pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -25,6 +25,9 @@ class SecretBackendArgs:
25
25
  token: Optional[pulumi.Input[str]] = None):
26
26
  """
27
27
  The set of arguments for constructing a SecretBackend resource.
28
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
29
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
30
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
28
31
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
29
32
  :param pulumi.Input[str] description: A human-friendly description for this backend.
30
33
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -35,6 +38,7 @@ class SecretBackendArgs:
35
38
  The value should not contain leading or trailing forward slashes.
36
39
  The `namespace` is always relative to the provider's configured namespace.
37
40
  *Available only for Vault Enterprise*.
41
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
38
42
  """
39
43
  if address is not None:
40
44
  pulumi.set(__self__, "address", address)
@@ -58,6 +62,9 @@ class SecretBackendArgs:
58
62
  @property
59
63
  @pulumi.getter
60
64
  def address(self) -> Optional[pulumi.Input[str]]:
65
+ """
66
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
67
+ """
61
68
  return pulumi.get(self, "address")
62
69
 
63
70
  @address.setter
@@ -67,6 +74,9 @@ class SecretBackendArgs:
67
74
  @property
68
75
  @pulumi.getter
69
76
  def backend(self) -> Optional[pulumi.Input[str]]:
77
+ """
78
+ Unique name of the Vault Terraform Cloud mount to configure
79
+ """
70
80
  return pulumi.get(self, "backend")
71
81
 
72
82
  @backend.setter
@@ -76,6 +86,9 @@ class SecretBackendArgs:
76
86
  @property
77
87
  @pulumi.getter(name="basePath")
78
88
  def base_path(self) -> Optional[pulumi.Input[str]]:
89
+ """
90
+ Specifies the base path for the Terraform Cloud or Enterprise API.
91
+ """
79
92
  return pulumi.get(self, "base_path")
80
93
 
81
94
  @base_path.setter
@@ -150,6 +163,9 @@ class SecretBackendArgs:
150
163
  @property
151
164
  @pulumi.getter
152
165
  def token(self) -> Optional[pulumi.Input[str]]:
166
+ """
167
+ Specifies the Terraform Cloud access token to use.
168
+ """
153
169
  return pulumi.get(self, "token")
154
170
 
155
171
  @token.setter
@@ -171,6 +187,9 @@ class _SecretBackendState:
171
187
  token: Optional[pulumi.Input[str]] = None):
172
188
  """
173
189
  Input properties used for looking up and filtering SecretBackend resources.
190
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
191
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
192
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
174
193
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
175
194
  :param pulumi.Input[str] description: A human-friendly description for this backend.
176
195
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -181,6 +200,7 @@ class _SecretBackendState:
181
200
  The value should not contain leading or trailing forward slashes.
182
201
  The `namespace` is always relative to the provider's configured namespace.
183
202
  *Available only for Vault Enterprise*.
203
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
184
204
  """
185
205
  if address is not None:
186
206
  pulumi.set(__self__, "address", address)
@@ -204,6 +224,9 @@ class _SecretBackendState:
204
224
  @property
205
225
  @pulumi.getter
206
226
  def address(self) -> Optional[pulumi.Input[str]]:
227
+ """
228
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
229
+ """
207
230
  return pulumi.get(self, "address")
208
231
 
209
232
  @address.setter
@@ -213,6 +236,9 @@ class _SecretBackendState:
213
236
  @property
214
237
  @pulumi.getter
215
238
  def backend(self) -> Optional[pulumi.Input[str]]:
239
+ """
240
+ Unique name of the Vault Terraform Cloud mount to configure
241
+ """
216
242
  return pulumi.get(self, "backend")
217
243
 
218
244
  @backend.setter
@@ -222,6 +248,9 @@ class _SecretBackendState:
222
248
  @property
223
249
  @pulumi.getter(name="basePath")
224
250
  def base_path(self) -> Optional[pulumi.Input[str]]:
251
+ """
252
+ Specifies the base path for the Terraform Cloud or Enterprise API.
253
+ """
225
254
  return pulumi.get(self, "base_path")
226
255
 
227
256
  @base_path.setter
@@ -296,6 +325,9 @@ class _SecretBackendState:
296
325
  @property
297
326
  @pulumi.getter
298
327
  def token(self) -> Optional[pulumi.Input[str]]:
328
+ """
329
+ Specifies the Terraform Cloud access token to use.
330
+ """
299
331
  return pulumi.get(self, "token")
300
332
 
301
333
  @token.setter
@@ -321,6 +353,7 @@ class SecretBackend(pulumi.CustomResource):
321
353
  """
322
354
  ## Example Usage
323
355
 
356
+ <!--Start PulumiCodeChooser -->
324
357
  ```python
325
358
  import pulumi
326
359
  import pulumi_vault as vault
@@ -330,6 +363,7 @@ class SecretBackend(pulumi.CustomResource):
330
363
  description="Manages the Terraform Cloud backend",
331
364
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
332
365
  ```
366
+ <!--End PulumiCodeChooser -->
333
367
 
334
368
  ## Import
335
369
 
@@ -341,6 +375,9 @@ class SecretBackend(pulumi.CustomResource):
341
375
 
342
376
  :param str resource_name: The name of the resource.
343
377
  :param pulumi.ResourceOptions opts: Options for the resource.
378
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
379
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
380
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
344
381
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
345
382
  :param pulumi.Input[str] description: A human-friendly description for this backend.
346
383
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -351,6 +388,7 @@ class SecretBackend(pulumi.CustomResource):
351
388
  The value should not contain leading or trailing forward slashes.
352
389
  The `namespace` is always relative to the provider's configured namespace.
353
390
  *Available only for Vault Enterprise*.
391
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
354
392
  """
355
393
  ...
356
394
  @overload
@@ -361,6 +399,7 @@ class SecretBackend(pulumi.CustomResource):
361
399
  """
362
400
  ## Example Usage
363
401
 
402
+ <!--Start PulumiCodeChooser -->
364
403
  ```python
365
404
  import pulumi
366
405
  import pulumi_vault as vault
@@ -370,6 +409,7 @@ class SecretBackend(pulumi.CustomResource):
370
409
  description="Manages the Terraform Cloud backend",
371
410
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
372
411
  ```
412
+ <!--End PulumiCodeChooser -->
373
413
 
374
414
  ## Import
375
415
 
@@ -449,6 +489,9 @@ class SecretBackend(pulumi.CustomResource):
449
489
  :param str resource_name: The unique name of the resulting resource.
450
490
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
451
491
  :param pulumi.ResourceOptions opts: Options for the resource.
492
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
493
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
494
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
452
495
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
453
496
  :param pulumi.Input[str] description: A human-friendly description for this backend.
454
497
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -459,6 +502,7 @@ class SecretBackend(pulumi.CustomResource):
459
502
  The value should not contain leading or trailing forward slashes.
460
503
  The `namespace` is always relative to the provider's configured namespace.
461
504
  *Available only for Vault Enterprise*.
505
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
462
506
  """
463
507
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
464
508
 
@@ -478,16 +522,25 @@ class SecretBackend(pulumi.CustomResource):
478
522
  @property
479
523
  @pulumi.getter
480
524
  def address(self) -> pulumi.Output[Optional[str]]:
525
+ """
526
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
527
+ """
481
528
  return pulumi.get(self, "address")
482
529
 
483
530
  @property
484
531
  @pulumi.getter
485
532
  def backend(self) -> pulumi.Output[Optional[str]]:
533
+ """
534
+ Unique name of the Vault Terraform Cloud mount to configure
535
+ """
486
536
  return pulumi.get(self, "backend")
487
537
 
488
538
  @property
489
539
  @pulumi.getter(name="basePath")
490
540
  def base_path(self) -> pulumi.Output[Optional[str]]:
541
+ """
542
+ Specifies the base path for the Terraform Cloud or Enterprise API.
543
+ """
491
544
  return pulumi.get(self, "base_path")
492
545
 
493
546
  @property
@@ -538,5 +591,8 @@ class SecretBackend(pulumi.CustomResource):
538
591
  @property
539
592
  @pulumi.getter
540
593
  def token(self) -> pulumi.Output[Optional[str]]:
594
+ """
595
+ Specifies the Terraform Cloud access token to use.
596
+ """
541
597
  return pulumi.get(self, "token")
542
598
 
@@ -19,6 +19,7 @@ class SecretCredsArgs:
19
19
  namespace: Optional[pulumi.Input[str]] = None):
20
20
  """
21
21
  The set of arguments for constructing a SecretCreds resource.
22
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
22
23
  :param pulumi.Input[str] role: Name of the role.
23
24
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
24
25
  The value should not contain leading or trailing forward slashes.
@@ -33,6 +34,9 @@ class SecretCredsArgs:
33
34
  @property
34
35
  @pulumi.getter
35
36
  def backend(self) -> pulumi.Input[str]:
37
+ """
38
+ Terraform Cloud secret backend to generate tokens from
39
+ """
36
40
  return pulumi.get(self, "backend")
37
41
 
38
42
  @backend.setter
@@ -80,6 +84,7 @@ class _SecretCredsState:
80
84
  token_id: Optional[pulumi.Input[str]] = None):
81
85
  """
82
86
  Input properties used for looking up and filtering SecretCreds resources.
87
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
83
88
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
84
89
  Vault lease associated with them.
85
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -114,6 +119,9 @@ class _SecretCredsState:
114
119
  @property
115
120
  @pulumi.getter
116
121
  def backend(self) -> Optional[pulumi.Input[str]]:
122
+ """
123
+ Terraform Cloud secret backend to generate tokens from
124
+ """
117
125
  return pulumi.get(self, "backend")
118
126
 
119
127
  @backend.setter
@@ -223,6 +231,7 @@ class SecretCreds(pulumi.CustomResource):
223
231
  """
224
232
  ## Example Usage
225
233
 
234
+ <!--Start PulumiCodeChooser -->
226
235
  ```python
227
236
  import pulumi
228
237
  import pulumi_vault as vault
@@ -233,16 +242,17 @@ class SecretCreds(pulumi.CustomResource):
233
242
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
234
243
  example = vault.terraformcloud.SecretRole("example",
235
244
  backend=test.backend,
236
- name="test-role",
237
245
  organization="example-organization-name",
238
246
  team_id="team-ieF4isC...")
239
247
  token = vault.terraformcloud.SecretCreds("token",
240
248
  backend=test.backend,
241
249
  role=example.name)
242
250
  ```
251
+ <!--End PulumiCodeChooser -->
243
252
 
244
253
  :param str resource_name: The name of the resource.
245
254
  :param pulumi.ResourceOptions opts: Options for the resource.
255
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
246
256
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
247
257
  The value should not contain leading or trailing forward slashes.
248
258
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -258,6 +268,7 @@ class SecretCreds(pulumi.CustomResource):
258
268
  """
259
269
  ## Example Usage
260
270
 
271
+ <!--Start PulumiCodeChooser -->
261
272
  ```python
262
273
  import pulumi
263
274
  import pulumi_vault as vault
@@ -268,13 +279,13 @@ class SecretCreds(pulumi.CustomResource):
268
279
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
269
280
  example = vault.terraformcloud.SecretRole("example",
270
281
  backend=test.backend,
271
- name="test-role",
272
282
  organization="example-organization-name",
273
283
  team_id="team-ieF4isC...")
274
284
  token = vault.terraformcloud.SecretCreds("token",
275
285
  backend=test.backend,
276
286
  role=example.name)
277
287
  ```
288
+ <!--End PulumiCodeChooser -->
278
289
 
279
290
  :param str resource_name: The name of the resource.
280
291
  :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
@@ -342,6 +353,7 @@ class SecretCreds(pulumi.CustomResource):
342
353
  :param str resource_name: The unique name of the resulting resource.
343
354
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
344
355
  :param pulumi.ResourceOptions opts: Options for the resource.
356
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
345
357
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
346
358
  Vault lease associated with them.
347
359
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -373,6 +385,9 @@ class SecretCreds(pulumi.CustomResource):
373
385
  @property
374
386
  @pulumi.getter
375
387
  def backend(self) -> pulumi.Output[str]:
388
+ """
389
+ Terraform Cloud secret backend to generate tokens from
390
+ """
376
391
  return pulumi.get(self, "backend")
377
392
 
378
393
  @property
@@ -24,12 +24,17 @@ class SecretRoleArgs:
24
24
  user_id: Optional[pulumi.Input[str]] = None):
25
25
  """
26
26
  The set of arguments for constructing a SecretRole resource.
27
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
27
28
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
29
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
28
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
31
  The value should not contain leading or trailing forward slashes.
30
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
33
  *Available only for Vault Enterprise*.
34
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
32
36
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
37
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
33
38
  """
34
39
  if backend is not None:
35
40
  pulumi.set(__self__, "backend", backend)
@@ -51,6 +56,9 @@ class SecretRoleArgs:
51
56
  @property
52
57
  @pulumi.getter
53
58
  def backend(self) -> Optional[pulumi.Input[str]]:
59
+ """
60
+ The path of the Terraform Cloud Secret Backend the role belongs to.
61
+ """
54
62
  return pulumi.get(self, "backend")
55
63
 
56
64
  @backend.setter
@@ -72,6 +80,9 @@ class SecretRoleArgs:
72
80
  @property
73
81
  @pulumi.getter
74
82
  def name(self) -> Optional[pulumi.Input[str]]:
83
+ """
84
+ The name of an existing role against which to create this Terraform Cloud credential
85
+ """
75
86
  return pulumi.get(self, "name")
76
87
 
77
88
  @name.setter
@@ -96,6 +107,9 @@ class SecretRoleArgs:
96
107
  @property
97
108
  @pulumi.getter
98
109
  def organization(self) -> Optional[pulumi.Input[str]]:
110
+ """
111
+ Name of the Terraform Cloud or Enterprise organization
112
+ """
99
113
  return pulumi.get(self, "organization")
100
114
 
101
115
  @organization.setter
@@ -105,6 +119,9 @@ class SecretRoleArgs:
105
119
  @property
106
120
  @pulumi.getter(name="teamId")
107
121
  def team_id(self) -> Optional[pulumi.Input[str]]:
122
+ """
123
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
124
+ """
108
125
  return pulumi.get(self, "team_id")
109
126
 
110
127
  @team_id.setter
@@ -126,6 +143,9 @@ class SecretRoleArgs:
126
143
  @property
127
144
  @pulumi.getter(name="userId")
128
145
  def user_id(self) -> Optional[pulumi.Input[str]]:
146
+ """
147
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
148
+ """
129
149
  return pulumi.get(self, "user_id")
130
150
 
131
151
  @user_id.setter
@@ -146,12 +166,17 @@ class _SecretRoleState:
146
166
  user_id: Optional[pulumi.Input[str]] = None):
147
167
  """
148
168
  Input properties used for looking up and filtering SecretRole resources.
169
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
149
170
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
171
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
150
172
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
151
173
  The value should not contain leading or trailing forward slashes.
152
174
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
175
  *Available only for Vault Enterprise*.
176
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
154
178
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
179
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
155
180
  """
156
181
  if backend is not None:
157
182
  pulumi.set(__self__, "backend", backend)
@@ -173,6 +198,9 @@ class _SecretRoleState:
173
198
  @property
174
199
  @pulumi.getter
175
200
  def backend(self) -> Optional[pulumi.Input[str]]:
201
+ """
202
+ The path of the Terraform Cloud Secret Backend the role belongs to.
203
+ """
176
204
  return pulumi.get(self, "backend")
177
205
 
178
206
  @backend.setter
@@ -194,6 +222,9 @@ class _SecretRoleState:
194
222
  @property
195
223
  @pulumi.getter
196
224
  def name(self) -> Optional[pulumi.Input[str]]:
225
+ """
226
+ The name of an existing role against which to create this Terraform Cloud credential
227
+ """
197
228
  return pulumi.get(self, "name")
198
229
 
199
230
  @name.setter
@@ -218,6 +249,9 @@ class _SecretRoleState:
218
249
  @property
219
250
  @pulumi.getter
220
251
  def organization(self) -> Optional[pulumi.Input[str]]:
252
+ """
253
+ Name of the Terraform Cloud or Enterprise organization
254
+ """
221
255
  return pulumi.get(self, "organization")
222
256
 
223
257
  @organization.setter
@@ -227,6 +261,9 @@ class _SecretRoleState:
227
261
  @property
228
262
  @pulumi.getter(name="teamId")
229
263
  def team_id(self) -> Optional[pulumi.Input[str]]:
264
+ """
265
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
266
+ """
230
267
  return pulumi.get(self, "team_id")
231
268
 
232
269
  @team_id.setter
@@ -248,6 +285,9 @@ class _SecretRoleState:
248
285
  @property
249
286
  @pulumi.getter(name="userId")
250
287
  def user_id(self) -> Optional[pulumi.Input[str]]:
288
+ """
289
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
290
+ """
251
291
  return pulumi.get(self, "user_id")
252
292
 
253
293
  @user_id.setter
@@ -272,6 +312,7 @@ class SecretRole(pulumi.CustomResource):
272
312
  """
273
313
  ## Example Usage
274
314
 
315
+ <!--Start PulumiCodeChooser -->
275
316
  ```python
276
317
  import pulumi
277
318
  import pulumi_vault as vault
@@ -282,10 +323,10 @@ class SecretRole(pulumi.CustomResource):
282
323
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
283
324
  example = vault.terraformcloud.SecretRole("example",
284
325
  backend=test.backend,
285
- name="test-role",
286
326
  organization="example-organization-name",
287
327
  team_id="team-ieF4isC...")
288
328
  ```
329
+ <!--End PulumiCodeChooser -->
289
330
 
290
331
  ## Import
291
332
 
@@ -297,12 +338,17 @@ class SecretRole(pulumi.CustomResource):
297
338
 
298
339
  :param str resource_name: The name of the resource.
299
340
  :param pulumi.ResourceOptions opts: Options for the resource.
341
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
300
342
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
343
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
301
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
302
345
  The value should not contain leading or trailing forward slashes.
303
346
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
347
  *Available only for Vault Enterprise*.
348
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
349
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
305
350
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
351
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
306
352
  """
307
353
  ...
308
354
  @overload
@@ -313,6 +359,7 @@ class SecretRole(pulumi.CustomResource):
313
359
  """
314
360
  ## Example Usage
315
361
 
362
+ <!--Start PulumiCodeChooser -->
316
363
  ```python
317
364
  import pulumi
318
365
  import pulumi_vault as vault
@@ -323,10 +370,10 @@ class SecretRole(pulumi.CustomResource):
323
370
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
371
  example = vault.terraformcloud.SecretRole("example",
325
372
  backend=test.backend,
326
- name="test-role",
327
373
  organization="example-organization-name",
328
374
  team_id="team-ieF4isC...")
329
375
  ```
376
+ <!--End PulumiCodeChooser -->
330
377
 
331
378
  ## Import
332
379
 
@@ -401,12 +448,17 @@ class SecretRole(pulumi.CustomResource):
401
448
  :param str resource_name: The unique name of the resulting resource.
402
449
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
403
450
  :param pulumi.ResourceOptions opts: Options for the resource.
451
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
404
452
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
453
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
405
454
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
406
455
  The value should not contain leading or trailing forward slashes.
407
456
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
408
457
  *Available only for Vault Enterprise*.
458
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
459
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
409
460
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
461
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
410
462
  """
411
463
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
412
464
 
@@ -425,6 +477,9 @@ class SecretRole(pulumi.CustomResource):
425
477
  @property
426
478
  @pulumi.getter
427
479
  def backend(self) -> pulumi.Output[Optional[str]]:
480
+ """
481
+ The path of the Terraform Cloud Secret Backend the role belongs to.
482
+ """
428
483
  return pulumi.get(self, "backend")
429
484
 
430
485
  @property
@@ -438,6 +493,9 @@ class SecretRole(pulumi.CustomResource):
438
493
  @property
439
494
  @pulumi.getter
440
495
  def name(self) -> pulumi.Output[str]:
496
+ """
497
+ The name of an existing role against which to create this Terraform Cloud credential
498
+ """
441
499
  return pulumi.get(self, "name")
442
500
 
443
501
  @property
@@ -454,11 +512,17 @@ class SecretRole(pulumi.CustomResource):
454
512
  @property
455
513
  @pulumi.getter
456
514
  def organization(self) -> pulumi.Output[Optional[str]]:
515
+ """
516
+ Name of the Terraform Cloud or Enterprise organization
517
+ """
457
518
  return pulumi.get(self, "organization")
458
519
 
459
520
  @property
460
521
  @pulumi.getter(name="teamId")
461
522
  def team_id(self) -> pulumi.Output[Optional[str]]:
523
+ """
524
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
525
+ """
462
526
  return pulumi.get(self, "team_id")
463
527
 
464
528
  @property
@@ -472,5 +536,8 @@ class SecretRole(pulumi.CustomResource):
472
536
  @property
473
537
  @pulumi.getter(name="userId")
474
538
  def user_id(self) -> pulumi.Output[Optional[str]]:
539
+ """
540
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
541
+ """
475
542
  return pulumi.get(self, "user_id")
476
543
 
pulumi_vault/token.py CHANGED
@@ -623,24 +623,26 @@ class Token(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
+ <!--Start PulumiCodeChooser -->
626
627
  ```python
627
628
  import pulumi
628
629
  import pulumi_vault as vault
629
630
 
630
631
  example = vault.Token("example",
631
- role_name="app",
632
+ metadata={
633
+ "purpose": "service-account",
634
+ },
632
635
  policies=[
633
636
  "policy1",
634
637
  "policy2",
635
638
  ],
636
- renewable=True,
637
- ttl="24h",
638
- renew_min_lease=43200,
639
639
  renew_increment=86400,
640
- metadata={
641
- "purpose": "service-account",
642
- })
640
+ renew_min_lease=43200,
641
+ renewable=True,
642
+ role_name="app",
643
+ ttl="24h")
643
644
  ```
645
+ <!--End PulumiCodeChooser -->
644
646
 
645
647
  ## Import
646
648
 
@@ -680,24 +682,26 @@ class Token(pulumi.CustomResource):
680
682
  """
681
683
  ## Example Usage
682
684
 
685
+ <!--Start PulumiCodeChooser -->
683
686
  ```python
684
687
  import pulumi
685
688
  import pulumi_vault as vault
686
689
 
687
690
  example = vault.Token("example",
688
- role_name="app",
691
+ metadata={
692
+ "purpose": "service-account",
693
+ },
689
694
  policies=[
690
695
  "policy1",
691
696
  "policy2",
692
697
  ],
693
- renewable=True,
694
- ttl="24h",
695
- renew_min_lease=43200,
696
698
  renew_increment=86400,
697
- metadata={
698
- "purpose": "service-account",
699
- })
699
+ renew_min_lease=43200,
700
+ renewable=True,
701
+ role_name="app",
702
+ ttl="24h")
700
703
  ```
704
+ <!--End PulumiCodeChooser -->
701
705
 
702
706
  ## Import
703
707