pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
@@ -19,7 +24,9 @@ class AuthBackendRoleSecretIdArgs:
19
24
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
25
  metadata: Optional[pulumi.Input[str]] = None,
21
26
  namespace: Optional[pulumi.Input[str]] = None,
27
+ num_uses: Optional[pulumi.Input[int]] = None,
22
28
  secret_id: Optional[pulumi.Input[str]] = None,
29
+ ttl: Optional[pulumi.Input[int]] = None,
23
30
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
24
31
  wrapping_ttl: Optional[pulumi.Input[str]] = None):
25
32
  """
@@ -32,10 +39,12 @@ class AuthBackendRoleSecretIdArgs:
32
39
  key-value pairs to be set on tokens issued with this SecretID.
33
40
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
41
  The value should not contain leading or trailing forward slashes.
35
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
43
  *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
37
45
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
38
46
  mode. Defaults to Vault auto-generating SecretIDs.
47
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
39
48
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
40
49
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
41
50
  invalidated through unwrapping.
@@ -53,8 +62,12 @@ class AuthBackendRoleSecretIdArgs:
53
62
  pulumi.set(__self__, "metadata", metadata)
54
63
  if namespace is not None:
55
64
  pulumi.set(__self__, "namespace", namespace)
65
+ if num_uses is not None:
66
+ pulumi.set(__self__, "num_uses", num_uses)
56
67
  if secret_id is not None:
57
68
  pulumi.set(__self__, "secret_id", secret_id)
69
+ if ttl is not None:
70
+ pulumi.set(__self__, "ttl", ttl)
58
71
  if with_wrapped_accessor is not None:
59
72
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
60
73
  if wrapping_ttl is not None:
@@ -116,7 +129,7 @@ class AuthBackendRoleSecretIdArgs:
116
129
  """
117
130
  The namespace to provision the resource in.
118
131
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
132
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
133
  *Available only for Vault Enterprise*.
121
134
  """
122
135
  return pulumi.get(self, "namespace")
@@ -125,6 +138,18 @@ class AuthBackendRoleSecretIdArgs:
125
138
  def namespace(self, value: Optional[pulumi.Input[str]]):
126
139
  pulumi.set(self, "namespace", value)
127
140
 
141
+ @property
142
+ @pulumi.getter(name="numUses")
143
+ def num_uses(self) -> Optional[pulumi.Input[int]]:
144
+ """
145
+ The number of uses for the secret-id.
146
+ """
147
+ return pulumi.get(self, "num_uses")
148
+
149
+ @num_uses.setter
150
+ def num_uses(self, value: Optional[pulumi.Input[int]]):
151
+ pulumi.set(self, "num_uses", value)
152
+
128
153
  @property
129
154
  @pulumi.getter(name="secretId")
130
155
  def secret_id(self) -> Optional[pulumi.Input[str]]:
@@ -138,6 +163,18 @@ class AuthBackendRoleSecretIdArgs:
138
163
  def secret_id(self, value: Optional[pulumi.Input[str]]):
139
164
  pulumi.set(self, "secret_id", value)
140
165
 
166
+ @property
167
+ @pulumi.getter
168
+ def ttl(self) -> Optional[pulumi.Input[int]]:
169
+ """
170
+ The TTL duration of the SecretID.
171
+ """
172
+ return pulumi.get(self, "ttl")
173
+
174
+ @ttl.setter
175
+ def ttl(self, value: Optional[pulumi.Input[int]]):
176
+ pulumi.set(self, "ttl", value)
177
+
141
178
  @property
142
179
  @pulumi.getter(name="withWrappedAccessor")
143
180
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -176,8 +213,10 @@ class _AuthBackendRoleSecretIdState:
176
213
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
177
214
  metadata: Optional[pulumi.Input[str]] = None,
178
215
  namespace: Optional[pulumi.Input[str]] = None,
216
+ num_uses: Optional[pulumi.Input[int]] = None,
179
217
  role_name: Optional[pulumi.Input[str]] = None,
180
218
  secret_id: Optional[pulumi.Input[str]] = None,
219
+ ttl: Optional[pulumi.Input[int]] = None,
181
220
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
182
221
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
183
222
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -192,11 +231,13 @@ class _AuthBackendRoleSecretIdState:
192
231
  key-value pairs to be set on tokens issued with this SecretID.
193
232
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
194
233
  The value should not contain leading or trailing forward slashes.
195
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
234
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
235
  *Available only for Vault Enterprise*.
236
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
197
237
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
198
238
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
199
239
  mode. Defaults to Vault auto-generating SecretIDs.
240
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
200
241
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
201
242
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
202
243
  invalidated through unwrapping.
@@ -218,10 +259,14 @@ class _AuthBackendRoleSecretIdState:
218
259
  pulumi.set(__self__, "metadata", metadata)
219
260
  if namespace is not None:
220
261
  pulumi.set(__self__, "namespace", namespace)
262
+ if num_uses is not None:
263
+ pulumi.set(__self__, "num_uses", num_uses)
221
264
  if role_name is not None:
222
265
  pulumi.set(__self__, "role_name", role_name)
223
266
  if secret_id is not None:
224
267
  pulumi.set(__self__, "secret_id", secret_id)
268
+ if ttl is not None:
269
+ pulumi.set(__self__, "ttl", ttl)
225
270
  if with_wrapped_accessor is not None:
226
271
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
227
272
  if wrapping_accessor is not None:
@@ -287,7 +332,7 @@ class _AuthBackendRoleSecretIdState:
287
332
  """
288
333
  The namespace to provision the resource in.
289
334
  The value should not contain leading or trailing forward slashes.
290
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
335
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
291
336
  *Available only for Vault Enterprise*.
292
337
  """
293
338
  return pulumi.get(self, "namespace")
@@ -296,6 +341,18 @@ class _AuthBackendRoleSecretIdState:
296
341
  def namespace(self, value: Optional[pulumi.Input[str]]):
297
342
  pulumi.set(self, "namespace", value)
298
343
 
344
+ @property
345
+ @pulumi.getter(name="numUses")
346
+ def num_uses(self) -> Optional[pulumi.Input[int]]:
347
+ """
348
+ The number of uses for the secret-id.
349
+ """
350
+ return pulumi.get(self, "num_uses")
351
+
352
+ @num_uses.setter
353
+ def num_uses(self, value: Optional[pulumi.Input[int]]):
354
+ pulumi.set(self, "num_uses", value)
355
+
299
356
  @property
300
357
  @pulumi.getter(name="roleName")
301
358
  def role_name(self) -> Optional[pulumi.Input[str]]:
@@ -321,6 +378,18 @@ class _AuthBackendRoleSecretIdState:
321
378
  def secret_id(self, value: Optional[pulumi.Input[str]]):
322
379
  pulumi.set(self, "secret_id", value)
323
380
 
381
+ @property
382
+ @pulumi.getter
383
+ def ttl(self) -> Optional[pulumi.Input[int]]:
384
+ """
385
+ The TTL duration of the SecretID.
386
+ """
387
+ return pulumi.get(self, "ttl")
388
+
389
+ @ttl.setter
390
+ def ttl(self, value: Optional[pulumi.Input[int]]):
391
+ pulumi.set(self, "ttl", value)
392
+
324
393
  @property
325
394
  @pulumi.getter(name="withWrappedAccessor")
326
395
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -385,8 +454,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
385
454
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
386
455
  metadata: Optional[pulumi.Input[str]] = None,
387
456
  namespace: Optional[pulumi.Input[str]] = None,
457
+ num_uses: Optional[pulumi.Input[int]] = None,
388
458
  role_name: Optional[pulumi.Input[str]] = None,
389
459
  secret_id: Optional[pulumi.Input[str]] = None,
460
+ ttl: Optional[pulumi.Input[int]] = None,
390
461
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
391
462
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
392
463
  __props__=None):
@@ -428,11 +499,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
428
499
  key-value pairs to be set on tokens issued with this SecretID.
429
500
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
430
501
  The value should not contain leading or trailing forward slashes.
431
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
502
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
432
503
  *Available only for Vault Enterprise*.
504
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
433
505
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
434
506
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
435
507
  mode. Defaults to Vault auto-generating SecretIDs.
508
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
436
509
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
437
510
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
438
511
  invalidated through unwrapping.
@@ -495,8 +568,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
495
568
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
496
569
  metadata: Optional[pulumi.Input[str]] = None,
497
570
  namespace: Optional[pulumi.Input[str]] = None,
571
+ num_uses: Optional[pulumi.Input[int]] = None,
498
572
  role_name: Optional[pulumi.Input[str]] = None,
499
573
  secret_id: Optional[pulumi.Input[str]] = None,
574
+ ttl: Optional[pulumi.Input[int]] = None,
500
575
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
501
576
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
502
577
  __props__=None):
@@ -512,10 +587,12 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
512
587
  __props__.__dict__["cidr_lists"] = cidr_lists
513
588
  __props__.__dict__["metadata"] = metadata
514
589
  __props__.__dict__["namespace"] = namespace
590
+ __props__.__dict__["num_uses"] = num_uses
515
591
  if role_name is None and not opts.urn:
516
592
  raise TypeError("Missing required property 'role_name'")
517
593
  __props__.__dict__["role_name"] = role_name
518
594
  __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
595
+ __props__.__dict__["ttl"] = ttl
519
596
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
520
597
  __props__.__dict__["wrapping_ttl"] = wrapping_ttl
521
598
  __props__.__dict__["accessor"] = None
@@ -540,8 +617,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
540
617
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
541
618
  metadata: Optional[pulumi.Input[str]] = None,
542
619
  namespace: Optional[pulumi.Input[str]] = None,
620
+ num_uses: Optional[pulumi.Input[int]] = None,
543
621
  role_name: Optional[pulumi.Input[str]] = None,
544
622
  secret_id: Optional[pulumi.Input[str]] = None,
623
+ ttl: Optional[pulumi.Input[int]] = None,
545
624
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
546
625
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
547
626
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -561,11 +640,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
561
640
  key-value pairs to be set on tokens issued with this SecretID.
562
641
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
563
642
  The value should not contain leading or trailing forward slashes.
564
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
643
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
565
644
  *Available only for Vault Enterprise*.
645
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
566
646
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
567
647
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
568
648
  mode. Defaults to Vault auto-generating SecretIDs.
649
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
569
650
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
570
651
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
571
652
  invalidated through unwrapping.
@@ -586,8 +667,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
586
667
  __props__.__dict__["cidr_lists"] = cidr_lists
587
668
  __props__.__dict__["metadata"] = metadata
588
669
  __props__.__dict__["namespace"] = namespace
670
+ __props__.__dict__["num_uses"] = num_uses
589
671
  __props__.__dict__["role_name"] = role_name
590
672
  __props__.__dict__["secret_id"] = secret_id
673
+ __props__.__dict__["ttl"] = ttl
591
674
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
592
675
  __props__.__dict__["wrapping_accessor"] = wrapping_accessor
593
676
  __props__.__dict__["wrapping_token"] = wrapping_token
@@ -634,11 +717,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
634
717
  """
635
718
  The namespace to provision the resource in.
636
719
  The value should not contain leading or trailing forward slashes.
637
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
720
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
638
721
  *Available only for Vault Enterprise*.
639
722
  """
640
723
  return pulumi.get(self, "namespace")
641
724
 
725
+ @property
726
+ @pulumi.getter(name="numUses")
727
+ def num_uses(self) -> pulumi.Output[Optional[int]]:
728
+ """
729
+ The number of uses for the secret-id.
730
+ """
731
+ return pulumi.get(self, "num_uses")
732
+
642
733
  @property
643
734
  @pulumi.getter(name="roleName")
644
735
  def role_name(self) -> pulumi.Output[str]:
@@ -656,6 +747,14 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
656
747
  """
657
748
  return pulumi.get(self, "secret_id")
658
749
 
750
+ @property
751
+ @pulumi.getter
752
+ def ttl(self) -> pulumi.Output[Optional[int]]:
753
+ """
754
+ The TTL duration of the SecretID.
755
+ """
756
+ return pulumi.get(self, "ttl")
757
+
659
758
  @property
660
759
  @pulumi.getter(name="withWrappedAccessor")
661
760
  def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -123,13 +128,10 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
123
128
  namespace=pulumi.get(__ret__, 'namespace'),
124
129
  role_id=pulumi.get(__ret__, 'role_id'),
125
130
  role_name=pulumi.get(__ret__, 'role_name'))
126
-
127
-
128
- @_utilities.lift_output_func(get_auth_backend_role_id)
129
131
  def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
130
132
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
131
133
  role_name: Optional[pulumi.Input[str]] = None,
132
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
134
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
133
135
  """
134
136
  Reads the Role ID of an AppRole from a Vault server.
135
137
 
@@ -153,4 +155,15 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
153
155
  *Available only for Vault Enterprise*.
154
156
  :param str role_name: The name of the role to retrieve the Role ID for.
155
157
  """
156
- ...
158
+ __args__ = dict()
159
+ __args__['backend'] = backend
160
+ __args__['namespace'] = namespace
161
+ __args__['roleName'] = role_name
162
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
+ __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
+ backend=pulumi.get(__response__, 'backend'),
166
+ id=pulumi.get(__response__, 'id'),
167
+ namespace=pulumi.get(__response__, 'namespace'),
168
+ role_id=pulumi.get(__response__, 'role_id'),
169
+ role_name=pulumi.get(__response__, 'role_name')))
pulumi_vault/audit.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['AuditArgs', 'Audit']
@@ -30,7 +35,7 @@ class AuditArgs:
30
35
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
31
36
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
37
  The value should not contain leading or trailing forward slashes.
33
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
39
  *Available only for Vault Enterprise*.
35
40
  :param pulumi.Input[str] path: The path to mount the audit device. This defaults to the type.
36
41
  """
@@ -101,7 +106,7 @@ class AuditArgs:
101
106
  """
102
107
  The namespace to provision the resource in.
103
108
  The value should not contain leading or trailing forward slashes.
104
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
109
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
105
110
  *Available only for Vault Enterprise*.
106
111
  """
107
112
  return pulumi.get(self, "namespace")
@@ -138,7 +143,7 @@ class _AuditState:
138
143
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
139
144
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
144
149
 
@@ -189,7 +194,7 @@ class _AuditState:
189
194
  """
190
195
  The namespace to provision the resource in.
191
196
  The value should not contain leading or trailing forward slashes.
192
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
197
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
198
  *Available only for Vault Enterprise*.
194
199
  """
195
200
  return pulumi.get(self, "namespace")
@@ -251,6 +256,7 @@ class Audit(pulumi.CustomResource):
251
256
  __props__=None):
252
257
  """
253
258
  ## Example Usage
259
+
254
260
  ### File Audit Device)
255
261
 
256
262
  ```python
@@ -258,11 +264,12 @@ class Audit(pulumi.CustomResource):
258
264
  import pulumi_vault as vault
259
265
 
260
266
  test = vault.Audit("test",
267
+ type="file",
261
268
  options={
262
269
  "file_path": "C:/temp/audit.txt",
263
- },
264
- type="file")
270
+ })
265
271
  ```
272
+
266
273
  ### Socket Audit Device)
267
274
 
268
275
  ```python
@@ -270,14 +277,14 @@ class Audit(pulumi.CustomResource):
270
277
  import pulumi_vault as vault
271
278
 
272
279
  test = vault.Audit("test",
280
+ type="socket",
281
+ path="app_socket",
273
282
  local=False,
274
283
  options={
275
284
  "address": "127.0.0.1:8000",
276
- "description": "application x socket",
277
285
  "socket_type": "tcp",
278
- },
279
- path="app_socket",
280
- type="socket")
286
+ "description": "application x socket",
287
+ })
281
288
  ```
282
289
 
283
290
  ## Import
@@ -285,7 +292,7 @@ class Audit(pulumi.CustomResource):
285
292
  Audit devices can be imported using the `path`, e.g.
286
293
 
287
294
  ```sh
288
- $ pulumi import vault:index/audit:Audit test syslog
295
+ $ pulumi import vault:index/audit:Audit test syslog
289
296
  ```
290
297
 
291
298
  :param str resource_name: The name of the resource.
@@ -294,7 +301,7 @@ class Audit(pulumi.CustomResource):
294
301
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
295
302
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
296
303
  The value should not contain leading or trailing forward slashes.
297
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
298
305
  *Available only for Vault Enterprise*.
299
306
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
300
307
 
@@ -310,6 +317,7 @@ class Audit(pulumi.CustomResource):
310
317
  opts: Optional[pulumi.ResourceOptions] = None):
311
318
  """
312
319
  ## Example Usage
320
+
313
321
  ### File Audit Device)
314
322
 
315
323
  ```python
@@ -317,11 +325,12 @@ class Audit(pulumi.CustomResource):
317
325
  import pulumi_vault as vault
318
326
 
319
327
  test = vault.Audit("test",
328
+ type="file",
320
329
  options={
321
330
  "file_path": "C:/temp/audit.txt",
322
- },
323
- type="file")
331
+ })
324
332
  ```
333
+
325
334
  ### Socket Audit Device)
326
335
 
327
336
  ```python
@@ -329,14 +338,14 @@ class Audit(pulumi.CustomResource):
329
338
  import pulumi_vault as vault
330
339
 
331
340
  test = vault.Audit("test",
341
+ type="socket",
342
+ path="app_socket",
332
343
  local=False,
333
344
  options={
334
345
  "address": "127.0.0.1:8000",
335
- "description": "application x socket",
336
346
  "socket_type": "tcp",
337
- },
338
- path="app_socket",
339
- type="socket")
347
+ "description": "application x socket",
348
+ })
340
349
  ```
341
350
 
342
351
  ## Import
@@ -344,7 +353,7 @@ class Audit(pulumi.CustomResource):
344
353
  Audit devices can be imported using the `path`, e.g.
345
354
 
346
355
  ```sh
347
- $ pulumi import vault:index/audit:Audit test syslog
356
+ $ pulumi import vault:index/audit:Audit test syslog
348
357
  ```
349
358
 
350
359
  :param str resource_name: The name of the resource.
@@ -414,7 +423,7 @@ class Audit(pulumi.CustomResource):
414
423
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
415
424
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
416
425
  The value should not contain leading or trailing forward slashes.
417
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
426
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
427
  *Available only for Vault Enterprise*.
419
428
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
420
429
 
@@ -456,7 +465,7 @@ class Audit(pulumi.CustomResource):
456
465
  """
457
466
  The namespace to provision the resource in.
458
467
  The value should not contain leading or trailing forward slashes.
459
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
468
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
460
469
  *Available only for Vault Enterprise*.
461
470
  """
462
471
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
@@ -146,7 +151,9 @@ class AuditRequestHeader(pulumi.CustomResource):
146
151
  import pulumi
147
152
  import pulumi_vault as vault
148
153
 
149
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
154
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
155
+ name="X-Forwarded-For",
156
+ hmac=False)
150
157
  ```
151
158
 
152
159
  :param str resource_name: The name of the resource.
@@ -175,7 +182,9 @@ class AuditRequestHeader(pulumi.CustomResource):
175
182
  import pulumi
176
183
  import pulumi_vault as vault
177
184
 
178
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
185
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
186
+ name="X-Forwarded-For",
187
+ hmac=False)
179
188
  ```
180
189
 
181
190
  :param str resource_name: The name of the resource.