pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NamespaceArgs', 'Namespace']
@@ -15,17 +20,17 @@ __all__ = ['NamespaceArgs', 'Namespace']
15
20
  class NamespaceArgs:
16
21
  def __init__(__self__, *,
17
22
  path: pulumi.Input[str],
18
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  namespace: Optional[pulumi.Input[str]] = None,
20
25
  path_fq: Optional[pulumi.Input[str]] = None):
21
26
  """
22
27
  The set of arguments for constructing a Namespace resource.
23
28
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
24
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
29
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
25
30
  is `map[string]string`. Requires Vault version 1.12+.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
31
36
  The path is relative to the provider's `namespace` argument.
@@ -52,7 +57,7 @@ class NamespaceArgs:
52
57
 
53
58
  @property
54
59
  @pulumi.getter(name="customMetadata")
55
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
60
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
61
  """
57
62
  Custom metadata describing this namespace. Value type
58
63
  is `map[string]string`. Requires Vault version 1.12+.
@@ -60,7 +65,7 @@ class NamespaceArgs:
60
65
  return pulumi.get(self, "custom_metadata")
61
66
 
62
67
  @custom_metadata.setter
63
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
68
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
64
69
  pulumi.set(self, "custom_metadata", value)
65
70
 
66
71
  @property
@@ -69,7 +74,7 @@ class NamespaceArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -95,18 +100,18 @@ class NamespaceArgs:
95
100
  @pulumi.input_type
96
101
  class _NamespaceState:
97
102
  def __init__(__self__, *,
98
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
103
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
99
104
  namespace: Optional[pulumi.Input[str]] = None,
100
105
  namespace_id: Optional[pulumi.Input[str]] = None,
101
106
  path: Optional[pulumi.Input[str]] = None,
102
107
  path_fq: Optional[pulumi.Input[str]] = None):
103
108
  """
104
109
  Input properties used for looking up and filtering Namespace resources.
105
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
110
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
106
111
  is `map[string]string`. Requires Vault version 1.12+.
107
112
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
108
113
  The value should not contain leading or trailing forward slashes.
109
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
114
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
115
  *Available only for Vault Enterprise*.
111
116
  :param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
112
117
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
@@ -126,7 +131,7 @@ class _NamespaceState:
126
131
 
127
132
  @property
128
133
  @pulumi.getter(name="customMetadata")
129
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
134
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
130
135
  """
131
136
  Custom metadata describing this namespace. Value type
132
137
  is `map[string]string`. Requires Vault version 1.12+.
@@ -134,7 +139,7 @@ class _NamespaceState:
134
139
  return pulumi.get(self, "custom_metadata")
135
140
 
136
141
  @custom_metadata.setter
137
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
142
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
138
143
  pulumi.set(self, "custom_metadata", value)
139
144
 
140
145
  @property
@@ -143,7 +148,7 @@ class _NamespaceState:
143
148
  """
144
149
  The namespace to provision the resource in.
145
150
  The value should not contain leading or trailing forward slashes.
146
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
152
  *Available only for Vault Enterprise*.
148
153
  """
149
154
  return pulumi.get(self, "namespace")
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
195
200
  def __init__(__self__,
196
201
  resource_name: str,
197
202
  opts: Optional[pulumi.ResourceOptions] = None,
198
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
203
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
199
204
  namespace: Optional[pulumi.Input[str]] = None,
200
205
  path: Optional[pulumi.Input[str]] = None,
201
206
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -209,65 +214,55 @@ class Namespace(pulumi.CustomResource):
209
214
  $ pulumi import vault:index/namespace:Namespace example <name>
210
215
  ```
211
216
 
212
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
217
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
213
218
 
214
- hcl
219
+ hcl
215
220
 
216
- provider "vault" {
221
+ provider "vault" {
217
222
 
218
223
  # Configuration options
219
224
 
220
- namespace = "example"
225
+ namespace = "example"
221
226
 
222
- alias
227
+ alias = "example"
223
228
 
224
- = "example"
229
+ }
225
230
 
226
- }
231
+ resource "vault_namespace" "example2" {
227
232
 
228
- resource "vault_namespace" "example2" {
233
+ provider = vault.example
229
234
 
230
- provider = vault.example
235
+ path = "example2"
231
236
 
232
- path
233
-
234
- = "example2"
235
-
236
- }
237
+ }
237
238
 
238
239
  ```sh
239
240
  $ pulumi import vault:index/namespace:Namespace example2 example2
240
241
  ```
241
242
 
242
- $ terraform state show vault_namespace.example2
243
-
244
- vault_namespace.example2:
245
-
246
- resource "vault_namespace" "example2" {
247
-
248
- id
249
-
250
- = "example/example2/"
251
-
252
- namespace_id = <known after import>
253
-
254
- path
243
+ $ terraform state show vault_namespace.example2
255
244
 
256
- = "example2"
245
+ vault_namespace.example2:
257
246
 
258
- path_fq
247
+ resource "vault_namespace" "example2" {
259
248
 
260
- = "example2"
249
+ id = "example/example2/"
250
+
251
+ namespace_id = <known after import>
252
+
253
+ path = "example2"
254
+
255
+ path_fq = "example2"
261
256
 
262
- }
257
+ }
263
258
 
264
259
  :param str resource_name: The name of the resource.
265
260
  :param pulumi.ResourceOptions opts: Options for the resource.
266
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
261
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
267
262
  is `map[string]string`. Requires Vault version 1.12+.
268
263
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
269
264
  The value should not contain leading or trailing forward slashes.
270
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
265
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
266
  *Available only for Vault Enterprise*.
272
267
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
273
268
  :param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
@@ -288,57 +283,47 @@ class Namespace(pulumi.CustomResource):
288
283
  $ pulumi import vault:index/namespace:Namespace example <name>
289
284
  ```
290
285
 
291
- If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
286
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
292
287
 
293
- hcl
288
+ hcl
294
289
 
295
- provider "vault" {
290
+ provider "vault" {
296
291
 
297
292
  # Configuration options
298
293
 
299
- namespace = "example"
294
+ namespace = "example"
300
295
 
301
- alias
296
+ alias = "example"
302
297
 
303
- = "example"
298
+ }
304
299
 
305
- }
300
+ resource "vault_namespace" "example2" {
306
301
 
307
- resource "vault_namespace" "example2" {
302
+ provider = vault.example
308
303
 
309
- provider = vault.example
304
+ path = "example2"
310
305
 
311
- path
312
-
313
- = "example2"
314
-
315
- }
306
+ }
316
307
 
317
308
  ```sh
318
309
  $ pulumi import vault:index/namespace:Namespace example2 example2
319
310
  ```
320
311
 
321
- $ terraform state show vault_namespace.example2
322
-
323
- vault_namespace.example2:
324
-
325
- resource "vault_namespace" "example2" {
326
-
327
- id
328
-
329
- = "example/example2/"
330
-
331
- namespace_id = <known after import>
332
-
333
- path
312
+ $ terraform state show vault_namespace.example2
334
313
 
335
- = "example2"
314
+ vault_namespace.example2:
336
315
 
337
- path_fq
316
+ resource "vault_namespace" "example2" {
338
317
 
339
- = "example2"
318
+ id = "example/example2/"
319
+
320
+ namespace_id = <known after import>
321
+
322
+ path = "example2"
323
+
324
+ path_fq = "example2"
340
325
 
341
- }
326
+ }
342
327
 
343
328
  :param str resource_name: The name of the resource.
344
329
  :param NamespaceArgs args: The arguments to use to populate this resource's properties.
@@ -355,7 +340,7 @@ class Namespace(pulumi.CustomResource):
355
340
  def _internal_init(__self__,
356
341
  resource_name: str,
357
342
  opts: Optional[pulumi.ResourceOptions] = None,
358
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
343
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
359
344
  namespace: Optional[pulumi.Input[str]] = None,
360
345
  path: Optional[pulumi.Input[str]] = None,
361
346
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -385,7 +370,7 @@ class Namespace(pulumi.CustomResource):
385
370
  def get(resource_name: str,
386
371
  id: pulumi.Input[str],
387
372
  opts: Optional[pulumi.ResourceOptions] = None,
388
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
373
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
389
374
  namespace: Optional[pulumi.Input[str]] = None,
390
375
  namespace_id: Optional[pulumi.Input[str]] = None,
391
376
  path: Optional[pulumi.Input[str]] = None,
@@ -397,11 +382,11 @@ class Namespace(pulumi.CustomResource):
397
382
  :param str resource_name: The unique name of the resulting resource.
398
383
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
399
384
  :param pulumi.ResourceOptions opts: Options for the resource.
400
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
385
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
401
386
  is `map[string]string`. Requires Vault version 1.12+.
402
387
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
403
388
  The value should not contain leading or trailing forward slashes.
404
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
389
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
405
390
  *Available only for Vault Enterprise*.
406
391
  :param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
407
392
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
@@ -421,7 +406,7 @@ class Namespace(pulumi.CustomResource):
421
406
 
422
407
  @property
423
408
  @pulumi.getter(name="customMetadata")
424
- def custom_metadata(self) -> pulumi.Output[Mapping[str, Any]]:
409
+ def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
425
410
  """
426
411
  Custom metadata describing this namespace. Value type
427
412
  is `map[string]string`. Requires Vault version 1.12+.
@@ -434,7 +419,7 @@ class Namespace(pulumi.CustomResource):
434
419
  """
435
420
  The namespace to provision the resource in.
436
421
  The value should not contain leading or trailing forward slashes.
437
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
422
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
438
423
  *Available only for Vault Enterprise*.
439
424
  """
440
425
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
@@ -52,7 +57,7 @@ class NomadSecretBackendArgs:
52
57
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
53
58
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
54
59
  The value should not contain leading or trailing forward slashes.
55
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
60
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
61
  *Available only for Vault Enterprise*.
57
62
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
58
63
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -245,7 +250,7 @@ class NomadSecretBackendArgs:
245
250
  """
246
251
  The namespace to provision the resource in.
247
252
  The value should not contain leading or trailing forward slashes.
248
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
253
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
249
254
  *Available only for Vault Enterprise*.
250
255
  """
251
256
  return pulumi.get(self, "namespace")
@@ -320,7 +325,7 @@ class _NomadSecretBackendState:
320
325
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
321
326
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
322
327
  The value should not contain leading or trailing forward slashes.
323
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
324
329
  *Available only for Vault Enterprise*.
325
330
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
326
331
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -513,7 +518,7 @@ class _NomadSecretBackendState:
513
518
  """
514
519
  The namespace to provision the resource in.
515
520
  The value should not contain leading or trailing forward slashes.
516
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
521
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
517
522
  *Available only for Vault Enterprise*.
518
523
  """
519
524
  return pulumi.get(self, "namespace")
@@ -576,12 +581,12 @@ class NomadSecretBackend(pulumi.CustomResource):
576
581
  import pulumi_vault as vault
577
582
 
578
583
  config = vault.NomadSecretBackend("config",
579
- address="https://127.0.0.1:4646",
580
584
  backend="nomad",
581
- default_lease_ttl_seconds=3600,
582
585
  description="test description",
586
+ default_lease_ttl_seconds=3600,
583
587
  max_lease_ttl_seconds=7200,
584
588
  max_ttl=240,
589
+ address="https://127.0.0.1:4646",
585
590
  token="ae20ceaa-...",
586
591
  ttl=120)
587
592
  ```
@@ -591,7 +596,7 @@ class NomadSecretBackend(pulumi.CustomResource):
591
596
  Nomad secret backend can be imported using the `backend`, e.g.
592
597
 
593
598
  ```sh
594
- $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
599
+ $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
595
600
  ```
596
601
 
597
602
  :param str resource_name: The name of the resource.
@@ -617,7 +622,7 @@ class NomadSecretBackend(pulumi.CustomResource):
617
622
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
618
623
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
619
624
  The value should not contain leading or trailing forward slashes.
620
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
625
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
621
626
  *Available only for Vault Enterprise*.
622
627
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
623
628
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -636,12 +641,12 @@ class NomadSecretBackend(pulumi.CustomResource):
636
641
  import pulumi_vault as vault
637
642
 
638
643
  config = vault.NomadSecretBackend("config",
639
- address="https://127.0.0.1:4646",
640
644
  backend="nomad",
641
- default_lease_ttl_seconds=3600,
642
645
  description="test description",
646
+ default_lease_ttl_seconds=3600,
643
647
  max_lease_ttl_seconds=7200,
644
648
  max_ttl=240,
649
+ address="https://127.0.0.1:4646",
645
650
  token="ae20ceaa-...",
646
651
  ttl=120)
647
652
  ```
@@ -651,7 +656,7 @@ class NomadSecretBackend(pulumi.CustomResource):
651
656
  Nomad secret backend can be imported using the `backend`, e.g.
652
657
 
653
658
  ```sh
654
- $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
659
+ $ pulumi import vault:index/nomadSecretBackend:NomadSecretBackend nomad nomad
655
660
  ```
656
661
 
657
662
  :param str resource_name: The name of the resource.
@@ -763,7 +768,7 @@ class NomadSecretBackend(pulumi.CustomResource):
763
768
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
764
769
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
765
770
  The value should not contain leading or trailing forward slashes.
766
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
771
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
767
772
  *Available only for Vault Enterprise*.
768
773
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
769
774
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -898,7 +903,7 @@ class NomadSecretBackend(pulumi.CustomResource):
898
903
  """
899
904
  The namespace to provision the resource in.
900
905
  The value should not contain leading or trailing forward slashes.
901
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
906
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
902
907
  *Available only for Vault Enterprise*.
903
908
  """
904
909
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
@@ -29,7 +34,7 @@ class NomadSecretRoleArgs:
29
34
  false.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
35
40
  when `type` is 'client'.
@@ -91,7 +96,7 @@ class NomadSecretRoleArgs:
91
96
  """
92
97
  The namespace to provision the resource in.
93
98
  The value should not contain leading or trailing forward slashes.
94
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
95
100
  *Available only for Vault Enterprise*.
96
101
  """
97
102
  return pulumi.get(self, "namespace")
@@ -143,7 +148,7 @@ class _NomadSecretRoleState:
143
148
  false.
144
149
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
145
150
  The value should not contain leading or trailing forward slashes.
146
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
152
  *Available only for Vault Enterprise*.
148
153
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
149
154
  when `type` is 'client'.
@@ -196,7 +201,7 @@ class _NomadSecretRoleState:
196
201
  """
197
202
  The namespace to provision the resource in.
198
203
  The value should not contain leading or trailing forward slashes.
199
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
200
205
  *Available only for Vault Enterprise*.
201
206
  """
202
207
  return pulumi.get(self, "namespace")
@@ -283,7 +288,7 @@ class NomadSecretRole(pulumi.CustomResource):
283
288
  Nomad secret role can be imported using the `backend`, e.g.
284
289
 
285
290
  ```sh
286
- $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
291
+ $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
287
292
  ```
288
293
 
289
294
  :param str resource_name: The name of the resource.
@@ -293,7 +298,7 @@ class NomadSecretRole(pulumi.CustomResource):
293
298
  false.
294
299
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
295
300
  The value should not contain leading or trailing forward slashes.
296
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
301
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
297
302
  *Available only for Vault Enterprise*.
298
303
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
299
304
  when `type` is 'client'.
@@ -334,7 +339,7 @@ class NomadSecretRole(pulumi.CustomResource):
334
339
  Nomad secret role can be imported using the `backend`, e.g.
335
340
 
336
341
  ```sh
337
- $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
342
+ $ pulumi import vault:index/nomadSecretRole:NomadSecretRole bob nomad/role/bob
338
343
  ```
339
344
 
340
345
  :param str resource_name: The name of the resource.
@@ -405,7 +410,7 @@ class NomadSecretRole(pulumi.CustomResource):
405
410
  false.
406
411
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
407
412
  The value should not contain leading or trailing forward slashes.
408
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
413
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
409
414
  *Available only for Vault Enterprise*.
410
415
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
411
416
  when `type` is 'client'.
@@ -449,7 +454,7 @@ class NomadSecretRole(pulumi.CustomResource):
449
454
  """
450
455
  The namespace to provision the resource in.
451
456
  The value should not contain leading or trailing forward slashes.
452
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
457
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
453
458
  *Available only for Vault Enterprise*.
454
459
  """
455
460
  return pulumi.get(self, "namespace")