pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,15 +4,53 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigEstAuthenticators',
13
19
  'SecretBackendRolePolicyIdentifier',
20
+ 'GetBackendConfigEstAuthenticatorResult',
14
21
  ]
15
22
 
23
+ @pulumi.output_type
24
+ class BackendConfigEstAuthenticators(dict):
25
+ def __init__(__self__, *,
26
+ cert: Optional[Mapping[str, str]] = None,
27
+ userpass: Optional[Mapping[str, str]] = None):
28
+ """
29
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
30
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
31
+ """
32
+ if cert is not None:
33
+ pulumi.set(__self__, "cert", cert)
34
+ if userpass is not None:
35
+ pulumi.set(__self__, "userpass", userpass)
36
+
37
+ @property
38
+ @pulumi.getter
39
+ def cert(self) -> Optional[Mapping[str, str]]:
40
+ """
41
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
42
+ """
43
+ return pulumi.get(self, "cert")
44
+
45
+ @property
46
+ @pulumi.getter
47
+ def userpass(self) -> Optional[Mapping[str, str]]:
48
+ """
49
+ "The accessor (required) property for user pass auth backends".
50
+ """
51
+ return pulumi.get(self, "userpass")
52
+
53
+
16
54
  @pulumi.output_type
17
55
  class SecretBackendRolePolicyIdentifier(dict):
18
56
  def __init__(__self__, *,
@@ -59,3 +97,34 @@ class SecretBackendRolePolicyIdentifier(dict):
59
97
  return pulumi.get(self, "notice")
60
98
 
61
99
 
100
+ @pulumi.output_type
101
+ class GetBackendConfigEstAuthenticatorResult(dict):
102
+ def __init__(__self__, *,
103
+ cert: Optional[Mapping[str, str]] = None,
104
+ userpass: Optional[Mapping[str, str]] = None):
105
+ """
106
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
107
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
108
+ """
109
+ if cert is not None:
110
+ pulumi.set(__self__, "cert", cert)
111
+ if userpass is not None:
112
+ pulumi.set(__self__, "userpass", userpass)
113
+
114
+ @property
115
+ @pulumi.getter
116
+ def cert(self) -> Optional[Mapping[str, str]]:
117
+ """
118
+ "The accessor and cert_role properties for cert auth backends".
119
+ """
120
+ return pulumi.get(self, "cert")
121
+
122
+ @property
123
+ @pulumi.getter
124
+ def userpass(self) -> Optional[Mapping[str, str]]:
125
+ """
126
+ "The accessor property for user pass auth backends".
127
+ """
128
+ return pulumi.get(self, "userpass")
129
+
130
+
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
45
50
  :param pulumi.Input[str] name: Name of the role to create the certificate against
46
51
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
47
52
  The value should not contain leading or trailing forward slashes.
48
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
53
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
54
  *Available only for Vault Enterprise*.
50
55
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
51
56
  :param pulumi.Input[str] private_key_format: The private key format
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
213
218
  """
214
219
  The namespace to provision the resource in.
215
220
  The value should not contain leading or trailing forward slashes.
216
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
221
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
222
  *Available only for Vault Enterprise*.
218
223
  """
219
224
  return pulumi.get(self, "namespace")
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
341
346
  :param pulumi.Input[str] name: Name of the role to create the certificate against
342
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
348
  The value should not contain leading or trailing forward slashes.
344
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
349
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
350
  *Available only for Vault Enterprise*.
346
351
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
347
352
  :param pulumi.Input[str] private_key: The private key
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
579
584
  """
580
585
  The namespace to provision the resource in.
581
586
  The value should not contain leading or trailing forward slashes.
582
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
583
588
  *Available only for Vault Enterprise*.
584
589
  """
585
590
  return pulumi.get(self, "namespace")
@@ -735,17 +740,16 @@ class SecretBackendCert(pulumi.CustomResource):
735
740
  """
736
741
  ## Example Usage
737
742
 
738
- <!--Start PulumiCodeChooser -->
739
743
  ```python
740
744
  import pulumi
741
745
  import pulumi_vault as vault
742
746
 
743
747
  app = vault.pki_secret.SecretBackendCert("app",
744
- backend=vault_mount["intermediate"]["path"],
748
+ backend=intermediate["path"],
749
+ name=test["name"],
745
750
  common_name="app.my.domain",
746
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
751
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
747
752
  ```
748
- <!--End PulumiCodeChooser -->
749
753
 
750
754
  :param str resource_name: The name of the resource.
751
755
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -761,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
761
765
  :param pulumi.Input[str] name: Name of the role to create the certificate against
762
766
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
763
767
  The value should not contain leading or trailing forward slashes.
764
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
768
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
765
769
  *Available only for Vault Enterprise*.
766
770
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
767
771
  :param pulumi.Input[str] private_key_format: The private key format
@@ -779,17 +783,16 @@ class SecretBackendCert(pulumi.CustomResource):
779
783
  """
780
784
  ## Example Usage
781
785
 
782
- <!--Start PulumiCodeChooser -->
783
786
  ```python
784
787
  import pulumi
785
788
  import pulumi_vault as vault
786
789
 
787
790
  app = vault.pki_secret.SecretBackendCert("app",
788
- backend=vault_mount["intermediate"]["path"],
791
+ backend=intermediate["path"],
792
+ name=test["name"],
789
793
  common_name="app.my.domain",
790
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
794
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
791
795
  ```
792
- <!--End PulumiCodeChooser -->
793
796
 
794
797
  :param str resource_name: The name of the resource.
795
798
  :param SecretBackendCertArgs args: The arguments to use to populate this resource's properties.
@@ -921,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
921
924
  :param pulumi.Input[str] name: Name of the role to create the certificate against
922
925
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
923
926
  The value should not contain leading or trailing forward slashes.
924
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
927
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
925
928
  *Available only for Vault Enterprise*.
926
929
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
927
930
  :param pulumi.Input[str] private_key: The private key
@@ -1083,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
1083
1086
  """
1084
1087
  The namespace to provision the resource in.
1085
1088
  The value should not contain leading or trailing forward slashes.
1086
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1089
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1087
1090
  *Available only for Vault Enterprise*.
1088
1091
  """
1089
1092
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
23
28
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
82
87
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
88
93
  """
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -145,13 +150,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
145
150
  """
146
151
  ## Example Usage
147
152
 
148
- <!--Start PulumiCodeChooser -->
149
153
  ```python
150
154
  import pulumi
151
155
  import pulumi_vault as vault
152
156
 
153
157
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
154
- backend=vault_mount["intermediate"]["path"],
158
+ backend=intermediate_vault_mount["path"],
155
159
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
156
160
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
157
161
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -201,16 +205,15 @@ class SecretBackendConfigCa(pulumi.CustomResource):
201
205
  MUR4qFxeUOW/GJGccMUd
202
206
  -----END CERTIFICATE-----
203
207
  \"\"\",
204
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
208
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
205
209
  ```
206
- <!--End PulumiCodeChooser -->
207
210
 
208
211
  :param str resource_name: The name of the resource.
209
212
  :param pulumi.ResourceOptions opts: Options for the resource.
210
213
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
211
214
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
212
215
  The value should not contain leading or trailing forward slashes.
213
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
217
  *Available only for Vault Enterprise*.
215
218
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
216
219
  """
@@ -223,13 +226,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
223
226
  """
224
227
  ## Example Usage
225
228
 
226
- <!--Start PulumiCodeChooser -->
227
229
  ```python
228
230
  import pulumi
229
231
  import pulumi_vault as vault
230
232
 
231
233
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
232
- backend=vault_mount["intermediate"]["path"],
234
+ backend=intermediate_vault_mount["path"],
233
235
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
234
236
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
235
237
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -279,9 +281,8 @@ class SecretBackendConfigCa(pulumi.CustomResource):
279
281
  MUR4qFxeUOW/GJGccMUd
280
282
  -----END CERTIFICATE-----
281
283
  \"\"\",
282
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
284
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
283
285
  ```
284
- <!--End PulumiCodeChooser -->
285
286
 
286
287
  :param str resource_name: The name of the resource.
287
288
  :param SecretBackendConfigCaArgs args: The arguments to use to populate this resource's properties.
@@ -342,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
342
343
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
343
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
344
345
  The value should not contain leading or trailing forward slashes.
345
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
346
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
346
347
  *Available only for Vault Enterprise*.
347
348
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
348
349
  """
@@ -369,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
369
370
  """
370
371
  The namespace to provision the resource in.
371
372
  The value should not contain leading or trailing forward slashes.
372
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
373
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
373
374
  *Available only for Vault Enterprise*.
374
375
  """
375
376
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
27
32
  or an issuer import operation updates the default issuer to the newly added issuer.
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "backend", backend)
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
82
87
  """
83
88
  The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  """
88
93
  return pulumi.get(self, "namespace")
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
108
113
  or an issuer import operation updates the default issuer to the newly added issuer.
109
114
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
110
115
  The value should not contain leading or trailing forward slashes.
111
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
116
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
112
117
  *Available only for Vault Enterprise*.
113
118
  """
114
119
  if backend is not None:
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
164
169
  """
165
170
  The namespace to provision the resource in.
166
171
  The value should not contain leading or trailing forward slashes.
167
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
172
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
173
  *Available only for Vault Enterprise*.
169
174
  """
170
175
  return pulumi.get(self, "namespace")
@@ -187,7 +192,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
187
192
  """
188
193
  ## Example Usage
189
194
 
190
- <!--Start PulumiCodeChooser -->
191
195
  ```python
192
196
  import pulumi
193
197
  import pulumi_vault as vault
@@ -211,7 +215,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
211
215
  default=example.issuer_id,
212
216
  default_follows_latest_issuer=True)
213
217
  ```
214
- <!--End PulumiCodeChooser -->
215
218
 
216
219
  ## Import
217
220
 
@@ -230,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
230
233
  or an issuer import operation updates the default issuer to the newly added issuer.
231
234
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
232
235
  The value should not contain leading or trailing forward slashes.
233
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
236
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
237
  *Available only for Vault Enterprise*.
235
238
  """
236
239
  ...
@@ -242,7 +245,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
242
245
  """
243
246
  ## Example Usage
244
247
 
245
- <!--Start PulumiCodeChooser -->
246
248
  ```python
247
249
  import pulumi
248
250
  import pulumi_vault as vault
@@ -266,7 +268,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
266
268
  default=example.issuer_id,
267
269
  default_follows_latest_issuer=True)
268
270
  ```
269
- <!--End PulumiCodeChooser -->
270
271
 
271
272
  ## Import
272
273
 
@@ -338,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
338
339
  or an issuer import operation updates the default issuer to the newly added issuer.
339
340
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
340
341
  The value should not contain leading or trailing forward slashes.
341
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
342
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
342
343
  *Available only for Vault Enterprise*.
343
344
  """
344
345
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -383,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
383
384
  """
384
385
  The namespace to provision the resource in.
385
386
  The value should not contain leading or trailing forward slashes.
386
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
387
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
387
388
  *Available only for Vault Enterprise*.
388
389
  """
389
390
  return pulumi.get(self, "namespace")