pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -25,9 +30,6 @@ class SecretBackendArgs:
25
30
  token: Optional[pulumi.Input[str]] = None):
26
31
  """
27
32
  The set of arguments for constructing a SecretBackend resource.
28
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
29
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
30
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
31
33
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
32
34
  :param pulumi.Input[str] description: A human-friendly description for this backend.
33
35
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -38,7 +40,6 @@ class SecretBackendArgs:
38
40
  The value should not contain leading or trailing forward slashes.
39
41
  The `namespace` is always relative to the provider's configured namespace.
40
42
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
42
43
  """
43
44
  if address is not None:
44
45
  pulumi.set(__self__, "address", address)
@@ -62,9 +63,6 @@ class SecretBackendArgs:
62
63
  @property
63
64
  @pulumi.getter
64
65
  def address(self) -> Optional[pulumi.Input[str]]:
65
- """
66
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
67
- """
68
66
  return pulumi.get(self, "address")
69
67
 
70
68
  @address.setter
@@ -74,9 +72,6 @@ class SecretBackendArgs:
74
72
  @property
75
73
  @pulumi.getter
76
74
  def backend(self) -> Optional[pulumi.Input[str]]:
77
- """
78
- Unique name of the Vault Terraform Cloud mount to configure
79
- """
80
75
  return pulumi.get(self, "backend")
81
76
 
82
77
  @backend.setter
@@ -86,9 +81,6 @@ class SecretBackendArgs:
86
81
  @property
87
82
  @pulumi.getter(name="basePath")
88
83
  def base_path(self) -> Optional[pulumi.Input[str]]:
89
- """
90
- Specifies the base path for the Terraform Cloud or Enterprise API.
91
- """
92
84
  return pulumi.get(self, "base_path")
93
85
 
94
86
  @base_path.setter
@@ -163,9 +155,6 @@ class SecretBackendArgs:
163
155
  @property
164
156
  @pulumi.getter
165
157
  def token(self) -> Optional[pulumi.Input[str]]:
166
- """
167
- Specifies the Terraform Cloud access token to use.
168
- """
169
158
  return pulumi.get(self, "token")
170
159
 
171
160
  @token.setter
@@ -187,9 +176,6 @@ class _SecretBackendState:
187
176
  token: Optional[pulumi.Input[str]] = None):
188
177
  """
189
178
  Input properties used for looking up and filtering SecretBackend resources.
190
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
191
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
192
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
193
179
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
194
180
  :param pulumi.Input[str] description: A human-friendly description for this backend.
195
181
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -200,7 +186,6 @@ class _SecretBackendState:
200
186
  The value should not contain leading or trailing forward slashes.
201
187
  The `namespace` is always relative to the provider's configured namespace.
202
188
  *Available only for Vault Enterprise*.
203
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
204
189
  """
205
190
  if address is not None:
206
191
  pulumi.set(__self__, "address", address)
@@ -224,9 +209,6 @@ class _SecretBackendState:
224
209
  @property
225
210
  @pulumi.getter
226
211
  def address(self) -> Optional[pulumi.Input[str]]:
227
- """
228
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
229
- """
230
212
  return pulumi.get(self, "address")
231
213
 
232
214
  @address.setter
@@ -236,9 +218,6 @@ class _SecretBackendState:
236
218
  @property
237
219
  @pulumi.getter
238
220
  def backend(self) -> Optional[pulumi.Input[str]]:
239
- """
240
- Unique name of the Vault Terraform Cloud mount to configure
241
- """
242
221
  return pulumi.get(self, "backend")
243
222
 
244
223
  @backend.setter
@@ -248,9 +227,6 @@ class _SecretBackendState:
248
227
  @property
249
228
  @pulumi.getter(name="basePath")
250
229
  def base_path(self) -> Optional[pulumi.Input[str]]:
251
- """
252
- Specifies the base path for the Terraform Cloud or Enterprise API.
253
- """
254
230
  return pulumi.get(self, "base_path")
255
231
 
256
232
  @base_path.setter
@@ -325,9 +301,6 @@ class _SecretBackendState:
325
301
  @property
326
302
  @pulumi.getter
327
303
  def token(self) -> Optional[pulumi.Input[str]]:
328
- """
329
- Specifies the Terraform Cloud access token to use.
330
- """
331
304
  return pulumi.get(self, "token")
332
305
 
333
306
  @token.setter
@@ -353,7 +326,6 @@ class SecretBackend(pulumi.CustomResource):
353
326
  """
354
327
  ## Example Usage
355
328
 
356
- <!--Start PulumiCodeChooser -->
357
329
  ```python
358
330
  import pulumi
359
331
  import pulumi_vault as vault
@@ -363,7 +335,6 @@ class SecretBackend(pulumi.CustomResource):
363
335
  description="Manages the Terraform Cloud backend",
364
336
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
365
337
  ```
366
- <!--End PulumiCodeChooser -->
367
338
 
368
339
  ## Import
369
340
 
@@ -375,9 +346,6 @@ class SecretBackend(pulumi.CustomResource):
375
346
 
376
347
  :param str resource_name: The name of the resource.
377
348
  :param pulumi.ResourceOptions opts: Options for the resource.
378
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
379
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
380
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
381
349
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
382
350
  :param pulumi.Input[str] description: A human-friendly description for this backend.
383
351
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -388,7 +356,6 @@ class SecretBackend(pulumi.CustomResource):
388
356
  The value should not contain leading or trailing forward slashes.
389
357
  The `namespace` is always relative to the provider's configured namespace.
390
358
  *Available only for Vault Enterprise*.
391
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
392
359
  """
393
360
  ...
394
361
  @overload
@@ -399,7 +366,6 @@ class SecretBackend(pulumi.CustomResource):
399
366
  """
400
367
  ## Example Usage
401
368
 
402
- <!--Start PulumiCodeChooser -->
403
369
  ```python
404
370
  import pulumi
405
371
  import pulumi_vault as vault
@@ -409,7 +375,6 @@ class SecretBackend(pulumi.CustomResource):
409
375
  description="Manages the Terraform Cloud backend",
410
376
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
411
377
  ```
412
- <!--End PulumiCodeChooser -->
413
378
 
414
379
  ## Import
415
380
 
@@ -489,9 +454,6 @@ class SecretBackend(pulumi.CustomResource):
489
454
  :param str resource_name: The unique name of the resulting resource.
490
455
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
491
456
  :param pulumi.ResourceOptions opts: Options for the resource.
492
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
493
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
494
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
495
457
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
496
458
  :param pulumi.Input[str] description: A human-friendly description for this backend.
497
459
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -502,7 +464,6 @@ class SecretBackend(pulumi.CustomResource):
502
464
  The value should not contain leading or trailing forward slashes.
503
465
  The `namespace` is always relative to the provider's configured namespace.
504
466
  *Available only for Vault Enterprise*.
505
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
506
467
  """
507
468
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
508
469
 
@@ -522,25 +483,16 @@ class SecretBackend(pulumi.CustomResource):
522
483
  @property
523
484
  @pulumi.getter
524
485
  def address(self) -> pulumi.Output[Optional[str]]:
525
- """
526
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
527
- """
528
486
  return pulumi.get(self, "address")
529
487
 
530
488
  @property
531
489
  @pulumi.getter
532
490
  def backend(self) -> pulumi.Output[Optional[str]]:
533
- """
534
- Unique name of the Vault Terraform Cloud mount to configure
535
- """
536
491
  return pulumi.get(self, "backend")
537
492
 
538
493
  @property
539
494
  @pulumi.getter(name="basePath")
540
495
  def base_path(self) -> pulumi.Output[Optional[str]]:
541
- """
542
- Specifies the base path for the Terraform Cloud or Enterprise API.
543
- """
544
496
  return pulumi.get(self, "base_path")
545
497
 
546
498
  @property
@@ -591,8 +543,5 @@ class SecretBackend(pulumi.CustomResource):
591
543
  @property
592
544
  @pulumi.getter
593
545
  def token(self) -> pulumi.Output[Optional[str]]:
594
- """
595
- Specifies the Terraform Cloud access token to use.
596
- """
597
546
  return pulumi.get(self, "token")
598
547
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretCredsArgs', 'SecretCreds']
@@ -19,11 +24,10 @@ class SecretCredsArgs:
19
24
  namespace: Optional[pulumi.Input[str]] = None):
20
25
  """
21
26
  The set of arguments for constructing a SecretCreds resource.
22
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
23
27
  :param pulumi.Input[str] role: Name of the role.
24
28
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
29
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
30
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
31
  *Available only for Vault Enterprise*.
28
32
  """
29
33
  pulumi.set(__self__, "backend", backend)
@@ -34,9 +38,6 @@ class SecretCredsArgs:
34
38
  @property
35
39
  @pulumi.getter
36
40
  def backend(self) -> pulumi.Input[str]:
37
- """
38
- Terraform Cloud secret backend to generate tokens from
39
- """
40
41
  return pulumi.get(self, "backend")
41
42
 
42
43
  @backend.setter
@@ -61,7 +62,7 @@ class SecretCredsArgs:
61
62
  """
62
63
  The namespace to provision the resource in.
63
64
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
65
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
66
  *Available only for Vault Enterprise*.
66
67
  """
67
68
  return pulumi.get(self, "namespace")
@@ -84,12 +85,11 @@ class _SecretCredsState:
84
85
  token_id: Optional[pulumi.Input[str]] = None):
85
86
  """
86
87
  Input properties used for looking up and filtering SecretCreds resources.
87
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
88
88
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
89
89
  Vault lease associated with them.
90
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
91
91
  The value should not contain leading or trailing forward slashes.
92
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
93
  *Available only for Vault Enterprise*.
94
94
  :param pulumi.Input[str] organization: The organization associated with the token provided.
95
95
  :param pulumi.Input[str] role: Name of the role.
@@ -119,9 +119,6 @@ class _SecretCredsState:
119
119
  @property
120
120
  @pulumi.getter
121
121
  def backend(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- Terraform Cloud secret backend to generate tokens from
124
- """
125
122
  return pulumi.get(self, "backend")
126
123
 
127
124
  @backend.setter
@@ -147,7 +144,7 @@ class _SecretCredsState:
147
144
  """
148
145
  The namespace to provision the resource in.
149
146
  The value should not contain leading or trailing forward slashes.
150
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
151
148
  *Available only for Vault Enterprise*.
152
149
  """
153
150
  return pulumi.get(self, "namespace")
@@ -231,7 +228,6 @@ class SecretCreds(pulumi.CustomResource):
231
228
  """
232
229
  ## Example Usage
233
230
 
234
- <!--Start PulumiCodeChooser -->
235
231
  ```python
236
232
  import pulumi
237
233
  import pulumi_vault as vault
@@ -242,20 +238,19 @@ class SecretCreds(pulumi.CustomResource):
242
238
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
243
239
  example = vault.terraformcloud.SecretRole("example",
244
240
  backend=test.backend,
241
+ name="test-role",
245
242
  organization="example-organization-name",
246
243
  team_id="team-ieF4isC...")
247
244
  token = vault.terraformcloud.SecretCreds("token",
248
245
  backend=test.backend,
249
246
  role=example.name)
250
247
  ```
251
- <!--End PulumiCodeChooser -->
252
248
 
253
249
  :param str resource_name: The name of the resource.
254
250
  :param pulumi.ResourceOptions opts: Options for the resource.
255
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
256
251
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
257
252
  The value should not contain leading or trailing forward slashes.
258
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
253
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
259
254
  *Available only for Vault Enterprise*.
260
255
  :param pulumi.Input[str] role: Name of the role.
261
256
  """
@@ -268,7 +263,6 @@ class SecretCreds(pulumi.CustomResource):
268
263
  """
269
264
  ## Example Usage
270
265
 
271
- <!--Start PulumiCodeChooser -->
272
266
  ```python
273
267
  import pulumi
274
268
  import pulumi_vault as vault
@@ -279,13 +273,13 @@ class SecretCreds(pulumi.CustomResource):
279
273
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
280
274
  example = vault.terraformcloud.SecretRole("example",
281
275
  backend=test.backend,
276
+ name="test-role",
282
277
  organization="example-organization-name",
283
278
  team_id="team-ieF4isC...")
284
279
  token = vault.terraformcloud.SecretCreds("token",
285
280
  backend=test.backend,
286
281
  role=example.name)
287
282
  ```
288
- <!--End PulumiCodeChooser -->
289
283
 
290
284
  :param str resource_name: The name of the resource.
291
285
  :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
@@ -353,12 +347,11 @@ class SecretCreds(pulumi.CustomResource):
353
347
  :param str resource_name: The unique name of the resulting resource.
354
348
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
355
349
  :param pulumi.ResourceOptions opts: Options for the resource.
356
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
357
350
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
358
351
  Vault lease associated with them.
359
352
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
360
353
  The value should not contain leading or trailing forward slashes.
361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
354
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
362
355
  *Available only for Vault Enterprise*.
363
356
  :param pulumi.Input[str] organization: The organization associated with the token provided.
364
357
  :param pulumi.Input[str] role: Name of the role.
@@ -385,9 +378,6 @@ class SecretCreds(pulumi.CustomResource):
385
378
  @property
386
379
  @pulumi.getter
387
380
  def backend(self) -> pulumi.Output[str]:
388
- """
389
- Terraform Cloud secret backend to generate tokens from
390
- """
391
381
  return pulumi.get(self, "backend")
392
382
 
393
383
  @property
@@ -405,7 +395,7 @@ class SecretCreds(pulumi.CustomResource):
405
395
  """
406
396
  The namespace to provision the resource in.
407
397
  The value should not contain leading or trailing forward slashes.
408
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
409
399
  *Available only for Vault Enterprise*.
410
400
  """
411
401
  return pulumi.get(self, "namespace")