pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -128,7 +133,7 @@ def get_backend_key(backend: Optional[str] = None,
128
133
  key_name="example",
129
134
  key_type="rsa",
130
135
  key_bits=4096)
131
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
136
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
132
137
  key_ref=key_id))
133
138
  ```
134
139
 
@@ -138,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
138
143
  :param str key_ref: Reference to an existing key.
139
144
  :param str namespace: The namespace of the target resource.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  """
144
149
  __args__ = dict()
@@ -156,13 +161,10 @@ def get_backend_key(backend: Optional[str] = None,
156
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
157
162
  key_type=pulumi.get(__ret__, 'key_type'),
158
163
  namespace=pulumi.get(__ret__, 'namespace'))
159
-
160
-
161
- @_utilities.lift_output_func(get_backend_key)
162
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
163
165
  key_ref: Optional[pulumi.Input[str]] = None,
164
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
165
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
167
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
166
168
  """
167
169
  ## Example Usage
168
170
 
@@ -180,7 +182,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
180
182
  key_name="example",
181
183
  key_type="rsa",
182
184
  key_bits=4096)
183
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
185
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
184
186
  key_ref=key_id))
185
187
  ```
186
188
 
@@ -190,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
190
192
  :param str key_ref: Reference to an existing key.
191
193
  :param str namespace: The namespace of the target resource.
192
194
  The value should not contain leading or trailing forward slashes.
193
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
194
196
  *Available only for Vault Enterprise*.
195
197
  """
196
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of key strings read from Vault.
62
67
  """
@@ -126,7 +131,7 @@ def get_backend_keys(backend: Optional[str] = None,
126
131
  read the keys from, with no leading or trailing `/`s.
127
132
  :param str namespace: The namespace of the target resource.
128
133
  The value should not contain leading or trailing forward slashes.
129
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
135
  *Available only for Vault Enterprise*.
131
136
  """
132
137
  __args__ = dict()
@@ -142,12 +147,9 @@ def get_backend_keys(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_keys)
148
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
151
153
  """
152
154
  ## Example Usage
153
155
 
@@ -173,7 +175,18 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
173
175
  read the keys from, with no leading or trailing `/`s.
174
176
  :param str namespace: The namespace of the target resource.
175
177
  The value should not contain leading or trailing forward slashes.
176
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,15 +4,74 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigCmpv2Authenticators',
19
+ 'BackendConfigEstAuthenticators',
13
20
  'SecretBackendRolePolicyIdentifier',
21
+ 'GetBackendConfigCmpv2AuthenticatorResult',
22
+ 'GetBackendConfigEstAuthenticatorResult',
14
23
  ]
15
24
 
25
+ @pulumi.output_type
26
+ class BackendConfigCmpv2Authenticators(dict):
27
+ def __init__(__self__, *,
28
+ cert: Optional[Mapping[str, str]] = None):
29
+ """
30
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ if cert is not None:
33
+ pulumi.set(__self__, "cert", cert)
34
+
35
+ @property
36
+ @pulumi.getter
37
+ def cert(self) -> Optional[Mapping[str, str]]:
38
+ """
39
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
40
+ """
41
+ return pulumi.get(self, "cert")
42
+
43
+
44
+ @pulumi.output_type
45
+ class BackendConfigEstAuthenticators(dict):
46
+ def __init__(__self__, *,
47
+ cert: Optional[Mapping[str, str]] = None,
48
+ userpass: Optional[Mapping[str, str]] = None):
49
+ """
50
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
51
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
52
+ """
53
+ if cert is not None:
54
+ pulumi.set(__self__, "cert", cert)
55
+ if userpass is not None:
56
+ pulumi.set(__self__, "userpass", userpass)
57
+
58
+ @property
59
+ @pulumi.getter
60
+ def cert(self) -> Optional[Mapping[str, str]]:
61
+ """
62
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
63
+ """
64
+ return pulumi.get(self, "cert")
65
+
66
+ @property
67
+ @pulumi.getter
68
+ def userpass(self) -> Optional[Mapping[str, str]]:
69
+ """
70
+ "The accessor (required) property for user pass auth backends".
71
+ """
72
+ return pulumi.get(self, "userpass")
73
+
74
+
16
75
  @pulumi.output_type
17
76
  class SecretBackendRolePolicyIdentifier(dict):
18
77
  def __init__(__self__, *,
@@ -59,3 +118,53 @@ class SecretBackendRolePolicyIdentifier(dict):
59
118
  return pulumi.get(self, "notice")
60
119
 
61
120
 
121
+ @pulumi.output_type
122
+ class GetBackendConfigCmpv2AuthenticatorResult(dict):
123
+ def __init__(__self__, *,
124
+ cert: Optional[Mapping[str, str]] = None):
125
+ """
126
+ :param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
127
+ """
128
+ if cert is not None:
129
+ pulumi.set(__self__, "cert", cert)
130
+
131
+ @property
132
+ @pulumi.getter
133
+ def cert(self) -> Optional[Mapping[str, str]]:
134
+ """
135
+ The accessor and cert_role properties for cert auth backends
136
+ """
137
+ return pulumi.get(self, "cert")
138
+
139
+
140
+ @pulumi.output_type
141
+ class GetBackendConfigEstAuthenticatorResult(dict):
142
+ def __init__(__self__, *,
143
+ cert: Optional[Mapping[str, str]] = None,
144
+ userpass: Optional[Mapping[str, str]] = None):
145
+ """
146
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
147
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
148
+ """
149
+ if cert is not None:
150
+ pulumi.set(__self__, "cert", cert)
151
+ if userpass is not None:
152
+ pulumi.set(__self__, "userpass", userpass)
153
+
154
+ @property
155
+ @pulumi.getter
156
+ def cert(self) -> Optional[Mapping[str, str]]:
157
+ """
158
+ "The accessor and cert_role properties for cert auth backends".
159
+ """
160
+ return pulumi.get(self, "cert")
161
+
162
+ @property
163
+ @pulumi.getter
164
+ def userpass(self) -> Optional[Mapping[str, str]]:
165
+ """
166
+ "The accessor property for user pass auth backends".
167
+ """
168
+ return pulumi.get(self, "userpass")
169
+
170
+
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
45
50
  :param pulumi.Input[str] name: Name of the role to create the certificate against
46
51
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
47
52
  The value should not contain leading or trailing forward slashes.
48
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
53
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
54
  *Available only for Vault Enterprise*.
50
55
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
51
56
  :param pulumi.Input[str] private_key_format: The private key format
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
213
218
  """
214
219
  The namespace to provision the resource in.
215
220
  The value should not contain leading or trailing forward slashes.
216
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
221
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
222
  *Available only for Vault Enterprise*.
218
223
  """
219
224
  return pulumi.get(self, "namespace")
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
341
346
  :param pulumi.Input[str] name: Name of the role to create the certificate against
342
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
348
  The value should not contain leading or trailing forward slashes.
344
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
349
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
350
  *Available only for Vault Enterprise*.
346
351
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
347
352
  :param pulumi.Input[str] private_key: The private key
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
579
584
  """
580
585
  The namespace to provision the resource in.
581
586
  The value should not contain leading or trailing forward slashes.
582
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
583
588
  *Available only for Vault Enterprise*.
584
589
  """
585
590
  return pulumi.get(self, "namespace")
@@ -740,9 +745,10 @@ class SecretBackendCert(pulumi.CustomResource):
740
745
  import pulumi_vault as vault
741
746
 
742
747
  app = vault.pki_secret.SecretBackendCert("app",
743
- backend=vault_mount["intermediate"]["path"],
748
+ backend=intermediate["path"],
749
+ name=test["name"],
744
750
  common_name="app.my.domain",
745
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
751
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
746
752
  ```
747
753
 
748
754
  :param str resource_name: The name of the resource.
@@ -759,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
759
765
  :param pulumi.Input[str] name: Name of the role to create the certificate against
760
766
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
761
767
  The value should not contain leading or trailing forward slashes.
762
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
768
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
763
769
  *Available only for Vault Enterprise*.
764
770
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
765
771
  :param pulumi.Input[str] private_key_format: The private key format
@@ -782,9 +788,10 @@ class SecretBackendCert(pulumi.CustomResource):
782
788
  import pulumi_vault as vault
783
789
 
784
790
  app = vault.pki_secret.SecretBackendCert("app",
785
- backend=vault_mount["intermediate"]["path"],
791
+ backend=intermediate["path"],
792
+ name=test["name"],
786
793
  common_name="app.my.domain",
787
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
794
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
788
795
  ```
789
796
 
790
797
  :param str resource_name: The name of the resource.
@@ -917,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
917
924
  :param pulumi.Input[str] name: Name of the role to create the certificate against
918
925
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
919
926
  The value should not contain leading or trailing forward slashes.
920
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
927
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
921
928
  *Available only for Vault Enterprise*.
922
929
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
923
930
  :param pulumi.Input[str] private_key: The private key
@@ -1079,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
1079
1086
  """
1080
1087
  The namespace to provision the resource in.
1081
1088
  The value should not contain leading or trailing forward slashes.
1082
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1089
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1083
1090
  *Available only for Vault Enterprise*.
1084
1091
  """
1085
1092
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
23
28
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
82
87
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
88
93
  """
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -150,7 +155,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
150
155
  import pulumi_vault as vault
151
156
 
152
157
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
153
- backend=vault_mount["intermediate"]["path"],
158
+ backend=intermediate_vault_mount["path"],
154
159
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
155
160
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
156
161
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -200,7 +205,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
200
205
  MUR4qFxeUOW/GJGccMUd
201
206
  -----END CERTIFICATE-----
202
207
  \"\"\",
203
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
208
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
204
209
  ```
205
210
 
206
211
  :param str resource_name: The name of the resource.
@@ -208,7 +213,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
208
213
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
209
214
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
210
215
  The value should not contain leading or trailing forward slashes.
211
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
217
  *Available only for Vault Enterprise*.
213
218
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
214
219
  """
@@ -226,7 +231,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
226
231
  import pulumi_vault as vault
227
232
 
228
233
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
229
- backend=vault_mount["intermediate"]["path"],
234
+ backend=intermediate_vault_mount["path"],
230
235
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
231
236
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
232
237
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -276,7 +281,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
276
281
  MUR4qFxeUOW/GJGccMUd
277
282
  -----END CERTIFICATE-----
278
283
  \"\"\",
279
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
284
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
280
285
  ```
281
286
 
282
287
  :param str resource_name: The name of the resource.
@@ -338,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
338
343
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
339
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
340
345
  The value should not contain leading or trailing forward slashes.
341
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
346
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
342
347
  *Available only for Vault Enterprise*.
343
348
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
344
349
  """
@@ -365,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
365
370
  """
366
371
  The namespace to provision the resource in.
367
372
  The value should not contain leading or trailing forward slashes.
368
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
373
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
369
374
  *Available only for Vault Enterprise*.
370
375
  """
371
376
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
27
32
  or an issuer import operation updates the default issuer to the newly added issuer.
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "backend", backend)
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
82
87
  """
83
88
  The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  """
88
93
  return pulumi.get(self, "namespace")
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
108
113
  or an issuer import operation updates the default issuer to the newly added issuer.
109
114
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
110
115
  The value should not contain leading or trailing forward slashes.
111
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
116
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
112
117
  *Available only for Vault Enterprise*.
113
118
  """
114
119
  if backend is not None:
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
164
169
  """
165
170
  The namespace to provision the resource in.
166
171
  The value should not contain leading or trailing forward slashes.
167
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
172
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
173
  *Available only for Vault Enterprise*.
169
174
  """
170
175
  return pulumi.get(self, "namespace")
@@ -216,7 +221,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
216
221
  PKI secret backend config issuers can be imported using the path, e.g.
217
222
 
218
223
  ```sh
219
- $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
224
+ $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
220
225
  ```
221
226
 
222
227
  :param str resource_name: The name of the resource.
@@ -228,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
228
233
  or an issuer import operation updates the default issuer to the newly added issuer.
229
234
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
230
235
  The value should not contain leading or trailing forward slashes.
231
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
236
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
232
237
  *Available only for Vault Enterprise*.
233
238
  """
234
239
  ...
@@ -269,7 +274,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
269
274
  PKI secret backend config issuers can be imported using the path, e.g.
270
275
 
271
276
  ```sh
272
- $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
277
+ $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
273
278
  ```
274
279
 
275
280
  :param str resource_name: The name of the resource.
@@ -334,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
334
339
  or an issuer import operation updates the default issuer to the newly added issuer.
335
340
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
336
341
  The value should not contain leading or trailing forward slashes.
337
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
342
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
343
  *Available only for Vault Enterprise*.
339
344
  """
340
345
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -379,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
379
384
  """
380
385
  The namespace to provision the resource in.
381
386
  The value should not contain leading or trailing forward slashes.
382
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
387
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
383
388
  *Available only for Vault Enterprise*.
384
389
  """
385
390
  return pulumi.get(self, "namespace")