pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -591,20 +591,21 @@ class SecretBackendRole(pulumi.CustomResource):
591
591
 
592
592
  Example using `service_account_name` mode:
593
593
 
594
- <!--Start PulumiCodeChooser -->
595
594
  ```python
596
595
  import pulumi
596
+ import pulumi_std as std
597
597
  import pulumi_vault as vault
598
598
 
599
599
  config = vault.kubernetes.SecretBackend("config",
600
600
  path="kubernetes",
601
601
  description="kubernetes secrets engine description",
602
602
  kubernetes_host="https://127.0.0.1:61233",
603
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
604
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
603
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
604
+ service_account_jwt=std.file(input="/path/to/token").result,
605
605
  disable_local_ca_jwt=False)
606
606
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
607
607
  backend=config.path,
608
+ name="service-account-name-role",
608
609
  allowed_kubernetes_namespaces=["*"],
609
610
  token_max_ttl=43200,
610
611
  token_default_ttl=21600,
@@ -618,24 +619,24 @@ class SecretBackendRole(pulumi.CustomResource):
618
619
  "location": "earth",
619
620
  })
620
621
  ```
621
- <!--End PulumiCodeChooser -->
622
622
 
623
623
  Example using `kubernetes_role_name` mode:
624
624
 
625
- <!--Start PulumiCodeChooser -->
626
625
  ```python
627
626
  import pulumi
627
+ import pulumi_std as std
628
628
  import pulumi_vault as vault
629
629
 
630
630
  config = vault.kubernetes.SecretBackend("config",
631
631
  path="kubernetes",
632
632
  description="kubernetes secrets engine description",
633
633
  kubernetes_host="https://127.0.0.1:61233",
634
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
635
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
634
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
635
+ service_account_jwt=std.file(input="/path/to/token").result,
636
636
  disable_local_ca_jwt=False)
637
637
  name_example = vault.kubernetes.SecretBackendRole("name-example",
638
638
  backend=config.path,
639
+ name="service-account-name-role",
639
640
  allowed_kubernetes_namespaces=["*"],
640
641
  token_max_ttl=43200,
641
642
  token_default_ttl=21600,
@@ -649,24 +650,24 @@ class SecretBackendRole(pulumi.CustomResource):
649
650
  "location": "earth",
650
651
  })
651
652
  ```
652
- <!--End PulumiCodeChooser -->
653
653
 
654
654
  Example using `generated_role_rules` mode:
655
655
 
656
- <!--Start PulumiCodeChooser -->
657
656
  ```python
658
657
  import pulumi
658
+ import pulumi_std as std
659
659
  import pulumi_vault as vault
660
660
 
661
661
  config = vault.kubernetes.SecretBackend("config",
662
662
  path="kubernetes",
663
663
  description="kubernetes secrets engine description",
664
664
  kubernetes_host="https://127.0.0.1:61233",
665
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
666
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
665
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
666
+ service_account_jwt=std.file(input="/path/to/token").result,
667
667
  disable_local_ca_jwt=False)
668
668
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
669
669
  backend=config.path,
670
+ name="service-account-name-role",
670
671
  allowed_kubernetes_namespaces=["*"],
671
672
  token_max_ttl=43200,
672
673
  token_default_ttl=21600,
@@ -685,7 +686,6 @@ class SecretBackendRole(pulumi.CustomResource):
685
686
  "location": "earth",
686
687
  })
687
688
  ```
688
- <!--End PulumiCodeChooser -->
689
689
 
690
690
  ## Import
691
691
 
@@ -748,20 +748,21 @@ class SecretBackendRole(pulumi.CustomResource):
748
748
 
749
749
  Example using `service_account_name` mode:
750
750
 
751
- <!--Start PulumiCodeChooser -->
752
751
  ```python
753
752
  import pulumi
753
+ import pulumi_std as std
754
754
  import pulumi_vault as vault
755
755
 
756
756
  config = vault.kubernetes.SecretBackend("config",
757
757
  path="kubernetes",
758
758
  description="kubernetes secrets engine description",
759
759
  kubernetes_host="https://127.0.0.1:61233",
760
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
761
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
760
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
761
+ service_account_jwt=std.file(input="/path/to/token").result,
762
762
  disable_local_ca_jwt=False)
763
763
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
764
764
  backend=config.path,
765
+ name="service-account-name-role",
765
766
  allowed_kubernetes_namespaces=["*"],
766
767
  token_max_ttl=43200,
767
768
  token_default_ttl=21600,
@@ -775,24 +776,24 @@ class SecretBackendRole(pulumi.CustomResource):
775
776
  "location": "earth",
776
777
  })
777
778
  ```
778
- <!--End PulumiCodeChooser -->
779
779
 
780
780
  Example using `kubernetes_role_name` mode:
781
781
 
782
- <!--Start PulumiCodeChooser -->
783
782
  ```python
784
783
  import pulumi
784
+ import pulumi_std as std
785
785
  import pulumi_vault as vault
786
786
 
787
787
  config = vault.kubernetes.SecretBackend("config",
788
788
  path="kubernetes",
789
789
  description="kubernetes secrets engine description",
790
790
  kubernetes_host="https://127.0.0.1:61233",
791
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
792
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
791
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
792
+ service_account_jwt=std.file(input="/path/to/token").result,
793
793
  disable_local_ca_jwt=False)
794
794
  name_example = vault.kubernetes.SecretBackendRole("name-example",
795
795
  backend=config.path,
796
+ name="service-account-name-role",
796
797
  allowed_kubernetes_namespaces=["*"],
797
798
  token_max_ttl=43200,
798
799
  token_default_ttl=21600,
@@ -806,24 +807,24 @@ class SecretBackendRole(pulumi.CustomResource):
806
807
  "location": "earth",
807
808
  })
808
809
  ```
809
- <!--End PulumiCodeChooser -->
810
810
 
811
811
  Example using `generated_role_rules` mode:
812
812
 
813
- <!--Start PulumiCodeChooser -->
814
813
  ```python
815
814
  import pulumi
815
+ import pulumi_std as std
816
816
  import pulumi_vault as vault
817
817
 
818
818
  config = vault.kubernetes.SecretBackend("config",
819
819
  path="kubernetes",
820
820
  description="kubernetes secrets engine description",
821
821
  kubernetes_host="https://127.0.0.1:61233",
822
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
823
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
822
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
823
+ service_account_jwt=std.file(input="/path/to/token").result,
824
824
  disable_local_ca_jwt=False)
825
825
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
826
826
  backend=config.path,
827
+ name="service-account-name-role",
827
828
  allowed_kubernetes_namespaces=["*"],
828
829
  token_max_ttl=43200,
829
830
  token_default_ttl=21600,
@@ -842,7 +843,6 @@ class SecretBackendRole(pulumi.CustomResource):
842
843
  "location": "earth",
843
844
  })
844
845
  ```
845
- <!--End PulumiCodeChooser -->
846
846
 
847
847
  ## Import
848
848
 
@@ -134,7 +134,6 @@ def get_secret(namespace: Optional[str] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
- <!--Start PulumiCodeChooser -->
138
137
  ```python
139
138
  import pulumi
140
139
  import json
@@ -155,7 +154,6 @@ def get_secret(namespace: Optional[str] = None,
155
154
  }))
156
155
  secret_data = vault.kv.get_secret_output(path=secret.path)
157
156
  ```
158
- <!--End PulumiCodeChooser -->
159
157
 
160
158
  ## Required Vault Capabilities
161
159
 
@@ -192,7 +190,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
190
  """
193
191
  ## Example Usage
194
192
 
195
- <!--Start PulumiCodeChooser -->
196
193
  ```python
197
194
  import pulumi
198
195
  import json
@@ -213,7 +210,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
213
210
  }))
214
211
  secret_data = vault.kv.get_secret_output(path=secret.path)
215
212
  ```
216
- <!--End PulumiCodeChooser -->
217
213
 
218
214
  ## Required Vault Capabilities
219
215
 
@@ -134,7 +134,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
- <!--Start PulumiCodeChooser -->
138
137
  ```python
139
138
  import pulumi
140
139
  import json
@@ -147,8 +146,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
147
146
  "version": "2",
148
147
  },
149
148
  description="KV Version 2 secret engine mount")
150
- aws_secret = vault.kv.SecretV2("awsSecret",
149
+ aws_secret = vault.kv.SecretV2("aws_secret",
151
150
  mount=kvv2.path,
151
+ name="aws_secret",
152
152
  data_json=json.dumps({
153
153
  "zip": "zap",
154
154
  "foo": "bar",
@@ -156,7 +156,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
156
156
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
157
157
  name=aws_secret.name)
158
158
  ```
159
- <!--End PulumiCodeChooser -->
160
159
 
161
160
  ## Required Vault Capabilities
162
161
 
@@ -210,7 +209,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
210
209
  """
211
210
  ## Example Usage
212
211
 
213
- <!--Start PulumiCodeChooser -->
214
212
  ```python
215
213
  import pulumi
216
214
  import json
@@ -223,8 +221,9 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
223
221
  "version": "2",
224
222
  },
225
223
  description="KV Version 2 secret engine mount")
226
- aws_secret = vault.kv.SecretV2("awsSecret",
224
+ aws_secret = vault.kv.SecretV2("aws_secret",
227
225
  mount=kvv2.path,
226
+ name="aws_secret",
228
227
  data_json=json.dumps({
229
228
  "zip": "zap",
230
229
  "foo": "bar",
@@ -232,7 +231,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
232
231
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
233
232
  name=aws_secret.name)
234
233
  ```
235
- <!--End PulumiCodeChooser -->
236
234
 
237
235
  ## Required Vault Capabilities
238
236
 
@@ -179,6 +179,35 @@ def get_secret_v2(mount: Optional[str] = None,
179
179
  """
180
180
  ## Example Usage
181
181
 
182
+ ```python
183
+ import pulumi
184
+ import json
185
+ import pulumi_vault as vault
186
+
187
+ kvv2 = vault.Mount("kvv2",
188
+ path="kvv2",
189
+ type="kv",
190
+ options={
191
+ "version": "2",
192
+ },
193
+ description="KV Version 2 secret engine mount")
194
+ example_secret_v2 = vault.kv.SecretV2("example",
195
+ mount=kvv2.path,
196
+ name="secret",
197
+ cas=1,
198
+ delete_all_versions=True,
199
+ data_json=json.dumps({
200
+ "zip": "zap",
201
+ "foo": "bar",
202
+ }))
203
+ example = vault.kv.get_secret_v2_output(mount=kvv2.path,
204
+ name=example_secret_v2.name)
205
+ ```
206
+
207
+ ## Required Vault Capabilities
208
+
209
+ Use of this resource requires the `read` capability on the given path.
210
+
182
211
 
183
212
  :param str mount: Path where KV-V2 engine is mounted.
184
213
  :param str name: Full name of the secret. For a nested secret
@@ -223,6 +252,35 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
223
252
  """
224
253
  ## Example Usage
225
254
 
255
+ ```python
256
+ import pulumi
257
+ import json
258
+ import pulumi_vault as vault
259
+
260
+ kvv2 = vault.Mount("kvv2",
261
+ path="kvv2",
262
+ type="kv",
263
+ options={
264
+ "version": "2",
265
+ },
266
+ description="KV Version 2 secret engine mount")
267
+ example_secret_v2 = vault.kv.SecretV2("example",
268
+ mount=kvv2.path,
269
+ name="secret",
270
+ cas=1,
271
+ delete_all_versions=True,
272
+ data_json=json.dumps({
273
+ "zip": "zap",
274
+ "foo": "bar",
275
+ }))
276
+ example = vault.kv.get_secret_v2_output(mount=kvv2.path,
277
+ name=example_secret_v2.name)
278
+ ```
279
+
280
+ ## Required Vault Capabilities
281
+
282
+ Use of this resource requires the `read` capability on the given path.
283
+
226
284
 
227
285
  :param str mount: Path where KV-V2 engine is mounted.
228
286
  :param str name: Full name of the secret. For a nested secret
@@ -80,7 +80,6 @@ def get_secrets_list(namespace: Optional[str] = None,
80
80
  """
81
81
  ## Example Usage
82
82
 
83
- <!--Start PulumiCodeChooser -->
84
83
  ```python
85
84
  import pulumi
86
85
  import json
@@ -93,19 +92,18 @@ def get_secrets_list(namespace: Optional[str] = None,
93
92
  "version": "1",
94
93
  },
95
94
  description="KV Version 1 secret engine mount")
96
- aws_secret = vault.kv.Secret("awsSecret",
95
+ aws_secret = vault.kv.Secret("aws_secret",
97
96
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
98
97
  data_json=json.dumps({
99
98
  "zip": "zap",
100
99
  }))
101
- azure_secret = vault.kv.Secret("azureSecret",
100
+ azure_secret = vault.kv.Secret("azure_secret",
102
101
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
103
102
  data_json=json.dumps({
104
103
  "foo": "bar",
105
104
  }))
106
105
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
107
106
  ```
108
- <!--End PulumiCodeChooser -->
109
107
 
110
108
  ## Required Vault Capabilities
111
109
 
@@ -138,7 +136,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
138
136
  """
139
137
  ## Example Usage
140
138
 
141
- <!--Start PulumiCodeChooser -->
142
139
  ```python
143
140
  import pulumi
144
141
  import json
@@ -151,19 +148,18 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
151
148
  "version": "1",
152
149
  },
153
150
  description="KV Version 1 secret engine mount")
154
- aws_secret = vault.kv.Secret("awsSecret",
151
+ aws_secret = vault.kv.Secret("aws_secret",
155
152
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
156
153
  data_json=json.dumps({
157
154
  "zip": "zap",
158
155
  }))
159
- azure_secret = vault.kv.Secret("azureSecret",
156
+ azure_secret = vault.kv.Secret("azure_secret",
160
157
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
161
158
  data_json=json.dumps({
162
159
  "foo": "bar",
163
160
  }))
164
161
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
165
162
  ```
166
- <!--End PulumiCodeChooser -->
167
163
 
168
164
  ## Required Vault Capabilities
169
165
 
@@ -102,7 +102,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
102
102
  """
103
103
  ## Example Usage
104
104
 
105
- <!--Start PulumiCodeChooser -->
106
105
  ```python
107
106
  import pulumi
108
107
  import json
@@ -115,26 +114,28 @@ def get_secrets_list_v2(mount: Optional[str] = None,
115
114
  "version": "2",
116
115
  },
117
116
  description="KV Version 2 secret engine mount")
118
- aws_secret = vault.kv.SecretV2("awsSecret",
117
+ aws_secret = vault.kv.SecretV2("aws_secret",
119
118
  mount=kvv2.path,
119
+ name="aws_secret",
120
120
  data_json=json.dumps({
121
121
  "zip": "zap",
122
122
  }))
123
- azure_secret = vault.kv.SecretV2("azureSecret",
123
+ azure_secret = vault.kv.SecretV2("azure_secret",
124
124
  mount=kvv2.path,
125
+ name="azure_secret",
125
126
  data_json=json.dumps({
126
127
  "foo": "bar",
127
128
  }))
128
- nested_secret = vault.kv.SecretV2("nestedSecret",
129
+ nested_secret = vault.kv.SecretV2("nested_secret",
129
130
  mount=kvv2.path,
131
+ name=azure_secret.name.apply(lambda name: f"{name}/dev"),
130
132
  data_json=json.dumps({
131
133
  "password": "test",
132
134
  }))
133
135
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
134
136
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
135
- name=vault_kv_secret_v2["test_2"]["name"]))
137
+ name=test2["name"]))
136
138
  ```
137
- <!--End PulumiCodeChooser -->
138
139
 
139
140
  ## Required Vault Capabilities
140
141
 
@@ -175,7 +176,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
175
176
  """
176
177
  ## Example Usage
177
178
 
178
- <!--Start PulumiCodeChooser -->
179
179
  ```python
180
180
  import pulumi
181
181
  import json
@@ -188,26 +188,28 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
188
188
  "version": "2",
189
189
  },
190
190
  description="KV Version 2 secret engine mount")
191
- aws_secret = vault.kv.SecretV2("awsSecret",
191
+ aws_secret = vault.kv.SecretV2("aws_secret",
192
192
  mount=kvv2.path,
193
+ name="aws_secret",
193
194
  data_json=json.dumps({
194
195
  "zip": "zap",
195
196
  }))
196
- azure_secret = vault.kv.SecretV2("azureSecret",
197
+ azure_secret = vault.kv.SecretV2("azure_secret",
197
198
  mount=kvv2.path,
199
+ name="azure_secret",
198
200
  data_json=json.dumps({
199
201
  "foo": "bar",
200
202
  }))
201
- nested_secret = vault.kv.SecretV2("nestedSecret",
203
+ nested_secret = vault.kv.SecretV2("nested_secret",
202
204
  mount=kvv2.path,
205
+ name=azure_secret.name.apply(lambda name: f"{name}/dev"),
203
206
  data_json=json.dumps({
204
207
  "password": "test",
205
208
  }))
206
209
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
207
210
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
208
- name=vault_kv_secret_v2["test_2"]["name"]))
211
+ name=test2["name"]))
209
212
  ```
210
- <!--End PulumiCodeChooser -->
211
213
 
212
214
  ## Required Vault Capabilities
213
215
 
pulumi_vault/kv/secret.py CHANGED
@@ -176,7 +176,6 @@ class Secret(pulumi.CustomResource):
176
176
 
177
177
  ## Example Usage
178
178
 
179
- <!--Start PulumiCodeChooser -->
180
179
  ```python
181
180
  import pulumi
182
181
  import json
@@ -196,7 +195,6 @@ class Secret(pulumi.CustomResource):
196
195
  "foo": "bar",
197
196
  }))
198
197
  ```
199
- <!--End PulumiCodeChooser -->
200
198
 
201
199
  ## Required Vault Capabilities
202
200
 
@@ -237,7 +235,6 @@ class Secret(pulumi.CustomResource):
237
235
 
238
236
  ## Example Usage
239
237
 
240
- <!--Start PulumiCodeChooser -->
241
238
  ```python
242
239
  import pulumi
243
240
  import json
@@ -257,7 +254,6 @@ class Secret(pulumi.CustomResource):
257
254
  "foo": "bar",
258
255
  }))
259
256
  ```
260
- <!--End PulumiCodeChooser -->
261
257
 
262
258
  ## Required Vault Capabilities
263
259
 
@@ -226,7 +226,6 @@ class SecretBackendV2(pulumi.CustomResource):
226
226
 
227
227
  ## Example Usage
228
228
 
229
- <!--Start PulumiCodeChooser -->
230
229
  ```python
231
230
  import pulumi
232
231
  import pulumi_vault as vault
@@ -244,7 +243,6 @@ class SecretBackendV2(pulumi.CustomResource):
244
243
  delete_version_after=12600,
245
244
  cas_required=True)
246
245
  ```
247
- <!--End PulumiCodeChooser -->
248
246
 
249
247
  ## Required Vault Capabilities
250
248
 
@@ -290,7 +288,6 @@ class SecretBackendV2(pulumi.CustomResource):
290
288
 
291
289
  ## Example Usage
292
290
 
293
- <!--Start PulumiCodeChooser -->
294
291
  ```python
295
292
  import pulumi
296
293
  import pulumi_vault as vault
@@ -308,7 +305,6 @@ class SecretBackendV2(pulumi.CustomResource):
308
305
  delete_version_after=12600,
309
306
  cas_required=True)
310
307
  ```
311
- <!--End PulumiCodeChooser -->
312
308
 
313
309
  ## Required Vault Capabilities
314
310
 
@@ -448,7 +448,6 @@ class SecretV2(pulumi.CustomResource):
448
448
 
449
449
  ## Example Usage
450
450
 
451
- <!--Start PulumiCodeChooser -->
452
451
  ```python
453
452
  import pulumi
454
453
  import json
@@ -463,6 +462,7 @@ class SecretV2(pulumi.CustomResource):
463
462
  description="KV Version 2 secret engine mount")
464
463
  example = vault.kv.SecretV2("example",
465
464
  mount=kvv2.path,
465
+ name="secret",
466
466
  cas=1,
467
467
  delete_all_versions=True,
468
468
  data_json=json.dumps({
@@ -477,7 +477,6 @@ class SecretV2(pulumi.CustomResource):
477
477
  },
478
478
  ))
479
479
  ```
480
- <!--End PulumiCodeChooser -->
481
480
 
482
481
  ## Required Vault Capabilities
483
482
 
@@ -546,7 +545,6 @@ class SecretV2(pulumi.CustomResource):
546
545
 
547
546
  ## Example Usage
548
547
 
549
- <!--Start PulumiCodeChooser -->
550
548
  ```python
551
549
  import pulumi
552
550
  import json
@@ -561,6 +559,7 @@ class SecretV2(pulumi.CustomResource):
561
559
  description="KV Version 2 secret engine mount")
562
560
  example = vault.kv.SecretV2("example",
563
561
  mount=kvv2.path,
562
+ name="secret",
564
563
  cas=1,
565
564
  delete_all_versions=True,
566
565
  data_json=json.dumps({
@@ -575,7 +574,6 @@ class SecretV2(pulumi.CustomResource):
575
574
  },
576
575
  ))
577
576
  ```
578
- <!--End PulumiCodeChooser -->
579
577
 
580
578
  ## Required Vault Capabilities
581
579