pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -46,7 +51,7 @@ class SecretBackendArgs:
46
51
  for credentials issued by this backend.
47
52
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
53
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
55
  *Available only for Vault Enterprise*.
51
56
  :param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
52
57
  to `consul`.
@@ -211,7 +216,7 @@ class SecretBackendArgs:
211
216
  """
212
217
  The namespace to provision the resource in.
213
218
  The value should not contain leading or trailing forward slashes.
214
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
219
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
215
220
  *Available only for Vault Enterprise*.
216
221
  """
217
222
  return pulumi.get(self, "namespace")
@@ -293,7 +298,7 @@ class _SecretBackendState:
293
298
  for credentials issued by this backend.
294
299
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
295
300
  The value should not contain leading or trailing forward slashes.
296
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
301
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
297
302
  *Available only for Vault Enterprise*.
298
303
  :param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
299
304
  to `consul`.
@@ -459,7 +464,7 @@ class _SecretBackendState:
459
464
  """
460
465
  The namespace to provision the resource in.
461
466
  The value should not contain leading or trailing forward slashes.
462
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
467
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
463
468
  *Available only for Vault Enterprise*.
464
469
  """
465
470
  return pulumi.get(self, "namespace")
@@ -530,32 +535,28 @@ class SecretBackend(pulumi.CustomResource):
530
535
  ## Example Usage
531
536
 
532
537
  ### Creating a standard backend resource:
533
- <!--Start PulumiCodeChooser -->
534
538
  ```python
535
539
  import pulumi
536
540
  import pulumi_vault as vault
537
541
 
538
542
  test = vault.consul.SecretBackend("test",
539
- address="127.0.0.1:8500",
540
- description="Manages the Consul backend",
541
543
  path="consul",
544
+ description="Manages the Consul backend",
545
+ address="127.0.0.1:8500",
542
546
  token="4240861b-ce3d-8530-115a-521ff070dd29")
543
547
  ```
544
- <!--End PulumiCodeChooser -->
545
548
 
546
549
  ### Creating a backend resource to bootstrap a new Consul instance:
547
- <!--Start PulumiCodeChooser -->
548
550
  ```python
549
551
  import pulumi
550
552
  import pulumi_vault as vault
551
553
 
552
554
  test = vault.consul.SecretBackend("test",
553
- address="127.0.0.1:8500",
554
- bootstrap=True,
555
+ path="consul",
555
556
  description="Bootstrap the Consul backend",
556
- path="consul")
557
+ address="127.0.0.1:8500",
558
+ bootstrap=True)
557
559
  ```
558
- <!--End PulumiCodeChooser -->
559
560
 
560
561
  ## Import
561
562
 
@@ -583,7 +584,7 @@ class SecretBackend(pulumi.CustomResource):
583
584
  for credentials issued by this backend.
584
585
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
585
586
  The value should not contain leading or trailing forward slashes.
586
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
587
588
  *Available only for Vault Enterprise*.
588
589
  :param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
589
590
  to `consul`.
@@ -600,32 +601,28 @@ class SecretBackend(pulumi.CustomResource):
600
601
  ## Example Usage
601
602
 
602
603
  ### Creating a standard backend resource:
603
- <!--Start PulumiCodeChooser -->
604
604
  ```python
605
605
  import pulumi
606
606
  import pulumi_vault as vault
607
607
 
608
608
  test = vault.consul.SecretBackend("test",
609
- address="127.0.0.1:8500",
610
- description="Manages the Consul backend",
611
609
  path="consul",
610
+ description="Manages the Consul backend",
611
+ address="127.0.0.1:8500",
612
612
  token="4240861b-ce3d-8530-115a-521ff070dd29")
613
613
  ```
614
- <!--End PulumiCodeChooser -->
615
614
 
616
615
  ### Creating a backend resource to bootstrap a new Consul instance:
617
- <!--Start PulumiCodeChooser -->
618
616
  ```python
619
617
  import pulumi
620
618
  import pulumi_vault as vault
621
619
 
622
620
  test = vault.consul.SecretBackend("test",
623
- address="127.0.0.1:8500",
624
- bootstrap=True,
621
+ path="consul",
625
622
  description="Bootstrap the Consul backend",
626
- path="consul")
623
+ address="127.0.0.1:8500",
624
+ bootstrap=True)
627
625
  ```
628
- <!--End PulumiCodeChooser -->
629
626
 
630
627
  ## Import
631
628
 
@@ -738,7 +735,7 @@ class SecretBackend(pulumi.CustomResource):
738
735
  for credentials issued by this backend.
739
736
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
740
737
  The value should not contain leading or trailing forward slashes.
741
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
738
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
742
739
  *Available only for Vault Enterprise*.
743
740
  :param pulumi.Input[str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
744
741
  to `consul`.
@@ -855,7 +852,7 @@ class SecretBackend(pulumi.CustomResource):
855
852
  """
856
853
  The namespace to provision the resource in.
857
854
  The value should not contain leading or trailing forward slashes.
858
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
855
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
859
856
  *Available only for Vault Enterprise*.
860
857
  """
861
858
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
@@ -26,7 +31,6 @@ class SecretBackendRoleArgs:
26
31
  partition: Optional[pulumi.Input[str]] = None,
27
32
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
33
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
29
- token_type: Optional[pulumi.Input[str]] = None,
30
34
  ttl: Optional[pulumi.Input[int]] = None):
31
35
  """
32
36
  The set of arguments for constructing a SecretBackendRole resource.
@@ -41,7 +45,7 @@ class SecretBackendRoleArgs:
41
45
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
42
46
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
43
47
  The value should not contain leading or trailing forward slashes.
44
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
48
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
49
  *Available only for Vault Enterprise*.
46
50
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
47
51
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -52,8 +56,6 @@ class SecretBackendRoleArgs:
52
56
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
53
57
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
54
58
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
55
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
56
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
57
59
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
58
60
  """
59
61
  if backend is not None:
@@ -80,11 +82,6 @@ class SecretBackendRoleArgs:
80
82
  pulumi.set(__self__, "policies", policies)
81
83
  if service_identities is not None:
82
84
  pulumi.set(__self__, "service_identities", service_identities)
83
- if token_type is not None:
84
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
85
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
86
- if token_type is not None:
87
- pulumi.set(__self__, "token_type", token_type)
88
85
  if ttl is not None:
89
86
  pulumi.set(__self__, "ttl", ttl)
90
87
 
@@ -180,7 +177,7 @@ class SecretBackendRoleArgs:
180
177
  """
181
178
  The namespace to provision the resource in.
182
179
  The value should not contain leading or trailing forward slashes.
183
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
180
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
184
181
  *Available only for Vault Enterprise*.
185
182
  """
186
183
  return pulumi.get(self, "namespace")
@@ -242,22 +239,6 @@ class SecretBackendRoleArgs:
242
239
  def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
243
240
  pulumi.set(self, "service_identities", value)
244
241
 
245
- @property
246
- @pulumi.getter(name="tokenType")
247
- def token_type(self) -> Optional[pulumi.Input[str]]:
248
- """
249
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
250
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
251
- """
252
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
253
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
254
-
255
- return pulumi.get(self, "token_type")
256
-
257
- @token_type.setter
258
- def token_type(self, value: Optional[pulumi.Input[str]]):
259
- pulumi.set(self, "token_type", value)
260
-
261
242
  @property
262
243
  @pulumi.getter
263
244
  def ttl(self) -> Optional[pulumi.Input[int]]:
@@ -286,7 +267,6 @@ class _SecretBackendRoleState:
286
267
  partition: Optional[pulumi.Input[str]] = None,
287
268
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
288
269
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
289
- token_type: Optional[pulumi.Input[str]] = None,
290
270
  ttl: Optional[pulumi.Input[int]] = None):
291
271
  """
292
272
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -301,7 +281,7 @@ class _SecretBackendRoleState:
301
281
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
302
282
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
303
283
  The value should not contain leading or trailing forward slashes.
304
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
284
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
305
285
  *Available only for Vault Enterprise*.
306
286
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
307
287
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -312,8 +292,6 @@ class _SecretBackendRoleState:
312
292
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
313
293
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
314
294
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
315
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
316
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
317
295
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
318
296
  """
319
297
  if backend is not None:
@@ -340,11 +318,6 @@ class _SecretBackendRoleState:
340
318
  pulumi.set(__self__, "policies", policies)
341
319
  if service_identities is not None:
342
320
  pulumi.set(__self__, "service_identities", service_identities)
343
- if token_type is not None:
344
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
345
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
346
- if token_type is not None:
347
- pulumi.set(__self__, "token_type", token_type)
348
321
  if ttl is not None:
349
322
  pulumi.set(__self__, "ttl", ttl)
350
323
 
@@ -440,7 +413,7 @@ class _SecretBackendRoleState:
440
413
  """
441
414
  The namespace to provision the resource in.
442
415
  The value should not contain leading or trailing forward slashes.
443
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
416
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
444
417
  *Available only for Vault Enterprise*.
445
418
  """
446
419
  return pulumi.get(self, "namespace")
@@ -502,22 +475,6 @@ class _SecretBackendRoleState:
502
475
  def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
503
476
  pulumi.set(self, "service_identities", value)
504
477
 
505
- @property
506
- @pulumi.getter(name="tokenType")
507
- def token_type(self) -> Optional[pulumi.Input[str]]:
508
- """
509
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
510
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
511
- """
512
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
513
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
514
-
515
- return pulumi.get(self, "token_type")
516
-
517
- @token_type.setter
518
- def token_type(self, value: Optional[pulumi.Input[str]]):
519
- pulumi.set(self, "token_type", value)
520
-
521
478
  @property
522
479
  @pulumi.getter
523
480
  def ttl(self) -> Optional[pulumi.Input[int]]:
@@ -548,7 +505,6 @@ class SecretBackendRole(pulumi.CustomResource):
548
505
  partition: Optional[pulumi.Input[str]] = None,
549
506
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
550
507
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
551
- token_type: Optional[pulumi.Input[str]] = None,
552
508
  ttl: Optional[pulumi.Input[int]] = None,
553
509
  __props__=None):
554
510
  """
@@ -556,7 +512,6 @@ class SecretBackendRole(pulumi.CustomResource):
556
512
 
557
513
  ## Example Usage
558
514
 
559
- <!--Start PulumiCodeChooser -->
560
515
  ```python
561
516
  import pulumi
562
517
  import pulumi_vault as vault
@@ -567,10 +522,10 @@ class SecretBackendRole(pulumi.CustomResource):
567
522
  address="127.0.0.1:8500",
568
523
  token="4240861b-ce3d-8530-115a-521ff070dd29")
569
524
  example = vault.consul.SecretBackendRole("example",
525
+ name="test-role",
570
526
  backend=test.path,
571
527
  consul_policies=["example-policy"])
572
528
  ```
573
- <!--End PulumiCodeChooser -->
574
529
 
575
530
  ## Note About Required Arguments
576
531
 
@@ -599,7 +554,7 @@ class SecretBackendRole(pulumi.CustomResource):
599
554
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
600
555
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
601
556
  The value should not contain leading or trailing forward slashes.
602
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
557
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
603
558
  *Available only for Vault Enterprise*.
604
559
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
605
560
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -610,8 +565,6 @@ class SecretBackendRole(pulumi.CustomResource):
610
565
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
611
566
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
612
567
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
613
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
614
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
615
568
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
616
569
  """
617
570
  ...
@@ -625,7 +578,6 @@ class SecretBackendRole(pulumi.CustomResource):
625
578
 
626
579
  ## Example Usage
627
580
 
628
- <!--Start PulumiCodeChooser -->
629
581
  ```python
630
582
  import pulumi
631
583
  import pulumi_vault as vault
@@ -636,10 +588,10 @@ class SecretBackendRole(pulumi.CustomResource):
636
588
  address="127.0.0.1:8500",
637
589
  token="4240861b-ce3d-8530-115a-521ff070dd29")
638
590
  example = vault.consul.SecretBackendRole("example",
591
+ name="test-role",
639
592
  backend=test.path,
640
593
  consul_policies=["example-policy"])
641
594
  ```
642
- <!--End PulumiCodeChooser -->
643
595
 
644
596
  ## Note About Required Arguments
645
597
 
@@ -682,7 +634,6 @@ class SecretBackendRole(pulumi.CustomResource):
682
634
  partition: Optional[pulumi.Input[str]] = None,
683
635
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
684
636
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
685
- token_type: Optional[pulumi.Input[str]] = None,
686
637
  ttl: Optional[pulumi.Input[int]] = None,
687
638
  __props__=None):
688
639
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -705,7 +656,6 @@ class SecretBackendRole(pulumi.CustomResource):
705
656
  __props__.__dict__["partition"] = partition
706
657
  __props__.__dict__["policies"] = policies
707
658
  __props__.__dict__["service_identities"] = service_identities
708
- __props__.__dict__["token_type"] = token_type
709
659
  __props__.__dict__["ttl"] = ttl
710
660
  super(SecretBackendRole, __self__).__init__(
711
661
  'vault:consul/secretBackendRole:SecretBackendRole',
@@ -729,7 +679,6 @@ class SecretBackendRole(pulumi.CustomResource):
729
679
  partition: Optional[pulumi.Input[str]] = None,
730
680
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
731
681
  service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
732
- token_type: Optional[pulumi.Input[str]] = None,
733
682
  ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
734
683
  """
735
684
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -749,7 +698,7 @@ class SecretBackendRole(pulumi.CustomResource):
749
698
  :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
750
699
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
751
700
  The value should not contain leading or trailing forward slashes.
752
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
701
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
753
702
  *Available only for Vault Enterprise*.
754
703
  :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
755
704
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -760,8 +709,6 @@ class SecretBackendRole(pulumi.CustomResource):
760
709
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
761
710
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
762
711
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
763
- :param pulumi.Input[str] token_type: Specifies the type of token to create when using this role. Valid values are "client" or "management".
764
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
765
712
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
766
713
  """
767
714
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -780,7 +727,6 @@ class SecretBackendRole(pulumi.CustomResource):
780
727
  __props__.__dict__["partition"] = partition
781
728
  __props__.__dict__["policies"] = policies
782
729
  __props__.__dict__["service_identities"] = service_identities
783
- __props__.__dict__["token_type"] = token_type
784
730
  __props__.__dict__["ttl"] = ttl
785
731
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
786
732
 
@@ -848,7 +794,7 @@ class SecretBackendRole(pulumi.CustomResource):
848
794
  """
849
795
  The namespace to provision the resource in.
850
796
  The value should not contain leading or trailing forward slashes.
851
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
797
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
852
798
  *Available only for Vault Enterprise*.
853
799
  """
854
800
  return pulumi.get(self, "namespace")
@@ -890,18 +836,6 @@ class SecretBackendRole(pulumi.CustomResource):
890
836
  """
891
837
  return pulumi.get(self, "service_identities")
892
838
 
893
- @property
894
- @pulumi.getter(name="tokenType")
895
- def token_type(self) -> pulumi.Output[Optional[str]]:
896
- """
897
- Specifies the type of token to create when using this role. Valid values are "client" or "management".
898
- *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
899
- """
900
- warnings.warn("""Consul 1.11 and later removed the legacy ACL system which supported this field.""", DeprecationWarning)
901
- pulumi.log.warn("""token_type is deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.""")
902
-
903
- return pulumi.get(self, "token_type")
904
-
905
839
  @property
906
840
  @pulumi.getter
907
841
  def ttl(self) -> pulumi.Output[Optional[int]]: