pulumi-vault 5.19.0a1705621752__py3-none-any.whl → 5.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. pulumi_vault/__init__.py +59 -0
  2. pulumi_vault/_inputs.py +380 -0
  3. pulumi_vault/_utilities.py +2 -2
  4. pulumi_vault/aws/secret_backend.py +188 -0
  5. pulumi_vault/aws/secret_backend_static_role.py +2 -2
  6. pulumi_vault/azure/backend.py +7 -21
  7. pulumi_vault/config/__init__.pyi +0 -3
  8. pulumi_vault/config/outputs.py +380 -0
  9. pulumi_vault/config/vars.py +0 -3
  10. pulumi_vault/consul/secret_backend.py +7 -35
  11. pulumi_vault/database/_inputs.py +176 -0
  12. pulumi_vault/database/outputs.py +168 -0
  13. pulumi_vault/get_raft_autopilot_state.py +0 -12
  14. pulumi_vault/identity/group_alias.py +6 -6
  15. pulumi_vault/kubernetes/secret_backend_role.py +8 -4
  16. pulumi_vault/kv/_inputs.py +12 -0
  17. pulumi_vault/kv/outputs.py +12 -0
  18. pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
  19. pulumi_vault/ldap/secret_backend_static_role.py +2 -2
  20. pulumi_vault/managed/_inputs.py +12 -0
  21. pulumi_vault/managed/keys.py +20 -0
  22. pulumi_vault/managed/outputs.py +12 -0
  23. pulumi_vault/mongodbatlas/secret_role.py +2 -2
  24. pulumi_vault/namespace.py +46 -14
  25. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
  26. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
  27. pulumi_vault/pkisecret/secret_backend_role.py +7 -7
  28. pulumi_vault/rabbitmq/_inputs.py +36 -0
  29. pulumi_vault/rabbitmq/outputs.py +36 -0
  30. pulumi_vault/saml/auth_backend_role.py +7 -14
  31. pulumi_vault/secrets/__init__.py +14 -0
  32. pulumi_vault/secrets/sync_association.py +464 -0
  33. pulumi_vault/secrets/sync_aws_destination.py +564 -0
  34. pulumi_vault/secrets/sync_azure_destination.py +674 -0
  35. pulumi_vault/secrets/sync_config.py +297 -0
  36. pulumi_vault/secrets/sync_gcp_destination.py +438 -0
  37. pulumi_vault/secrets/sync_gh_destination.py +511 -0
  38. pulumi_vault/secrets/sync_vercel_destination.py +541 -0
  39. pulumi_vault/ssh/secret_backend_role.py +7 -14
  40. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
  41. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +43 -35
  42. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
  43. {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -199,16 +199,16 @@ class GroupAlias(pulumi.CustomResource):
199
199
 
200
200
  ## Import
201
201
 
202
- The group alias can be imported with the group alias `id`, for example
202
+ The group alias can be imported with the group alias `id`, for example:
203
203
 
204
204
  ```sh
205
- $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
205
+ $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
206
206
  ```
207
207
 
208
208
  Group aliases can also be imported using the UUID of the alias record, e.g.
209
209
 
210
210
  ```sh
211
- $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
211
+ $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
212
212
  ```
213
213
 
214
214
  :param str resource_name: The name of the resource.
@@ -252,16 +252,16 @@ class GroupAlias(pulumi.CustomResource):
252
252
 
253
253
  ## Import
254
254
 
255
- The group alias can be imported with the group alias `id`, for example
255
+ The group alias can be imported with the group alias `id`, for example:
256
256
 
257
257
  ```sh
258
- $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
258
+ $ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
259
259
  ```
260
260
 
261
261
  Group aliases can also be imported using the UUID of the alias record, e.g.
262
262
 
263
263
  ```sh
264
- $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
264
+ $ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
265
265
  ```
266
266
 
267
267
  :param str resource_name: The name of the resource.
@@ -633,10 +633,12 @@ class SecretBackendRole(pulumi.CustomResource):
633
633
 
634
634
  ## Import
635
635
 
636
- The Kubernetes secret backend role can be imported using the full path to the role of the form`<backend_path>/roles/<role_name>` e.g.
636
+ The Kubernetes secret backend role can be imported using the full path to the role
637
+
638
+ of the form: `<backend_path>/roles/<role_name>` e.g.
637
639
 
638
640
  ```sh
639
- $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
641
+ $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
640
642
  ```
641
643
 
642
644
  :param str resource_name: The name of the resource.
@@ -777,10 +779,12 @@ class SecretBackendRole(pulumi.CustomResource):
777
779
 
778
780
  ## Import
779
781
 
780
- The Kubernetes secret backend role can be imported using the full path to the role of the form`<backend_path>/roles/<role_name>` e.g.
782
+ The Kubernetes secret backend role can be imported using the full path to the role
783
+
784
+ of the form: `<backend_path>/roles/<role_name>` e.g.
781
785
 
782
786
  ```sh
783
- $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
787
+ $ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
784
788
  ```
785
789
 
786
790
  :param str resource_name: The name of the resource.
@@ -21,10 +21,13 @@ class SecretV2CustomMetadataArgs:
21
21
  delete_version_after: Optional[pulumi.Input[int]] = None,
22
22
  max_versions: Optional[pulumi.Input[int]] = None):
23
23
  """
24
+ :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
24
25
  :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
25
26
  Vault and whose values are the corresponding values. This map can only
26
27
  represent string data, so any non-string values returned from Vault are
27
28
  serialized as JSON.
29
+ :param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
30
+ :param pulumi.Input[int] max_versions: The number of versions to keep per key.
28
31
  """
29
32
  if cas_required is not None:
30
33
  pulumi.set(__self__, "cas_required", cas_required)
@@ -38,6 +41,9 @@ class SecretV2CustomMetadataArgs:
38
41
  @property
39
42
  @pulumi.getter(name="casRequired")
40
43
  def cas_required(self) -> Optional[pulumi.Input[bool]]:
44
+ """
45
+ If true, all keys will require the cas parameter to be set on all write requests.
46
+ """
41
47
  return pulumi.get(self, "cas_required")
42
48
 
43
49
  @cas_required.setter
@@ -62,6 +68,9 @@ class SecretV2CustomMetadataArgs:
62
68
  @property
63
69
  @pulumi.getter(name="deleteVersionAfter")
64
70
  def delete_version_after(self) -> Optional[pulumi.Input[int]]:
71
+ """
72
+ If set, specifies the length of time before a version is deleted.
73
+ """
65
74
  return pulumi.get(self, "delete_version_after")
66
75
 
67
76
  @delete_version_after.setter
@@ -71,6 +80,9 @@ class SecretV2CustomMetadataArgs:
71
80
  @property
72
81
  @pulumi.getter(name="maxVersions")
73
82
  def max_versions(self) -> Optional[pulumi.Input[int]]:
83
+ """
84
+ The number of versions to keep per key.
85
+ """
74
86
  return pulumi.get(self, "max_versions")
75
87
 
76
88
  @max_versions.setter
@@ -42,10 +42,13 @@ class SecretV2CustomMetadata(dict):
42
42
  delete_version_after: Optional[int] = None,
43
43
  max_versions: Optional[int] = None):
44
44
  """
45
+ :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
45
46
  :param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
46
47
  Vault and whose values are the corresponding values. This map can only
47
48
  represent string data, so any non-string values returned from Vault are
48
49
  serialized as JSON.
50
+ :param int delete_version_after: If set, specifies the length of time before a version is deleted.
51
+ :param int max_versions: The number of versions to keep per key.
49
52
  """
50
53
  if cas_required is not None:
51
54
  pulumi.set(__self__, "cas_required", cas_required)
@@ -59,6 +62,9 @@ class SecretV2CustomMetadata(dict):
59
62
  @property
60
63
  @pulumi.getter(name="casRequired")
61
64
  def cas_required(self) -> Optional[bool]:
65
+ """
66
+ If true, all keys will require the cas parameter to be set on all write requests.
67
+ """
62
68
  return pulumi.get(self, "cas_required")
63
69
 
64
70
  @property
@@ -75,11 +81,17 @@ class SecretV2CustomMetadata(dict):
75
81
  @property
76
82
  @pulumi.getter(name="deleteVersionAfter")
77
83
  def delete_version_after(self) -> Optional[int]:
84
+ """
85
+ If set, specifies the length of time before a version is deleted.
86
+ """
78
87
  return pulumi.get(self, "delete_version_after")
79
88
 
80
89
  @property
81
90
  @pulumi.getter(name="maxVersions")
82
91
  def max_versions(self) -> Optional[int]:
92
+ """
93
+ The number of versions to keep per key.
94
+ """
83
95
  return pulumi.get(self, "max_versions")
84
96
 
85
97
 
@@ -453,7 +453,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
453
453
 
454
454
  ## Import
455
455
 
456
- LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
456
+ LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
457
457
 
458
458
  ```sh
459
459
  $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
@@ -534,7 +534,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
534
534
 
535
535
  ## Import
536
536
 
537
- LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
537
+ LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
538
538
 
539
539
  ```sh
540
540
  $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
@@ -276,7 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
276
276
 
277
277
  ## Import
278
278
 
279
- LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
279
+ LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
280
280
 
281
281
  ```sh
282
282
  $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
@@ -327,7 +327,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
327
327
 
328
328
  ## Import
329
329
 
330
- LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
330
+ LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
331
331
 
332
332
  ```sh
333
333
  $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
@@ -53,6 +53,7 @@ class KeysAwArgs:
53
53
  is `ECDSA`. Required if `allow_generate_key` is `true`.
54
54
  :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
55
55
  :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
56
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
56
57
  """
57
58
  pulumi.set(__self__, "access_key", access_key)
58
59
  pulumi.set(__self__, "key_bits", key_bits)
@@ -243,6 +244,9 @@ class KeysAwArgs:
243
244
  @property
244
245
  @pulumi.getter
245
246
  def uuid(self) -> Optional[pulumi.Input[str]]:
247
+ """
248
+ ID of the managed key read from Vault
249
+ """
246
250
  return pulumi.get(self, "uuid")
247
251
 
248
252
  @uuid.setter
@@ -289,6 +293,7 @@ class KeysAzureArgs:
289
293
  :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
290
294
  :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
291
295
  :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
296
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
292
297
  """
293
298
  pulumi.set(__self__, "client_id", client_id)
294
299
  pulumi.set(__self__, "client_secret", client_secret)
@@ -491,6 +496,9 @@ class KeysAzureArgs:
491
496
  @property
492
497
  @pulumi.getter
493
498
  def uuid(self) -> Optional[pulumi.Input[str]]:
499
+ """
500
+ ID of the managed key read from Vault
501
+ """
494
502
  return pulumi.get(self, "uuid")
495
503
 
496
504
  @uuid.setter
@@ -544,6 +552,7 @@ class KeysPkcArgs:
544
552
  :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
545
553
  (e.g. `2305843009213693953`).
546
554
  :param pulumi.Input[str] token_label: The slot token label to use.
555
+ :param pulumi.Input[str] uuid: ID of the managed key read from Vault
547
556
  """
548
557
  pulumi.set(__self__, "key_id", key_id)
549
558
  pulumi.set(__self__, "key_label", key_label)
@@ -766,6 +775,9 @@ class KeysPkcArgs:
766
775
  @property
767
776
  @pulumi.getter
768
777
  def uuid(self) -> Optional[pulumi.Input[str]]:
778
+ """
779
+ ID of the managed key read from Vault
780
+ """
769
781
  return pulumi.get(self, "uuid")
770
782
 
771
783
  @uuid.setter
@@ -180,6 +180,16 @@ class Keys(pulumi.CustomResource):
180
180
  pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
181
181
  __props__=None):
182
182
  """
183
+ A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
184
+
185
+ **Note** this feature is available only with Vault Enterprise.
186
+
187
+ ## Caveats
188
+
189
+ This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
190
+ There can only be one such resource in the TF state, and if there are already provisioned managed
191
+ keys in Vault, we recommend using `pulumi import` instead.
192
+
183
193
  ## Import
184
194
 
185
195
  Mounts can be imported using the `id` of `default`, e.g.
@@ -205,6 +215,16 @@ class Keys(pulumi.CustomResource):
205
215
  args: Optional[KeysArgs] = None,
206
216
  opts: Optional[pulumi.ResourceOptions] = None):
207
217
  """
218
+ A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
219
+
220
+ **Note** this feature is available only with Vault Enterprise.
221
+
222
+ ## Caveats
223
+
224
+ This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
225
+ There can only be one such resource in the TF state, and if there are already provisioned managed
226
+ keys in Vault, we recommend using `pulumi import` instead.
227
+
208
228
  ## Import
209
229
 
210
230
  Mounts can be imported using the `id` of `default`, e.g.
@@ -86,6 +86,7 @@ class KeysAw(dict):
86
86
  is `ECDSA`. Required if `allow_generate_key` is `true`.
87
87
  :param str endpoint: Used to specify a custom AWS endpoint.
88
88
  :param str region: The AWS region where the keys are stored (or will be stored).
89
+ :param str uuid: ID of the managed key read from Vault
89
90
  """
90
91
  pulumi.set(__self__, "access_key", access_key)
91
92
  pulumi.set(__self__, "key_bits", key_bits)
@@ -224,6 +225,9 @@ class KeysAw(dict):
224
225
  @property
225
226
  @pulumi.getter
226
227
  def uuid(self) -> Optional[str]:
228
+ """
229
+ ID of the managed key read from Vault
230
+ """
227
231
  return pulumi.get(self, "uuid")
228
232
 
229
233
 
@@ -303,6 +307,7 @@ class KeysAzure(dict):
303
307
  :param str environment: The Azure Cloud environment API endpoints to use.
304
308
  :param str key_bits: The size in bits for an RSA key.
305
309
  :param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
310
+ :param str uuid: ID of the managed key read from Vault
306
311
  """
307
312
  pulumi.set(__self__, "client_id", client_id)
308
313
  pulumi.set(__self__, "client_secret", client_secret)
@@ -449,6 +454,9 @@ class KeysAzure(dict):
449
454
  @property
450
455
  @pulumi.getter
451
456
  def uuid(self) -> Optional[str]:
457
+ """
458
+ ID of the managed key read from Vault
459
+ """
452
460
  return pulumi.get(self, "uuid")
453
461
 
454
462
 
@@ -531,6 +539,7 @@ class KeysPkc(dict):
531
539
  :param str slot: The slot number to use, specified as a string in a decimal format
532
540
  (e.g. `2305843009213693953`).
533
541
  :param str token_label: The slot token label to use.
542
+ :param str uuid: ID of the managed key read from Vault
534
543
  """
535
544
  pulumi.set(__self__, "key_id", key_id)
536
545
  pulumi.set(__self__, "key_label", key_label)
@@ -693,6 +702,9 @@ class KeysPkc(dict):
693
702
  @property
694
703
  @pulumi.getter
695
704
  def uuid(self) -> Optional[str]:
705
+ """
706
+ ID of the managed key read from Vault
707
+ """
696
708
  return pulumi.get(self, "uuid")
697
709
 
698
710
 
@@ -443,7 +443,7 @@ class SecretRole(pulumi.CustomResource):
443
443
 
444
444
  ## Import
445
445
 
446
- The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
446
+ The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
447
447
 
448
448
  ```sh
449
449
  $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
@@ -503,7 +503,7 @@ class SecretRole(pulumi.CustomResource):
503
503
 
504
504
  ## Import
505
505
 
506
- The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
506
+ The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
507
507
 
508
508
  ```sh
509
509
  $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
pulumi_vault/namespace.py CHANGED
@@ -206,10 +206,14 @@ class Namespace(pulumi.CustomResource):
206
206
  Namespaces can be imported using its `name` as accessor id
207
207
 
208
208
  ```sh
209
- $ pulumi import vault:index/namespace:Namespace example <name>
209
+ $ pulumi import vault:index/namespace:Namespace example <name>
210
210
  ```
211
211
 
212
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path. hcl provider "vault" {
212
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
213
+
214
+ hcl
215
+
216
+ provider "vault" {
213
217
 
214
218
  # Configuration options
215
219
 
@@ -217,19 +221,29 @@ class Namespace(pulumi.CustomResource):
217
221
 
218
222
  alias
219
223
 
220
- = "example" } resource "vault_namespace" "example2" {
224
+ = "example"
225
+
226
+ }
227
+
228
+ resource "vault_namespace" "example2" {
221
229
 
222
230
  provider = vault.example
223
231
 
224
232
  path
225
233
 
226
- = "example2" }
234
+ = "example2"
235
+
236
+ }
227
237
 
228
238
  ```sh
229
- $ pulumi import vault:index/namespace:Namespace example2 example2
239
+ $ pulumi import vault:index/namespace:Namespace example2 example2
230
240
  ```
231
241
 
232
- $ terraform state show vault_namespace.example2 vault_namespace.example2resource "vault_namespace" "example2" {
242
+ $ terraform state show vault_namespace.example2
243
+
244
+ vault_namespace.example2:
245
+
246
+ resource "vault_namespace" "example2" {
233
247
 
234
248
  id
235
249
 
@@ -243,7 +257,9 @@ class Namespace(pulumi.CustomResource):
243
257
 
244
258
  path_fq
245
259
 
246
- = "example2" }
260
+ = "example2"
261
+
262
+ }
247
263
 
248
264
  :param str resource_name: The name of the resource.
249
265
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -269,10 +285,14 @@ class Namespace(pulumi.CustomResource):
269
285
  Namespaces can be imported using its `name` as accessor id
270
286
 
271
287
  ```sh
272
- $ pulumi import vault:index/namespace:Namespace example <name>
288
+ $ pulumi import vault:index/namespace:Namespace example <name>
273
289
  ```
274
290
 
275
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path. hcl provider "vault" {
291
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
292
+
293
+ hcl
294
+
295
+ provider "vault" {
276
296
 
277
297
  # Configuration options
278
298
 
@@ -280,19 +300,29 @@ class Namespace(pulumi.CustomResource):
280
300
 
281
301
  alias
282
302
 
283
- = "example" } resource "vault_namespace" "example2" {
303
+ = "example"
304
+
305
+ }
306
+
307
+ resource "vault_namespace" "example2" {
284
308
 
285
309
  provider = vault.example
286
310
 
287
311
  path
288
312
 
289
- = "example2" }
313
+ = "example2"
314
+
315
+ }
290
316
 
291
317
  ```sh
292
- $ pulumi import vault:index/namespace:Namespace example2 example2
318
+ $ pulumi import vault:index/namespace:Namespace example2 example2
293
319
  ```
294
320
 
295
- $ terraform state show vault_namespace.example2 vault_namespace.example2resource "vault_namespace" "example2" {
321
+ $ terraform state show vault_namespace.example2
322
+
323
+ vault_namespace.example2:
324
+
325
+ resource "vault_namespace" "example2" {
296
326
 
297
327
  id
298
328
 
@@ -306,7 +336,9 @@ class Namespace(pulumi.CustomResource):
306
336
 
307
337
  path_fq
308
338
 
309
- = "example2" }
339
+ = "example2"
340
+
341
+ }
310
342
 
311
343
  :param str resource_name: The name of the resource.
312
344
  :param NamespaceArgs args: The arguments to use to populate this resource's properties.
@@ -185,9 +185,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
185
185
  namespace: Optional[pulumi.Input[str]] = None,
186
186
  __props__=None):
187
187
  """
188
- Allows setting the value of the default issuer. For more information, see the
189
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
190
-
191
188
  ## Example Usage
192
189
 
193
190
  ```python
@@ -241,9 +238,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
241
238
  args: SecretBackendConfigIssuersArgs,
242
239
  opts: Optional[pulumi.ResourceOptions] = None):
243
240
  """
244
- Allows setting the value of the default issuer. For more information, see the
245
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
246
-
247
241
  ## Example Usage
248
242
 
249
243
  ```python
@@ -484,11 +484,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
484
484
  usage: Optional[pulumi.Input[str]] = None,
485
485
  __props__=None):
486
486
  """
487
- Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
488
- create issuers. It instead tracks and performs updates made to an existing issuer that was
489
- created by one of the PKI generate endpoints. For more information, see the
490
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
491
-
492
487
  ## Example Usage
493
488
 
494
489
  ```python
@@ -551,11 +546,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
551
546
  args: SecretBackendIssuerArgs,
552
547
  opts: Optional[pulumi.ResourceOptions] = None):
553
548
  """
554
- Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
555
- create issuers. It instead tracks and performs updates made to an existing issuer that was
556
- created by one of the PKI generate endpoints. For more information, see the
557
- [Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
558
-
559
549
  ## Example Usage
560
550
 
561
551
  ```python
@@ -106,7 +106,7 @@ class SecretBackendRoleArgs:
106
106
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
107
  *Available only for Vault Enterprise*.
108
108
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
109
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
109
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
110
110
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
111
111
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
112
112
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -621,7 +621,7 @@ class SecretBackendRoleArgs:
621
621
  @pulumi.getter(name="notBeforeDuration")
622
622
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
623
623
  """
624
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
624
+ Specifies the duration by which to backdate the NotBefore property.
625
625
  """
626
626
  return pulumi.get(self, "not_before_duration")
627
627
 
@@ -867,7 +867,7 @@ class _SecretBackendRoleState:
867
867
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
868
868
  *Available only for Vault Enterprise*.
869
869
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
870
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
870
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
871
871
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
872
872
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
873
873
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -1383,7 +1383,7 @@ class _SecretBackendRoleState:
1383
1383
  @pulumi.getter(name="notBeforeDuration")
1384
1384
  def not_before_duration(self) -> Optional[pulumi.Input[str]]:
1385
1385
  """
1386
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1386
+ Specifies the duration by which to backdate the NotBefore property.
1387
1387
  """
1388
1388
  return pulumi.get(self, "not_before_duration")
1389
1389
 
@@ -1667,7 +1667,7 @@ class SecretBackendRole(pulumi.CustomResource):
1667
1667
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1668
1668
  *Available only for Vault Enterprise*.
1669
1669
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1670
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1670
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1671
1671
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1672
1672
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1673
1673
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -1945,7 +1945,7 @@ class SecretBackendRole(pulumi.CustomResource):
1945
1945
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1946
1946
  *Available only for Vault Enterprise*.
1947
1947
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1948
- :param pulumi.Input[str] not_before_duration: Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
1948
+ :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1949
1949
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1950
1950
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1951
1951
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
@@ -2288,7 +2288,7 @@ class SecretBackendRole(pulumi.CustomResource):
2288
2288
  @pulumi.getter(name="notBeforeDuration")
2289
2289
  def not_before_duration(self) -> pulumi.Output[str]:
2290
2290
  """
2291
- Specifies the [duration](https://developer.hashicorp.com/vault/docs/concepts/duration-format) by which to backdate the NotBefore property.
2291
+ Specifies the duration by which to backdate the NotBefore property.
2292
2292
  """
2293
2293
  return pulumi.get(self, "not_before_duration")
2294
2294