pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretArgs', 'Secret']
@@ -24,7 +29,7 @@ class SecretArgs:
24
29
  :param pulumi.Input[str] path: Full path of the KV-V1 secret.
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  """
30
35
  pulumi.set(__self__, "data_json", data_json)
@@ -63,7 +68,7 @@ class SecretArgs:
63
68
  """
64
69
  The namespace to provision the resource in.
65
70
  The value should not contain leading or trailing forward slashes.
66
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
71
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
67
72
  *Available only for Vault Enterprise*.
68
73
  """
69
74
  return pulumi.get(self, "namespace")
@@ -76,13 +81,13 @@ class SecretArgs:
76
81
  @pulumi.input_type
77
82
  class _SecretState:
78
83
  def __init__(__self__, *,
79
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
84
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
80
85
  data_json: Optional[pulumi.Input[str]] = None,
81
86
  namespace: Optional[pulumi.Input[str]] = None,
82
87
  path: Optional[pulumi.Input[str]] = None):
83
88
  """
84
89
  Input properties used for looking up and filtering Secret resources.
85
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
90
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
86
91
  Vault and whose values are the corresponding values. This map can only
87
92
  represent string data, so any non-string values returned from Vault are
88
93
  serialized as JSON.
@@ -90,7 +95,7 @@ class _SecretState:
90
95
  written as the secret data at the given path.
91
96
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
92
97
  The value should not contain leading or trailing forward slashes.
93
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
98
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
94
99
  *Available only for Vault Enterprise*.
95
100
  :param pulumi.Input[str] path: Full path of the KV-V1 secret.
96
101
  """
@@ -105,7 +110,7 @@ class _SecretState:
105
110
 
106
111
  @property
107
112
  @pulumi.getter
108
- def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
113
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
109
114
  """
110
115
  A mapping whose keys are the top-level data keys returned from
111
116
  Vault and whose values are the corresponding values. This map can only
@@ -115,7 +120,7 @@ class _SecretState:
115
120
  return pulumi.get(self, "data")
116
121
 
117
122
  @data.setter
118
- def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
123
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
119
124
  pulumi.set(self, "data", value)
120
125
 
121
126
  @property
@@ -137,7 +142,7 @@ class _SecretState:
137
142
  """
138
143
  The namespace to provision the resource in.
139
144
  The value should not contain leading or trailing forward slashes.
140
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
141
146
  *Available only for Vault Enterprise*.
142
147
  """
143
148
  return pulumi.get(self, "namespace")
@@ -195,6 +200,7 @@ class Secret(pulumi.CustomResource):
195
200
  "foo": "bar",
196
201
  }))
197
202
  ```
203
+
198
204
  ## Required Vault Capabilities
199
205
 
200
206
  Use of this resource requires the `create` or `update` capability
@@ -207,7 +213,7 @@ class Secret(pulumi.CustomResource):
207
213
  KV-V1 secrets can be imported using the `path`, e.g.
208
214
 
209
215
  ```sh
210
- $ pulumi import vault:kv/secret:Secret secret kvv1/secret
216
+ $ pulumi import vault:kv/secret:Secret secret kvv1/secret
211
217
  ```
212
218
 
213
219
  :param str resource_name: The name of the resource.
@@ -216,7 +222,7 @@ class Secret(pulumi.CustomResource):
216
222
  written as the secret data at the given path.
217
223
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
218
224
  The value should not contain leading or trailing forward slashes.
219
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
225
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
220
226
  *Available only for Vault Enterprise*.
221
227
  :param pulumi.Input[str] path: Full path of the KV-V1 secret.
222
228
  """
@@ -253,6 +259,7 @@ class Secret(pulumi.CustomResource):
253
259
  "foo": "bar",
254
260
  }))
255
261
  ```
262
+
256
263
  ## Required Vault Capabilities
257
264
 
258
265
  Use of this resource requires the `create` or `update` capability
@@ -265,7 +272,7 @@ class Secret(pulumi.CustomResource):
265
272
  KV-V1 secrets can be imported using the `path`, e.g.
266
273
 
267
274
  ```sh
268
- $ pulumi import vault:kv/secret:Secret secret kvv1/secret
275
+ $ pulumi import vault:kv/secret:Secret secret kvv1/secret
269
276
  ```
270
277
 
271
278
  :param str resource_name: The name of the resource.
@@ -315,7 +322,7 @@ class Secret(pulumi.CustomResource):
315
322
  def get(resource_name: str,
316
323
  id: pulumi.Input[str],
317
324
  opts: Optional[pulumi.ResourceOptions] = None,
318
- data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
325
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
319
326
  data_json: Optional[pulumi.Input[str]] = None,
320
327
  namespace: Optional[pulumi.Input[str]] = None,
321
328
  path: Optional[pulumi.Input[str]] = None) -> 'Secret':
@@ -326,7 +333,7 @@ class Secret(pulumi.CustomResource):
326
333
  :param str resource_name: The unique name of the resulting resource.
327
334
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
328
335
  :param pulumi.ResourceOptions opts: Options for the resource.
329
- :param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
336
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
330
337
  Vault and whose values are the corresponding values. This map can only
331
338
  represent string data, so any non-string values returned from Vault are
332
339
  serialized as JSON.
@@ -334,7 +341,7 @@ class Secret(pulumi.CustomResource):
334
341
  written as the secret data at the given path.
335
342
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
336
343
  The value should not contain leading or trailing forward slashes.
337
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
344
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
345
  *Available only for Vault Enterprise*.
339
346
  :param pulumi.Input[str] path: Full path of the KV-V1 secret.
340
347
  """
@@ -350,7 +357,7 @@ class Secret(pulumi.CustomResource):
350
357
 
351
358
  @property
352
359
  @pulumi.getter
353
- def data(self) -> pulumi.Output[Mapping[str, Any]]:
360
+ def data(self) -> pulumi.Output[Mapping[str, str]]:
354
361
  """
355
362
  A mapping whose keys are the top-level data keys returned from
356
363
  Vault and whose values are the corresponding values. This map can only
@@ -374,7 +381,7 @@ class Secret(pulumi.CustomResource):
374
381
  """
375
382
  The namespace to provision the resource in.
376
383
  The value should not contain leading or trailing forward slashes.
377
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
384
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
385
  *Available only for Vault Enterprise*.
379
386
  """
380
387
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendV2Args', 'SecretBackendV2']
@@ -29,7 +34,7 @@ class SecretBackendV2Args:
29
34
  :param pulumi.Input[int] max_versions: The number of versions to keep per key.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "mount", mount)
@@ -98,7 +103,7 @@ class SecretBackendV2Args:
98
103
  """
99
104
  The namespace to provision the resource in.
100
105
  The value should not contain leading or trailing forward slashes.
101
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
106
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
102
107
  *Available only for Vault Enterprise*.
103
108
  """
104
109
  return pulumi.get(self, "namespace")
@@ -126,7 +131,7 @@ class _SecretBackendV2State:
126
131
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
127
132
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
128
133
  The value should not contain leading or trailing forward slashes.
129
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
135
  *Available only for Vault Enterprise*.
131
136
  """
132
137
  if cas_required is not None:
@@ -196,7 +201,7 @@ class _SecretBackendV2State:
196
201
  """
197
202
  The namespace to provision the resource in.
198
203
  The value should not contain leading or trailing forward slashes.
199
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
200
205
  *Available only for Vault Enterprise*.
201
206
  """
202
207
  return pulumi.get(self, "namespace")
@@ -243,6 +248,7 @@ class SecretBackendV2(pulumi.CustomResource):
243
248
  delete_version_after=12600,
244
249
  cas_required=True)
245
250
  ```
251
+
246
252
  ## Required Vault Capabilities
247
253
 
248
254
  Use of this resource requires the `create` or `update` capability
@@ -252,10 +258,11 @@ class SecretBackendV2(pulumi.CustomResource):
252
258
 
253
259
  ## Import
254
260
 
255
- The KV-V2 secret backend can be imported using its unique ID, the `${mount}/config`, e.g.
261
+ The KV-V2 secret backend can be imported using its unique ID,
262
+ the `${mount}/config`, e.g.
256
263
 
257
264
  ```sh
258
- $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
265
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
259
266
  ```
260
267
 
261
268
  :param str resource_name: The name of the resource.
@@ -268,7 +275,7 @@ class SecretBackendV2(pulumi.CustomResource):
268
275
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
269
276
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
270
277
  The value should not contain leading or trailing forward slashes.
271
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
278
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
272
279
  *Available only for Vault Enterprise*.
273
280
  """
274
281
  ...
@@ -303,6 +310,7 @@ class SecretBackendV2(pulumi.CustomResource):
303
310
  delete_version_after=12600,
304
311
  cas_required=True)
305
312
  ```
313
+
306
314
  ## Required Vault Capabilities
307
315
 
308
316
  Use of this resource requires the `create` or `update` capability
@@ -312,10 +320,11 @@ class SecretBackendV2(pulumi.CustomResource):
312
320
 
313
321
  ## Import
314
322
 
315
- The KV-V2 secret backend can be imported using its unique ID, the `${mount}/config`, e.g.
323
+ The KV-V2 secret backend can be imported using its unique ID,
324
+ the `${mount}/config`, e.g.
316
325
 
317
326
  ```sh
318
- $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
327
+ $ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
319
328
  ```
320
329
 
321
330
  :param str resource_name: The name of the resource.
@@ -384,7 +393,7 @@ class SecretBackendV2(pulumi.CustomResource):
384
393
  :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
385
394
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
386
395
  The value should not contain leading or trailing forward slashes.
387
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
396
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
388
397
  *Available only for Vault Enterprise*.
389
398
  """
390
399
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -438,7 +447,7 @@ class SecretBackendV2(pulumi.CustomResource):
438
447
  """
439
448
  The namespace to provision the resource in.
440
449
  The value should not contain leading or trailing forward slashes.
441
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
450
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
442
451
  *Available only for Vault Enterprise*.
443
452
  """
444
453
  return pulumi.get(self, "namespace")