pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -25,9 +25,6 @@ class SecretBackendArgs:
25
25
  token: Optional[pulumi.Input[str]] = None):
26
26
  """
27
27
  The set of arguments for constructing a SecretBackend resource.
28
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
29
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
30
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
31
28
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
32
29
  :param pulumi.Input[str] description: A human-friendly description for this backend.
33
30
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -38,7 +35,6 @@ class SecretBackendArgs:
38
35
  The value should not contain leading or trailing forward slashes.
39
36
  The `namespace` is always relative to the provider's configured namespace.
40
37
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
42
38
  """
43
39
  if address is not None:
44
40
  pulumi.set(__self__, "address", address)
@@ -62,9 +58,6 @@ class SecretBackendArgs:
62
58
  @property
63
59
  @pulumi.getter
64
60
  def address(self) -> Optional[pulumi.Input[str]]:
65
- """
66
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
67
- """
68
61
  return pulumi.get(self, "address")
69
62
 
70
63
  @address.setter
@@ -74,9 +67,6 @@ class SecretBackendArgs:
74
67
  @property
75
68
  @pulumi.getter
76
69
  def backend(self) -> Optional[pulumi.Input[str]]:
77
- """
78
- Unique name of the Vault Terraform Cloud mount to configure
79
- """
80
70
  return pulumi.get(self, "backend")
81
71
 
82
72
  @backend.setter
@@ -86,9 +76,6 @@ class SecretBackendArgs:
86
76
  @property
87
77
  @pulumi.getter(name="basePath")
88
78
  def base_path(self) -> Optional[pulumi.Input[str]]:
89
- """
90
- Specifies the base path for the Terraform Cloud or Enterprise API.
91
- """
92
79
  return pulumi.get(self, "base_path")
93
80
 
94
81
  @base_path.setter
@@ -163,9 +150,6 @@ class SecretBackendArgs:
163
150
  @property
164
151
  @pulumi.getter
165
152
  def token(self) -> Optional[pulumi.Input[str]]:
166
- """
167
- Specifies the Terraform Cloud access token to use.
168
- """
169
153
  return pulumi.get(self, "token")
170
154
 
171
155
  @token.setter
@@ -187,9 +171,6 @@ class _SecretBackendState:
187
171
  token: Optional[pulumi.Input[str]] = None):
188
172
  """
189
173
  Input properties used for looking up and filtering SecretBackend resources.
190
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
191
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
192
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
193
174
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
194
175
  :param pulumi.Input[str] description: A human-friendly description for this backend.
195
176
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -200,7 +181,6 @@ class _SecretBackendState:
200
181
  The value should not contain leading or trailing forward slashes.
201
182
  The `namespace` is always relative to the provider's configured namespace.
202
183
  *Available only for Vault Enterprise*.
203
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
204
184
  """
205
185
  if address is not None:
206
186
  pulumi.set(__self__, "address", address)
@@ -224,9 +204,6 @@ class _SecretBackendState:
224
204
  @property
225
205
  @pulumi.getter
226
206
  def address(self) -> Optional[pulumi.Input[str]]:
227
- """
228
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
229
- """
230
207
  return pulumi.get(self, "address")
231
208
 
232
209
  @address.setter
@@ -236,9 +213,6 @@ class _SecretBackendState:
236
213
  @property
237
214
  @pulumi.getter
238
215
  def backend(self) -> Optional[pulumi.Input[str]]:
239
- """
240
- Unique name of the Vault Terraform Cloud mount to configure
241
- """
242
216
  return pulumi.get(self, "backend")
243
217
 
244
218
  @backend.setter
@@ -248,9 +222,6 @@ class _SecretBackendState:
248
222
  @property
249
223
  @pulumi.getter(name="basePath")
250
224
  def base_path(self) -> Optional[pulumi.Input[str]]:
251
- """
252
- Specifies the base path for the Terraform Cloud or Enterprise API.
253
- """
254
225
  return pulumi.get(self, "base_path")
255
226
 
256
227
  @base_path.setter
@@ -325,9 +296,6 @@ class _SecretBackendState:
325
296
  @property
326
297
  @pulumi.getter
327
298
  def token(self) -> Optional[pulumi.Input[str]]:
328
- """
329
- Specifies the Terraform Cloud access token to use.
330
- """
331
299
  return pulumi.get(self, "token")
332
300
 
333
301
  @token.setter
@@ -353,7 +321,6 @@ class SecretBackend(pulumi.CustomResource):
353
321
  """
354
322
  ## Example Usage
355
323
 
356
- <!--Start PulumiCodeChooser -->
357
324
  ```python
358
325
  import pulumi
359
326
  import pulumi_vault as vault
@@ -363,7 +330,6 @@ class SecretBackend(pulumi.CustomResource):
363
330
  description="Manages the Terraform Cloud backend",
364
331
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
365
332
  ```
366
- <!--End PulumiCodeChooser -->
367
333
 
368
334
  ## Import
369
335
 
@@ -375,9 +341,6 @@ class SecretBackend(pulumi.CustomResource):
375
341
 
376
342
  :param str resource_name: The name of the resource.
377
343
  :param pulumi.ResourceOptions opts: Options for the resource.
378
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
379
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
380
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
381
344
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
382
345
  :param pulumi.Input[str] description: A human-friendly description for this backend.
383
346
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -388,7 +351,6 @@ class SecretBackend(pulumi.CustomResource):
388
351
  The value should not contain leading or trailing forward slashes.
389
352
  The `namespace` is always relative to the provider's configured namespace.
390
353
  *Available only for Vault Enterprise*.
391
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
392
354
  """
393
355
  ...
394
356
  @overload
@@ -399,7 +361,6 @@ class SecretBackend(pulumi.CustomResource):
399
361
  """
400
362
  ## Example Usage
401
363
 
402
- <!--Start PulumiCodeChooser -->
403
364
  ```python
404
365
  import pulumi
405
366
  import pulumi_vault as vault
@@ -409,7 +370,6 @@ class SecretBackend(pulumi.CustomResource):
409
370
  description="Manages the Terraform Cloud backend",
410
371
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
411
372
  ```
412
- <!--End PulumiCodeChooser -->
413
373
 
414
374
  ## Import
415
375
 
@@ -489,9 +449,6 @@ class SecretBackend(pulumi.CustomResource):
489
449
  :param str resource_name: The unique name of the resulting resource.
490
450
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
491
451
  :param pulumi.ResourceOptions opts: Options for the resource.
492
- :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
493
- :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
494
- :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
495
452
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
496
453
  :param pulumi.Input[str] description: A human-friendly description for this backend.
497
454
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -502,7 +459,6 @@ class SecretBackend(pulumi.CustomResource):
502
459
  The value should not contain leading or trailing forward slashes.
503
460
  The `namespace` is always relative to the provider's configured namespace.
504
461
  *Available only for Vault Enterprise*.
505
- :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
506
462
  """
507
463
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
508
464
 
@@ -522,25 +478,16 @@ class SecretBackend(pulumi.CustomResource):
522
478
  @property
523
479
  @pulumi.getter
524
480
  def address(self) -> pulumi.Output[Optional[str]]:
525
- """
526
- Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
527
- """
528
481
  return pulumi.get(self, "address")
529
482
 
530
483
  @property
531
484
  @pulumi.getter
532
485
  def backend(self) -> pulumi.Output[Optional[str]]:
533
- """
534
- Unique name of the Vault Terraform Cloud mount to configure
535
- """
536
486
  return pulumi.get(self, "backend")
537
487
 
538
488
  @property
539
489
  @pulumi.getter(name="basePath")
540
490
  def base_path(self) -> pulumi.Output[Optional[str]]:
541
- """
542
- Specifies the base path for the Terraform Cloud or Enterprise API.
543
- """
544
491
  return pulumi.get(self, "base_path")
545
492
 
546
493
  @property
@@ -591,8 +538,5 @@ class SecretBackend(pulumi.CustomResource):
591
538
  @property
592
539
  @pulumi.getter
593
540
  def token(self) -> pulumi.Output[Optional[str]]:
594
- """
595
- Specifies the Terraform Cloud access token to use.
596
- """
597
541
  return pulumi.get(self, "token")
598
542
 
@@ -19,7 +19,6 @@ class SecretCredsArgs:
19
19
  namespace: Optional[pulumi.Input[str]] = None):
20
20
  """
21
21
  The set of arguments for constructing a SecretCreds resource.
22
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
23
22
  :param pulumi.Input[str] role: Name of the role.
24
23
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
24
  The value should not contain leading or trailing forward slashes.
@@ -34,9 +33,6 @@ class SecretCredsArgs:
34
33
  @property
35
34
  @pulumi.getter
36
35
  def backend(self) -> pulumi.Input[str]:
37
- """
38
- Terraform Cloud secret backend to generate tokens from
39
- """
40
36
  return pulumi.get(self, "backend")
41
37
 
42
38
  @backend.setter
@@ -84,7 +80,6 @@ class _SecretCredsState:
84
80
  token_id: Optional[pulumi.Input[str]] = None):
85
81
  """
86
82
  Input properties used for looking up and filtering SecretCreds resources.
87
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
88
83
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
89
84
  Vault lease associated with them.
90
85
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -119,9 +114,6 @@ class _SecretCredsState:
119
114
  @property
120
115
  @pulumi.getter
121
116
  def backend(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- Terraform Cloud secret backend to generate tokens from
124
- """
125
117
  return pulumi.get(self, "backend")
126
118
 
127
119
  @backend.setter
@@ -231,7 +223,6 @@ class SecretCreds(pulumi.CustomResource):
231
223
  """
232
224
  ## Example Usage
233
225
 
234
- <!--Start PulumiCodeChooser -->
235
226
  ```python
236
227
  import pulumi
237
228
  import pulumi_vault as vault
@@ -242,17 +233,16 @@ class SecretCreds(pulumi.CustomResource):
242
233
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
243
234
  example = vault.terraformcloud.SecretRole("example",
244
235
  backend=test.backend,
236
+ name="test-role",
245
237
  organization="example-organization-name",
246
238
  team_id="team-ieF4isC...")
247
239
  token = vault.terraformcloud.SecretCreds("token",
248
240
  backend=test.backend,
249
241
  role=example.name)
250
242
  ```
251
- <!--End PulumiCodeChooser -->
252
243
 
253
244
  :param str resource_name: The name of the resource.
254
245
  :param pulumi.ResourceOptions opts: Options for the resource.
255
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
256
246
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
257
247
  The value should not contain leading or trailing forward slashes.
258
248
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -268,7 +258,6 @@ class SecretCreds(pulumi.CustomResource):
268
258
  """
269
259
  ## Example Usage
270
260
 
271
- <!--Start PulumiCodeChooser -->
272
261
  ```python
273
262
  import pulumi
274
263
  import pulumi_vault as vault
@@ -279,13 +268,13 @@ class SecretCreds(pulumi.CustomResource):
279
268
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
280
269
  example = vault.terraformcloud.SecretRole("example",
281
270
  backend=test.backend,
271
+ name="test-role",
282
272
  organization="example-organization-name",
283
273
  team_id="team-ieF4isC...")
284
274
  token = vault.terraformcloud.SecretCreds("token",
285
275
  backend=test.backend,
286
276
  role=example.name)
287
277
  ```
288
- <!--End PulumiCodeChooser -->
289
278
 
290
279
  :param str resource_name: The name of the resource.
291
280
  :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
@@ -353,7 +342,6 @@ class SecretCreds(pulumi.CustomResource):
353
342
  :param str resource_name: The unique name of the resulting resource.
354
343
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
355
344
  :param pulumi.ResourceOptions opts: Options for the resource.
356
- :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
357
345
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
358
346
  Vault lease associated with them.
359
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -385,9 +373,6 @@ class SecretCreds(pulumi.CustomResource):
385
373
  @property
386
374
  @pulumi.getter
387
375
  def backend(self) -> pulumi.Output[str]:
388
- """
389
- Terraform Cloud secret backend to generate tokens from
390
- """
391
376
  return pulumi.get(self, "backend")
392
377
 
393
378
  @property
@@ -24,17 +24,12 @@ class SecretRoleArgs:
24
24
  user_id: Optional[pulumi.Input[str]] = None):
25
25
  """
26
26
  The set of arguments for constructing a SecretRole resource.
27
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
28
27
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
29
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
30
28
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
29
  The value should not contain leading or trailing forward slashes.
32
30
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
31
  *Available only for Vault Enterprise*.
34
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
36
32
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
37
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
38
33
  """
39
34
  if backend is not None:
40
35
  pulumi.set(__self__, "backend", backend)
@@ -56,9 +51,6 @@ class SecretRoleArgs:
56
51
  @property
57
52
  @pulumi.getter
58
53
  def backend(self) -> Optional[pulumi.Input[str]]:
59
- """
60
- The path of the Terraform Cloud Secret Backend the role belongs to.
61
- """
62
54
  return pulumi.get(self, "backend")
63
55
 
64
56
  @backend.setter
@@ -80,9 +72,6 @@ class SecretRoleArgs:
80
72
  @property
81
73
  @pulumi.getter
82
74
  def name(self) -> Optional[pulumi.Input[str]]:
83
- """
84
- The name of an existing role against which to create this Terraform Cloud credential
85
- """
86
75
  return pulumi.get(self, "name")
87
76
 
88
77
  @name.setter
@@ -107,9 +96,6 @@ class SecretRoleArgs:
107
96
  @property
108
97
  @pulumi.getter
109
98
  def organization(self) -> Optional[pulumi.Input[str]]:
110
- """
111
- Name of the Terraform Cloud or Enterprise organization
112
- """
113
99
  return pulumi.get(self, "organization")
114
100
 
115
101
  @organization.setter
@@ -119,9 +105,6 @@ class SecretRoleArgs:
119
105
  @property
120
106
  @pulumi.getter(name="teamId")
121
107
  def team_id(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
124
- """
125
108
  return pulumi.get(self, "team_id")
126
109
 
127
110
  @team_id.setter
@@ -143,9 +126,6 @@ class SecretRoleArgs:
143
126
  @property
144
127
  @pulumi.getter(name="userId")
145
128
  def user_id(self) -> Optional[pulumi.Input[str]]:
146
- """
147
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
148
- """
149
129
  return pulumi.get(self, "user_id")
150
130
 
151
131
  @user_id.setter
@@ -166,17 +146,12 @@ class _SecretRoleState:
166
146
  user_id: Optional[pulumi.Input[str]] = None):
167
147
  """
168
148
  Input properties used for looking up and filtering SecretRole resources.
169
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
170
149
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
171
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
172
150
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
173
151
  The value should not contain leading or trailing forward slashes.
174
152
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
153
  *Available only for Vault Enterprise*.
176
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
178
154
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
179
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
180
155
  """
181
156
  if backend is not None:
182
157
  pulumi.set(__self__, "backend", backend)
@@ -198,9 +173,6 @@ class _SecretRoleState:
198
173
  @property
199
174
  @pulumi.getter
200
175
  def backend(self) -> Optional[pulumi.Input[str]]:
201
- """
202
- The path of the Terraform Cloud Secret Backend the role belongs to.
203
- """
204
176
  return pulumi.get(self, "backend")
205
177
 
206
178
  @backend.setter
@@ -222,9 +194,6 @@ class _SecretRoleState:
222
194
  @property
223
195
  @pulumi.getter
224
196
  def name(self) -> Optional[pulumi.Input[str]]:
225
- """
226
- The name of an existing role against which to create this Terraform Cloud credential
227
- """
228
197
  return pulumi.get(self, "name")
229
198
 
230
199
  @name.setter
@@ -249,9 +218,6 @@ class _SecretRoleState:
249
218
  @property
250
219
  @pulumi.getter
251
220
  def organization(self) -> Optional[pulumi.Input[str]]:
252
- """
253
- Name of the Terraform Cloud or Enterprise organization
254
- """
255
221
  return pulumi.get(self, "organization")
256
222
 
257
223
  @organization.setter
@@ -261,9 +227,6 @@ class _SecretRoleState:
261
227
  @property
262
228
  @pulumi.getter(name="teamId")
263
229
  def team_id(self) -> Optional[pulumi.Input[str]]:
264
- """
265
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
266
- """
267
230
  return pulumi.get(self, "team_id")
268
231
 
269
232
  @team_id.setter
@@ -285,9 +248,6 @@ class _SecretRoleState:
285
248
  @property
286
249
  @pulumi.getter(name="userId")
287
250
  def user_id(self) -> Optional[pulumi.Input[str]]:
288
- """
289
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
290
- """
291
251
  return pulumi.get(self, "user_id")
292
252
 
293
253
  @user_id.setter
@@ -312,7 +272,6 @@ class SecretRole(pulumi.CustomResource):
312
272
  """
313
273
  ## Example Usage
314
274
 
315
- <!--Start PulumiCodeChooser -->
316
275
  ```python
317
276
  import pulumi
318
277
  import pulumi_vault as vault
@@ -323,10 +282,10 @@ class SecretRole(pulumi.CustomResource):
323
282
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
283
  example = vault.terraformcloud.SecretRole("example",
325
284
  backend=test.backend,
285
+ name="test-role",
326
286
  organization="example-organization-name",
327
287
  team_id="team-ieF4isC...")
328
288
  ```
329
- <!--End PulumiCodeChooser -->
330
289
 
331
290
  ## Import
332
291
 
@@ -338,17 +297,12 @@ class SecretRole(pulumi.CustomResource):
338
297
 
339
298
  :param str resource_name: The name of the resource.
340
299
  :param pulumi.ResourceOptions opts: Options for the resource.
341
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
342
300
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
343
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
344
301
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
345
302
  The value should not contain leading or trailing forward slashes.
346
303
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
304
  *Available only for Vault Enterprise*.
348
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
349
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
350
305
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
351
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
352
306
  """
353
307
  ...
354
308
  @overload
@@ -359,7 +313,6 @@ class SecretRole(pulumi.CustomResource):
359
313
  """
360
314
  ## Example Usage
361
315
 
362
- <!--Start PulumiCodeChooser -->
363
316
  ```python
364
317
  import pulumi
365
318
  import pulumi_vault as vault
@@ -370,10 +323,10 @@ class SecretRole(pulumi.CustomResource):
370
323
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
371
324
  example = vault.terraformcloud.SecretRole("example",
372
325
  backend=test.backend,
326
+ name="test-role",
373
327
  organization="example-organization-name",
374
328
  team_id="team-ieF4isC...")
375
329
  ```
376
- <!--End PulumiCodeChooser -->
377
330
 
378
331
  ## Import
379
332
 
@@ -448,17 +401,12 @@ class SecretRole(pulumi.CustomResource):
448
401
  :param str resource_name: The unique name of the resulting resource.
449
402
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
450
403
  :param pulumi.ResourceOptions opts: Options for the resource.
451
- :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
452
404
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
453
- :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
454
405
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
455
406
  The value should not contain leading or trailing forward slashes.
456
407
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
457
408
  *Available only for Vault Enterprise*.
458
- :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
459
- :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
460
409
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
461
- :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
462
410
  """
463
411
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
464
412
 
@@ -477,9 +425,6 @@ class SecretRole(pulumi.CustomResource):
477
425
  @property
478
426
  @pulumi.getter
479
427
  def backend(self) -> pulumi.Output[Optional[str]]:
480
- """
481
- The path of the Terraform Cloud Secret Backend the role belongs to.
482
- """
483
428
  return pulumi.get(self, "backend")
484
429
 
485
430
  @property
@@ -493,9 +438,6 @@ class SecretRole(pulumi.CustomResource):
493
438
  @property
494
439
  @pulumi.getter
495
440
  def name(self) -> pulumi.Output[str]:
496
- """
497
- The name of an existing role against which to create this Terraform Cloud credential
498
- """
499
441
  return pulumi.get(self, "name")
500
442
 
501
443
  @property
@@ -512,17 +454,11 @@ class SecretRole(pulumi.CustomResource):
512
454
  @property
513
455
  @pulumi.getter
514
456
  def organization(self) -> pulumi.Output[Optional[str]]:
515
- """
516
- Name of the Terraform Cloud or Enterprise organization
517
- """
518
457
  return pulumi.get(self, "organization")
519
458
 
520
459
  @property
521
460
  @pulumi.getter(name="teamId")
522
461
  def team_id(self) -> pulumi.Output[Optional[str]]:
523
- """
524
- ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
525
- """
526
462
  return pulumi.get(self, "team_id")
527
463
 
528
464
  @property
@@ -536,8 +472,5 @@ class SecretRole(pulumi.CustomResource):
536
472
  @property
537
473
  @pulumi.getter(name="userId")
538
474
  def user_id(self) -> pulumi.Output[Optional[str]]:
539
- """
540
- ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
541
- """
542
475
  return pulumi.get(self, "user_id")
543
476
 
pulumi_vault/token.py CHANGED
@@ -623,26 +623,24 @@ class Token(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
- <!--Start PulumiCodeChooser -->
627
626
  ```python
628
627
  import pulumi
629
628
  import pulumi_vault as vault
630
629
 
631
630
  example = vault.Token("example",
632
- metadata={
633
- "purpose": "service-account",
634
- },
631
+ role_name="app",
635
632
  policies=[
636
633
  "policy1",
637
634
  "policy2",
638
635
  ],
639
- renew_increment=86400,
640
- renew_min_lease=43200,
641
636
  renewable=True,
642
- role_name="app",
643
- ttl="24h")
637
+ ttl="24h",
638
+ renew_min_lease=43200,
639
+ renew_increment=86400,
640
+ metadata={
641
+ "purpose": "service-account",
642
+ })
644
643
  ```
645
- <!--End PulumiCodeChooser -->
646
644
 
647
645
  ## Import
648
646
 
@@ -682,26 +680,24 @@ class Token(pulumi.CustomResource):
682
680
  """
683
681
  ## Example Usage
684
682
 
685
- <!--Start PulumiCodeChooser -->
686
683
  ```python
687
684
  import pulumi
688
685
  import pulumi_vault as vault
689
686
 
690
687
  example = vault.Token("example",
691
- metadata={
692
- "purpose": "service-account",
693
- },
688
+ role_name="app",
694
689
  policies=[
695
690
  "policy1",
696
691
  "policy2",
697
692
  ],
698
- renew_increment=86400,
699
- renew_min_lease=43200,
700
693
  renewable=True,
701
- role_name="app",
702
- ttl="24h")
694
+ ttl="24h",
695
+ renew_min_lease=43200,
696
+ renew_increment=86400,
697
+ metadata={
698
+ "purpose": "service-account",
699
+ })
703
700
  ```
704
- <!--End PulumiCodeChooser -->
705
701
 
706
702
  ## Import
707
703