.py +64 -3
- pulumi_vault/gcp/outputs.py +161 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/auth_backend_config.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +54 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -36,7 +36,7 @@ class AuthBackendConfigArgs:
|
|
36
36
|
The `namespace` is always relative to the provider's configured namespace.
|
37
37
|
*Available only for Vault Enterprise*.
|
38
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
39
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
39
|
+
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
40
40
|
"""
|
41
41
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
42
42
|
if backend is not None:
|
@@ -159,7 +159,7 @@ class AuthBackendConfigArgs:
|
|
159
159
|
@pulumi.getter(name="tokenReviewerJwt")
|
160
160
|
def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
|
161
161
|
"""
|
162
|
-
A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
162
|
+
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
163
163
|
"""
|
164
164
|
return pulumi.get(self, "token_reviewer_jwt")
|
165
165
|
|
@@ -193,7 +193,7 @@ class _AuthBackendConfigState:
|
|
193
193
|
The `namespace` is always relative to the provider's configured namespace.
|
194
194
|
*Available only for Vault Enterprise*.
|
195
195
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
196
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
196
|
+
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
197
197
|
"""
|
198
198
|
if backend is not None:
|
199
199
|
pulumi.set(__self__, "backend", backend)
|
@@ -317,7 +317,7 @@ class _AuthBackendConfigState:
|
|
317
317
|
@pulumi.getter(name="tokenReviewerJwt")
|
318
318
|
def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
|
319
319
|
"""
|
320
|
-
A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
320
|
+
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
321
321
|
"""
|
322
322
|
return pulumi.get(self, "token_reviewer_jwt")
|
323
323
|
|
@@ -385,7 +385,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
385
385
|
The `namespace` is always relative to the provider's configured namespace.
|
386
386
|
*Available only for Vault Enterprise*.
|
387
387
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
388
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
388
|
+
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
389
389
|
"""
|
390
390
|
...
|
391
391
|
@overload
|
@@ -507,7 +507,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
507
507
|
The `namespace` is always relative to the provider's configured namespace.
|
508
508
|
*Available only for Vault Enterprise*.
|
509
509
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
510
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
510
|
+
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
511
511
|
"""
|
512
512
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
513
513
|
|
@@ -595,7 +595,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
595
595
|
@pulumi.getter(name="tokenReviewerJwt")
|
596
596
|
def token_reviewer_jwt(self) -> pulumi.Output[Optional[str]]:
|
597
597
|
"""
|
598
|
-
A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
598
|
+
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
599
599
|
"""
|
600
600
|
return pulumi.get(self, "token_reviewer_jwt")
|
601
601
|
|
@@ -633,10 +633,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
633
633
|
|
634
634
|
## Import
|
635
635
|
|
636
|
-
The Kubernetes secret backend role can be imported using the full path to the role
|
636
|
+
The Kubernetes secret backend role can be imported using the full path to the role
|
637
|
+
|
638
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
637
639
|
|
638
640
|
```sh
|
639
|
-
|
641
|
+
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
640
642
|
```
|
641
643
|
|
642
644
|
:param str resource_name: The name of the resource.
|
@@ -777,10 +779,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
777
779
|
|
778
780
|
## Import
|
779
781
|
|
780
|
-
The Kubernetes secret backend role can be imported using the full path to the role
|
782
|
+
The Kubernetes secret backend role can be imported using the full path to the role
|
783
|
+
|
784
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
781
785
|
|
782
786
|
```sh
|
783
|
-
|
787
|
+
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
784
788
|
```
|
785
789
|
|
786
790
|
:param str resource_name: The name of the resource.
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -21,10 +21,13 @@ class SecretV2CustomMetadataArgs:
|
|
21
21
|
delete_version_after: Optional[pulumi.Input[int]] = None,
|
22
22
|
max_versions: Optional[pulumi.Input[int]] = None):
|
23
23
|
"""
|
24
|
+
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
24
25
|
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
25
26
|
Vault and whose values are the corresponding values. This map can only
|
26
27
|
represent string data, so any non-string values returned from Vault are
|
27
28
|
serialized as JSON.
|
29
|
+
:param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
|
30
|
+
:param pulumi.Input[int] max_versions: The number of versions to keep per key.
|
28
31
|
"""
|
29
32
|
if cas_required is not None:
|
30
33
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -38,6 +41,9 @@ class SecretV2CustomMetadataArgs:
|
|
38
41
|
@property
|
39
42
|
@pulumi.getter(name="casRequired")
|
40
43
|
def cas_required(self) -> Optional[pulumi.Input[bool]]:
|
44
|
+
"""
|
45
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
46
|
+
"""
|
41
47
|
return pulumi.get(self, "cas_required")
|
42
48
|
|
43
49
|
@cas_required.setter
|
@@ -62,6 +68,9 @@ class SecretV2CustomMetadataArgs:
|
|
62
68
|
@property
|
63
69
|
@pulumi.getter(name="deleteVersionAfter")
|
64
70
|
def delete_version_after(self) -> Optional[pulumi.Input[int]]:
|
71
|
+
"""
|
72
|
+
If set, specifies the length of time before a version is deleted.
|
73
|
+
"""
|
65
74
|
return pulumi.get(self, "delete_version_after")
|
66
75
|
|
67
76
|
@delete_version_after.setter
|
@@ -71,6 +80,9 @@ class SecretV2CustomMetadataArgs:
|
|
71
80
|
@property
|
72
81
|
@pulumi.getter(name="maxVersions")
|
73
82
|
def max_versions(self) -> Optional[pulumi.Input[int]]:
|
83
|
+
"""
|
84
|
+
The number of versions to keep per key.
|
85
|
+
"""
|
74
86
|
return pulumi.get(self, "max_versions")
|
75
87
|
|
76
88
|
@max_versions.setter
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -42,10 +42,13 @@ class SecretV2CustomMetadata(dict):
|
|
42
42
|
delete_version_after: Optional[int] = None,
|
43
43
|
max_versions: Optional[int] = None):
|
44
44
|
"""
|
45
|
+
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
45
46
|
:param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
|
46
47
|
Vault and whose values are the corresponding values. This map can only
|
47
48
|
represent string data, so any non-string values returned from Vault are
|
48
49
|
serialized as JSON.
|
50
|
+
:param int delete_version_after: If set, specifies the length of time before a version is deleted.
|
51
|
+
:param int max_versions: The number of versions to keep per key.
|
49
52
|
"""
|
50
53
|
if cas_required is not None:
|
51
54
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -59,6 +62,9 @@ class SecretV2CustomMetadata(dict):
|
|
59
62
|
@property
|
60
63
|
@pulumi.getter(name="casRequired")
|
61
64
|
def cas_required(self) -> Optional[bool]:
|
65
|
+
"""
|
66
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
67
|
+
"""
|
62
68
|
return pulumi.get(self, "cas_required")
|
63
69
|
|
64
70
|
@property
|
@@ -75,11 +81,17 @@ class SecretV2CustomMetadata(dict):
|
|
75
81
|
@property
|
76
82
|
@pulumi.getter(name="deleteVersionAfter")
|
77
83
|
def delete_version_after(self) -> Optional[int]:
|
84
|
+
"""
|
85
|
+
If set, specifies the length of time before a version is deleted.
|
86
|
+
"""
|
78
87
|
return pulumi.get(self, "delete_version_after")
|
79
88
|
|
80
89
|
@property
|
81
90
|
@pulumi.getter(name="maxVersions")
|
82
91
|
def max_versions(self) -> Optional[int]:
|
92
|
+
"""
|
93
|
+
The number of versions to keep per key.
|
94
|
+
"""
|
83
95
|
return pulumi.get(self, "max_versions")
|
84
96
|
|
85
97
|
|
@@ -453,7 +453,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
453
453
|
|
454
454
|
## Import
|
455
455
|
|
456
|
-
LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
|
456
|
+
LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
|
457
457
|
|
458
458
|
```sh
|
459
459
|
$ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
|
@@ -534,7 +534,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
534
534
|
|
535
535
|
## Import
|
536
536
|
|
537
|
-
LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
|
537
|
+
LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
|
538
538
|
|
539
539
|
```sh
|
540
540
|
$ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
|
@@ -276,7 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
276
276
|
|
277
277
|
## Import
|
278
278
|
|
279
|
-
LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
|
279
|
+
LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
|
280
280
|
|
281
281
|
```sh
|
282
282
|
$ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
|
@@ -327,7 +327,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
327
327
|
|
328
328
|
## Import
|
329
329
|
|
330
|
-
LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
|
330
|
+
LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
|
331
331
|
|
332
332
|
```sh
|
333
333
|
$ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
|
pulumi_vault/managed/_inputs.py
CHANGED
@@ -53,6 +53,7 @@ class KeysAwArgs:
|
|
53
53
|
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
54
54
|
:param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
|
55
55
|
:param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
|
56
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
56
57
|
"""
|
57
58
|
pulumi.set(__self__, "access_key", access_key)
|
58
59
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -243,6 +244,9 @@ class KeysAwArgs:
|
|
243
244
|
@property
|
244
245
|
@pulumi.getter
|
245
246
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
247
|
+
"""
|
248
|
+
ID of the managed key read from Vault
|
249
|
+
"""
|
246
250
|
return pulumi.get(self, "uuid")
|
247
251
|
|
248
252
|
@uuid.setter
|
@@ -289,6 +293,7 @@ class KeysAzureArgs:
|
|
289
293
|
:param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
|
290
294
|
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
291
295
|
:param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
296
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
292
297
|
"""
|
293
298
|
pulumi.set(__self__, "client_id", client_id)
|
294
299
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -491,6 +496,9 @@ class KeysAzureArgs:
|
|
491
496
|
@property
|
492
497
|
@pulumi.getter
|
493
498
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
499
|
+
"""
|
500
|
+
ID of the managed key read from Vault
|
501
|
+
"""
|
494
502
|
return pulumi.get(self, "uuid")
|
495
503
|
|
496
504
|
@uuid.setter
|
@@ -544,6 +552,7 @@ class KeysPkcArgs:
|
|
544
552
|
:param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
|
545
553
|
(e.g. `2305843009213693953`).
|
546
554
|
:param pulumi.Input[str] token_label: The slot token label to use.
|
555
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
547
556
|
"""
|
548
557
|
pulumi.set(__self__, "key_id", key_id)
|
549
558
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -766,6 +775,9 @@ class KeysPkcArgs:
|
|
766
775
|
@property
|
767
776
|
@pulumi.getter
|
768
777
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
778
|
+
"""
|
779
|
+
ID of the managed key read from Vault
|
780
|
+
"""
|
769
781
|
return pulumi.get(self, "uuid")
|
770
782
|
|
771
783
|
@uuid.setter
|
pulumi_vault/managed/keys.py
CHANGED
@@ -180,6 +180,16 @@ class Keys(pulumi.CustomResource):
|
|
180
180
|
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
|
181
181
|
__props__=None):
|
182
182
|
"""
|
183
|
+
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
184
|
+
|
185
|
+
**Note** this feature is available only with Vault Enterprise.
|
186
|
+
|
187
|
+
## Caveats
|
188
|
+
|
189
|
+
This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
|
190
|
+
There can only be one such resource in the TF state, and if there are already provisioned managed
|
191
|
+
keys in Vault, we recommend using `pulumi import` instead.
|
192
|
+
|
183
193
|
## Import
|
184
194
|
|
185
195
|
Mounts can be imported using the `id` of `default`, e.g.
|
@@ -205,6 +215,16 @@ class Keys(pulumi.CustomResource):
|
|
205
215
|
args: Optional[KeysArgs] = None,
|
206
216
|
opts: Optional[pulumi.ResourceOptions] = None):
|
207
217
|
"""
|
218
|
+
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
219
|
+
|
220
|
+
**Note** this feature is available only with Vault Enterprise.
|
221
|
+
|
222
|
+
## Caveats
|
223
|
+
|
224
|
+
This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
|
225
|
+
There can only be one such resource in the TF state, and if there are already provisioned managed
|
226
|
+
keys in Vault, we recommend using `pulumi import` instead.
|
227
|
+
|
208
228
|
## Import
|
209
229
|
|
210
230
|
Mounts can be imported using the `id` of `default`, e.g.
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -86,6 +86,7 @@ class KeysAw(dict):
|
|
86
86
|
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
87
87
|
:param str endpoint: Used to specify a custom AWS endpoint.
|
88
88
|
:param str region: The AWS region where the keys are stored (or will be stored).
|
89
|
+
:param str uuid: ID of the managed key read from Vault
|
89
90
|
"""
|
90
91
|
pulumi.set(__self__, "access_key", access_key)
|
91
92
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -224,6 +225,9 @@ class KeysAw(dict):
|
|
224
225
|
@property
|
225
226
|
@pulumi.getter
|
226
227
|
def uuid(self) -> Optional[str]:
|
228
|
+
"""
|
229
|
+
ID of the managed key read from Vault
|
230
|
+
"""
|
227
231
|
return pulumi.get(self, "uuid")
|
228
232
|
|
229
233
|
|
@@ -303,6 +307,7 @@ class KeysAzure(dict):
|
|
303
307
|
:param str environment: The Azure Cloud environment API endpoints to use.
|
304
308
|
:param str key_bits: The size in bits for an RSA key.
|
305
309
|
:param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
310
|
+
:param str uuid: ID of the managed key read from Vault
|
306
311
|
"""
|
307
312
|
pulumi.set(__self__, "client_id", client_id)
|
308
313
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -449,6 +454,9 @@ class KeysAzure(dict):
|
|
449
454
|
@property
|
450
455
|
@pulumi.getter
|
451
456
|
def uuid(self) -> Optional[str]:
|
457
|
+
"""
|
458
|
+
ID of the managed key read from Vault
|
459
|
+
"""
|
452
460
|
return pulumi.get(self, "uuid")
|
453
461
|
|
454
462
|
|
@@ -531,6 +539,7 @@ class KeysPkc(dict):
|
|
531
539
|
:param str slot: The slot number to use, specified as a string in a decimal format
|
532
540
|
(e.g. `2305843009213693953`).
|
533
541
|
:param str token_label: The slot token label to use.
|
542
|
+
:param str uuid: ID of the managed key read from Vault
|
534
543
|
"""
|
535
544
|
pulumi.set(__self__, "key_id", key_id)
|
536
545
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -693,6 +702,9 @@ class KeysPkc(dict):
|
|
693
702
|
@property
|
694
703
|
@pulumi.getter
|
695
704
|
def uuid(self) -> Optional[str]:
|
705
|
+
"""
|
706
|
+
ID of the managed key read from Vault
|
707
|
+
"""
|
696
708
|
return pulumi.get(self, "uuid")
|
697
709
|
|
698
710
|
|
@@ -443,7 +443,7 @@ class SecretRole(pulumi.CustomResource):
|
|
443
443
|
|
444
444
|
## Import
|
445
445
|
|
446
|
-
The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
|
446
|
+
The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
|
447
447
|
|
448
448
|
```sh
|
449
449
|
$ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
|
@@ -503,7 +503,7 @@ class SecretRole(pulumi.CustomResource):
|
|
503
503
|
|
504
504
|
## Import
|
505
505
|
|
506
|
-
The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
|
506
|
+
The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
|
507
507
|
|
508
508
|
```sh
|
509
509
|
$ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
|
pulumi_vault/namespace.py
CHANGED
@@ -206,10 +206,14 @@ class Namespace(pulumi.CustomResource):
|
|
206
206
|
Namespaces can be imported using its `name` as accessor id
|
207
207
|
|
208
208
|
```sh
|
209
|
-
|
209
|
+
$ pulumi import vault:index/namespace:Namespace example <name>
|
210
210
|
```
|
211
211
|
|
212
|
-
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
212
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
213
|
+
|
214
|
+
hcl
|
215
|
+
|
216
|
+
provider "vault" {
|
213
217
|
|
214
218
|
# Configuration options
|
215
219
|
|
@@ -217,19 +221,29 @@ class Namespace(pulumi.CustomResource):
|
|
217
221
|
|
218
222
|
alias
|
219
223
|
|
220
|
-
= "example"
|
224
|
+
= "example"
|
225
|
+
|
226
|
+
}
|
227
|
+
|
228
|
+
resource "vault_namespace" "example2" {
|
221
229
|
|
222
230
|
provider = vault.example
|
223
231
|
|
224
232
|
path
|
225
233
|
|
226
|
-
= "example2"
|
234
|
+
= "example2"
|
235
|
+
|
236
|
+
}
|
227
237
|
|
228
238
|
```sh
|
229
|
-
|
239
|
+
$ pulumi import vault:index/namespace:Namespace example2 example2
|
230
240
|
```
|
231
241
|
|
232
|
-
$ terraform state show vault_namespace.example2
|
242
|
+
$ terraform state show vault_namespace.example2
|
243
|
+
|
244
|
+
vault_namespace.example2:
|
245
|
+
|
246
|
+
resource "vault_namespace" "example2" {
|
233
247
|
|
234
248
|
id
|
235
249
|
|
@@ -243,7 +257,9 @@ class Namespace(pulumi.CustomResource):
|
|
243
257
|
|
244
258
|
path_fq
|
245
259
|
|
246
|
-
= "example2"
|
260
|
+
= "example2"
|
261
|
+
|
262
|
+
}
|
247
263
|
|
248
264
|
:param str resource_name: The name of the resource.
|
249
265
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -269,10 +285,14 @@ class Namespace(pulumi.CustomResource):
|
|
269
285
|
Namespaces can be imported using its `name` as accessor id
|
270
286
|
|
271
287
|
```sh
|
272
|
-
|
288
|
+
$ pulumi import vault:index/namespace:Namespace example <name>
|
273
289
|
```
|
274
290
|
|
275
|
-
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
291
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
292
|
+
|
293
|
+
hcl
|
294
|
+
|
295
|
+
provider "vault" {
|
276
296
|
|
277
297
|
# Configuration options
|
278
298
|
|
@@ -280,19 +300,29 @@ class Namespace(pulumi.CustomResource):
|
|
280
300
|
|
281
301
|
alias
|
282
302
|
|
283
|
-
= "example"
|
303
|
+
= "example"
|
304
|
+
|
305
|
+
}
|
306
|
+
|
307
|
+
resource "vault_namespace" "example2" {
|
284
308
|
|
285
309
|
provider = vault.example
|
286
310
|
|
287
311
|
path
|
288
312
|
|
289
|
-
= "example2"
|
313
|
+
= "example2"
|
314
|
+
|
315
|
+
}
|
290
316
|
|
291
317
|
```sh
|
292
|
-
|
318
|
+
$ pulumi import vault:index/namespace:Namespace example2 example2
|
293
319
|
```
|
294
320
|
|
295
|
-
$ terraform state show vault_namespace.example2
|
321
|
+
$ terraform state show vault_namespace.example2
|
322
|
+
|
323
|
+
vault_namespace.example2:
|
324
|
+
|
325
|
+
resource "vault_namespace" "example2" {
|
296
326
|
|
297
327
|
id
|
298
328
|
|
@@ -306,7 +336,9 @@ class Namespace(pulumi.CustomResource):
|
|
306
336
|
|
307
337
|
path_fq
|
308
338
|
|
309
|
-
= "example2"
|
339
|
+
= "example2"
|
340
|
+
|
341
|
+
}
|
310
342
|
|
311
343
|
:param str resource_name: The name of the resource.
|
312
344
|
:param NamespaceArgs args: The arguments to use to populate this resource's properties.
|
@@ -185,9 +185,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
185
185
|
namespace: Optional[pulumi.Input[str]] = None,
|
186
186
|
__props__=None):
|
187
187
|
"""
|
188
|
-
Allows setting the value of the default issuer. For more information, see the
|
189
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
|
190
|
-
|
191
188
|
## Example Usage
|
192
189
|
|
193
190
|
```python
|
@@ -241,9 +238,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
241
238
|
args: SecretBackendConfigIssuersArgs,
|
242
239
|
opts: Optional[pulumi.ResourceOptions] = None):
|
243
240
|
"""
|
244
|
-
Allows setting the value of the default issuer. For more information, see the
|
245
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
|
246
|
-
|
247
241
|
## Example Usage
|
248
242
|
|
249
243
|
```python
|
@@ -484,11 +484,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
484
484
|
usage: Optional[pulumi.Input[str]] = None,
|
485
485
|
__props__=None):
|
486
486
|
"""
|
487
|
-
Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
|
488
|
-
create issuers. It instead tracks and performs updates made to an existing issuer that was
|
489
|
-
created by one of the PKI generate endpoints. For more information, see the
|
490
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
|
491
|
-
|
492
487
|
## Example Usage
|
493
488
|
|
494
489
|
```python
|
@@ -551,11 +546,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
551
546
|
args: SecretBackendIssuerArgs,
|
552
547
|
opts: Optional[pulumi.ResourceOptions] = None):
|
553
548
|
"""
|
554
|
-
Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
|
555
|
-
create issuers. It instead tracks and performs updates made to an existing issuer that was
|
556
|
-
created by one of the PKI generate endpoints. For more information, see the
|
557
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
|
558
|
-
|
559
549
|
## Example Usage
|
560
550
|
|
561
551
|
```python
|