pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretRoleArgs', 'SecretRole']
@@ -24,17 +29,12 @@ class SecretRoleArgs:
24
29
  user_id: Optional[pulumi.Input[str]] = None):
25
30
  """
26
31
  The set of arguments for constructing a SecretRole resource.
27
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
28
32
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
29
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
30
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
34
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
36
  *Available only for Vault Enterprise*.
34
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
36
37
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
37
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
38
38
  """
39
39
  if backend is not None:
40
40
  pulumi.set(__self__, "backend", backend)
@@ -56,9 +56,6 @@ class SecretRoleArgs:
56
56
  @property
57
57
  @pulumi.getter
58
58
  def backend(self) -> Optional[pulumi.Input[str]]:
59
- """
60
- The path of the Terraform Cloud Secret Backend the role belongs to.
61
- """
62
59
  return pulumi.get(self, "backend")
63
60
 
64
61
  @backend.setter
@@ -80,9 +77,6 @@ class SecretRoleArgs:
80
77
  @property
81
78
  @pulumi.getter
82
79
  def name(self) -> Optional[pulumi.Input[str]]:
83
- """
84
- The name of an existing role against which to create this Terraform Cloud credential
85
- """
86
80
  return pulumi.get(self, "name")
87
81
 
88
82
  @name.setter
@@ -95,7 +89,7 @@ class SecretRoleArgs:
95
89
  """
96
90
  The namespace to provision the resource in.
97
91
  The value should not contain leading or trailing forward slashes.
98
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
92
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
99
93
  *Available only for Vault Enterprise*.
100
94
  """
101
95
  return pulumi.get(self, "namespace")
@@ -107,9 +101,6 @@ class SecretRoleArgs:
107
101
  @property
108
102
  @pulumi.getter
109
103
  def organization(self) -> Optional[pulumi.Input[str]]:
110
- """
111
- Name of the Terraform Cloud or Enterprise organization
112
- """
113
104
  return pulumi.get(self, "organization")
114
105
 
115
106
  @organization.setter
@@ -119,9 +110,6 @@ class SecretRoleArgs:
119
110
  @property
120
111
  @pulumi.getter(name="teamId")
121
112
  def team_id(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
124
- """
125
113
  return pulumi.get(self, "team_id")
126
114
 
127
115
  @team_id.setter
@@ -143,9 +131,6 @@ class SecretRoleArgs:
143
131
  @property
144
132
  @pulumi.getter(name="userId")
145
133
  def user_id(self) -> Optional[pulumi.Input[str]]:
146
- """
147
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
148
- """
149
134
  return pulumi.get(self, "user_id")
150
135
 
151
136
  @user_id.setter
@@ -166,17 +151,12 @@ class _SecretRoleState:
166
151
  user_id: Optional[pulumi.Input[str]] = None):
167
152
  """
168
153
  Input properties used for looking up and filtering SecretRole resources.
169
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
170
154
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
171
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
172
155
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
173
156
  The value should not contain leading or trailing forward slashes.
174
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
158
  *Available only for Vault Enterprise*.
176
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
178
159
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
179
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
180
160
  """
181
161
  if backend is not None:
182
162
  pulumi.set(__self__, "backend", backend)
@@ -198,9 +178,6 @@ class _SecretRoleState:
198
178
  @property
199
179
  @pulumi.getter
200
180
  def backend(self) -> Optional[pulumi.Input[str]]:
201
- """
202
- The path of the Terraform Cloud Secret Backend the role belongs to.
203
- """
204
181
  return pulumi.get(self, "backend")
205
182
 
206
183
  @backend.setter
@@ -222,9 +199,6 @@ class _SecretRoleState:
222
199
  @property
223
200
  @pulumi.getter
224
201
  def name(self) -> Optional[pulumi.Input[str]]:
225
- """
226
- The name of an existing role against which to create this Terraform Cloud credential
227
- """
228
202
  return pulumi.get(self, "name")
229
203
 
230
204
  @name.setter
@@ -237,7 +211,7 @@ class _SecretRoleState:
237
211
  """
238
212
  The namespace to provision the resource in.
239
213
  The value should not contain leading or trailing forward slashes.
240
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
214
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
241
215
  *Available only for Vault Enterprise*.
242
216
  """
243
217
  return pulumi.get(self, "namespace")
@@ -249,9 +223,6 @@ class _SecretRoleState:
249
223
  @property
250
224
  @pulumi.getter
251
225
  def organization(self) -> Optional[pulumi.Input[str]]:
252
- """
253
- Name of the Terraform Cloud or Enterprise organization
254
- """
255
226
  return pulumi.get(self, "organization")
256
227
 
257
228
  @organization.setter
@@ -261,9 +232,6 @@ class _SecretRoleState:
261
232
  @property
262
233
  @pulumi.getter(name="teamId")
263
234
  def team_id(self) -> Optional[pulumi.Input[str]]:
264
- """
265
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
266
- """
267
235
  return pulumi.get(self, "team_id")
268
236
 
269
237
  @team_id.setter
@@ -285,9 +253,6 @@ class _SecretRoleState:
285
253
  @property
286
254
  @pulumi.getter(name="userId")
287
255
  def user_id(self) -> Optional[pulumi.Input[str]]:
288
- """
289
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
290
- """
291
256
  return pulumi.get(self, "user_id")
292
257
 
293
258
  @user_id.setter
@@ -312,7 +277,6 @@ class SecretRole(pulumi.CustomResource):
312
277
  """
313
278
  ## Example Usage
314
279
 
315
- <!--Start PulumiCodeChooser -->
316
280
  ```python
317
281
  import pulumi
318
282
  import pulumi_vault as vault
@@ -323,10 +287,10 @@ class SecretRole(pulumi.CustomResource):
323
287
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
288
  example = vault.terraformcloud.SecretRole("example",
325
289
  backend=test.backend,
290
+ name="test-role",
326
291
  organization="example-organization-name",
327
292
  team_id="team-ieF4isC...")
328
293
  ```
329
- <!--End PulumiCodeChooser -->
330
294
 
331
295
  ## Import
332
296
 
@@ -338,17 +302,12 @@ class SecretRole(pulumi.CustomResource):
338
302
 
339
303
  :param str resource_name: The name of the resource.
340
304
  :param pulumi.ResourceOptions opts: Options for the resource.
341
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
342
305
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
343
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
344
306
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
345
307
  The value should not contain leading or trailing forward slashes.
346
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
308
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
309
  *Available only for Vault Enterprise*.
348
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
349
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
350
310
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
351
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
352
311
  """
353
312
  ...
354
313
  @overload
@@ -359,7 +318,6 @@ class SecretRole(pulumi.CustomResource):
359
318
  """
360
319
  ## Example Usage
361
320
 
362
- <!--Start PulumiCodeChooser -->
363
321
  ```python
364
322
  import pulumi
365
323
  import pulumi_vault as vault
@@ -370,10 +328,10 @@ class SecretRole(pulumi.CustomResource):
370
328
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
371
329
  example = vault.terraformcloud.SecretRole("example",
372
330
  backend=test.backend,
331
+ name="test-role",
373
332
  organization="example-organization-name",
374
333
  team_id="team-ieF4isC...")
375
334
  ```
376
- <!--End PulumiCodeChooser -->
377
335
 
378
336
  ## Import
379
337
 
@@ -448,17 +406,12 @@ class SecretRole(pulumi.CustomResource):
448
406
  :param str resource_name: The unique name of the resulting resource.
449
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
450
408
  :param pulumi.ResourceOptions opts: Options for the resource.
451
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
452
409
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
453
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
454
410
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
455
411
  The value should not contain leading or trailing forward slashes.
456
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
412
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
457
413
  *Available only for Vault Enterprise*.
458
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
459
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
460
414
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
461
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
462
415
  """
463
416
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
464
417
 
@@ -477,9 +430,6 @@ class SecretRole(pulumi.CustomResource):
477
430
  @property
478
431
  @pulumi.getter
479
432
  def backend(self) -> pulumi.Output[Optional[str]]:
480
- """
481
- The path of the Terraform Cloud Secret Backend the role belongs to.
482
- """
483
433
  return pulumi.get(self, "backend")
484
434
 
485
435
  @property
@@ -493,9 +443,6 @@ class SecretRole(pulumi.CustomResource):
493
443
  @property
494
444
  @pulumi.getter
495
445
  def name(self) -> pulumi.Output[str]:
496
- """
497
- The name of an existing role against which to create this Terraform Cloud credential
498
- """
499
446
  return pulumi.get(self, "name")
500
447
 
501
448
  @property
@@ -504,7 +451,7 @@ class SecretRole(pulumi.CustomResource):
504
451
  """
505
452
  The namespace to provision the resource in.
506
453
  The value should not contain leading or trailing forward slashes.
507
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
454
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
508
455
  *Available only for Vault Enterprise*.
509
456
  """
510
457
  return pulumi.get(self, "namespace")
@@ -512,17 +459,11 @@ class SecretRole(pulumi.CustomResource):
512
459
  @property
513
460
  @pulumi.getter
514
461
  def organization(self) -> pulumi.Output[Optional[str]]:
515
- """
516
- Name of the Terraform Cloud or Enterprise organization
517
- """
518
462
  return pulumi.get(self, "organization")
519
463
 
520
464
  @property
521
465
  @pulumi.getter(name="teamId")
522
466
  def team_id(self) -> pulumi.Output[Optional[str]]:
523
- """
524
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
525
- """
526
467
  return pulumi.get(self, "team_id")
527
468
 
528
469
  @property
@@ -536,8 +477,5 @@ class SecretRole(pulumi.CustomResource):
536
477
  @property
537
478
  @pulumi.getter(name="userId")
538
479
  def user_id(self) -> pulumi.Output[Optional[str]]:
539
- """
540
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
541
- """
542
480
  return pulumi.get(self, "user_id")
543
481
 
pulumi_vault/token.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['TokenArgs', 'Token']
@@ -36,7 +41,7 @@ class TokenArgs:
36
41
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
37
42
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
43
  The value should not contain leading or trailing forward slashes.
39
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
44
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
45
  *Available only for Vault Enterprise*.
41
46
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
42
47
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -123,7 +128,7 @@ class TokenArgs:
123
128
  """
124
129
  The namespace to provision the resource in.
125
130
  The value should not contain leading or trailing forward slashes.
126
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
131
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
127
132
  *Available only for Vault Enterprise*.
128
133
  """
129
134
  return pulumi.get(self, "namespace")
@@ -298,7 +303,7 @@ class _TokenState:
298
303
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
299
304
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
300
305
  The value should not contain leading or trailing forward slashes.
301
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
306
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
307
  *Available only for Vault Enterprise*.
303
308
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
304
309
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -433,7 +438,7 @@ class _TokenState:
433
438
  """
434
439
  The namespace to provision the resource in.
435
440
  The value should not contain leading or trailing forward slashes.
436
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
441
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
437
442
  *Available only for Vault Enterprise*.
438
443
  """
439
444
  return pulumi.get(self, "namespace")
@@ -623,26 +628,24 @@ class Token(pulumi.CustomResource):
623
628
  """
624
629
  ## Example Usage
625
630
 
626
- <!--Start PulumiCodeChooser -->
627
631
  ```python
628
632
  import pulumi
629
633
  import pulumi_vault as vault
630
634
 
631
635
  example = vault.Token("example",
632
- metadata={
633
- "purpose": "service-account",
634
- },
636
+ role_name="app",
635
637
  policies=[
636
638
  "policy1",
637
639
  "policy2",
638
640
  ],
639
- renew_increment=86400,
640
- renew_min_lease=43200,
641
641
  renewable=True,
642
- role_name="app",
643
- ttl="24h")
642
+ ttl="24h",
643
+ renew_min_lease=43200,
644
+ renew_increment=86400,
645
+ metadata={
646
+ "purpose": "service-account",
647
+ })
644
648
  ```
645
- <!--End PulumiCodeChooser -->
646
649
 
647
650
  ## Import
648
651
 
@@ -659,7 +662,7 @@ class Token(pulumi.CustomResource):
659
662
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
660
663
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
661
664
  The value should not contain leading or trailing forward slashes.
662
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
665
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
663
666
  *Available only for Vault Enterprise*.
664
667
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
665
668
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -682,26 +685,24 @@ class Token(pulumi.CustomResource):
682
685
  """
683
686
  ## Example Usage
684
687
 
685
- <!--Start PulumiCodeChooser -->
686
688
  ```python
687
689
  import pulumi
688
690
  import pulumi_vault as vault
689
691
 
690
692
  example = vault.Token("example",
691
- metadata={
692
- "purpose": "service-account",
693
- },
693
+ role_name="app",
694
694
  policies=[
695
695
  "policy1",
696
696
  "policy2",
697
697
  ],
698
- renew_increment=86400,
699
- renew_min_lease=43200,
700
698
  renewable=True,
701
- role_name="app",
702
- ttl="24h")
699
+ ttl="24h",
700
+ renew_min_lease=43200,
701
+ renew_increment=86400,
702
+ metadata={
703
+ "purpose": "service-account",
704
+ })
703
705
  ```
704
- <!--End PulumiCodeChooser -->
705
706
 
706
707
  ## Import
707
708
 
@@ -817,7 +818,7 @@ class Token(pulumi.CustomResource):
817
818
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata to be set on this token
818
819
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
819
820
  The value should not contain leading or trailing forward slashes.
820
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
821
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
821
822
  *Available only for Vault Enterprise*.
822
823
  :param pulumi.Input[bool] no_default_policy: Flag to not attach the default policy to this token
823
824
  :param pulumi.Input[bool] no_parent: Flag to create a token without parent
@@ -913,7 +914,7 @@ class Token(pulumi.CustomResource):
913
914
  """
914
915
  The namespace to provision the resource in.
915
916
  The value should not contain leading or trailing forward slashes.
916
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
917
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
917
918
  *Available only for Vault Enterprise*.
918
919
  """
919
920
  return pulumi.get(self, "namespace")