pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -311,6 +311,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
311
311
 
312
312
  ## Example Usage
313
313
 
314
+ <!--Start PulumiCodeChooser -->
314
315
  ```python
315
316
  import pulumi
316
317
  import pulumi_vault as vault
@@ -319,6 +320,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
319
320
  role_name="my-role")
320
321
  pulumi.export("role-id", role.role_id)
321
322
  ```
323
+ <!--End PulumiCodeChooser -->
322
324
 
323
325
 
324
326
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -414,6 +416,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
414
416
 
415
417
  ## Example Usage
416
418
 
419
+ <!--Start PulumiCodeChooser -->
417
420
  ```python
418
421
  import pulumi
419
422
  import pulumi_vault as vault
@@ -422,6 +425,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
422
425
  role_name="my-role")
423
426
  pulumi.export("role-id", role.role_id)
424
427
  ```
428
+ <!--End PulumiCodeChooser -->
425
429
 
426
430
 
427
431
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -328,13 +328,14 @@ class SecretBackend(pulumi.CustomResource):
328
328
  """
329
329
  ## Example Usage
330
330
 
331
+ <!--Start PulumiCodeChooser -->
331
332
  ```python
332
333
  import pulumi
333
- import pulumi_std as std
334
334
  import pulumi_vault as vault
335
335
 
336
- gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
336
+ gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
337
337
  ```
338
+ <!--End PulumiCodeChooser -->
338
339
 
339
340
  :param str resource_name: The name of the resource.
340
341
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -363,13 +364,14 @@ class SecretBackend(pulumi.CustomResource):
363
364
  """
364
365
  ## Example Usage
365
366
 
367
+ <!--Start PulumiCodeChooser -->
366
368
  ```python
367
369
  import pulumi
368
- import pulumi_std as std
369
370
  import pulumi_vault as vault
370
371
 
371
- gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
372
+ gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
372
373
  ```
374
+ <!--End PulumiCodeChooser -->
373
375
 
374
376
  :param str resource_name: The name of the resource.
375
377
  :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
@@ -219,22 +219,23 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
219
219
 
220
220
  ## Example Usage
221
221
 
222
+ <!--Start PulumiCodeChooser -->
222
223
  ```python
223
224
  import pulumi
224
- import pulumi_google as google
225
- import pulumi_std as std
225
+ import pulumi_gcp as gcp
226
226
  import pulumi_vault as vault
227
227
 
228
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
228
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
229
229
  gcp = vault.gcp.SecretBackend("gcp",
230
230
  path="gcp",
231
- credentials=std.file(input="credentials.json").result)
232
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
231
+ credentials=(lambda path: open(path).read())("credentials.json"))
232
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
233
233
  backend=gcp.path,
234
234
  impersonated_account="this",
235
- service_account_email=this["email"],
235
+ service_account_email=this.email,
236
236
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
237
237
  ```
238
+ <!--End PulumiCodeChooser -->
238
239
 
239
240
  ## Import
240
241
 
@@ -266,22 +267,23 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
266
267
 
267
268
  ## Example Usage
268
269
 
270
+ <!--Start PulumiCodeChooser -->
269
271
  ```python
270
272
  import pulumi
271
- import pulumi_google as google
272
- import pulumi_std as std
273
+ import pulumi_gcp as gcp
273
274
  import pulumi_vault as vault
274
275
 
275
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
276
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
276
277
  gcp = vault.gcp.SecretBackend("gcp",
277
278
  path="gcp",
278
- credentials=std.file(input="credentials.json").result)
279
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
279
+ credentials=(lambda path: open(path).read())("credentials.json"))
280
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
280
281
  backend=gcp.path,
281
282
  impersonated_account="this",
282
- service_account_email=this["email"],
283
+ service_account_email=this.email,
283
284
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
284
285
  ```
286
+ <!--End PulumiCodeChooser -->
285
287
 
286
288
  ## Import
287
289
 
@@ -297,15 +297,15 @@ class SecretRoleset(pulumi.CustomResource):
297
297
 
298
298
  ## Example Usage
299
299
 
300
+ <!--Start PulumiCodeChooser -->
300
301
  ```python
301
302
  import pulumi
302
- import pulumi_std as std
303
303
  import pulumi_vault as vault
304
304
 
305
305
  project = "my-awesome-project"
306
306
  gcp = vault.gcp.SecretBackend("gcp",
307
307
  path="gcp",
308
- credentials=std.file(input="credentials.json").result)
308
+ credentials=(lambda path: open(path).read())("credentials.json"))
309
309
  roleset = vault.gcp.SecretRoleset("roleset",
310
310
  backend=gcp.path,
311
311
  roleset="project_viewer",
@@ -317,6 +317,7 @@ class SecretRoleset(pulumi.CustomResource):
317
317
  roles=["roles/viewer"],
318
318
  )])
319
319
  ```
320
+ <!--End PulumiCodeChooser -->
320
321
 
321
322
  ## Import
322
323
 
@@ -352,15 +353,15 @@ class SecretRoleset(pulumi.CustomResource):
352
353
 
353
354
  ## Example Usage
354
355
 
356
+ <!--Start PulumiCodeChooser -->
355
357
  ```python
356
358
  import pulumi
357
- import pulumi_std as std
358
359
  import pulumi_vault as vault
359
360
 
360
361
  project = "my-awesome-project"
361
362
  gcp = vault.gcp.SecretBackend("gcp",
362
363
  path="gcp",
363
- credentials=std.file(input="credentials.json").result)
364
+ credentials=(lambda path: open(path).read())("credentials.json"))
364
365
  roleset = vault.gcp.SecretRoleset("roleset",
365
366
  backend=gcp.path,
366
367
  roleset="project_viewer",
@@ -372,6 +373,7 @@ class SecretRoleset(pulumi.CustomResource):
372
373
  roles=["roles/viewer"],
373
374
  )])
374
375
  ```
376
+ <!--End PulumiCodeChooser -->
375
377
 
376
378
  ## Import
377
379
 
@@ -299,27 +299,28 @@ class SecretStaticAccount(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
+ <!--Start PulumiCodeChooser -->
302
303
  ```python
303
304
  import pulumi
304
- import pulumi_google as google
305
- import pulumi_std as std
305
+ import pulumi_gcp as gcp
306
306
  import pulumi_vault as vault
307
307
 
308
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
308
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
309
309
  gcp = vault.gcp.SecretBackend("gcp",
310
310
  path="gcp",
311
- credentials=std.file(input="credentials.json").result)
312
- static_account = vault.gcp.SecretStaticAccount("static_account",
311
+ credentials=(lambda path: open(path).read())("credentials.json"))
312
+ static_account = vault.gcp.SecretStaticAccount("staticAccount",
313
313
  backend=gcp.path,
314
314
  static_account="project_viewer",
315
315
  secret_type="access_token",
316
316
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
317
- service_account_email=this["email"],
317
+ service_account_email=this.email,
318
318
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
319
- resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
319
+ resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
320
320
  roles=["roles/viewer"],
321
321
  )])
322
322
  ```
323
+ <!--End PulumiCodeChooser -->
323
324
 
324
325
  ## Import
325
326
 
@@ -356,27 +357,28 @@ class SecretStaticAccount(pulumi.CustomResource):
356
357
 
357
358
  ## Example Usage
358
359
 
360
+ <!--Start PulumiCodeChooser -->
359
361
  ```python
360
362
  import pulumi
361
- import pulumi_google as google
362
- import pulumi_std as std
363
+ import pulumi_gcp as gcp
363
364
  import pulumi_vault as vault
364
365
 
365
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
366
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
366
367
  gcp = vault.gcp.SecretBackend("gcp",
367
368
  path="gcp",
368
- credentials=std.file(input="credentials.json").result)
369
- static_account = vault.gcp.SecretStaticAccount("static_account",
369
+ credentials=(lambda path: open(path).read())("credentials.json"))
370
+ static_account = vault.gcp.SecretStaticAccount("staticAccount",
370
371
  backend=gcp.path,
371
372
  static_account="project_viewer",
372
373
  secret_type="access_token",
373
374
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
374
- service_account_email=this["email"],
375
+ service_account_email=this.email,
375
376
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
376
- resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
377
+ resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
377
378
  roles=["roles/viewer"],
378
379
  )])
379
380
  ```
381
+ <!--End PulumiCodeChooser -->
380
382
 
381
383
  ## Import
382
384
 
@@ -407,6 +407,7 @@ class Endpoint(pulumi.CustomResource):
407
407
  """
408
408
  ## Example Usage
409
409
 
410
+ <!--Start PulumiCodeChooser -->
410
411
  ```python
411
412
  import pulumi
412
413
  import pulumi_vault as vault
@@ -421,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
421
422
  }
422
423
  \"\"\",
423
424
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
424
- u1_token = vault.generic.Endpoint("u1_token",
425
+ u1_token = vault.generic.Endpoint("u1Token",
425
426
  path="auth/userpass/login/u1",
426
427
  disable_read=True,
427
428
  disable_delete=True,
@@ -430,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
430
431
  }
431
432
  \"\"\",
432
433
  opts=pulumi.ResourceOptions(depends_on=[u1]))
433
- u1_entity = vault.generic.Endpoint("u1_entity",
434
+ u1_entity = vault.generic.Endpoint("u1Entity",
434
435
  disable_read=True,
435
436
  disable_delete=True,
436
437
  path="identity/lookup/entity",
@@ -444,6 +445,7 @@ class Endpoint(pulumi.CustomResource):
444
445
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
445
446
  pulumi.export("u1Id", u1_entity.write_data["id"])
446
447
  ```
448
+ <!--End PulumiCodeChooser -->
447
449
 
448
450
  ## Required Vault Capabilities
449
451
 
@@ -500,6 +502,7 @@ class Endpoint(pulumi.CustomResource):
500
502
  """
501
503
  ## Example Usage
502
504
 
505
+ <!--Start PulumiCodeChooser -->
503
506
  ```python
504
507
  import pulumi
505
508
  import pulumi_vault as vault
@@ -514,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
514
517
  }
515
518
  \"\"\",
516
519
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
517
- u1_token = vault.generic.Endpoint("u1_token",
520
+ u1_token = vault.generic.Endpoint("u1Token",
518
521
  path="auth/userpass/login/u1",
519
522
  disable_read=True,
520
523
  disable_delete=True,
@@ -523,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
523
526
  }
524
527
  \"\"\",
525
528
  opts=pulumi.ResourceOptions(depends_on=[u1]))
526
- u1_entity = vault.generic.Endpoint("u1_entity",
529
+ u1_entity = vault.generic.Endpoint("u1Entity",
527
530
  disable_read=True,
528
531
  disable_delete=True,
529
532
  path="identity/lookup/entity",
@@ -537,6 +540,7 @@ class Endpoint(pulumi.CustomResource):
537
540
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
538
541
  pulumi.export("u1Id", u1_entity.write_data["id"])
539
542
  ```
543
+ <!--End PulumiCodeChooser -->
540
544
 
541
545
  ## Required Vault Capabilities
542
546
 
@@ -162,32 +162,14 @@ def get_secret(namespace: Optional[str] = None,
162
162
 
163
163
  ### Generic secret
164
164
 
165
+ <!--Start PulumiCodeChooser -->
165
166
  ```python
166
167
  import pulumi
167
168
  import pulumi_vault as vault
168
169
 
169
170
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
170
171
  ```
171
-
172
- ### KV
173
-
174
- For this example, consider `example` as a path for a KV engine.
175
-
176
- ```python
177
- import pulumi
178
- import pulumi_vault as vault
179
-
180
-
181
- def not_implemented(msg):
182
- raise NotImplementedError(msg)
183
-
184
- example_creds = vault.generic.get_secret(path="example/creds")
185
- example_template = not_implemented("The template_file data resource is not yet supported.")
186
- ```
187
-
188
- ## Required Vault Capabilities
189
-
190
- Use of this resource requires the `read` capability on the given path.
172
+ <!--End PulumiCodeChooser -->
191
173
 
192
174
 
193
175
  :param str namespace: The namespace of the target resource.
@@ -239,32 +221,14 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
239
221
 
240
222
  ### Generic secret
241
223
 
224
+ <!--Start PulumiCodeChooser -->
242
225
  ```python
243
226
  import pulumi
244
227
  import pulumi_vault as vault
245
228
 
246
229
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
247
230
  ```
248
-
249
- ### KV
250
-
251
- For this example, consider `example` as a path for a KV engine.
252
-
253
- ```python
254
- import pulumi
255
- import pulumi_vault as vault
256
-
257
-
258
- def not_implemented(msg):
259
- raise NotImplementedError(msg)
260
-
261
- example_creds = vault.generic.get_secret(path="example/creds")
262
- example_template = not_implemented("The template_file data resource is not yet supported.")
263
- ```
264
-
265
- ## Required Vault Capabilities
266
-
267
- Use of this resource requires the `read` capability on the given path.
231
+ <!--End PulumiCodeChooser -->
268
232
 
269
233
 
270
234
  :param str namespace: The namespace of the target resource.
@@ -152,12 +152,14 @@ def get_auth_backend(namespace: Optional[str] = None,
152
152
  """
153
153
  ## Example Usage
154
154
 
155
+ <!--Start PulumiCodeChooser -->
155
156
  ```python
156
157
  import pulumi
157
158
  import pulumi_vault as vault
158
159
 
159
160
  example = vault.get_auth_backend(path="userpass")
160
161
  ```
162
+ <!--End PulumiCodeChooser -->
161
163
 
162
164
 
163
165
  :param str namespace: The namespace of the target resource.
@@ -192,12 +194,14 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
192
194
  """
193
195
  ## Example Usage
194
196
 
197
+ <!--Start PulumiCodeChooser -->
195
198
  ```python
196
199
  import pulumi
197
200
  import pulumi_vault as vault
198
201
 
199
202
  example = vault.get_auth_backend(path="userpass")
200
203
  ```
204
+ <!--End PulumiCodeChooser -->
201
205
 
202
206
 
203
207
  :param str namespace: The namespace of the target resource.
@@ -92,19 +92,23 @@ def get_auth_backends(namespace: Optional[str] = None,
92
92
  """
93
93
  ## Example Usage
94
94
 
95
+ <!--Start PulumiCodeChooser -->
95
96
  ```python
96
97
  import pulumi
97
98
  import pulumi_vault as vault
98
99
 
99
100
  example = vault.get_auth_backends()
100
101
  ```
102
+ <!--End PulumiCodeChooser -->
101
103
 
104
+ <!--Start PulumiCodeChooser -->
102
105
  ```python
103
106
  import pulumi
104
107
  import pulumi_vault as vault
105
108
 
106
109
  example_filter = vault.get_auth_backends(type="kubernetes")
107
110
  ```
111
+ <!--End PulumiCodeChooser -->
108
112
 
109
113
 
110
114
  :param str namespace: The namespace of the target resource.
@@ -134,19 +138,23 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
134
138
  """
135
139
  ## Example Usage
136
140
 
141
+ <!--Start PulumiCodeChooser -->
137
142
  ```python
138
143
  import pulumi
139
144
  import pulumi_vault as vault
140
145
 
141
146
  example = vault.get_auth_backends()
142
147
  ```
148
+ <!--End PulumiCodeChooser -->
143
149
 
150
+ <!--Start PulumiCodeChooser -->
144
151
  ```python
145
152
  import pulumi
146
153
  import pulumi_vault as vault
147
154
 
148
155
  example_filter = vault.get_auth_backends(type="kubernetes")
149
156
  ```
157
+ <!--End PulumiCodeChooser -->
150
158
 
151
159
 
152
160
  :param str namespace: The namespace of the target resource.
@@ -110,24 +110,29 @@ def get_namespace(namespace: Optional[str] = None,
110
110
 
111
111
  ### Current namespace
112
112
 
113
+ <!--Start PulumiCodeChooser -->
113
114
  ```python
114
115
  import pulumi
115
116
  import pulumi_vault as vault
116
117
 
117
118
  current = vault.get_namespace()
118
119
  ```
120
+ <!--End PulumiCodeChooser -->
119
121
 
120
122
  ### Single namespace
121
123
 
124
+ <!--Start PulumiCodeChooser -->
122
125
  ```python
123
126
  import pulumi
124
127
  import pulumi_vault as vault
125
128
 
126
129
  ns1 = vault.get_namespace(path="ns1")
127
130
  ```
131
+ <!--End PulumiCodeChooser -->
128
132
 
129
133
  ### Nested namespace
130
134
 
135
+ <!--Start PulumiCodeChooser -->
131
136
  ```python
132
137
  import pulumi
133
138
  import pulumi_vault as vault
@@ -138,6 +143,7 @@ def get_namespace(namespace: Optional[str] = None,
138
143
  # -> foo/parent/child/
139
144
  path_fq = child.path_fq
140
145
  ```
146
+ <!--End PulumiCodeChooser -->
141
147
 
142
148
 
143
149
  :param str namespace: The namespace to provision the resource in.
@@ -172,24 +178,29 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
172
178
 
173
179
  ### Current namespace
174
180
 
181
+ <!--Start PulumiCodeChooser -->
175
182
  ```python
176
183
  import pulumi
177
184
  import pulumi_vault as vault
178
185
 
179
186
  current = vault.get_namespace()
180
187
  ```
188
+ <!--End PulumiCodeChooser -->
181
189
 
182
190
  ### Single namespace
183
191
 
192
+ <!--Start PulumiCodeChooser -->
184
193
  ```python
185
194
  import pulumi
186
195
  import pulumi_vault as vault
187
196
 
188
197
  ns1 = vault.get_namespace(path="ns1")
189
198
  ```
199
+ <!--End PulumiCodeChooser -->
190
200
 
191
201
  ### Nested namespace
192
202
 
203
+ <!--Start PulumiCodeChooser -->
193
204
  ```python
194
205
  import pulumi
195
206
  import pulumi_vault as vault
@@ -200,6 +211,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
200
211
  # -> foo/parent/child/
201
212
  path_fq = child.path_fq
202
213
  ```
214
+ <!--End PulumiCodeChooser -->
203
215
 
204
216
 
205
217
  :param str namespace: The namespace to provision the resource in.
@@ -72,25 +72,29 @@ def get_namespaces(namespace: Optional[str] = None,
72
72
 
73
73
  ### Child namespaces
74
74
 
75
+ <!--Start PulumiCodeChooser -->
75
76
  ```python
76
77
  import pulumi
77
78
  import pulumi_vault as vault
78
79
 
79
80
  children = vault.get_namespaces()
80
81
  ```
82
+ <!--End PulumiCodeChooser -->
81
83
 
82
84
  ### Nested namespace
83
85
 
84
86
  To fetch the details of nested namespaces:
85
87
 
88
+ <!--Start PulumiCodeChooser -->
86
89
  ```python
87
90
  import pulumi
88
91
  import pulumi_vault as vault
89
92
 
90
93
  children = vault.get_namespaces(namespace="parent")
91
- child = {__key: vault.get_namespace(namespace=children.namespace,
92
- path=__key) for __key, __value in children.paths}
94
+ child = [vault.get_namespace(namespace=children.namespace,
95
+ path=__key) for __key, __value in children.paths]
93
96
  ```
97
+ <!--End PulumiCodeChooser -->
94
98
 
95
99
 
96
100
  :param str namespace: The namespace to provision the resource in.
@@ -116,25 +120,29 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
116
120
 
117
121
  ### Child namespaces
118
122
 
123
+ <!--Start PulumiCodeChooser -->
119
124
  ```python
120
125
  import pulumi
121
126
  import pulumi_vault as vault
122
127
 
123
128
  children = vault.get_namespaces()
124
129
  ```
130
+ <!--End PulumiCodeChooser -->
125
131
 
126
132
  ### Nested namespace
127
133
 
128
134
  To fetch the details of nested namespaces:
129
135
 
136
+ <!--Start PulumiCodeChooser -->
130
137
  ```python
131
138
  import pulumi
132
139
  import pulumi_vault as vault
133
140
 
134
141
  children = vault.get_namespaces(namespace="parent")
135
- child = {__key: vault.get_namespace(namespace=children.namespace,
136
- path=__key) for __key, __value in children.paths}
142
+ child = [vault.get_namespace(namespace=children.namespace,
143
+ path=__key) for __key, __value in children.paths]
137
144
  ```
145
+ <!--End PulumiCodeChooser -->
138
146
 
139
147
 
140
148
  :param str namespace: The namespace to provision the resource in.
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
103
103
  """
104
104
  ## Example Usage
105
105
 
106
+ <!--Start PulumiCodeChooser -->
106
107
  ```python
107
108
  import pulumi
108
109
  import pulumi_vault as vault
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
122
123
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
124
  role=role))
124
125
  ```
126
+ <!--End PulumiCodeChooser -->
125
127
 
126
128
 
127
129
  :param str backend: The path to the Nomad secret backend to
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
157
159
  """
158
160
  ## Example Usage
159
161
 
162
+ <!--Start PulumiCodeChooser -->
160
163
  ```python
161
164
  import pulumi
162
165
  import pulumi_vault as vault
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
176
179
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
180
  role=role))
178
181
  ```
182
+ <!--End PulumiCodeChooser -->
179
183
 
180
184
 
181
185
  :param str backend: The path to the Nomad secret backend to