pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -25,9 +30,6 @@ class SecretBackendArgs:
25
30
  token: Optional[pulumi.Input[str]] = None):
26
31
  """
27
32
  The set of arguments for constructing a SecretBackend resource.
28
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
29
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
30
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
31
33
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
32
34
  :param pulumi.Input[str] description: A human-friendly description for this backend.
33
35
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -38,7 +40,6 @@ class SecretBackendArgs:
38
40
  The value should not contain leading or trailing forward slashes.
39
41
  The `namespace` is always relative to the provider's configured namespace.
40
42
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
42
43
  """
43
44
  if address is not None:
44
45
  pulumi.set(__self__, "address", address)
@@ -62,9 +63,6 @@ class SecretBackendArgs:
62
63
  @property
63
64
  @pulumi.getter
64
65
  def address(self) -> Optional[pulumi.Input[str]]:
65
- """
66
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
67
- """
68
66
  return pulumi.get(self, "address")
69
67
 
70
68
  @address.setter
@@ -74,9 +72,6 @@ class SecretBackendArgs:
74
72
  @property
75
73
  @pulumi.getter
76
74
  def backend(self) -> Optional[pulumi.Input[str]]:
77
- """
78
- Unique name of the Vault Terraform Cloud mount to configure
79
- """
80
75
  return pulumi.get(self, "backend")
81
76
 
82
77
  @backend.setter
@@ -86,9 +81,6 @@ class SecretBackendArgs:
86
81
  @property
87
82
  @pulumi.getter(name="basePath")
88
83
  def base_path(self) -> Optional[pulumi.Input[str]]:
89
- """
90
- Specifies the base path for the Terraform Cloud or Enterprise API.
91
- """
92
84
  return pulumi.get(self, "base_path")
93
85
 
94
86
  @base_path.setter
@@ -163,9 +155,6 @@ class SecretBackendArgs:
163
155
  @property
164
156
  @pulumi.getter
165
157
  def token(self) -> Optional[pulumi.Input[str]]:
166
- """
167
- Specifies the Terraform Cloud access token to use.
168
- """
169
158
  return pulumi.get(self, "token")
170
159
 
171
160
  @token.setter
@@ -187,9 +176,6 @@ class _SecretBackendState:
187
176
  token: Optional[pulumi.Input[str]] = None):
188
177
  """
189
178
  Input properties used for looking up and filtering SecretBackend resources.
190
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
191
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
192
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
193
179
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
194
180
  :param pulumi.Input[str] description: A human-friendly description for this backend.
195
181
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -200,7 +186,6 @@ class _SecretBackendState:
200
186
  The value should not contain leading or trailing forward slashes.
201
187
  The `namespace` is always relative to the provider's configured namespace.
202
188
  *Available only for Vault Enterprise*.
203
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
204
189
  """
205
190
  if address is not None:
206
191
  pulumi.set(__self__, "address", address)
@@ -224,9 +209,6 @@ class _SecretBackendState:
224
209
  @property
225
210
  @pulumi.getter
226
211
  def address(self) -> Optional[pulumi.Input[str]]:
227
- """
228
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
229
- """
230
212
  return pulumi.get(self, "address")
231
213
 
232
214
  @address.setter
@@ -236,9 +218,6 @@ class _SecretBackendState:
236
218
  @property
237
219
  @pulumi.getter
238
220
  def backend(self) -> Optional[pulumi.Input[str]]:
239
- """
240
- Unique name of the Vault Terraform Cloud mount to configure
241
- """
242
221
  return pulumi.get(self, "backend")
243
222
 
244
223
  @backend.setter
@@ -248,9 +227,6 @@ class _SecretBackendState:
248
227
  @property
249
228
  @pulumi.getter(name="basePath")
250
229
  def base_path(self) -> Optional[pulumi.Input[str]]:
251
- """
252
- Specifies the base path for the Terraform Cloud or Enterprise API.
253
- """
254
230
  return pulumi.get(self, "base_path")
255
231
 
256
232
  @base_path.setter
@@ -325,9 +301,6 @@ class _SecretBackendState:
325
301
  @property
326
302
  @pulumi.getter
327
303
  def token(self) -> Optional[pulumi.Input[str]]:
328
- """
329
- Specifies the Terraform Cloud access token to use.
330
- """
331
304
  return pulumi.get(self, "token")
332
305
 
333
306
  @token.setter
@@ -368,14 +341,11 @@ class SecretBackend(pulumi.CustomResource):
368
341
  Terraform Cloud secret backends can be imported using the `backend`, e.g.
369
342
 
370
343
  ```sh
371
- $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
344
+ $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
372
345
  ```
373
346
 
374
347
  :param str resource_name: The name of the resource.
375
348
  :param pulumi.ResourceOptions opts: Options for the resource.
376
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
377
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
378
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
379
349
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
380
350
  :param pulumi.Input[str] description: A human-friendly description for this backend.
381
351
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -386,7 +356,6 @@ class SecretBackend(pulumi.CustomResource):
386
356
  The value should not contain leading or trailing forward slashes.
387
357
  The `namespace` is always relative to the provider's configured namespace.
388
358
  *Available only for Vault Enterprise*.
389
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
390
359
  """
391
360
  ...
392
361
  @overload
@@ -412,7 +381,7 @@ class SecretBackend(pulumi.CustomResource):
412
381
  Terraform Cloud secret backends can be imported using the `backend`, e.g.
413
382
 
414
383
  ```sh
415
- $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
384
+ $ pulumi import vault:terraformcloud/secretBackend:SecretBackend example terraform
416
385
  ```
417
386
 
418
387
  :param str resource_name: The name of the resource.
@@ -485,9 +454,6 @@ class SecretBackend(pulumi.CustomResource):
485
454
  :param str resource_name: The unique name of the resulting resource.
486
455
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
487
456
  :param pulumi.ResourceOptions opts: Options for the resource.
488
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
489
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
490
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
491
457
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
492
458
  :param pulumi.Input[str] description: A human-friendly description for this backend.
493
459
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -498,7 +464,6 @@ class SecretBackend(pulumi.CustomResource):
498
464
  The value should not contain leading or trailing forward slashes.
499
465
  The `namespace` is always relative to the provider's configured namespace.
500
466
  *Available only for Vault Enterprise*.
501
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
502
467
  """
503
468
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
504
469
 
@@ -518,25 +483,16 @@ class SecretBackend(pulumi.CustomResource):
518
483
  @property
519
484
  @pulumi.getter
520
485
  def address(self) -> pulumi.Output[Optional[str]]:
521
- """
522
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
523
- """
524
486
  return pulumi.get(self, "address")
525
487
 
526
488
  @property
527
489
  @pulumi.getter
528
490
  def backend(self) -> pulumi.Output[Optional[str]]:
529
- """
530
- Unique name of the Vault Terraform Cloud mount to configure
531
- """
532
491
  return pulumi.get(self, "backend")
533
492
 
534
493
  @property
535
494
  @pulumi.getter(name="basePath")
536
495
  def base_path(self) -> pulumi.Output[Optional[str]]:
537
- """
538
- Specifies the base path for the Terraform Cloud or Enterprise API.
539
- """
540
496
  return pulumi.get(self, "base_path")
541
497
 
542
498
  @property
@@ -587,8 +543,5 @@ class SecretBackend(pulumi.CustomResource):
587
543
  @property
588
544
  @pulumi.getter
589
545
  def token(self) -> pulumi.Output[Optional[str]]:
590
- """
591
- Specifies the Terraform Cloud access token to use.
592
- """
593
546
  return pulumi.get(self, "token")
594
547
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -19,11 +24,10 @@ class SecretCredsArgs:
19
24
  namespace: Optional[pulumi.Input[str]] = None):
20
25
  """
21
26
  The set of arguments for constructing a SecretCreds resource.
22
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
23
27
  :param pulumi.Input[str] role: Name of the role.
24
28
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
29
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
30
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
31
  *Available only for Vault Enterprise*.
28
32
  """
29
33
  pulumi.set(__self__, "backend", backend)
@@ -34,9 +38,6 @@ class SecretCredsArgs:
34
38
  @property
35
39
  @pulumi.getter
36
40
  def backend(self) -> pulumi.Input[str]:
37
- """
38
- Terraform Cloud secret backend to generate tokens from
39
- """
40
41
  return pulumi.get(self, "backend")
41
42
 
42
43
  @backend.setter
@@ -61,7 +62,7 @@ class SecretCredsArgs:
61
62
  """
62
63
  The namespace to provision the resource in.
63
64
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
65
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
66
  *Available only for Vault Enterprise*.
66
67
  """
67
68
  return pulumi.get(self, "namespace")
@@ -84,12 +85,11 @@ class _SecretCredsState:
84
85
  token_id: Optional[pulumi.Input[str]] = None):
85
86
  """
86
87
  Input properties used for looking up and filtering SecretCreds resources.
87
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
88
88
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
89
89
  Vault lease associated with them.
90
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
91
91
  The value should not contain leading or trailing forward slashes.
92
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
93
  *Available only for Vault Enterprise*.
94
94
  :param pulumi.Input[str] organization: The organization associated with the token provided.
95
95
  :param pulumi.Input[str] role: Name of the role.
@@ -119,9 +119,6 @@ class _SecretCredsState:
119
119
  @property
120
120
  @pulumi.getter
121
121
  def backend(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- Terraform Cloud secret backend to generate tokens from
124
- """
125
122
  return pulumi.get(self, "backend")
126
123
 
127
124
  @backend.setter
@@ -147,7 +144,7 @@ class _SecretCredsState:
147
144
  """
148
145
  The namespace to provision the resource in.
149
146
  The value should not contain leading or trailing forward slashes.
150
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
151
148
  *Available only for Vault Enterprise*.
152
149
  """
153
150
  return pulumi.get(self, "namespace")
@@ -241,6 +238,7 @@ class SecretCreds(pulumi.CustomResource):
241
238
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
242
239
  example = vault.terraformcloud.SecretRole("example",
243
240
  backend=test.backend,
241
+ name="test-role",
244
242
  organization="example-organization-name",
245
243
  team_id="team-ieF4isC...")
246
244
  token = vault.terraformcloud.SecretCreds("token",
@@ -250,10 +248,9 @@ class SecretCreds(pulumi.CustomResource):
250
248
 
251
249
  :param str resource_name: The name of the resource.
252
250
  :param pulumi.ResourceOptions opts: Options for the resource.
253
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
254
251
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
255
252
  The value should not contain leading or trailing forward slashes.
256
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
253
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
257
254
  *Available only for Vault Enterprise*.
258
255
  :param pulumi.Input[str] role: Name of the role.
259
256
  """
@@ -276,6 +273,7 @@ class SecretCreds(pulumi.CustomResource):
276
273
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
277
274
  example = vault.terraformcloud.SecretRole("example",
278
275
  backend=test.backend,
276
+ name="test-role",
279
277
  organization="example-organization-name",
280
278
  team_id="team-ieF4isC...")
281
279
  token = vault.terraformcloud.SecretCreds("token",
@@ -349,12 +347,11 @@ class SecretCreds(pulumi.CustomResource):
349
347
  :param str resource_name: The unique name of the resulting resource.
350
348
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
351
349
  :param pulumi.ResourceOptions opts: Options for the resource.
352
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
353
350
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
354
351
  Vault lease associated with them.
355
352
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
356
353
  The value should not contain leading or trailing forward slashes.
357
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
354
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
358
355
  *Available only for Vault Enterprise*.
359
356
  :param pulumi.Input[str] organization: The organization associated with the token provided.
360
357
  :param pulumi.Input[str] role: Name of the role.
@@ -381,9 +378,6 @@ class SecretCreds(pulumi.CustomResource):
381
378
  @property
382
379
  @pulumi.getter
383
380
  def backend(self) -> pulumi.Output[str]:
384
- """
385
- Terraform Cloud secret backend to generate tokens from
386
- """
387
381
  return pulumi.get(self, "backend")
388
382
 
389
383
  @property
@@ -401,7 +395,7 @@ class SecretCreds(pulumi.CustomResource):
401
395
  """
402
396
  The namespace to provision the resource in.
403
397
  The value should not contain leading or trailing forward slashes.
404
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
405
399
  *Available only for Vault Enterprise*.
406
400
  """
407
401
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -24,17 +29,12 @@ class SecretRoleArgs:
24
29
  user_id: Optional[pulumi.Input[str]] = None):
25
30
  """
26
31
  The set of arguments for constructing a SecretRole resource.
27
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
28
32
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
29
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
30
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
34
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
36
  *Available only for Vault Enterprise*.
34
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
36
37
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
37
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
38
38
  """
39
39
  if backend is not None:
40
40
  pulumi.set(__self__, "backend", backend)
@@ -56,9 +56,6 @@ class SecretRoleArgs:
56
56
  @property
57
57
  @pulumi.getter
58
58
  def backend(self) -> Optional[pulumi.Input[str]]:
59
- """
60
- The path of the Terraform Cloud Secret Backend the role belongs to.
61
- """
62
59
  return pulumi.get(self, "backend")
63
60
 
64
61
  @backend.setter
@@ -80,9 +77,6 @@ class SecretRoleArgs:
80
77
  @property
81
78
  @pulumi.getter
82
79
  def name(self) -> Optional[pulumi.Input[str]]:
83
- """
84
- The name of an existing role against which to create this Terraform Cloud credential
85
- """
86
80
  return pulumi.get(self, "name")
87
81
 
88
82
  @name.setter
@@ -95,7 +89,7 @@ class SecretRoleArgs:
95
89
  """
96
90
  The namespace to provision the resource in.
97
91
  The value should not contain leading or trailing forward slashes.
98
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
99
93
  *Available only for Vault Enterprise*.
100
94
  """
101
95
  return pulumi.get(self, "namespace")
@@ -107,9 +101,6 @@ class SecretRoleArgs:
107
101
  @property
108
102
  @pulumi.getter
109
103
  def organization(self) -> Optional[pulumi.Input[str]]:
110
- """
111
- Name of the Terraform Cloud or Enterprise organization
112
- """
113
104
  return pulumi.get(self, "organization")
114
105
 
115
106
  @organization.setter
@@ -119,9 +110,6 @@ class SecretRoleArgs:
119
110
  @property
120
111
  @pulumi.getter(name="teamId")
121
112
  def team_id(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
124
- """
125
113
  return pulumi.get(self, "team_id")
126
114
 
127
115
  @team_id.setter
@@ -143,9 +131,6 @@ class SecretRoleArgs:
143
131
  @property
144
132
  @pulumi.getter(name="userId")
145
133
  def user_id(self) -> Optional[pulumi.Input[str]]:
146
- """
147
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
148
- """
149
134
  return pulumi.get(self, "user_id")
150
135
 
151
136
  @user_id.setter
@@ -166,17 +151,12 @@ class _SecretRoleState:
166
151
  user_id: Optional[pulumi.Input[str]] = None):
167
152
  """
168
153
  Input properties used for looking up and filtering SecretRole resources.
169
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
170
154
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
171
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
172
155
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
173
156
  The value should not contain leading or trailing forward slashes.
174
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
158
  *Available only for Vault Enterprise*.
176
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
178
159
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
179
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
180
160
  """
181
161
  if backend is not None:
182
162
  pulumi.set(__self__, "backend", backend)
@@ -198,9 +178,6 @@ class _SecretRoleState:
198
178
  @property
199
179
  @pulumi.getter
200
180
  def backend(self) -> Optional[pulumi.Input[str]]:
201
- """
202
- The path of the Terraform Cloud Secret Backend the role belongs to.
203
- """
204
181
  return pulumi.get(self, "backend")
205
182
 
206
183
  @backend.setter
@@ -222,9 +199,6 @@ class _SecretRoleState:
222
199
  @property
223
200
  @pulumi.getter
224
201
  def name(self) -> Optional[pulumi.Input[str]]:
225
- """
226
- The name of an existing role against which to create this Terraform Cloud credential
227
- """
228
202
  return pulumi.get(self, "name")
229
203
 
230
204
  @name.setter
@@ -237,7 +211,7 @@ class _SecretRoleState:
237
211
  """
238
212
  The namespace to provision the resource in.
239
213
  The value should not contain leading or trailing forward slashes.
240
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
214
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
241
215
  *Available only for Vault Enterprise*.
242
216
  """
243
217
  return pulumi.get(self, "namespace")
@@ -249,9 +223,6 @@ class _SecretRoleState:
249
223
  @property
250
224
  @pulumi.getter
251
225
  def organization(self) -> Optional[pulumi.Input[str]]:
252
- """
253
- Name of the Terraform Cloud or Enterprise organization
254
- """
255
226
  return pulumi.get(self, "organization")
256
227
 
257
228
  @organization.setter
@@ -261,9 +232,6 @@ class _SecretRoleState:
261
232
  @property
262
233
  @pulumi.getter(name="teamId")
263
234
  def team_id(self) -> Optional[pulumi.Input[str]]:
264
- """
265
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
266
- """
267
235
  return pulumi.get(self, "team_id")
268
236
 
269
237
  @team_id.setter
@@ -285,9 +253,6 @@ class _SecretRoleState:
285
253
  @property
286
254
  @pulumi.getter(name="userId")
287
255
  def user_id(self) -> Optional[pulumi.Input[str]]:
288
- """
289
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
290
- """
291
256
  return pulumi.get(self, "user_id")
292
257
 
293
258
  @user_id.setter
@@ -322,6 +287,7 @@ class SecretRole(pulumi.CustomResource):
322
287
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
323
288
  example = vault.terraformcloud.SecretRole("example",
324
289
  backend=test.backend,
290
+ name="test-role",
325
291
  organization="example-organization-name",
326
292
  team_id="team-ieF4isC...")
327
293
  ```
@@ -331,22 +297,17 @@ class SecretRole(pulumi.CustomResource):
331
297
  Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
332
298
 
333
299
  ```sh
334
- $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
300
+ $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
335
301
  ```
336
302
 
337
303
  :param str resource_name: The name of the resource.
338
304
  :param pulumi.ResourceOptions opts: Options for the resource.
339
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
340
305
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
341
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
342
306
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
307
  The value should not contain leading or trailing forward slashes.
344
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
308
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
309
  *Available only for Vault Enterprise*.
346
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
347
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
348
310
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
349
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
350
311
  """
351
312
  ...
352
313
  @overload
@@ -367,6 +328,7 @@ class SecretRole(pulumi.CustomResource):
367
328
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
368
329
  example = vault.terraformcloud.SecretRole("example",
369
330
  backend=test.backend,
331
+ name="test-role",
370
332
  organization="example-organization-name",
371
333
  team_id="team-ieF4isC...")
372
334
  ```
@@ -376,7 +338,7 @@ class SecretRole(pulumi.CustomResource):
376
338
  Terraform Cloud secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
377
339
 
378
340
  ```sh
379
- $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
341
+ $ pulumi import vault:terraformcloud/secretRole:SecretRole example terraform/roles/my-role
380
342
  ```
381
343
 
382
344
  :param str resource_name: The name of the resource.
@@ -444,17 +406,12 @@ class SecretRole(pulumi.CustomResource):
444
406
  :param str resource_name: The unique name of the resulting resource.
445
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
446
408
  :param pulumi.ResourceOptions opts: Options for the resource.
447
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
448
409
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
449
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
450
410
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
451
411
  The value should not contain leading or trailing forward slashes.
452
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
412
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
453
413
  *Available only for Vault Enterprise*.
454
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
455
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
456
414
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
457
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
458
415
  """
459
416
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
460
417
 
@@ -473,9 +430,6 @@ class SecretRole(pulumi.CustomResource):
473
430
  @property
474
431
  @pulumi.getter
475
432
  def backend(self) -> pulumi.Output[Optional[str]]:
476
- """
477
- The path of the Terraform Cloud Secret Backend the role belongs to.
478
- """
479
433
  return pulumi.get(self, "backend")
480
434
 
481
435
  @property
@@ -489,9 +443,6 @@ class SecretRole(pulumi.CustomResource):
489
443
  @property
490
444
  @pulumi.getter
491
445
  def name(self) -> pulumi.Output[str]:
492
- """
493
- The name of an existing role against which to create this Terraform Cloud credential
494
- """
495
446
  return pulumi.get(self, "name")
496
447
 
497
448
  @property
@@ -500,7 +451,7 @@ class SecretRole(pulumi.CustomResource):
500
451
  """
501
452
  The namespace to provision the resource in.
502
453
  The value should not contain leading or trailing forward slashes.
503
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
454
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
504
455
  *Available only for Vault Enterprise*.
505
456
  """
506
457
  return pulumi.get(self, "namespace")
@@ -508,17 +459,11 @@ class SecretRole(pulumi.CustomResource):
508
459
  @property
509
460
  @pulumi.getter
510
461
  def organization(self) -> pulumi.Output[Optional[str]]:
511
- """
512
- Name of the Terraform Cloud or Enterprise organization
513
- """
514
462
  return pulumi.get(self, "organization")
515
463
 
516
464
  @property
517
465
  @pulumi.getter(name="teamId")
518
466
  def team_id(self) -> pulumi.Output[Optional[str]]:
519
- """
520
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
521
- """
522
467
  return pulumi.get(self, "team_id")
523
468
 
524
469
  @property
@@ -532,8 +477,5 @@ class SecretRole(pulumi.CustomResource):
532
477
  @property
533
478
  @pulumi.getter(name="userId")
534
479
  def user_id(self) -> pulumi.Output[Optional[str]]:
535
- """
536
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
537
- """
538
480
  return pulumi.get(self, "user_id")
539
481