pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NamespaceArgs', 'Namespace']
|
@@ -15,17 +20,17 @@ __all__ = ['NamespaceArgs', 'Namespace']
|
|
15
20
|
class NamespaceArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
path: pulumi.Input[str],
|
18
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
23
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
25
|
path_fq: Optional[pulumi.Input[str]] = None):
|
21
26
|
"""
|
22
27
|
The set of arguments for constructing a Namespace resource.
|
23
28
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
24
|
-
:param pulumi.Input[Mapping[str,
|
29
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
25
30
|
is `map[string]string`. Requires Vault version 1.12+.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
|
31
36
|
The path is relative to the provider's `namespace` argument.
|
@@ -52,7 +57,7 @@ class NamespaceArgs:
|
|
52
57
|
|
53
58
|
@property
|
54
59
|
@pulumi.getter(name="customMetadata")
|
55
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
60
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
61
|
"""
|
57
62
|
Custom metadata describing this namespace. Value type
|
58
63
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -60,7 +65,7 @@ class NamespaceArgs:
|
|
60
65
|
return pulumi.get(self, "custom_metadata")
|
61
66
|
|
62
67
|
@custom_metadata.setter
|
63
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
68
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
64
69
|
pulumi.set(self, "custom_metadata", value)
|
65
70
|
|
66
71
|
@property
|
@@ -69,7 +74,7 @@ class NamespaceArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -95,18 +100,18 @@ class NamespaceArgs:
|
|
95
100
|
@pulumi.input_type
|
96
101
|
class _NamespaceState:
|
97
102
|
def __init__(__self__, *,
|
98
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
103
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
99
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
100
105
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
101
106
|
path: Optional[pulumi.Input[str]] = None,
|
102
107
|
path_fq: Optional[pulumi.Input[str]] = None):
|
103
108
|
"""
|
104
109
|
Input properties used for looking up and filtering Namespace resources.
|
105
|
-
:param pulumi.Input[Mapping[str,
|
110
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
106
111
|
is `map[string]string`. Requires Vault version 1.12+.
|
107
112
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
108
113
|
The value should not contain leading or trailing forward slashes.
|
109
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
114
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
110
115
|
*Available only for Vault Enterprise*.
|
111
116
|
:param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
|
112
117
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
@@ -126,7 +131,7 @@ class _NamespaceState:
|
|
126
131
|
|
127
132
|
@property
|
128
133
|
@pulumi.getter(name="customMetadata")
|
129
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
134
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
130
135
|
"""
|
131
136
|
Custom metadata describing this namespace. Value type
|
132
137
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -134,7 +139,7 @@ class _NamespaceState:
|
|
134
139
|
return pulumi.get(self, "custom_metadata")
|
135
140
|
|
136
141
|
@custom_metadata.setter
|
137
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
142
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
138
143
|
pulumi.set(self, "custom_metadata", value)
|
139
144
|
|
140
145
|
@property
|
@@ -143,7 +148,7 @@ class _NamespaceState:
|
|
143
148
|
"""
|
144
149
|
The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
"""
|
149
154
|
return pulumi.get(self, "namespace")
|
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
|
|
195
200
|
def __init__(__self__,
|
196
201
|
resource_name: str,
|
197
202
|
opts: Optional[pulumi.ResourceOptions] = None,
|
198
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
203
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
199
204
|
namespace: Optional[pulumi.Input[str]] = None,
|
200
205
|
path: Optional[pulumi.Input[str]] = None,
|
201
206
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -209,65 +214,55 @@ class Namespace(pulumi.CustomResource):
|
|
209
214
|
$ pulumi import vault:index/namespace:Namespace example <name>
|
210
215
|
```
|
211
216
|
|
212
|
-
|
217
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
213
218
|
|
214
|
-
|
219
|
+
hcl
|
215
220
|
|
216
|
-
|
221
|
+
provider "vault" {
|
217
222
|
|
218
223
|
# Configuration options
|
219
224
|
|
220
|
-
|
225
|
+
namespace = "example"
|
221
226
|
|
222
|
-
|
227
|
+
alias = "example"
|
223
228
|
|
224
|
-
|
229
|
+
}
|
225
230
|
|
226
|
-
|
231
|
+
resource "vault_namespace" "example2" {
|
227
232
|
|
228
|
-
|
233
|
+
provider = vault.example
|
229
234
|
|
230
|
-
|
235
|
+
path = "example2"
|
231
236
|
|
232
|
-
|
233
|
-
|
234
|
-
= "example2"
|
235
|
-
|
236
|
-
}
|
237
|
+
}
|
237
238
|
|
238
239
|
```sh
|
239
240
|
$ pulumi import vault:index/namespace:Namespace example2 example2
|
240
241
|
```
|
241
242
|
|
242
|
-
|
243
|
-
|
244
|
-
vault_namespace.example2:
|
245
|
-
|
246
|
-
resource "vault_namespace" "example2" {
|
247
|
-
|
248
|
-
id
|
249
|
-
|
250
|
-
= "example/example2/"
|
251
|
-
|
252
|
-
namespace_id = <known after import>
|
253
|
-
|
254
|
-
path
|
243
|
+
$ terraform state show vault_namespace.example2
|
255
244
|
|
256
|
-
|
245
|
+
vault_namespace.example2:
|
257
246
|
|
258
|
-
|
247
|
+
resource "vault_namespace" "example2" {
|
259
248
|
|
260
|
-
|
249
|
+
id = "example/example2/"
|
250
|
+
|
251
|
+
namespace_id = <known after import>
|
252
|
+
|
253
|
+
path = "example2"
|
254
|
+
|
255
|
+
path_fq = "example2"
|
261
256
|
|
262
|
-
|
257
|
+
}
|
263
258
|
|
264
259
|
:param str resource_name: The name of the resource.
|
265
260
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
266
|
-
:param pulumi.Input[Mapping[str,
|
261
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
267
262
|
is `map[string]string`. Requires Vault version 1.12+.
|
268
263
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
269
264
|
The value should not contain leading or trailing forward slashes.
|
270
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
265
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
266
|
*Available only for Vault Enterprise*.
|
272
267
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
273
268
|
:param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
|
@@ -288,57 +283,47 @@ class Namespace(pulumi.CustomResource):
|
|
288
283
|
$ pulumi import vault:index/namespace:Namespace example <name>
|
289
284
|
```
|
290
285
|
|
291
|
-
|
286
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
292
287
|
|
293
|
-
|
288
|
+
hcl
|
294
289
|
|
295
|
-
|
290
|
+
provider "vault" {
|
296
291
|
|
297
292
|
# Configuration options
|
298
293
|
|
299
|
-
|
294
|
+
namespace = "example"
|
300
295
|
|
301
|
-
|
296
|
+
alias = "example"
|
302
297
|
|
303
|
-
|
298
|
+
}
|
304
299
|
|
305
|
-
|
300
|
+
resource "vault_namespace" "example2" {
|
306
301
|
|
307
|
-
|
302
|
+
provider = vault.example
|
308
303
|
|
309
|
-
|
304
|
+
path = "example2"
|
310
305
|
|
311
|
-
|
312
|
-
|
313
|
-
= "example2"
|
314
|
-
|
315
|
-
}
|
306
|
+
}
|
316
307
|
|
317
308
|
```sh
|
318
309
|
$ pulumi import vault:index/namespace:Namespace example2 example2
|
319
310
|
```
|
320
311
|
|
321
|
-
|
322
|
-
|
323
|
-
vault_namespace.example2:
|
324
|
-
|
325
|
-
resource "vault_namespace" "example2" {
|
326
|
-
|
327
|
-
id
|
328
|
-
|
329
|
-
= "example/example2/"
|
330
|
-
|
331
|
-
namespace_id = <known after import>
|
332
|
-
|
333
|
-
path
|
312
|
+
$ terraform state show vault_namespace.example2
|
334
313
|
|
335
|
-
|
314
|
+
vault_namespace.example2:
|
336
315
|
|
337
|
-
|
316
|
+
resource "vault_namespace" "example2" {
|
338
317
|
|
339
|
-
|
318
|
+
id = "example/example2/"
|
319
|
+
|
320
|
+
namespace_id = <known after import>
|
321
|
+
|
322
|
+
path = "example2"
|
323
|
+
|
324
|
+
path_fq = "example2"
|
340
325
|
|
341
|
-
|
326
|
+
}
|
342
327
|
|
343
328
|
:param str resource_name: The name of the resource.
|
344
329
|
:param NamespaceArgs args: The arguments to use to populate this resource's properties.
|
@@ -355,7 +340,7 @@ class Namespace(pulumi.CustomResource):
|
|
355
340
|
def _internal_init(__self__,
|
356
341
|
resource_name: str,
|
357
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
358
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
343
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
359
344
|
namespace: Optional[pulumi.Input[str]] = None,
|
360
345
|
path: Optional[pulumi.Input[str]] = None,
|
361
346
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -385,7 +370,7 @@ class Namespace(pulumi.CustomResource):
|
|
385
370
|
def get(resource_name: str,
|
386
371
|
id: pulumi.Input[str],
|
387
372
|
opts: Optional[pulumi.ResourceOptions] = None,
|
388
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
373
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
389
374
|
namespace: Optional[pulumi.Input[str]] = None,
|
390
375
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
391
376
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -397,11 +382,11 @@ class Namespace(pulumi.CustomResource):
|
|
397
382
|
:param str resource_name: The unique name of the resulting resource.
|
398
383
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
399
384
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
400
|
-
:param pulumi.Input[Mapping[str,
|
385
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
401
386
|
is `map[string]string`. Requires Vault version 1.12+.
|
402
387
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
403
388
|
The value should not contain leading or trailing forward slashes.
|
404
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
389
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
405
390
|
*Available only for Vault Enterprise*.
|
406
391
|
:param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
|
407
392
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
@@ -421,7 +406,7 @@ class Namespace(pulumi.CustomResource):
|
|
421
406
|
|
422
407
|
@property
|
423
408
|
@pulumi.getter(name="customMetadata")
|
424
|
-
def custom_metadata(self) -> pulumi.Output[Mapping[str,
|
409
|
+
def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
425
410
|
"""
|
426
411
|
Custom metadata describing this namespace. Value type
|
427
412
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -434,7 +419,7 @@ class Namespace(pulumi.CustomResource):
|
|
434
419
|
"""
|
435
420
|
The namespace to provision the resource in.
|
436
421
|
The value should not contain leading or trailing forward slashes.
|
437
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
422
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
438
423
|
*Available only for Vault Enterprise*.
|
439
424
|
"""
|
440
425
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
@@ -52,7 +57,7 @@ class NomadSecretBackendArgs:
|
|
52
57
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
53
58
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
54
59
|
The value should not contain leading or trailing forward slashes.
|
55
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
60
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
61
|
*Available only for Vault Enterprise*.
|
57
62
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
58
63
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -245,7 +250,7 @@ class NomadSecretBackendArgs:
|
|
245
250
|
"""
|
246
251
|
The namespace to provision the resource in.
|
247
252
|
The value should not contain leading or trailing forward slashes.
|
248
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
253
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
249
254
|
*Available only for Vault Enterprise*.
|
250
255
|
"""
|
251
256
|
return pulumi.get(self, "namespace")
|
@@ -320,7 +325,7 @@ class _NomadSecretBackendState:
|
|
320
325
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
321
326
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
322
327
|
The value should not contain leading or trailing forward slashes.
|
323
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
324
329
|
*Available only for Vault Enterprise*.
|
325
330
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
326
331
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -513,7 +518,7 @@ class _NomadSecretBackendState:
|
|
513
518
|
"""
|
514
519
|
The namespace to provision the resource in.
|
515
520
|
The value should not contain leading or trailing forward slashes.
|
516
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
521
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
517
522
|
*Available only for Vault Enterprise*.
|
518
523
|
"""
|
519
524
|
return pulumi.get(self, "namespace")
|
@@ -576,12 +581,12 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
576
581
|
import pulumi_vault as vault
|
577
582
|
|
578
583
|
config = vault.NomadSecretBackend("config",
|
579
|
-
address="https://127.0.0.1:4646",
|
580
584
|
backend="nomad",
|
581
|
-
default_lease_ttl_seconds=3600,
|
582
585
|
description="test description",
|
586
|
+
default_lease_ttl_seconds=3600,
|
583
587
|
max_lease_ttl_seconds=7200,
|
584
588
|
max_ttl=240,
|
589
|
+
address="https://127.0.0.1:4646",
|
585
590
|
token="ae20ceaa-...",
|
586
591
|
ttl=120)
|
587
592
|
```
|
@@ -591,7 +596,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
591
596
|
Nomad secret backend can be imported using the `backend`, e.g.
|
592
597
|
|
593
598
|
```sh
|
594
|
-
|
599
|
+
$ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
|
595
600
|
```
|
596
601
|
|
597
602
|
:param str resource_name: The name of the resource.
|
@@ -617,7 +622,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
617
622
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
618
623
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
619
624
|
The value should not contain leading or trailing forward slashes.
|
620
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
625
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
621
626
|
*Available only for Vault Enterprise*.
|
622
627
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
623
628
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -636,12 +641,12 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
636
641
|
import pulumi_vault as vault
|
637
642
|
|
638
643
|
config = vault.NomadSecretBackend("config",
|
639
|
-
address="https://127.0.0.1:4646",
|
640
644
|
backend="nomad",
|
641
|
-
default_lease_ttl_seconds=3600,
|
642
645
|
description="test description",
|
646
|
+
default_lease_ttl_seconds=3600,
|
643
647
|
max_lease_ttl_seconds=7200,
|
644
648
|
max_ttl=240,
|
649
|
+
address="https://127.0.0.1:4646",
|
645
650
|
token="ae20ceaa-...",
|
646
651
|
ttl=120)
|
647
652
|
```
|
@@ -651,7 +656,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
651
656
|
Nomad secret backend can be imported using the `backend`, e.g.
|
652
657
|
|
653
658
|
```sh
|
654
|
-
|
659
|
+
$ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
|
655
660
|
```
|
656
661
|
|
657
662
|
:param str resource_name: The name of the resource.
|
@@ -763,7 +768,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
763
768
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
764
769
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
765
770
|
The value should not contain leading or trailing forward slashes.
|
766
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
771
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
767
772
|
*Available only for Vault Enterprise*.
|
768
773
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
769
774
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -898,7 +903,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
898
903
|
"""
|
899
904
|
The namespace to provision the resource in.
|
900
905
|
The value should not contain leading or trailing forward slashes.
|
901
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
906
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
902
907
|
*Available only for Vault Enterprise*.
|
903
908
|
"""
|
904
909
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
@@ -29,7 +34,7 @@ class NomadSecretRoleArgs:
|
|
29
34
|
false.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
35
40
|
when `type` is 'client'.
|
@@ -91,7 +96,7 @@ class NomadSecretRoleArgs:
|
|
91
96
|
"""
|
92
97
|
The namespace to provision the resource in.
|
93
98
|
The value should not contain leading or trailing forward slashes.
|
94
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
99
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
95
100
|
*Available only for Vault Enterprise*.
|
96
101
|
"""
|
97
102
|
return pulumi.get(self, "namespace")
|
@@ -143,7 +148,7 @@ class _NomadSecretRoleState:
|
|
143
148
|
false.
|
144
149
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
149
154
|
when `type` is 'client'.
|
@@ -196,7 +201,7 @@ class _NomadSecretRoleState:
|
|
196
201
|
"""
|
197
202
|
The namespace to provision the resource in.
|
198
203
|
The value should not contain leading or trailing forward slashes.
|
199
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
204
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
200
205
|
*Available only for Vault Enterprise*.
|
201
206
|
"""
|
202
207
|
return pulumi.get(self, "namespace")
|
@@ -283,7 +288,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
283
288
|
Nomad secret role can be imported using the `backend`, e.g.
|
284
289
|
|
285
290
|
```sh
|
286
|
-
|
291
|
+
$ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
|
287
292
|
```
|
288
293
|
|
289
294
|
:param str resource_name: The name of the resource.
|
@@ -293,7 +298,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
293
298
|
false.
|
294
299
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
295
300
|
The value should not contain leading or trailing forward slashes.
|
296
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
301
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
297
302
|
*Available only for Vault Enterprise*.
|
298
303
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
299
304
|
when `type` is 'client'.
|
@@ -334,7 +339,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
334
339
|
Nomad secret role can be imported using the `backend`, e.g.
|
335
340
|
|
336
341
|
```sh
|
337
|
-
|
342
|
+
$ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
|
338
343
|
```
|
339
344
|
|
340
345
|
:param str resource_name: The name of the resource.
|
@@ -405,7 +410,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
405
410
|
false.
|
406
411
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
407
412
|
The value should not contain leading or trailing forward slashes.
|
408
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
413
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
409
414
|
*Available only for Vault Enterprise*.
|
410
415
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
411
416
|
when `type` is 'client'.
|
@@ -449,7 +454,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
449
454
|
"""
|
450
455
|
The namespace to provision the resource in.
|
451
456
|
The value should not contain leading or trailing forward slashes.
|
452
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
457
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
453
458
|
*Available only for Vault Enterprise*.
|
454
459
|
"""
|
455
460
|
return pulumi.get(self, "namespace")
|