pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
@@ -46,7 +51,7 @@ class SecretBackendDynamicRoleArgs:
46
51
  not begin or end with a `/`. Defaults to `ldap`.
47
52
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
53
  The value should not contain leading or trailing forward slashes.
49
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
55
  *Available only for Vault Enterprise*.
51
56
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
52
57
  rollback any changes in the event that execution of the `creation_ldif` results
@@ -165,7 +170,7 @@ class SecretBackendDynamicRoleArgs:
165
170
  """
166
171
  The namespace to provision the resource in.
167
172
  The value should not contain leading or trailing forward slashes.
168
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
173
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
169
174
  *Available only for Vault Enterprise*.
170
175
  """
171
176
  return pulumi.get(self, "namespace")
@@ -240,7 +245,7 @@ class _SecretBackendDynamicRoleState:
240
245
  not begin or end with a `/`. Defaults to `ldap`.
241
246
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
242
247
  The value should not contain leading or trailing forward slashes.
243
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
248
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
244
249
  *Available only for Vault Enterprise*.
245
250
  :param pulumi.Input[str] role_name: Name of the role.
246
251
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -351,7 +356,7 @@ class _SecretBackendDynamicRoleState:
351
356
  """
352
357
  The namespace to provision the resource in.
353
358
  The value should not contain leading or trailing forward slashes.
354
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
359
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
360
  *Available only for Vault Enterprise*.
356
361
  """
357
362
  return pulumi.get(self, "namespace")
@@ -422,7 +427,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
422
427
  """
423
428
  ## Example Usage
424
429
 
425
- <!--Start PulumiCodeChooser -->
426
430
  ```python
427
431
  import pulumi
428
432
  import pulumi_vault as vault
@@ -451,7 +455,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
451
455
  changetype: delete
452
456
  \"\"\")
453
457
  ```
454
- <!--End PulumiCodeChooser -->
455
458
 
456
459
  ## Import
457
460
 
@@ -484,7 +487,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
484
487
  not begin or end with a `/`. Defaults to `ldap`.
485
488
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
486
489
  The value should not contain leading or trailing forward slashes.
487
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
490
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
488
491
  *Available only for Vault Enterprise*.
489
492
  :param pulumi.Input[str] role_name: Name of the role.
490
493
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -506,7 +509,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
506
509
  """
507
510
  ## Example Usage
508
511
 
509
- <!--Start PulumiCodeChooser -->
510
512
  ```python
511
513
  import pulumi
512
514
  import pulumi_vault as vault
@@ -535,7 +537,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
535
537
  changetype: delete
536
538
  \"\"\")
537
539
  ```
538
- <!--End PulumiCodeChooser -->
539
540
 
540
541
  ## Import
541
542
 
@@ -640,7 +641,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
640
641
  not begin or end with a `/`. Defaults to `ldap`.
641
642
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
642
643
  The value should not contain leading or trailing forward slashes.
643
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
644
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
644
645
  *Available only for Vault Enterprise*.
645
646
  :param pulumi.Input[str] role_name: Name of the role.
646
647
  :param pulumi.Input[str] rollback_ldif: A templatized LDIF string used to attempt to
@@ -727,7 +728,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
727
728
  """
728
729
  The namespace to provision the resource in.
729
730
  The value should not contain leading or trailing forward slashes.
730
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
731
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
731
732
  *Available only for Vault Enterprise*.
732
733
  """
733
734
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
@@ -34,7 +39,7 @@ class SecretBackendLibrarySetArgs:
34
39
  Must be unique within the backend.
35
40
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
41
  The value should not contain leading or trailing forward slashes.
37
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
43
  *Available only for Vault Enterprise*.
39
44
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
40
45
  ttl if not provided.
@@ -123,7 +128,7 @@ class SecretBackendLibrarySetArgs:
123
128
  """
124
129
  The namespace to provision the resource in.
125
130
  The value should not contain leading or trailing forward slashes.
126
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
131
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
127
132
  *Available only for Vault Enterprise*.
128
133
  """
129
134
  return pulumi.get(self, "namespace")
@@ -168,7 +173,7 @@ class _SecretBackendLibrarySetState:
168
173
  Must be unique within the backend.
169
174
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
170
175
  The value should not contain leading or trailing forward slashes.
171
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
172
177
  *Available only for Vault Enterprise*.
173
178
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
174
179
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -247,7 +252,7 @@ class _SecretBackendLibrarySetState:
247
252
  """
248
253
  The namespace to provision the resource in.
249
254
  The value should not contain leading or trailing forward slashes.
250
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
255
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
251
256
  *Available only for Vault Enterprise*.
252
257
  """
253
258
  return pulumi.get(self, "namespace")
@@ -298,7 +303,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
298
303
  """
299
304
  ## Example Usage
300
305
 
301
- <!--Start PulumiCodeChooser -->
302
306
  ```python
303
307
  import pulumi
304
308
  import pulumi_vault as vault
@@ -312,6 +316,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
312
316
  userdn="CN=Users,DC=corp,DC=example,DC=net")
313
317
  qa = vault.ldap.SecretBackendLibrarySet("qa",
314
318
  mount=config.path,
319
+ name="qa",
315
320
  service_account_names=[
316
321
  "Bob",
317
322
  "Mary",
@@ -320,7 +325,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
320
325
  disable_check_in_enforcement=True,
321
326
  max_ttl=120)
322
327
  ```
323
- <!--End PulumiCodeChooser -->
324
328
 
325
329
  ## Import
326
330
 
@@ -342,7 +346,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
342
346
  Must be unique within the backend.
343
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
344
348
  The value should not contain leading or trailing forward slashes.
345
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
349
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
346
350
  *Available only for Vault Enterprise*.
347
351
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
348
352
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -357,7 +361,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
357
361
  """
358
362
  ## Example Usage
359
363
 
360
- <!--Start PulumiCodeChooser -->
361
364
  ```python
362
365
  import pulumi
363
366
  import pulumi_vault as vault
@@ -371,6 +374,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
371
374
  userdn="CN=Users,DC=corp,DC=example,DC=net")
372
375
  qa = vault.ldap.SecretBackendLibrarySet("qa",
373
376
  mount=config.path,
377
+ name="qa",
374
378
  service_account_names=[
375
379
  "Bob",
376
380
  "Mary",
@@ -379,7 +383,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
379
383
  disable_check_in_enforcement=True,
380
384
  max_ttl=120)
381
385
  ```
382
- <!--End PulumiCodeChooser -->
383
386
 
384
387
  ## Import
385
388
 
@@ -463,7 +466,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
463
466
  Must be unique within the backend.
464
467
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
465
468
  The value should not contain leading or trailing forward slashes.
466
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
467
470
  *Available only for Vault Enterprise*.
468
471
  :param pulumi.Input[Sequence[pulumi.Input[str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
469
472
  :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
@@ -524,7 +527,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
524
527
  """
525
528
  The namespace to provision the resource in.
526
529
  The value should not contain leading or trailing forward slashes.
527
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
530
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
528
531
  *Available only for Vault Enterprise*.
529
532
  """
530
533
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
@@ -19,7 +24,8 @@ class SecretBackendStaticRoleArgs:
19
24
  username: pulumi.Input[str],
20
25
  dn: Optional[pulumi.Input[str]] = None,
21
26
  mount: Optional[pulumi.Input[str]] = None,
22
- namespace: Optional[pulumi.Input[str]] = None):
27
+ namespace: Optional[pulumi.Input[str]] = None,
28
+ skip_import_rotation: Optional[pulumi.Input[bool]] = None):
23
29
  """
24
30
  The set of arguments for constructing a SecretBackendStaticRole resource.
25
31
  :param pulumi.Input[str] role_name: Name of the role.
@@ -32,8 +38,10 @@ class SecretBackendStaticRoleArgs:
32
38
  not begin or end with a `/`. Defaults to `ldap`.
33
39
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
40
  The value should not contain leading or trailing forward slashes.
35
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
41
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
42
  *Available only for Vault Enterprise*.
43
+ :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
44
+ Requires Vault 1.16 or above.
37
45
  """
38
46
  pulumi.set(__self__, "role_name", role_name)
39
47
  pulumi.set(__self__, "rotation_period", rotation_period)
@@ -44,6 +52,8 @@ class SecretBackendStaticRoleArgs:
44
52
  pulumi.set(__self__, "mount", mount)
45
53
  if namespace is not None:
46
54
  pulumi.set(__self__, "namespace", namespace)
55
+ if skip_import_rotation is not None:
56
+ pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
47
57
 
48
58
  @property
49
59
  @pulumi.getter(name="roleName")
@@ -114,7 +124,7 @@ class SecretBackendStaticRoleArgs:
114
124
  """
115
125
  The namespace to provision the resource in.
116
126
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
128
  *Available only for Vault Enterprise*.
119
129
  """
120
130
  return pulumi.get(self, "namespace")
@@ -123,6 +133,19 @@ class SecretBackendStaticRoleArgs:
123
133
  def namespace(self, value: Optional[pulumi.Input[str]]):
124
134
  pulumi.set(self, "namespace", value)
125
135
 
136
+ @property
137
+ @pulumi.getter(name="skipImportRotation")
138
+ def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
139
+ """
140
+ Causes vault to skip the initial secret rotation on import. Not applicable to updates.
141
+ Requires Vault 1.16 or above.
142
+ """
143
+ return pulumi.get(self, "skip_import_rotation")
144
+
145
+ @skip_import_rotation.setter
146
+ def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
147
+ pulumi.set(self, "skip_import_rotation", value)
148
+
126
149
 
127
150
  @pulumi.input_type
128
151
  class _SecretBackendStaticRoleState:
@@ -132,6 +155,7 @@ class _SecretBackendStaticRoleState:
132
155
  namespace: Optional[pulumi.Input[str]] = None,
133
156
  role_name: Optional[pulumi.Input[str]] = None,
134
157
  rotation_period: Optional[pulumi.Input[int]] = None,
158
+ skip_import_rotation: Optional[pulumi.Input[bool]] = None,
135
159
  username: Optional[pulumi.Input[str]] = None):
136
160
  """
137
161
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
@@ -142,10 +166,12 @@ class _SecretBackendStaticRoleState:
142
166
  not begin or end with a `/`. Defaults to `ldap`.
143
167
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
144
168
  The value should not contain leading or trailing forward slashes.
145
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
169
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
146
170
  *Available only for Vault Enterprise*.
147
171
  :param pulumi.Input[str] role_name: Name of the role.
148
172
  :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
173
+ :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
174
+ Requires Vault 1.16 or above.
149
175
  :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
150
176
  """
151
177
  if dn is not None:
@@ -158,6 +184,8 @@ class _SecretBackendStaticRoleState:
158
184
  pulumi.set(__self__, "role_name", role_name)
159
185
  if rotation_period is not None:
160
186
  pulumi.set(__self__, "rotation_period", rotation_period)
187
+ if skip_import_rotation is not None:
188
+ pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
161
189
  if username is not None:
162
190
  pulumi.set(__self__, "username", username)
163
191
 
@@ -194,7 +222,7 @@ class _SecretBackendStaticRoleState:
194
222
  """
195
223
  The namespace to provision the resource in.
196
224
  The value should not contain leading or trailing forward slashes.
197
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
225
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
226
  *Available only for Vault Enterprise*.
199
227
  """
200
228
  return pulumi.get(self, "namespace")
@@ -227,6 +255,19 @@ class _SecretBackendStaticRoleState:
227
255
  def rotation_period(self, value: Optional[pulumi.Input[int]]):
228
256
  pulumi.set(self, "rotation_period", value)
229
257
 
258
+ @property
259
+ @pulumi.getter(name="skipImportRotation")
260
+ def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
261
+ """
262
+ Causes vault to skip the initial secret rotation on import. Not applicable to updates.
263
+ Requires Vault 1.16 or above.
264
+ """
265
+ return pulumi.get(self, "skip_import_rotation")
266
+
267
+ @skip_import_rotation.setter
268
+ def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
269
+ pulumi.set(self, "skip_import_rotation", value)
270
+
230
271
  @property
231
272
  @pulumi.getter
232
273
  def username(self) -> Optional[pulumi.Input[str]]:
@@ -250,12 +291,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
250
291
  namespace: Optional[pulumi.Input[str]] = None,
251
292
  role_name: Optional[pulumi.Input[str]] = None,
252
293
  rotation_period: Optional[pulumi.Input[int]] = None,
294
+ skip_import_rotation: Optional[pulumi.Input[bool]] = None,
253
295
  username: Optional[pulumi.Input[str]] = None,
254
296
  __props__=None):
255
297
  """
256
298
  ## Example Usage
257
299
 
258
- <!--Start PulumiCodeChooser -->
259
300
  ```python
260
301
  import pulumi
261
302
  import pulumi_vault as vault
@@ -274,7 +315,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
274
315
  role_name="alice",
275
316
  rotation_period=60)
276
317
  ```
277
- <!--End PulumiCodeChooser -->
278
318
 
279
319
  ## Import
280
320
 
@@ -294,10 +334,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
294
334
  not begin or end with a `/`. Defaults to `ldap`.
295
335
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
296
336
  The value should not contain leading or trailing forward slashes.
297
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
337
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
298
338
  *Available only for Vault Enterprise*.
299
339
  :param pulumi.Input[str] role_name: Name of the role.
300
340
  :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
341
+ :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
342
+ Requires Vault 1.16 or above.
301
343
  :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
302
344
  """
303
345
  ...
@@ -309,7 +351,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
309
351
  """
310
352
  ## Example Usage
311
353
 
312
- <!--Start PulumiCodeChooser -->
313
354
  ```python
314
355
  import pulumi
315
356
  import pulumi_vault as vault
@@ -328,7 +369,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
328
369
  role_name="alice",
329
370
  rotation_period=60)
330
371
  ```
331
- <!--End PulumiCodeChooser -->
332
372
 
333
373
  ## Import
334
374
 
@@ -359,6 +399,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
359
399
  namespace: Optional[pulumi.Input[str]] = None,
360
400
  role_name: Optional[pulumi.Input[str]] = None,
361
401
  rotation_period: Optional[pulumi.Input[int]] = None,
402
+ skip_import_rotation: Optional[pulumi.Input[bool]] = None,
362
403
  username: Optional[pulumi.Input[str]] = None,
363
404
  __props__=None):
364
405
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -378,6 +419,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
378
419
  if rotation_period is None and not opts.urn:
379
420
  raise TypeError("Missing required property 'rotation_period'")
380
421
  __props__.__dict__["rotation_period"] = rotation_period
422
+ __props__.__dict__["skip_import_rotation"] = skip_import_rotation
381
423
  if username is None and not opts.urn:
382
424
  raise TypeError("Missing required property 'username'")
383
425
  __props__.__dict__["username"] = username
@@ -396,6 +438,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
396
438
  namespace: Optional[pulumi.Input[str]] = None,
397
439
  role_name: Optional[pulumi.Input[str]] = None,
398
440
  rotation_period: Optional[pulumi.Input[int]] = None,
441
+ skip_import_rotation: Optional[pulumi.Input[bool]] = None,
399
442
  username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
400
443
  """
401
444
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
@@ -411,10 +454,12 @@ class SecretBackendStaticRole(pulumi.CustomResource):
411
454
  not begin or end with a `/`. Defaults to `ldap`.
412
455
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
413
456
  The value should not contain leading or trailing forward slashes.
414
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
457
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
415
458
  *Available only for Vault Enterprise*.
416
459
  :param pulumi.Input[str] role_name: Name of the role.
417
460
  :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
461
+ :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
462
+ Requires Vault 1.16 or above.
418
463
  :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
419
464
  """
420
465
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -426,6 +471,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
426
471
  __props__.__dict__["namespace"] = namespace
427
472
  __props__.__dict__["role_name"] = role_name
428
473
  __props__.__dict__["rotation_period"] = rotation_period
474
+ __props__.__dict__["skip_import_rotation"] = skip_import_rotation
429
475
  __props__.__dict__["username"] = username
430
476
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
431
477
 
@@ -454,7 +500,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
454
500
  """
455
501
  The namespace to provision the resource in.
456
502
  The value should not contain leading or trailing forward slashes.
457
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
503
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
458
504
  *Available only for Vault Enterprise*.
459
505
  """
460
506
  return pulumi.get(self, "namespace")
@@ -475,6 +521,15 @@ class SecretBackendStaticRole(pulumi.CustomResource):
475
521
  """
476
522
  return pulumi.get(self, "rotation_period")
477
523
 
524
+ @property
525
+ @pulumi.getter(name="skipImportRotation")
526
+ def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
527
+ """
528
+ Causes vault to skip the initial secret rotation on import. Not applicable to updates.
529
+ Requires Vault 1.16 or above.
530
+ """
531
+ return pulumi.get(self, "skip_import_rotation")
532
+
478
533
  @property
479
534
  @pulumi.getter
480
535
  def username(self) -> pulumi.Output[str]: