pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -591,21 +591,20 @@ class SecretBackendRole(pulumi.CustomResource):
591
591
 
592
592
  Example using `service_account_name` mode:
593
593
 
594
+ <!--Start PulumiCodeChooser -->
594
595
  ```python
595
596
  import pulumi
596
- import pulumi_std as std
597
597
  import pulumi_vault as vault
598
598
 
599
599
  config = vault.kubernetes.SecretBackend("config",
600
600
  path="kubernetes",
601
601
  description="kubernetes secrets engine description",
602
602
  kubernetes_host="https://127.0.0.1:61233",
603
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
604
- service_account_jwt=std.file(input="/path/to/token").result,
603
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
604
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
605
605
  disable_local_ca_jwt=False)
606
606
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
607
607
  backend=config.path,
608
- name="service-account-name-role",
609
608
  allowed_kubernetes_namespaces=["*"],
610
609
  token_max_ttl=43200,
611
610
  token_default_ttl=21600,
@@ -619,24 +618,24 @@ class SecretBackendRole(pulumi.CustomResource):
619
618
  "location": "earth",
620
619
  })
621
620
  ```
621
+ <!--End PulumiCodeChooser -->
622
622
 
623
623
  Example using `kubernetes_role_name` mode:
624
624
 
625
+ <!--Start PulumiCodeChooser -->
625
626
  ```python
626
627
  import pulumi
627
- import pulumi_std as std
628
628
  import pulumi_vault as vault
629
629
 
630
630
  config = vault.kubernetes.SecretBackend("config",
631
631
  path="kubernetes",
632
632
  description="kubernetes secrets engine description",
633
633
  kubernetes_host="https://127.0.0.1:61233",
634
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
635
- service_account_jwt=std.file(input="/path/to/token").result,
634
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
635
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
636
636
  disable_local_ca_jwt=False)
637
637
  name_example = vault.kubernetes.SecretBackendRole("name-example",
638
638
  backend=config.path,
639
- name="service-account-name-role",
640
639
  allowed_kubernetes_namespaces=["*"],
641
640
  token_max_ttl=43200,
642
641
  token_default_ttl=21600,
@@ -650,24 +649,24 @@ class SecretBackendRole(pulumi.CustomResource):
650
649
  "location": "earth",
651
650
  })
652
651
  ```
652
+ <!--End PulumiCodeChooser -->
653
653
 
654
654
  Example using `generated_role_rules` mode:
655
655
 
656
+ <!--Start PulumiCodeChooser -->
656
657
  ```python
657
658
  import pulumi
658
- import pulumi_std as std
659
659
  import pulumi_vault as vault
660
660
 
661
661
  config = vault.kubernetes.SecretBackend("config",
662
662
  path="kubernetes",
663
663
  description="kubernetes secrets engine description",
664
664
  kubernetes_host="https://127.0.0.1:61233",
665
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
666
- service_account_jwt=std.file(input="/path/to/token").result,
665
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
666
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
667
667
  disable_local_ca_jwt=False)
668
668
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
669
669
  backend=config.path,
670
- name="service-account-name-role",
671
670
  allowed_kubernetes_namespaces=["*"],
672
671
  token_max_ttl=43200,
673
672
  token_default_ttl=21600,
@@ -686,6 +685,7 @@ class SecretBackendRole(pulumi.CustomResource):
686
685
  "location": "earth",
687
686
  })
688
687
  ```
688
+ <!--End PulumiCodeChooser -->
689
689
 
690
690
  ## Import
691
691
 
@@ -748,21 +748,20 @@ class SecretBackendRole(pulumi.CustomResource):
748
748
 
749
749
  Example using `service_account_name` mode:
750
750
 
751
+ <!--Start PulumiCodeChooser -->
751
752
  ```python
752
753
  import pulumi
753
- import pulumi_std as std
754
754
  import pulumi_vault as vault
755
755
 
756
756
  config = vault.kubernetes.SecretBackend("config",
757
757
  path="kubernetes",
758
758
  description="kubernetes secrets engine description",
759
759
  kubernetes_host="https://127.0.0.1:61233",
760
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
761
- service_account_jwt=std.file(input="/path/to/token").result,
760
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
761
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
762
762
  disable_local_ca_jwt=False)
763
763
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
764
764
  backend=config.path,
765
- name="service-account-name-role",
766
765
  allowed_kubernetes_namespaces=["*"],
767
766
  token_max_ttl=43200,
768
767
  token_default_ttl=21600,
@@ -776,24 +775,24 @@ class SecretBackendRole(pulumi.CustomResource):
776
775
  "location": "earth",
777
776
  })
778
777
  ```
778
+ <!--End PulumiCodeChooser -->
779
779
 
780
780
  Example using `kubernetes_role_name` mode:
781
781
 
782
+ <!--Start PulumiCodeChooser -->
782
783
  ```python
783
784
  import pulumi
784
- import pulumi_std as std
785
785
  import pulumi_vault as vault
786
786
 
787
787
  config = vault.kubernetes.SecretBackend("config",
788
788
  path="kubernetes",
789
789
  description="kubernetes secrets engine description",
790
790
  kubernetes_host="https://127.0.0.1:61233",
791
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
792
- service_account_jwt=std.file(input="/path/to/token").result,
791
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
792
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
793
793
  disable_local_ca_jwt=False)
794
794
  name_example = vault.kubernetes.SecretBackendRole("name-example",
795
795
  backend=config.path,
796
- name="service-account-name-role",
797
796
  allowed_kubernetes_namespaces=["*"],
798
797
  token_max_ttl=43200,
799
798
  token_default_ttl=21600,
@@ -807,24 +806,24 @@ class SecretBackendRole(pulumi.CustomResource):
807
806
  "location": "earth",
808
807
  })
809
808
  ```
809
+ <!--End PulumiCodeChooser -->
810
810
 
811
811
  Example using `generated_role_rules` mode:
812
812
 
813
+ <!--Start PulumiCodeChooser -->
813
814
  ```python
814
815
  import pulumi
815
- import pulumi_std as std
816
816
  import pulumi_vault as vault
817
817
 
818
818
  config = vault.kubernetes.SecretBackend("config",
819
819
  path="kubernetes",
820
820
  description="kubernetes secrets engine description",
821
821
  kubernetes_host="https://127.0.0.1:61233",
822
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
823
- service_account_jwt=std.file(input="/path/to/token").result,
822
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
823
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
824
824
  disable_local_ca_jwt=False)
825
825
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
826
826
  backend=config.path,
827
- name="service-account-name-role",
828
827
  allowed_kubernetes_namespaces=["*"],
829
828
  token_max_ttl=43200,
830
829
  token_default_ttl=21600,
@@ -843,6 +842,7 @@ class SecretBackendRole(pulumi.CustomResource):
843
842
  "location": "earth",
844
843
  })
845
844
  ```
845
+ <!--End PulumiCodeChooser -->
846
846
 
847
847
  ## Import
848
848
 
@@ -134,6 +134,7 @@ def get_secret(namespace: Optional[str] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
+ <!--Start PulumiCodeChooser -->
137
138
  ```python
138
139
  import pulumi
139
140
  import json
@@ -154,6 +155,7 @@ def get_secret(namespace: Optional[str] = None,
154
155
  }))
155
156
  secret_data = vault.kv.get_secret_output(path=secret.path)
156
157
  ```
158
+ <!--End PulumiCodeChooser -->
157
159
 
158
160
  ## Required Vault Capabilities
159
161
 
@@ -190,6 +192,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
192
  """
191
193
  ## Example Usage
192
194
 
195
+ <!--Start PulumiCodeChooser -->
193
196
  ```python
194
197
  import pulumi
195
198
  import json
@@ -210,6 +213,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
210
213
  }))
211
214
  secret_data = vault.kv.get_secret_output(path=secret.path)
212
215
  ```
216
+ <!--End PulumiCodeChooser -->
213
217
 
214
218
  ## Required Vault Capabilities
215
219
 
@@ -134,6 +134,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
+ <!--Start PulumiCodeChooser -->
137
138
  ```python
138
139
  import pulumi
139
140
  import json
@@ -146,9 +147,8 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
146
147
  "version": "2",
147
148
  },
148
149
  description="KV Version 2 secret engine mount")
149
- aws_secret = vault.kv.SecretV2("aws_secret",
150
+ aws_secret = vault.kv.SecretV2("awsSecret",
150
151
  mount=kvv2.path,
151
- name="aws_secret",
152
152
  data_json=json.dumps({
153
153
  "zip": "zap",
154
154
  "foo": "bar",
@@ -156,6 +156,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
156
156
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
157
157
  name=aws_secret.name)
158
158
  ```
159
+ <!--End PulumiCodeChooser -->
159
160
 
160
161
  ## Required Vault Capabilities
161
162
 
@@ -209,6 +210,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
209
210
  """
210
211
  ## Example Usage
211
212
 
213
+ <!--Start PulumiCodeChooser -->
212
214
  ```python
213
215
  import pulumi
214
216
  import json
@@ -221,9 +223,8 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
221
223
  "version": "2",
222
224
  },
223
225
  description="KV Version 2 secret engine mount")
224
- aws_secret = vault.kv.SecretV2("aws_secret",
226
+ aws_secret = vault.kv.SecretV2("awsSecret",
225
227
  mount=kvv2.path,
226
- name="aws_secret",
227
228
  data_json=json.dumps({
228
229
  "zip": "zap",
229
230
  "foo": "bar",
@@ -231,6 +232,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
231
232
  test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
232
233
  name=aws_secret.name)
233
234
  ```
235
+ <!--End PulumiCodeChooser -->
234
236
 
235
237
  ## Required Vault Capabilities
236
238
 
@@ -179,35 +179,6 @@ def get_secret_v2(mount: Optional[str] = None,
179
179
  """
180
180
  ## Example Usage
181
181
 
182
- ```python
183
- import pulumi
184
- import json
185
- import pulumi_vault as vault
186
-
187
- kvv2 = vault.Mount("kvv2",
188
- path="kvv2",
189
- type="kv",
190
- options={
191
- "version": "2",
192
- },
193
- description="KV Version 2 secret engine mount")
194
- example_secret_v2 = vault.kv.SecretV2("example",
195
- mount=kvv2.path,
196
- name="secret",
197
- cas=1,
198
- delete_all_versions=True,
199
- data_json=json.dumps({
200
- "zip": "zap",
201
- "foo": "bar",
202
- }))
203
- example = vault.kv.get_secret_v2_output(mount=kvv2.path,
204
- name=example_secret_v2.name)
205
- ```
206
-
207
- ## Required Vault Capabilities
208
-
209
- Use of this resource requires the `read` capability on the given path.
210
-
211
182
 
212
183
  :param str mount: Path where KV-V2 engine is mounted.
213
184
  :param str name: Full name of the secret. For a nested secret
@@ -252,35 +223,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
252
223
  """
253
224
  ## Example Usage
254
225
 
255
- ```python
256
- import pulumi
257
- import json
258
- import pulumi_vault as vault
259
-
260
- kvv2 = vault.Mount("kvv2",
261
- path="kvv2",
262
- type="kv",
263
- options={
264
- "version": "2",
265
- },
266
- description="KV Version 2 secret engine mount")
267
- example_secret_v2 = vault.kv.SecretV2("example",
268
- mount=kvv2.path,
269
- name="secret",
270
- cas=1,
271
- delete_all_versions=True,
272
- data_json=json.dumps({
273
- "zip": "zap",
274
- "foo": "bar",
275
- }))
276
- example = vault.kv.get_secret_v2_output(mount=kvv2.path,
277
- name=example_secret_v2.name)
278
- ```
279
-
280
- ## Required Vault Capabilities
281
-
282
- Use of this resource requires the `read` capability on the given path.
283
-
284
226
 
285
227
  :param str mount: Path where KV-V2 engine is mounted.
286
228
  :param str name: Full name of the secret. For a nested secret
@@ -80,6 +80,7 @@ def get_secrets_list(namespace: Optional[str] = None,
80
80
  """
81
81
  ## Example Usage
82
82
 
83
+ <!--Start PulumiCodeChooser -->
83
84
  ```python
84
85
  import pulumi
85
86
  import json
@@ -92,18 +93,19 @@ def get_secrets_list(namespace: Optional[str] = None,
92
93
  "version": "1",
93
94
  },
94
95
  description="KV Version 1 secret engine mount")
95
- aws_secret = vault.kv.Secret("aws_secret",
96
+ aws_secret = vault.kv.Secret("awsSecret",
96
97
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
97
98
  data_json=json.dumps({
98
99
  "zip": "zap",
99
100
  }))
100
- azure_secret = vault.kv.Secret("azure_secret",
101
+ azure_secret = vault.kv.Secret("azureSecret",
101
102
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
102
103
  data_json=json.dumps({
103
104
  "foo": "bar",
104
105
  }))
105
106
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
106
107
  ```
108
+ <!--End PulumiCodeChooser -->
107
109
 
108
110
  ## Required Vault Capabilities
109
111
 
@@ -136,6 +138,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
136
138
  """
137
139
  ## Example Usage
138
140
 
141
+ <!--Start PulumiCodeChooser -->
139
142
  ```python
140
143
  import pulumi
141
144
  import json
@@ -148,18 +151,19 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
148
151
  "version": "1",
149
152
  },
150
153
  description="KV Version 1 secret engine mount")
151
- aws_secret = vault.kv.Secret("aws_secret",
154
+ aws_secret = vault.kv.Secret("awsSecret",
152
155
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
153
156
  data_json=json.dumps({
154
157
  "zip": "zap",
155
158
  }))
156
- azure_secret = vault.kv.Secret("azure_secret",
159
+ azure_secret = vault.kv.Secret("azureSecret",
157
160
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
158
161
  data_json=json.dumps({
159
162
  "foo": "bar",
160
163
  }))
161
164
  secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
162
165
  ```
166
+ <!--End PulumiCodeChooser -->
163
167
 
164
168
  ## Required Vault Capabilities
165
169
 
@@ -102,6 +102,7 @@ def get_secrets_list_v2(mount: Optional[str] = None,
102
102
  """
103
103
  ## Example Usage
104
104
 
105
+ <!--Start PulumiCodeChooser -->
105
106
  ```python
106
107
  import pulumi
107
108
  import json
@@ -114,28 +115,26 @@ def get_secrets_list_v2(mount: Optional[str] = None,
114
115
  "version": "2",
115
116
  },
116
117
  description="KV Version 2 secret engine mount")
117
- aws_secret = vault.kv.SecretV2("aws_secret",
118
+ aws_secret = vault.kv.SecretV2("awsSecret",
118
119
  mount=kvv2.path,
119
- name="aws_secret",
120
120
  data_json=json.dumps({
121
121
  "zip": "zap",
122
122
  }))
123
- azure_secret = vault.kv.SecretV2("azure_secret",
123
+ azure_secret = vault.kv.SecretV2("azureSecret",
124
124
  mount=kvv2.path,
125
- name="azure_secret",
126
125
  data_json=json.dumps({
127
126
  "foo": "bar",
128
127
  }))
129
- nested_secret = vault.kv.SecretV2("nested_secret",
128
+ nested_secret = vault.kv.SecretV2("nestedSecret",
130
129
  mount=kvv2.path,
131
- name=azure_secret.name.apply(lambda name: f"{name}/dev"),
132
130
  data_json=json.dumps({
133
131
  "password": "test",
134
132
  }))
135
133
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
136
134
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
137
- name=test2["name"]))
135
+ name=vault_kv_secret_v2["test_2"]["name"]))
138
136
  ```
137
+ <!--End PulumiCodeChooser -->
139
138
 
140
139
  ## Required Vault Capabilities
141
140
 
@@ -176,6 +175,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
176
175
  """
177
176
  ## Example Usage
178
177
 
178
+ <!--Start PulumiCodeChooser -->
179
179
  ```python
180
180
  import pulumi
181
181
  import json
@@ -188,28 +188,26 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
188
188
  "version": "2",
189
189
  },
190
190
  description="KV Version 2 secret engine mount")
191
- aws_secret = vault.kv.SecretV2("aws_secret",
191
+ aws_secret = vault.kv.SecretV2("awsSecret",
192
192
  mount=kvv2.path,
193
- name="aws_secret",
194
193
  data_json=json.dumps({
195
194
  "zip": "zap",
196
195
  }))
197
- azure_secret = vault.kv.SecretV2("azure_secret",
196
+ azure_secret = vault.kv.SecretV2("azureSecret",
198
197
  mount=kvv2.path,
199
- name="azure_secret",
200
198
  data_json=json.dumps({
201
199
  "foo": "bar",
202
200
  }))
203
- nested_secret = vault.kv.SecretV2("nested_secret",
201
+ nested_secret = vault.kv.SecretV2("nestedSecret",
204
202
  mount=kvv2.path,
205
- name=azure_secret.name.apply(lambda name: f"{name}/dev"),
206
203
  data_json=json.dumps({
207
204
  "password": "test",
208
205
  }))
209
206
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
210
207
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
211
- name=test2["name"]))
208
+ name=vault_kv_secret_v2["test_2"]["name"]))
212
209
  ```
210
+ <!--End PulumiCodeChooser -->
213
211
 
214
212
  ## Required Vault Capabilities
215
213
 
pulumi_vault/kv/secret.py CHANGED
@@ -176,6 +176,7 @@ class Secret(pulumi.CustomResource):
176
176
 
177
177
  ## Example Usage
178
178
 
179
+ <!--Start PulumiCodeChooser -->
179
180
  ```python
180
181
  import pulumi
181
182
  import json
@@ -195,6 +196,7 @@ class Secret(pulumi.CustomResource):
195
196
  "foo": "bar",
196
197
  }))
197
198
  ```
199
+ <!--End PulumiCodeChooser -->
198
200
 
199
201
  ## Required Vault Capabilities
200
202
 
@@ -235,6 +237,7 @@ class Secret(pulumi.CustomResource):
235
237
 
236
238
  ## Example Usage
237
239
 
240
+ <!--Start PulumiCodeChooser -->
238
241
  ```python
239
242
  import pulumi
240
243
  import json
@@ -254,6 +257,7 @@ class Secret(pulumi.CustomResource):
254
257
  "foo": "bar",
255
258
  }))
256
259
  ```
260
+ <!--End PulumiCodeChooser -->
257
261
 
258
262
  ## Required Vault Capabilities
259
263
 
@@ -226,6 +226,7 @@ class SecretBackendV2(pulumi.CustomResource):
226
226
 
227
227
  ## Example Usage
228
228
 
229
+ <!--Start PulumiCodeChooser -->
229
230
  ```python
230
231
  import pulumi
231
232
  import pulumi_vault as vault
@@ -243,6 +244,7 @@ class SecretBackendV2(pulumi.CustomResource):
243
244
  delete_version_after=12600,
244
245
  cas_required=True)
245
246
  ```
247
+ <!--End PulumiCodeChooser -->
246
248
 
247
249
  ## Required Vault Capabilities
248
250
 
@@ -288,6 +290,7 @@ class SecretBackendV2(pulumi.CustomResource):
288
290
 
289
291
  ## Example Usage
290
292
 
293
+ <!--Start PulumiCodeChooser -->
291
294
  ```python
292
295
  import pulumi
293
296
  import pulumi_vault as vault
@@ -305,6 +308,7 @@ class SecretBackendV2(pulumi.CustomResource):
305
308
  delete_version_after=12600,
306
309
  cas_required=True)
307
310
  ```
311
+ <!--End PulumiCodeChooser -->
308
312
 
309
313
  ## Required Vault Capabilities
310
314
 
@@ -448,6 +448,7 @@ class SecretV2(pulumi.CustomResource):
448
448
 
449
449
  ## Example Usage
450
450
 
451
+ <!--Start PulumiCodeChooser -->
451
452
  ```python
452
453
  import pulumi
453
454
  import json
@@ -462,7 +463,6 @@ class SecretV2(pulumi.CustomResource):
462
463
  description="KV Version 2 secret engine mount")
463
464
  example = vault.kv.SecretV2("example",
464
465
  mount=kvv2.path,
465
- name="secret",
466
466
  cas=1,
467
467
  delete_all_versions=True,
468
468
  data_json=json.dumps({
@@ -477,6 +477,7 @@ class SecretV2(pulumi.CustomResource):
477
477
  },
478
478
  ))
479
479
  ```
480
+ <!--End PulumiCodeChooser -->
480
481
 
481
482
  ## Required Vault Capabilities
482
483
 
@@ -545,6 +546,7 @@ class SecretV2(pulumi.CustomResource):
545
546
 
546
547
  ## Example Usage
547
548
 
549
+ <!--Start PulumiCodeChooser -->
548
550
  ```python
549
551
  import pulumi
550
552
  import json
@@ -559,7 +561,6 @@ class SecretV2(pulumi.CustomResource):
559
561
  description="KV Version 2 secret engine mount")
560
562
  example = vault.kv.SecretV2("example",
561
563
  mount=kvv2.path,
562
- name="secret",
563
564
  cas=1,
564
565
  delete_all_versions=True,
565
566
  data_json=json.dumps({
@@ -574,6 +575,7 @@ class SecretV2(pulumi.CustomResource):
574
575
  },
575
576
  ))
576
577
  ```
578
+ <!--End PulumiCodeChooser -->
577
579
 
578
580
  ## Required Vault Capabilities
579
581