pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
@@ -19,7 +24,9 @@ class AuthBackendRoleSecretIdArgs:
19
24
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
25
  metadata: Optional[pulumi.Input[str]] = None,
21
26
  namespace: Optional[pulumi.Input[str]] = None,
27
+ num_uses: Optional[pulumi.Input[int]] = None,
22
28
  secret_id: Optional[pulumi.Input[str]] = None,
29
+ ttl: Optional[pulumi.Input[int]] = None,
23
30
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
24
31
  wrapping_ttl: Optional[pulumi.Input[str]] = None):
25
32
  """
@@ -32,10 +39,12 @@ class AuthBackendRoleSecretIdArgs:
32
39
  key-value pairs to be set on tokens issued with this SecretID.
33
40
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
41
  The value should not contain leading or trailing forward slashes.
35
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
43
  *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
37
45
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
38
46
  mode. Defaults to Vault auto-generating SecretIDs.
47
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
39
48
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
40
49
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
41
50
  invalidated through unwrapping.
@@ -53,8 +62,12 @@ class AuthBackendRoleSecretIdArgs:
53
62
  pulumi.set(__self__, "metadata", metadata)
54
63
  if namespace is not None:
55
64
  pulumi.set(__self__, "namespace", namespace)
65
+ if num_uses is not None:
66
+ pulumi.set(__self__, "num_uses", num_uses)
56
67
  if secret_id is not None:
57
68
  pulumi.set(__self__, "secret_id", secret_id)
69
+ if ttl is not None:
70
+ pulumi.set(__self__, "ttl", ttl)
58
71
  if with_wrapped_accessor is not None:
59
72
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
60
73
  if wrapping_ttl is not None:
@@ -116,7 +129,7 @@ class AuthBackendRoleSecretIdArgs:
116
129
  """
117
130
  The namespace to provision the resource in.
118
131
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
132
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
133
  *Available only for Vault Enterprise*.
121
134
  """
122
135
  return pulumi.get(self, "namespace")
@@ -125,6 +138,18 @@ class AuthBackendRoleSecretIdArgs:
125
138
  def namespace(self, value: Optional[pulumi.Input[str]]):
126
139
  pulumi.set(self, "namespace", value)
127
140
 
141
+ @property
142
+ @pulumi.getter(name="numUses")
143
+ def num_uses(self) -> Optional[pulumi.Input[int]]:
144
+ """
145
+ The number of uses for the secret-id.
146
+ """
147
+ return pulumi.get(self, "num_uses")
148
+
149
+ @num_uses.setter
150
+ def num_uses(self, value: Optional[pulumi.Input[int]]):
151
+ pulumi.set(self, "num_uses", value)
152
+
128
153
  @property
129
154
  @pulumi.getter(name="secretId")
130
155
  def secret_id(self) -> Optional[pulumi.Input[str]]:
@@ -138,6 +163,18 @@ class AuthBackendRoleSecretIdArgs:
138
163
  def secret_id(self, value: Optional[pulumi.Input[str]]):
139
164
  pulumi.set(self, "secret_id", value)
140
165
 
166
+ @property
167
+ @pulumi.getter
168
+ def ttl(self) -> Optional[pulumi.Input[int]]:
169
+ """
170
+ The TTL duration of the SecretID.
171
+ """
172
+ return pulumi.get(self, "ttl")
173
+
174
+ @ttl.setter
175
+ def ttl(self, value: Optional[pulumi.Input[int]]):
176
+ pulumi.set(self, "ttl", value)
177
+
141
178
  @property
142
179
  @pulumi.getter(name="withWrappedAccessor")
143
180
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -176,8 +213,10 @@ class _AuthBackendRoleSecretIdState:
176
213
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
177
214
  metadata: Optional[pulumi.Input[str]] = None,
178
215
  namespace: Optional[pulumi.Input[str]] = None,
216
+ num_uses: Optional[pulumi.Input[int]] = None,
179
217
  role_name: Optional[pulumi.Input[str]] = None,
180
218
  secret_id: Optional[pulumi.Input[str]] = None,
219
+ ttl: Optional[pulumi.Input[int]] = None,
181
220
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
182
221
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
183
222
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -192,11 +231,13 @@ class _AuthBackendRoleSecretIdState:
192
231
  key-value pairs to be set on tokens issued with this SecretID.
193
232
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
194
233
  The value should not contain leading or trailing forward slashes.
195
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
234
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
235
  *Available only for Vault Enterprise*.
236
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
197
237
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
198
238
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
199
239
  mode. Defaults to Vault auto-generating SecretIDs.
240
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
200
241
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
201
242
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
202
243
  invalidated through unwrapping.
@@ -218,10 +259,14 @@ class _AuthBackendRoleSecretIdState:
218
259
  pulumi.set(__self__, "metadata", metadata)
219
260
  if namespace is not None:
220
261
  pulumi.set(__self__, "namespace", namespace)
262
+ if num_uses is not None:
263
+ pulumi.set(__self__, "num_uses", num_uses)
221
264
  if role_name is not None:
222
265
  pulumi.set(__self__, "role_name", role_name)
223
266
  if secret_id is not None:
224
267
  pulumi.set(__self__, "secret_id", secret_id)
268
+ if ttl is not None:
269
+ pulumi.set(__self__, "ttl", ttl)
225
270
  if with_wrapped_accessor is not None:
226
271
  pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
227
272
  if wrapping_accessor is not None:
@@ -287,7 +332,7 @@ class _AuthBackendRoleSecretIdState:
287
332
  """
288
333
  The namespace to provision the resource in.
289
334
  The value should not contain leading or trailing forward slashes.
290
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
335
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
291
336
  *Available only for Vault Enterprise*.
292
337
  """
293
338
  return pulumi.get(self, "namespace")
@@ -296,6 +341,18 @@ class _AuthBackendRoleSecretIdState:
296
341
  def namespace(self, value: Optional[pulumi.Input[str]]):
297
342
  pulumi.set(self, "namespace", value)
298
343
 
344
+ @property
345
+ @pulumi.getter(name="numUses")
346
+ def num_uses(self) -> Optional[pulumi.Input[int]]:
347
+ """
348
+ The number of uses for the secret-id.
349
+ """
350
+ return pulumi.get(self, "num_uses")
351
+
352
+ @num_uses.setter
353
+ def num_uses(self, value: Optional[pulumi.Input[int]]):
354
+ pulumi.set(self, "num_uses", value)
355
+
299
356
  @property
300
357
  @pulumi.getter(name="roleName")
301
358
  def role_name(self) -> Optional[pulumi.Input[str]]:
@@ -321,6 +378,18 @@ class _AuthBackendRoleSecretIdState:
321
378
  def secret_id(self, value: Optional[pulumi.Input[str]]):
322
379
  pulumi.set(self, "secret_id", value)
323
380
 
381
+ @property
382
+ @pulumi.getter
383
+ def ttl(self) -> Optional[pulumi.Input[int]]:
384
+ """
385
+ The TTL duration of the SecretID.
386
+ """
387
+ return pulumi.get(self, "ttl")
388
+
389
+ @ttl.setter
390
+ def ttl(self, value: Optional[pulumi.Input[int]]):
391
+ pulumi.set(self, "ttl", value)
392
+
324
393
  @property
325
394
  @pulumi.getter(name="withWrappedAccessor")
326
395
  def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
@@ -385,8 +454,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
385
454
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
386
455
  metadata: Optional[pulumi.Input[str]] = None,
387
456
  namespace: Optional[pulumi.Input[str]] = None,
457
+ num_uses: Optional[pulumi.Input[int]] = None,
388
458
  role_name: Optional[pulumi.Input[str]] = None,
389
459
  secret_id: Optional[pulumi.Input[str]] = None,
460
+ ttl: Optional[pulumi.Input[int]] = None,
390
461
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
391
462
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
392
463
  __props__=None):
@@ -397,7 +468,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
397
468
 
398
469
  ## Example Usage
399
470
 
400
- <!--Start PulumiCodeChooser -->
401
471
  ```python
402
472
  import pulumi
403
473
  import json
@@ -419,7 +489,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
419
489
  "hello": "world",
420
490
  }))
421
491
  ```
422
- <!--End PulumiCodeChooser -->
423
492
 
424
493
  :param str resource_name: The name of the resource.
425
494
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -430,11 +499,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
430
499
  key-value pairs to be set on tokens issued with this SecretID.
431
500
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
432
501
  The value should not contain leading or trailing forward slashes.
433
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
502
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
434
503
  *Available only for Vault Enterprise*.
504
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
435
505
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
436
506
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
437
507
  mode. Defaults to Vault auto-generating SecretIDs.
508
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
438
509
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
439
510
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
440
511
  invalidated through unwrapping.
@@ -456,7 +527,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
456
527
 
457
528
  ## Example Usage
458
529
 
459
- <!--Start PulumiCodeChooser -->
460
530
  ```python
461
531
  import pulumi
462
532
  import json
@@ -478,7 +548,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
478
548
  "hello": "world",
479
549
  }))
480
550
  ```
481
- <!--End PulumiCodeChooser -->
482
551
 
483
552
  :param str resource_name: The name of the resource.
484
553
  :param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
@@ -499,8 +568,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
499
568
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
500
569
  metadata: Optional[pulumi.Input[str]] = None,
501
570
  namespace: Optional[pulumi.Input[str]] = None,
571
+ num_uses: Optional[pulumi.Input[int]] = None,
502
572
  role_name: Optional[pulumi.Input[str]] = None,
503
573
  secret_id: Optional[pulumi.Input[str]] = None,
574
+ ttl: Optional[pulumi.Input[int]] = None,
504
575
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
505
576
  wrapping_ttl: Optional[pulumi.Input[str]] = None,
506
577
  __props__=None):
@@ -516,10 +587,12 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
516
587
  __props__.__dict__["cidr_lists"] = cidr_lists
517
588
  __props__.__dict__["metadata"] = metadata
518
589
  __props__.__dict__["namespace"] = namespace
590
+ __props__.__dict__["num_uses"] = num_uses
519
591
  if role_name is None and not opts.urn:
520
592
  raise TypeError("Missing required property 'role_name'")
521
593
  __props__.__dict__["role_name"] = role_name
522
594
  __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
595
+ __props__.__dict__["ttl"] = ttl
523
596
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
524
597
  __props__.__dict__["wrapping_ttl"] = wrapping_ttl
525
598
  __props__.__dict__["accessor"] = None
@@ -544,8 +617,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
544
617
  cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
545
618
  metadata: Optional[pulumi.Input[str]] = None,
546
619
  namespace: Optional[pulumi.Input[str]] = None,
620
+ num_uses: Optional[pulumi.Input[int]] = None,
547
621
  role_name: Optional[pulumi.Input[str]] = None,
548
622
  secret_id: Optional[pulumi.Input[str]] = None,
623
+ ttl: Optional[pulumi.Input[int]] = None,
549
624
  with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
550
625
  wrapping_accessor: Optional[pulumi.Input[str]] = None,
551
626
  wrapping_token: Optional[pulumi.Input[str]] = None,
@@ -565,11 +640,13 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
565
640
  key-value pairs to be set on tokens issued with this SecretID.
566
641
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
567
642
  The value should not contain leading or trailing forward slashes.
568
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
643
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
569
644
  *Available only for Vault Enterprise*.
645
+ :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
570
646
  :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
571
647
  :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
572
648
  mode. Defaults to Vault auto-generating SecretIDs.
649
+ :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
573
650
  :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
574
651
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
575
652
  invalidated through unwrapping.
@@ -590,8 +667,10 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
590
667
  __props__.__dict__["cidr_lists"] = cidr_lists
591
668
  __props__.__dict__["metadata"] = metadata
592
669
  __props__.__dict__["namespace"] = namespace
670
+ __props__.__dict__["num_uses"] = num_uses
593
671
  __props__.__dict__["role_name"] = role_name
594
672
  __props__.__dict__["secret_id"] = secret_id
673
+ __props__.__dict__["ttl"] = ttl
595
674
  __props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
596
675
  __props__.__dict__["wrapping_accessor"] = wrapping_accessor
597
676
  __props__.__dict__["wrapping_token"] = wrapping_token
@@ -638,11 +717,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
638
717
  """
639
718
  The namespace to provision the resource in.
640
719
  The value should not contain leading or trailing forward slashes.
641
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
720
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
642
721
  *Available only for Vault Enterprise*.
643
722
  """
644
723
  return pulumi.get(self, "namespace")
645
724
 
725
+ @property
726
+ @pulumi.getter(name="numUses")
727
+ def num_uses(self) -> pulumi.Output[Optional[int]]:
728
+ """
729
+ The number of uses for the secret-id.
730
+ """
731
+ return pulumi.get(self, "num_uses")
732
+
646
733
  @property
647
734
  @pulumi.getter(name="roleName")
648
735
  def role_name(self) -> pulumi.Output[str]:
@@ -660,6 +747,14 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
660
747
  """
661
748
  return pulumi.get(self, "secret_id")
662
749
 
750
+ @property
751
+ @pulumi.getter
752
+ def ttl(self) -> pulumi.Output[Optional[int]]:
753
+ """
754
+ The TTL duration of the SecretID.
755
+ """
756
+ return pulumi.get(self, "ttl")
757
+
663
758
  @property
664
759
  @pulumi.getter(name="withWrappedAccessor")
665
760
  def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -92,7 +97,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
92
97
 
93
98
  ## Example Usage
94
99
 
95
- <!--Start PulumiCodeChooser -->
96
100
  ```python
97
101
  import pulumi
98
102
  import pulumi_vault as vault
@@ -101,7 +105,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
101
105
  role_name="my-role")
102
106
  pulumi.export("role-id", role.role_id)
103
107
  ```
104
- <!--End PulumiCodeChooser -->
105
108
 
106
109
 
107
110
  :param str backend: The unique name for the AppRole backend the role to
@@ -125,19 +128,15 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
125
128
  namespace=pulumi.get(__ret__, 'namespace'),
126
129
  role_id=pulumi.get(__ret__, 'role_id'),
127
130
  role_name=pulumi.get(__ret__, 'role_name'))
128
-
129
-
130
- @_utilities.lift_output_func(get_auth_backend_role_id)
131
131
  def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
132
132
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
133
133
  role_name: Optional[pulumi.Input[str]] = None,
134
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
134
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]:
135
135
  """
136
136
  Reads the Role ID of an AppRole from a Vault server.
137
137
 
138
138
  ## Example Usage
139
139
 
140
- <!--Start PulumiCodeChooser -->
141
140
  ```python
142
141
  import pulumi
143
142
  import pulumi_vault as vault
@@ -146,7 +145,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
146
145
  role_name="my-role")
147
146
  pulumi.export("role-id", role.role_id)
148
147
  ```
149
- <!--End PulumiCodeChooser -->
150
148
 
151
149
 
152
150
  :param str backend: The unique name for the AppRole backend the role to
@@ -157,4 +155,15 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
157
155
  *Available only for Vault Enterprise*.
158
156
  :param str role_name: The name of the role to retrieve the Role ID for.
159
157
  """
160
- ...
158
+ __args__ = dict()
159
+ __args__['backend'] = backend
160
+ __args__['namespace'] = namespace
161
+ __args__['roleName'] = role_name
162
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
163
+ __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult)
164
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult(
165
+ backend=pulumi.get(__response__, 'backend'),
166
+ id=pulumi.get(__response__, 'id'),
167
+ namespace=pulumi.get(__response__, 'namespace'),
168
+ role_id=pulumi.get(__response__, 'role_id'),
169
+ role_name=pulumi.get(__response__, 'role_name')))
pulumi_vault/audit.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['AuditArgs', 'Audit']
@@ -30,7 +35,7 @@ class AuditArgs:
30
35
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
31
36
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
37
  The value should not contain leading or trailing forward slashes.
33
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
39
  *Available only for Vault Enterprise*.
35
40
  :param pulumi.Input[str] path: The path to mount the audit device. This defaults to the type.
36
41
  """
@@ -101,7 +106,7 @@ class AuditArgs:
101
106
  """
102
107
  The namespace to provision the resource in.
103
108
  The value should not contain leading or trailing forward slashes.
104
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
109
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
105
110
  *Available only for Vault Enterprise*.
106
111
  """
107
112
  return pulumi.get(self, "namespace")
@@ -138,7 +143,7 @@ class _AuditState:
138
143
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
139
144
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
144
149
 
@@ -189,7 +194,7 @@ class _AuditState:
189
194
  """
190
195
  The namespace to provision the resource in.
191
196
  The value should not contain leading or trailing forward slashes.
192
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
197
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
198
  *Available only for Vault Enterprise*.
194
199
  """
195
200
  return pulumi.get(self, "namespace")
@@ -254,37 +259,33 @@ class Audit(pulumi.CustomResource):
254
259
 
255
260
  ### File Audit Device)
256
261
 
257
- <!--Start PulumiCodeChooser -->
258
262
  ```python
259
263
  import pulumi
260
264
  import pulumi_vault as vault
261
265
 
262
266
  test = vault.Audit("test",
267
+ type="file",
263
268
  options={
264
269
  "file_path": "C:/temp/audit.txt",
265
- },
266
- type="file")
270
+ })
267
271
  ```
268
- <!--End PulumiCodeChooser -->
269
272
 
270
273
  ### Socket Audit Device)
271
274
 
272
- <!--Start PulumiCodeChooser -->
273
275
  ```python
274
276
  import pulumi
275
277
  import pulumi_vault as vault
276
278
 
277
279
  test = vault.Audit("test",
280
+ type="socket",
281
+ path="app_socket",
278
282
  local=False,
279
283
  options={
280
284
  "address": "127.0.0.1:8000",
281
- "description": "application x socket",
282
285
  "socket_type": "tcp",
283
- },
284
- path="app_socket",
285
- type="socket")
286
+ "description": "application x socket",
287
+ })
286
288
  ```
287
- <!--End PulumiCodeChooser -->
288
289
 
289
290
  ## Import
290
291
 
@@ -300,7 +301,7 @@ class Audit(pulumi.CustomResource):
300
301
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
301
302
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
302
303
  The value should not contain leading or trailing forward slashes.
303
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
305
  *Available only for Vault Enterprise*.
305
306
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
306
307
 
@@ -319,37 +320,33 @@ class Audit(pulumi.CustomResource):
319
320
 
320
321
  ### File Audit Device)
321
322
 
322
- <!--Start PulumiCodeChooser -->
323
323
  ```python
324
324
  import pulumi
325
325
  import pulumi_vault as vault
326
326
 
327
327
  test = vault.Audit("test",
328
+ type="file",
328
329
  options={
329
330
  "file_path": "C:/temp/audit.txt",
330
- },
331
- type="file")
331
+ })
332
332
  ```
333
- <!--End PulumiCodeChooser -->
334
333
 
335
334
  ### Socket Audit Device)
336
335
 
337
- <!--Start PulumiCodeChooser -->
338
336
  ```python
339
337
  import pulumi
340
338
  import pulumi_vault as vault
341
339
 
342
340
  test = vault.Audit("test",
341
+ type="socket",
342
+ path="app_socket",
343
343
  local=False,
344
344
  options={
345
345
  "address": "127.0.0.1:8000",
346
- "description": "application x socket",
347
346
  "socket_type": "tcp",
348
- },
349
- path="app_socket",
350
- type="socket")
347
+ "description": "application x socket",
348
+ })
351
349
  ```
352
- <!--End PulumiCodeChooser -->
353
350
 
354
351
  ## Import
355
352
 
@@ -426,7 +423,7 @@ class Audit(pulumi.CustomResource):
426
423
  :param pulumi.Input[bool] local: Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication.
427
424
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
428
425
  The value should not contain leading or trailing forward slashes.
429
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
426
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
430
427
  *Available only for Vault Enterprise*.
431
428
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Configuration options to pass to the audit device itself.
432
429
 
@@ -468,7 +465,7 @@ class Audit(pulumi.CustomResource):
468
465
  """
469
466
  The namespace to provision the resource in.
470
467
  The value should not contain leading or trailing forward slashes.
471
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
468
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
472
469
  *Available only for Vault Enterprise*.
473
470
  """
474
471
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['AuditRequestHeaderArgs', 'AuditRequestHeader']
@@ -142,14 +147,14 @@ class AuditRequestHeader(pulumi.CustomResource):
142
147
 
143
148
  ## Example Usage
144
149
 
145
- <!--Start PulumiCodeChooser -->
146
150
  ```python
147
151
  import pulumi
148
152
  import pulumi_vault as vault
149
153
 
150
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
154
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
155
+ name="X-Forwarded-For",
156
+ hmac=False)
151
157
  ```
152
- <!--End PulumiCodeChooser -->
153
158
 
154
159
  :param str resource_name: The name of the resource.
155
160
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -173,14 +178,14 @@ class AuditRequestHeader(pulumi.CustomResource):
173
178
 
174
179
  ## Example Usage
175
180
 
176
- <!--Start PulumiCodeChooser -->
177
181
  ```python
178
182
  import pulumi
179
183
  import pulumi_vault as vault
180
184
 
181
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
185
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
186
+ name="X-Forwarded-For",
187
+ hmac=False)
182
188
  ```
183
- <!--End PulumiCodeChooser -->
184
189
 
185
190
  :param str resource_name: The name of the resource.
186
191
  :param AuditRequestHeaderArgs args: The arguments to use to populate this resource's properties.