pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -224,7 +224,6 @@ class SyncAssociation(pulumi.CustomResource):
224
224
  """
225
225
  ## Example Usage
226
226
 
227
- <!--Start PulumiCodeChooser -->
228
227
  ```python
229
228
  import pulumi
230
229
  import json
@@ -239,21 +238,23 @@ class SyncAssociation(pulumi.CustomResource):
239
238
  description="KV Version 2 secret engine mount")
240
239
  token = vault.kv.SecretV2("token",
241
240
  mount=kvv2.path,
241
+ name="token",
242
242
  data_json=json.dumps({
243
243
  "dev": "B!gS3cr3t",
244
244
  "prod": "S3cureP4$$",
245
245
  }))
246
246
  gh = vault.secrets.SyncGhDestination("gh",
247
- access_token=var["access_token"],
248
- repository_owner=var["repo_owner"],
247
+ name="gh-dest",
248
+ access_token=access_token,
249
+ repository_owner=repo_owner,
249
250
  repository_name="repo-name-example",
250
251
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
251
- gh_token = vault.secrets.SyncAssociation("ghToken",
252
+ gh_token = vault.secrets.SyncAssociation("gh_token",
253
+ name=gh.name,
252
254
  type=gh.type,
253
255
  mount=kvv2.path,
254
256
  secret_name=token.name)
255
257
  ```
256
- <!--End PulumiCodeChooser -->
257
258
 
258
259
  :param str resource_name: The name of the resource.
259
260
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -274,7 +275,6 @@ class SyncAssociation(pulumi.CustomResource):
274
275
  """
275
276
  ## Example Usage
276
277
 
277
- <!--Start PulumiCodeChooser -->
278
278
  ```python
279
279
  import pulumi
280
280
  import json
@@ -289,21 +289,23 @@ class SyncAssociation(pulumi.CustomResource):
289
289
  description="KV Version 2 secret engine mount")
290
290
  token = vault.kv.SecretV2("token",
291
291
  mount=kvv2.path,
292
+ name="token",
292
293
  data_json=json.dumps({
293
294
  "dev": "B!gS3cr3t",
294
295
  "prod": "S3cureP4$$",
295
296
  }))
296
297
  gh = vault.secrets.SyncGhDestination("gh",
297
- access_token=var["access_token"],
298
- repository_owner=var["repo_owner"],
298
+ name="gh-dest",
299
+ access_token=access_token,
300
+ repository_owner=repo_owner,
299
301
  repository_name="repo-name-example",
300
302
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
301
- gh_token = vault.secrets.SyncAssociation("ghToken",
303
+ gh_token = vault.secrets.SyncAssociation("gh_token",
304
+ name=gh.name,
302
305
  type=gh.type,
303
306
  mount=kvv2.path,
304
307
  secret_name=token.name)
305
308
  ```
306
- <!--End PulumiCodeChooser -->
307
309
 
308
310
  :param str resource_name: The name of the resource.
309
311
  :param SyncAssociationArgs args: The arguments to use to populate this resource's properties.
@@ -454,14 +454,14 @@ class SyncAwsDestination(pulumi.CustomResource):
454
454
  """
455
455
  ## Example Usage
456
456
 
457
- <!--Start PulumiCodeChooser -->
458
457
  ```python
459
458
  import pulumi
460
459
  import pulumi_vault as vault
461
460
 
462
461
  aws = vault.secrets.SyncAwsDestination("aws",
463
- access_key_id=var["access_key_id"],
464
- secret_access_key=var["secret_access_key"],
462
+ name="aws-dest",
463
+ access_key_id=access_key_id,
464
+ secret_access_key=secret_access_key,
465
465
  region="us-east-1",
466
466
  role_arn="role-arn",
467
467
  external_id="external-id",
@@ -470,7 +470,6 @@ class SyncAwsDestination(pulumi.CustomResource):
470
470
  "foo": "bar",
471
471
  })
472
472
  ```
473
- <!--End PulumiCodeChooser -->
474
473
 
475
474
  ## Import
476
475
 
@@ -520,14 +519,14 @@ class SyncAwsDestination(pulumi.CustomResource):
520
519
  """
521
520
  ## Example Usage
522
521
 
523
- <!--Start PulumiCodeChooser -->
524
522
  ```python
525
523
  import pulumi
526
524
  import pulumi_vault as vault
527
525
 
528
526
  aws = vault.secrets.SyncAwsDestination("aws",
529
- access_key_id=var["access_key_id"],
530
- secret_access_key=var["secret_access_key"],
527
+ name="aws-dest",
528
+ access_key_id=access_key_id,
529
+ secret_access_key=secret_access_key,
531
530
  region="us-east-1",
532
531
  role_arn="role-arn",
533
532
  external_id="external-id",
@@ -536,7 +535,6 @@ class SyncAwsDestination(pulumi.CustomResource):
536
535
  "foo": "bar",
537
536
  })
538
537
  ```
539
- <!--End PulumiCodeChooser -->
540
538
 
541
539
  ## Import
542
540
 
@@ -430,22 +430,21 @@ class SyncAzureDestination(pulumi.CustomResource):
430
430
  """
431
431
  ## Example Usage
432
432
 
433
- <!--Start PulumiCodeChooser -->
434
433
  ```python
435
434
  import pulumi
436
435
  import pulumi_vault as vault
437
436
 
438
437
  az = vault.secrets.SyncAzureDestination("az",
439
- key_vault_uri=var["key_vault_uri"],
440
- client_id=var["client_id"],
441
- client_secret=var["client_secret"],
442
- tenant_id=var["tenant_id"],
438
+ name="az-dest",
439
+ key_vault_uri=key_vault_uri,
440
+ client_id=client_id,
441
+ client_secret=client_secret,
442
+ tenant_id=tenant_id,
443
443
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
444
444
  custom_tags={
445
445
  "foo": "bar",
446
446
  })
447
447
  ```
448
- <!--End PulumiCodeChooser -->
449
448
 
450
449
  ## Import
451
450
 
@@ -489,22 +488,21 @@ class SyncAzureDestination(pulumi.CustomResource):
489
488
  """
490
489
  ## Example Usage
491
490
 
492
- <!--Start PulumiCodeChooser -->
493
491
  ```python
494
492
  import pulumi
495
493
  import pulumi_vault as vault
496
494
 
497
495
  az = vault.secrets.SyncAzureDestination("az",
498
- key_vault_uri=var["key_vault_uri"],
499
- client_id=var["client_id"],
500
- client_secret=var["client_secret"],
501
- tenant_id=var["tenant_id"],
496
+ name="az-dest",
497
+ key_vault_uri=key_vault_uri,
498
+ client_id=client_id,
499
+ client_secret=client_secret,
500
+ tenant_id=tenant_id,
502
501
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
503
502
  custom_tags={
504
503
  "foo": "bar",
505
504
  })
506
505
  ```
507
- <!--End PulumiCodeChooser -->
508
506
 
509
507
  ## Import
510
508
 
@@ -150,16 +150,14 @@ class SyncConfig(pulumi.CustomResource):
150
150
 
151
151
  ## Example Usage
152
152
 
153
- <!--Start PulumiCodeChooser -->
154
153
  ```python
155
154
  import pulumi
156
155
  import pulumi_vault as vault
157
156
 
158
- global_config = vault.secrets.SyncConfig("globalConfig",
157
+ global_config = vault.secrets.SyncConfig("global_config",
159
158
  disabled=True,
160
159
  queue_capacity=500000)
161
160
  ```
162
- <!--End PulumiCodeChooser -->
163
161
 
164
162
  ## Import
165
163
 
@@ -191,16 +189,14 @@ class SyncConfig(pulumi.CustomResource):
191
189
 
192
190
  ## Example Usage
193
191
 
194
- <!--Start PulumiCodeChooser -->
195
192
  ```python
196
193
  import pulumi
197
194
  import pulumi_vault as vault
198
195
 
199
- global_config = vault.secrets.SyncConfig("globalConfig",
196
+ global_config = vault.secrets.SyncConfig("global_config",
200
197
  disabled=True,
201
198
  queue_capacity=500000)
202
199
  ```
203
- <!--End PulumiCodeChooser -->
204
200
 
205
201
  ## Import
206
202
 
@@ -319,20 +319,20 @@ class SyncGcpDestination(pulumi.CustomResource):
319
319
  """
320
320
  ## Example Usage
321
321
 
322
- <!--Start PulumiCodeChooser -->
323
322
  ```python
324
323
  import pulumi
324
+ import pulumi_std as std
325
325
  import pulumi_vault as vault
326
326
 
327
327
  gcp = vault.secrets.SyncGcpDestination("gcp",
328
+ name="gcp-dest",
328
329
  project_id="gcp-project-id",
329
- credentials=(lambda path: open(path).read())(var["credentials_file"]),
330
+ credentials=std.file(input=credentials_file).result,
330
331
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
331
332
  custom_tags={
332
333
  "foo": "bar",
333
334
  })
334
335
  ```
335
- <!--End PulumiCodeChooser -->
336
336
 
337
337
  ## Import
338
338
 
@@ -370,20 +370,20 @@ class SyncGcpDestination(pulumi.CustomResource):
370
370
  """
371
371
  ## Example Usage
372
372
 
373
- <!--Start PulumiCodeChooser -->
374
373
  ```python
375
374
  import pulumi
375
+ import pulumi_std as std
376
376
  import pulumi_vault as vault
377
377
 
378
378
  gcp = vault.secrets.SyncGcpDestination("gcp",
379
+ name="gcp-dest",
379
380
  project_id="gcp-project-id",
380
- credentials=(lambda path: open(path).read())(var["credentials_file"]),
381
+ credentials=std.file(input=credentials_file).result,
381
382
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
382
383
  custom_tags={
383
384
  "foo": "bar",
384
385
  })
385
386
  ```
386
- <!--End PulumiCodeChooser -->
387
387
 
388
388
  ## Import
389
389
 
@@ -401,18 +401,17 @@ class SyncGhDestination(pulumi.CustomResource):
401
401
  """
402
402
  ## Example Usage
403
403
 
404
- <!--Start PulumiCodeChooser -->
405
404
  ```python
406
405
  import pulumi
407
406
  import pulumi_vault as vault
408
407
 
409
408
  gh = vault.secrets.SyncGhDestination("gh",
410
- access_token=var["access_token"],
411
- repository_owner=var["repo_owner"],
409
+ name="gh-dest",
410
+ access_token=access_token,
411
+ repository_owner=repo_owner,
412
412
  repository_name="repo-name-example",
413
413
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
414
414
  ```
415
- <!--End PulumiCodeChooser -->
416
415
 
417
416
  ## Import
418
417
 
@@ -456,18 +455,17 @@ class SyncGhDestination(pulumi.CustomResource):
456
455
  """
457
456
  ## Example Usage
458
457
 
459
- <!--Start PulumiCodeChooser -->
460
458
  ```python
461
459
  import pulumi
462
460
  import pulumi_vault as vault
463
461
 
464
462
  gh = vault.secrets.SyncGhDestination("gh",
465
- access_token=var["access_token"],
466
- repository_owner=var["repo_owner"],
463
+ name="gh-dest",
464
+ access_token=access_token,
465
+ repository_owner=repo_owner,
467
466
  repository_name="repo-name-example",
468
467
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
469
468
  ```
470
- <!--End PulumiCodeChooser -->
471
469
 
472
470
  ## Import
473
471
 
@@ -190,16 +190,16 @@ class SyncGithubApps(pulumi.CustomResource):
190
190
  """
191
191
  ## Example Usage
192
192
 
193
- <!--Start PulumiCodeChooser -->
194
193
  ```python
195
194
  import pulumi
195
+ import pulumi_std as std
196
196
  import pulumi_vault as vault
197
197
 
198
198
  github_apps = vault.secrets.SyncGithubApps("github-apps",
199
- app_id=var["app_id"],
200
- private_key=(lambda path: open(path).read())(var["privatekey_file"]))
199
+ name="gh-apps",
200
+ app_id=app_id,
201
+ private_key=std.file(input=privatekey_file).result)
201
202
  ```
202
- <!--End PulumiCodeChooser -->
203
203
 
204
204
  ## Import
205
205
 
@@ -227,16 +227,16 @@ class SyncGithubApps(pulumi.CustomResource):
227
227
  """
228
228
  ## Example Usage
229
229
 
230
- <!--Start PulumiCodeChooser -->
231
230
  ```python
232
231
  import pulumi
232
+ import pulumi_std as std
233
233
  import pulumi_vault as vault
234
234
 
235
235
  github_apps = vault.secrets.SyncGithubApps("github-apps",
236
- app_id=var["app_id"],
237
- private_key=(lambda path: open(path).read())(var["privatekey_file"]))
236
+ name="gh-apps",
237
+ app_id=app_id,
238
+ private_key=std.file(input=privatekey_file).result)
238
239
  ```
239
- <!--End PulumiCodeChooser -->
240
240
 
241
241
  ## Import
242
242
 
@@ -337,14 +337,14 @@ class SyncVercelDestination(pulumi.CustomResource):
337
337
  """
338
338
  ## Example Usage
339
339
 
340
- <!--Start PulumiCodeChooser -->
341
340
  ```python
342
341
  import pulumi
343
342
  import pulumi_vault as vault
344
343
 
345
344
  vercel = vault.secrets.SyncVercelDestination("vercel",
346
- access_token=var["access_token"],
347
- project_id=var["project_id"],
345
+ name="vercel-dest",
346
+ access_token=access_token,
347
+ project_id=project_id,
348
348
  deployment_environments=[
349
349
  "development",
350
350
  "preview",
@@ -352,7 +352,6 @@ class SyncVercelDestination(pulumi.CustomResource):
352
352
  ],
353
353
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
354
354
  ```
355
- <!--End PulumiCodeChooser -->
356
355
 
357
356
  ## Import
358
357
 
@@ -388,14 +387,14 @@ class SyncVercelDestination(pulumi.CustomResource):
388
387
  """
389
388
  ## Example Usage
390
389
 
391
- <!--Start PulumiCodeChooser -->
392
390
  ```python
393
391
  import pulumi
394
392
  import pulumi_vault as vault
395
393
 
396
394
  vercel = vault.secrets.SyncVercelDestination("vercel",
397
- access_token=var["access_token"],
398
- project_id=var["project_id"],
395
+ name="vercel-dest",
396
+ access_token=access_token,
397
+ project_id=project_id,
399
398
  deployment_environments=[
400
399
  "development",
401
400
  "preview",
@@ -403,7 +402,6 @@ class SyncVercelDestination(pulumi.CustomResource):
403
402
  ],
404
403
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
405
404
  ```
406
- <!--End PulumiCodeChooser -->
407
405
 
408
406
  ## Import
409
407
 
@@ -19,22 +19,9 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
19
19
  lengths: pulumi.Input[Sequence[pulumi.Input[int]]],
20
20
  type: pulumi.Input[str]):
21
21
  """
22
- :param pulumi.Input[Sequence[pulumi.Input[int]]] lengths: A list of allowed key lengths as integers.
23
- For key types that do not support setting the length a value of `[0]` should be used.
24
- Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
25
- must be set to a single element list.
26
-
27
- Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
-
29
- <!--Start PulumiCodeChooser -->
30
- ```python
31
- import pulumi
32
- ```
33
- <!--End PulumiCodeChooser -->
34
- :param pulumi.Input[str] type: The SSH public key type.
35
- *Supported key types are:*
36
- `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
37
- `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
22
+ :param pulumi.Input[Sequence[pulumi.Input[int]]] lengths: List of allowed key lengths, vault-1.10 and above
23
+ :param pulumi.Input[str] type: Key type, choices:
24
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
38
25
  """
39
26
  pulumi.set(__self__, "lengths", lengths)
40
27
  pulumi.set(__self__, "type", type)
@@ -43,18 +30,7 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
43
30
  @pulumi.getter
44
31
  def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[int]]]:
45
32
  """
46
- A list of allowed key lengths as integers.
47
- For key types that do not support setting the length a value of `[0]` should be used.
48
- Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
49
- must be set to a single element list.
50
-
51
- Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
-
53
- <!--Start PulumiCodeChooser -->
54
- ```python
55
- import pulumi
56
- ```
57
- <!--End PulumiCodeChooser -->
33
+ List of allowed key lengths, vault-1.10 and above
58
34
  """
59
35
  return pulumi.get(self, "lengths")
60
36
 
@@ -66,10 +42,8 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
66
42
  @pulumi.getter
67
43
  def type(self) -> pulumi.Input[str]:
68
44
  """
69
- The SSH public key type.
70
- *Supported key types are:*
71
- `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
72
- `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
45
+ Key type, choices:
46
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
73
47
  """
74
48
  return pulumi.get(self, "type")
75
49
 
@@ -19,22 +19,9 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
19
19
  lengths: Sequence[int],
20
20
  type: str):
21
21
  """
22
- :param Sequence[int] lengths: A list of allowed key lengths as integers.
23
- For key types that do not support setting the length a value of `[0]` should be used.
24
- Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
25
- must be set to a single element list.
26
-
27
- Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
-
29
- <!--Start PulumiCodeChooser -->
30
- ```python
31
- import pulumi
32
- ```
33
- <!--End PulumiCodeChooser -->
34
- :param str type: The SSH public key type.
35
- *Supported key types are:*
36
- `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
37
- `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
22
+ :param Sequence[int] lengths: List of allowed key lengths, vault-1.10 and above
23
+ :param str type: Key type, choices:
24
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
38
25
  """
39
26
  pulumi.set(__self__, "lengths", lengths)
40
27
  pulumi.set(__self__, "type", type)
@@ -43,18 +30,7 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
43
30
  @pulumi.getter
44
31
  def lengths(self) -> Sequence[int]:
45
32
  """
46
- A list of allowed key lengths as integers.
47
- For key types that do not support setting the length a value of `[0]` should be used.
48
- Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
49
- must be set to a single element list.
50
-
51
- Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
-
53
- <!--Start PulumiCodeChooser -->
54
- ```python
55
- import pulumi
56
- ```
57
- <!--End PulumiCodeChooser -->
33
+ List of allowed key lengths, vault-1.10 and above
58
34
  """
59
35
  return pulumi.get(self, "lengths")
60
36
 
@@ -62,10 +38,8 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
62
38
  @pulumi.getter
63
39
  def type(self) -> str:
64
40
  """
65
- The SSH public key type.
66
- *Supported key types are:*
67
- `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
68
- `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
41
+ Key type, choices:
42
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
69
43
  """
70
44
  return pulumi.get(self, "type")
71
45
 
@@ -216,7 +216,6 @@ class SecretBackendCa(pulumi.CustomResource):
216
216
 
217
217
  ## Example Usage
218
218
 
219
- <!--Start PulumiCodeChooser -->
220
219
  ```python
221
220
  import pulumi
222
221
  import pulumi_vault as vault
@@ -224,7 +223,6 @@ class SecretBackendCa(pulumi.CustomResource):
224
223
  example = vault.Mount("example", type="ssh")
225
224
  foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
226
225
  ```
227
- <!--End PulumiCodeChooser -->
228
226
 
229
227
  ## Import
230
228
 
@@ -257,7 +255,6 @@ class SecretBackendCa(pulumi.CustomResource):
257
255
 
258
256
  ## Example Usage
259
257
 
260
- <!--Start PulumiCodeChooser -->
261
258
  ```python
262
259
  import pulumi
263
260
  import pulumi_vault as vault
@@ -265,7 +262,6 @@ class SecretBackendCa(pulumi.CustomResource):
265
262
  example = vault.Mount("example", type="ssh")
266
263
  foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
267
264
  ```
268
- <!--End PulumiCodeChooser -->
269
265
 
270
266
  ## Import
271
267
 
@@ -921,24 +921,24 @@ class SecretBackendRole(pulumi.CustomResource):
921
921
 
922
922
  ## Example Usage
923
923
 
924
- <!--Start PulumiCodeChooser -->
925
924
  ```python
926
925
  import pulumi
927
926
  import pulumi_vault as vault
928
927
 
929
928
  example = vault.Mount("example", type="ssh")
930
929
  foo = vault.ssh.SecretBackendRole("foo",
930
+ name="my-role",
931
931
  backend=example.path,
932
932
  key_type="ca",
933
933
  allow_user_certificates=True)
934
934
  bar = vault.ssh.SecretBackendRole("bar",
935
+ name="otp-role",
935
936
  backend=example.path,
936
937
  key_type="otp",
937
938
  default_user="default",
938
939
  allowed_users="default,baz",
939
940
  cidr_list="0.0.0.0/0")
940
941
  ```
941
- <!--End PulumiCodeChooser -->
942
942
 
943
943
  ## Import
944
944
 
@@ -995,24 +995,24 @@ class SecretBackendRole(pulumi.CustomResource):
995
995
 
996
996
  ## Example Usage
997
997
 
998
- <!--Start PulumiCodeChooser -->
999
998
  ```python
1000
999
  import pulumi
1001
1000
  import pulumi_vault as vault
1002
1001
 
1003
1002
  example = vault.Mount("example", type="ssh")
1004
1003
  foo = vault.ssh.SecretBackendRole("foo",
1004
+ name="my-role",
1005
1005
  backend=example.path,
1006
1006
  key_type="ca",
1007
1007
  allow_user_certificates=True)
1008
1008
  bar = vault.ssh.SecretBackendRole("bar",
1009
+ name="otp-role",
1009
1010
  backend=example.path,
1010
1011
  key_type="otp",
1011
1012
  default_user="default",
1012
1013
  allowed_users="default,baz",
1013
1014
  cidr_list="0.0.0.0/0")
1014
1015
  ```
1015
- <!--End PulumiCodeChooser -->
1016
1016
 
1017
1017
  ## Import
1018
1018