pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -490,6 +490,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
490
490
 
491
491
  ## Example Usage
492
492
 
493
+ <!--Start PulumiCodeChooser -->
493
494
  ```python
494
495
  import pulumi
495
496
  import pulumi_vault as vault
@@ -499,11 +500,12 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
499
500
  type="pki",
500
501
  default_lease_ttl_seconds=3600,
501
502
  max_lease_ttl_seconds=86400)
502
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
503
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
503
504
  backend=pki.path,
504
505
  expiry="72h",
505
506
  disable=False)
506
507
  ```
508
+ <!--End PulumiCodeChooser -->
507
509
 
508
510
  :param str resource_name: The name of the resource.
509
511
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -538,6 +540,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
538
540
 
539
541
  ## Example Usage
540
542
 
543
+ <!--Start PulumiCodeChooser -->
541
544
  ```python
542
545
  import pulumi
543
546
  import pulumi_vault as vault
@@ -547,11 +550,12 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
547
550
  type="pki",
548
551
  default_lease_ttl_seconds=3600,
549
552
  max_lease_ttl_seconds=86400)
550
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
553
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
551
554
  backend=pki.path,
552
555
  expiry="72h",
553
556
  disable=False)
554
557
  ```
558
+ <!--End PulumiCodeChooser -->
555
559
 
556
560
  :param str resource_name: The name of the resource.
557
561
  :param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
@@ -962,16 +962,18 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
962
962
  """
963
963
  ## Example Usage
964
964
 
965
+ <!--Start PulumiCodeChooser -->
965
966
  ```python
966
967
  import pulumi
967
968
  import pulumi_vault as vault
968
969
 
969
970
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
970
- backend=pki["path"],
971
+ backend=vault_mount["pki"]["path"],
971
972
  type="internal",
972
973
  common_name="app.my.domain",
973
- opts=pulumi.ResourceOptions(depends_on=[pki]))
974
+ opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
974
975
  ```
976
+ <!--End PulumiCodeChooser -->
975
977
 
976
978
  :param str resource_name: The name of the resource.
977
979
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1020,16 +1022,18 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1020
1022
  """
1021
1023
  ## Example Usage
1022
1024
 
1025
+ <!--Start PulumiCodeChooser -->
1023
1026
  ```python
1024
1027
  import pulumi
1025
1028
  import pulumi_vault as vault
1026
1029
 
1027
1030
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
1028
- backend=pki["path"],
1031
+ backend=vault_mount["pki"]["path"],
1029
1032
  type="internal",
1030
1033
  common_name="app.my.domain",
1031
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1034
+ opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1032
1035
  ```
1036
+ <!--End PulumiCodeChooser -->
1033
1037
 
1034
1038
  :param str resource_name: The name of the resource.
1035
1039
  :param SecretBackendIntermediateCertRequestArgs args: The arguments to use to populate this resource's properties.
@@ -187,6 +187,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
187
187
  """
188
188
  ## Example Usage
189
189
 
190
+ <!--Start PulumiCodeChooser -->
190
191
  ```python
191
192
  import pulumi
192
193
  import pulumi_vault as vault
@@ -203,7 +204,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
203
204
  description="intermediate",
204
205
  default_lease_ttl_seconds=86400,
205
206
  max_lease_ttl_seconds=86400)
206
- example = vault.pki_secret.SecretBackendRootCert("example",
207
+ example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
207
208
  backend=root.path,
208
209
  type="internal",
209
210
  common_name="RootOrg Root CA",
@@ -218,11 +219,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
218
219
  country="US",
219
220
  locality="San Francisco",
220
221
  province="CA")
221
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
222
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
222
223
  backend=intermediate.path,
223
- type=example.type,
224
+ type=example_secret_backend_root_cert.type,
224
225
  common_name="SubOrg Intermediate CA")
225
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
226
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
226
227
  backend=root.path,
227
228
  csr=example_secret_backend_intermediate_cert_request.csr,
228
229
  common_name="SubOrg Intermediate CA",
@@ -233,10 +234,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
233
234
  locality="San Francisco",
234
235
  province="CA",
235
236
  revoke=True)
236
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
237
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
237
238
  backend=intermediate.path,
238
239
  certificate=example_secret_backend_root_sign_intermediate.certificate)
239
240
  ```
241
+ <!--End PulumiCodeChooser -->
240
242
 
241
243
  :param str resource_name: The name of the resource.
242
244
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -258,6 +260,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
258
260
  """
259
261
  ## Example Usage
260
262
 
263
+ <!--Start PulumiCodeChooser -->
261
264
  ```python
262
265
  import pulumi
263
266
  import pulumi_vault as vault
@@ -274,7 +277,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
274
277
  description="intermediate",
275
278
  default_lease_ttl_seconds=86400,
276
279
  max_lease_ttl_seconds=86400)
277
- example = vault.pki_secret.SecretBackendRootCert("example",
280
+ example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
278
281
  backend=root.path,
279
282
  type="internal",
280
283
  common_name="RootOrg Root CA",
@@ -289,11 +292,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
289
292
  country="US",
290
293
  locality="San Francisco",
291
294
  province="CA")
292
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
295
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
293
296
  backend=intermediate.path,
294
- type=example.type,
297
+ type=example_secret_backend_root_cert.type,
295
298
  common_name="SubOrg Intermediate CA")
296
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
299
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
297
300
  backend=root.path,
298
301
  csr=example_secret_backend_intermediate_cert_request.csr,
299
302
  common_name="SubOrg Intermediate CA",
@@ -304,10 +307,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
304
307
  locality="San Francisco",
305
308
  province="CA",
306
309
  revoke=True)
307
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
310
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
308
311
  backend=intermediate.path,
309
312
  certificate=example_secret_backend_root_sign_intermediate.certificate)
310
313
  ```
314
+ <!--End PulumiCodeChooser -->
311
315
 
312
316
  :param str resource_name: The name of the resource.
313
317
  :param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
@@ -486,6 +486,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
486
486
  """
487
487
  ## Example Usage
488
488
 
489
+ <!--Start PulumiCodeChooser -->
489
490
  ```python
490
491
  import pulumi
491
492
  import pulumi_vault as vault
@@ -505,6 +506,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
505
506
  issuer_ref=root.issuer_id,
506
507
  issuer_name="example-issuer")
507
508
  ```
509
+ <!--End PulumiCodeChooser -->
508
510
 
509
511
  ## Import
510
512
 
@@ -548,6 +550,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
548
550
  """
549
551
  ## Example Usage
550
552
 
553
+ <!--Start PulumiCodeChooser -->
551
554
  ```python
552
555
  import pulumi
553
556
  import pulumi_vault as vault
@@ -567,6 +570,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
567
570
  issuer_ref=root.issuer_id,
568
571
  issuer_name="example-issuer")
569
572
  ```
573
+ <!--End PulumiCodeChooser -->
570
574
 
571
575
  ## Import
572
576
 
@@ -1593,6 +1593,7 @@ class SecretBackendRole(pulumi.CustomResource):
1593
1593
 
1594
1594
  ## Example Usage
1595
1595
 
1596
+ <!--Start PulumiCodeChooser -->
1596
1597
  ```python
1597
1598
  import pulumi
1598
1599
  import pulumi_vault as vault
@@ -1604,7 +1605,6 @@ class SecretBackendRole(pulumi.CustomResource):
1604
1605
  max_lease_ttl_seconds=86400)
1605
1606
  role = vault.pki_secret.SecretBackendRole("role",
1606
1607
  backend=pki.path,
1607
- name="my_role",
1608
1608
  ttl="3600",
1609
1609
  allow_ip_sans=True,
1610
1610
  key_type="rsa",
@@ -1615,6 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
1615
1615
  ],
1616
1616
  allow_subdomains=True)
1617
1617
  ```
1618
+ <!--End PulumiCodeChooser -->
1618
1619
 
1619
1620
  ## Import
1620
1621
 
@@ -1693,6 +1694,7 @@ class SecretBackendRole(pulumi.CustomResource):
1693
1694
 
1694
1695
  ## Example Usage
1695
1696
 
1697
+ <!--Start PulumiCodeChooser -->
1696
1698
  ```python
1697
1699
  import pulumi
1698
1700
  import pulumi_vault as vault
@@ -1704,7 +1706,6 @@ class SecretBackendRole(pulumi.CustomResource):
1704
1706
  max_lease_ttl_seconds=86400)
1705
1707
  role = vault.pki_secret.SecretBackendRole("role",
1706
1708
  backend=pki.path,
1707
- name="my_role",
1708
1709
  ttl="3600",
1709
1710
  allow_ip_sans=True,
1710
1711
  key_type="rsa",
@@ -1715,6 +1716,7 @@ class SecretBackendRole(pulumi.CustomResource):
1715
1716
  ],
1716
1717
  allow_subdomains=True)
1717
1718
  ```
1719
+ <!--End PulumiCodeChooser -->
1718
1720
 
1719
1721
  ## Import
1720
1722
 
@@ -1073,12 +1073,13 @@ class SecretBackendRootCert(pulumi.CustomResource):
1073
1073
  """
1074
1074
  ## Example Usage
1075
1075
 
1076
+ <!--Start PulumiCodeChooser -->
1076
1077
  ```python
1077
1078
  import pulumi
1078
1079
  import pulumi_vault as vault
1079
1080
 
1080
1081
  test = vault.pki_secret.SecretBackendRootCert("test",
1081
- backend=pki["path"],
1082
+ backend=vault_mount["pki"]["path"],
1082
1083
  type="internal",
1083
1084
  common_name="Root CA",
1084
1085
  ttl="315360000",
@@ -1089,8 +1090,9 @@ class SecretBackendRootCert(pulumi.CustomResource):
1089
1090
  exclude_cn_from_sans=True,
1090
1091
  ou="My OU",
1091
1092
  organization="My organization",
1092
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1093
+ opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1093
1094
  ```
1095
+ <!--End PulumiCodeChooser -->
1094
1096
 
1095
1097
  :param str resource_name: The name of the resource.
1096
1098
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1141,12 +1143,13 @@ class SecretBackendRootCert(pulumi.CustomResource):
1141
1143
  """
1142
1144
  ## Example Usage
1143
1145
 
1146
+ <!--Start PulumiCodeChooser -->
1144
1147
  ```python
1145
1148
  import pulumi
1146
1149
  import pulumi_vault as vault
1147
1150
 
1148
1151
  test = vault.pki_secret.SecretBackendRootCert("test",
1149
- backend=pki["path"],
1152
+ backend=vault_mount["pki"]["path"],
1150
1153
  type="internal",
1151
1154
  common_name="Root CA",
1152
1155
  ttl="315360000",
@@ -1157,8 +1160,9 @@ class SecretBackendRootCert(pulumi.CustomResource):
1157
1160
  exclude_cn_from_sans=True,
1158
1161
  ou="My OU",
1159
1162
  organization="My organization",
1160
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1163
+ opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1161
1164
  ```
1165
+ <!--End PulumiCodeChooser -->
1162
1166
 
1163
1167
  :param str resource_name: The name of the resource.
1164
1168
  :param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
@@ -900,19 +900,21 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
900
900
 
901
901
  ## Example Usage
902
902
 
903
+ <!--Start PulumiCodeChooser -->
903
904
  ```python
904
905
  import pulumi
905
906
  import pulumi_vault as vault
906
907
 
907
908
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
908
- backend=root_vault_mount["path"],
909
- csr=intermediate["csr"],
909
+ backend=vault_mount["root"]["path"],
910
+ csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
910
911
  common_name="Intermediate CA",
911
912
  exclude_cn_from_sans=True,
912
913
  ou="My OU",
913
914
  organization="My organization",
914
- opts=pulumi.ResourceOptions(depends_on=[intermediate]))
915
+ opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
915
916
  ```
917
+ <!--End PulumiCodeChooser -->
916
918
 
917
919
  :param str resource_name: The name of the resource.
918
920
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -957,19 +959,21 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
957
959
 
958
960
  ## Example Usage
959
961
 
962
+ <!--Start PulumiCodeChooser -->
960
963
  ```python
961
964
  import pulumi
962
965
  import pulumi_vault as vault
963
966
 
964
967
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
965
- backend=root_vault_mount["path"],
966
- csr=intermediate["csr"],
968
+ backend=vault_mount["root"]["path"],
969
+ csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
967
970
  common_name="Intermediate CA",
968
971
  exclude_cn_from_sans=True,
969
972
  ou="My OU",
970
973
  organization="My organization",
971
- opts=pulumi.ResourceOptions(depends_on=[intermediate]))
974
+ opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
972
975
  ```
976
+ <!--End PulumiCodeChooser -->
973
977
 
974
978
  :param str resource_name: The name of the resource.
975
979
  :param SecretBackendRootSignIntermediateArgs args: The arguments to use to populate this resource's properties.
@@ -648,13 +648,13 @@ class SecretBackendSign(pulumi.CustomResource):
648
648
  """
649
649
  ## Example Usage
650
650
 
651
+ <!--Start PulumiCodeChooser -->
651
652
  ```python
652
653
  import pulumi
653
654
  import pulumi_vault as vault
654
655
 
655
656
  test = vault.pki_secret.SecretBackendSign("test",
656
- backend=pki["path"],
657
- name=admin["name"],
657
+ backend=vault_mount["pki"]["path"],
658
658
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
659
659
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
660
660
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -684,8 +684,9 @@ class SecretBackendSign(pulumi.CustomResource):
684
684
  -----END CERTIFICATE REQUEST-----
685
685
  \"\"\",
686
686
  common_name="test.my.domain",
687
- opts=pulumi.ResourceOptions(depends_on=[admin]))
687
+ opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
688
688
  ```
689
+ <!--End PulumiCodeChooser -->
689
690
 
690
691
  :param str resource_name: The name of the resource.
691
692
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -720,13 +721,13 @@ class SecretBackendSign(pulumi.CustomResource):
720
721
  """
721
722
  ## Example Usage
722
723
 
724
+ <!--Start PulumiCodeChooser -->
723
725
  ```python
724
726
  import pulumi
725
727
  import pulumi_vault as vault
726
728
 
727
729
  test = vault.pki_secret.SecretBackendSign("test",
728
- backend=pki["path"],
729
- name=admin["name"],
730
+ backend=vault_mount["pki"]["path"],
730
731
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
731
732
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
732
733
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -756,8 +757,9 @@ class SecretBackendSign(pulumi.CustomResource):
756
757
  -----END CERTIFICATE REQUEST-----
757
758
  \"\"\",
758
759
  common_name="test.my.domain",
759
- opts=pulumi.ResourceOptions(depends_on=[admin]))
760
+ opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
760
761
  ```
762
+ <!--End PulumiCodeChooser -->
761
763
 
762
764
  :param str resource_name: The name of the resource.
763
765
  :param SecretBackendSignArgs args: The arguments to use to populate this resource's properties.
pulumi_vault/provider.py CHANGED
@@ -49,6 +49,7 @@ class ProviderArgs:
49
49
  The set of arguments for constructing a Provider resource.
50
50
  :param pulumi.Input[str] address: URL of the root of the target Vault server.
51
51
  :param pulumi.Input[str] token: Token to use to authenticate to Vault.
52
+ :param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
52
53
  :param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
53
54
  :param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
54
55
  :param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
@@ -173,6 +174,9 @@ class ProviderArgs:
173
174
  @property
174
175
  @pulumi.getter(name="addAddressToEnv")
175
176
  def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
177
+ """
178
+ If true, adds the value of the `address` argument to the Terraform process environment.
179
+ """
176
180
  return pulumi.get(self, "add_address_to_env")
177
181
 
178
182
  @add_address_to_env.setter
@@ -552,6 +556,7 @@ class Provider(pulumi.ProviderResource):
552
556
 
553
557
  :param str resource_name: The name of the resource.
554
558
  :param pulumi.ResourceOptions opts: Options for the resource.
559
+ :param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
555
560
  :param pulumi.Input[str] address: URL of the root of the target Vault server.
556
561
  :param pulumi.Input[pulumi.InputType['ProviderAuthLoginArgs']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
557
562
  :param pulumi.Input[pulumi.InputType['ProviderAuthLoginAwsArgs']] auth_login_aws: Login to vault using the AWS method
@@ -698,6 +703,9 @@ class Provider(pulumi.ProviderResource):
698
703
  @property
699
704
  @pulumi.getter(name="addAddressToEnv")
700
705
  def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
706
+ """
707
+ If true, adds the value of the `address` argument to the Terraform process environment.
708
+ """
701
709
  return pulumi.get(self, "add_address_to_env")
702
710
 
703
711
  @property
@@ -1,5 +1,4 @@
1
1
  {
2
2
  "resource": true,
3
- "name": "vault",
4
- "version": "6.2.0"
3
+ "name": "vault"
5
4
  }
@@ -15,7 +15,6 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
15
15
  class QuotaLeaseCountArgs:
16
16
  def __init__(__self__, *,
17
17
  max_leases: pulumi.Input[int],
18
- inheritable: Optional[pulumi.Input[bool]] = None,
19
18
  name: Optional[pulumi.Input[str]] = None,
20
19
  namespace: Optional[pulumi.Input[str]] = None,
21
20
  path: Optional[pulumi.Input[str]] = None,
@@ -24,7 +23,6 @@ class QuotaLeaseCountArgs:
24
23
  The set of arguments for constructing a QuotaLeaseCount resource.
25
24
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
26
25
  rule. The `max_leases` must be positive.
27
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
28
26
  :param pulumi.Input[str] name: Name of the rate limit quota
29
27
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
28
  The value should not contain leading or trailing forward slashes.
@@ -39,8 +37,6 @@ class QuotaLeaseCountArgs:
39
37
  :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
40
38
  """
41
39
  pulumi.set(__self__, "max_leases", max_leases)
42
- if inheritable is not None:
43
- pulumi.set(__self__, "inheritable", inheritable)
44
40
  if name is not None:
45
41
  pulumi.set(__self__, "name", name)
46
42
  if namespace is not None:
@@ -63,18 +59,6 @@ class QuotaLeaseCountArgs:
63
59
  def max_leases(self, value: pulumi.Input[int]):
64
60
  pulumi.set(self, "max_leases", value)
65
61
 
66
- @property
67
- @pulumi.getter
68
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
69
- """
70
- If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
71
- """
72
- return pulumi.get(self, "inheritable")
73
-
74
- @inheritable.setter
75
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
76
- pulumi.set(self, "inheritable", value)
77
-
78
62
  @property
79
63
  @pulumi.getter
80
64
  def name(self) -> Optional[pulumi.Input[str]]:
@@ -135,7 +119,6 @@ class QuotaLeaseCountArgs:
135
119
  @pulumi.input_type
136
120
  class _QuotaLeaseCountState:
137
121
  def __init__(__self__, *,
138
- inheritable: Optional[pulumi.Input[bool]] = None,
139
122
  max_leases: Optional[pulumi.Input[int]] = None,
140
123
  name: Optional[pulumi.Input[str]] = None,
141
124
  namespace: Optional[pulumi.Input[str]] = None,
@@ -143,7 +126,6 @@ class _QuotaLeaseCountState:
143
126
  role: Optional[pulumi.Input[str]] = None):
144
127
  """
145
128
  Input properties used for looking up and filtering QuotaLeaseCount resources.
146
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
147
129
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
148
130
  rule. The `max_leases` must be positive.
149
131
  :param pulumi.Input[str] name: Name of the rate limit quota
@@ -159,8 +141,6 @@ class _QuotaLeaseCountState:
159
141
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
160
142
  :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
161
143
  """
162
- if inheritable is not None:
163
- pulumi.set(__self__, "inheritable", inheritable)
164
144
  if max_leases is not None:
165
145
  pulumi.set(__self__, "max_leases", max_leases)
166
146
  if name is not None:
@@ -172,18 +152,6 @@ class _QuotaLeaseCountState:
172
152
  if role is not None:
173
153
  pulumi.set(__self__, "role", role)
174
154
 
175
- @property
176
- @pulumi.getter
177
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
178
- """
179
- If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
180
- """
181
- return pulumi.get(self, "inheritable")
182
-
183
- @inheritable.setter
184
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
185
- pulumi.set(self, "inheritable", value)
186
-
187
155
  @property
188
156
  @pulumi.getter(name="maxLeases")
189
157
  def max_leases(self) -> Optional[pulumi.Input[int]]:
@@ -259,7 +227,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
259
227
  def __init__(__self__,
260
228
  resource_name: str,
261
229
  opts: Optional[pulumi.ResourceOptions] = None,
262
- inheritable: Optional[pulumi.Input[bool]] = None,
263
230
  max_leases: Optional[pulumi.Input[int]] = None,
264
231
  name: Optional[pulumi.Input[str]] = None,
265
232
  namespace: Optional[pulumi.Input[str]] = None,
@@ -278,15 +245,16 @@ class QuotaLeaseCount(pulumi.CustomResource):
278
245
 
279
246
  ## Example Usage
280
247
 
248
+ <!--Start PulumiCodeChooser -->
281
249
  ```python
282
250
  import pulumi
283
251
  import pulumi_vault as vault
284
252
 
285
253
  global_ = vault.QuotaLeaseCount("global",
286
- name="global",
287
- path="",
288
- max_leases=100)
254
+ max_leases=100,
255
+ path="")
289
256
  ```
257
+ <!--End PulumiCodeChooser -->
290
258
 
291
259
  ## Import
292
260
 
@@ -298,7 +266,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
298
266
 
299
267
  :param str resource_name: The name of the resource.
300
268
  :param pulumi.ResourceOptions opts: Options for the resource.
301
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
302
269
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
303
270
  rule. The `max_leases` must be positive.
304
271
  :param pulumi.Input[str] name: Name of the rate limit quota
@@ -332,15 +299,16 @@ class QuotaLeaseCount(pulumi.CustomResource):
332
299
 
333
300
  ## Example Usage
334
301
 
302
+ <!--Start PulumiCodeChooser -->
335
303
  ```python
336
304
  import pulumi
337
305
  import pulumi_vault as vault
338
306
 
339
307
  global_ = vault.QuotaLeaseCount("global",
340
- name="global",
341
- path="",
342
- max_leases=100)
308
+ max_leases=100,
309
+ path="")
343
310
  ```
311
+ <!--End PulumiCodeChooser -->
344
312
 
345
313
  ## Import
346
314
 
@@ -365,7 +333,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
365
333
  def _internal_init(__self__,
366
334
  resource_name: str,
367
335
  opts: Optional[pulumi.ResourceOptions] = None,
368
- inheritable: Optional[pulumi.Input[bool]] = None,
369
336
  max_leases: Optional[pulumi.Input[int]] = None,
370
337
  name: Optional[pulumi.Input[str]] = None,
371
338
  namespace: Optional[pulumi.Input[str]] = None,
@@ -380,7 +347,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
380
347
  raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
381
348
  __props__ = QuotaLeaseCountArgs.__new__(QuotaLeaseCountArgs)
382
349
 
383
- __props__.__dict__["inheritable"] = inheritable
384
350
  if max_leases is None and not opts.urn:
385
351
  raise TypeError("Missing required property 'max_leases'")
386
352
  __props__.__dict__["max_leases"] = max_leases
@@ -398,7 +364,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
398
364
  def get(resource_name: str,
399
365
  id: pulumi.Input[str],
400
366
  opts: Optional[pulumi.ResourceOptions] = None,
401
- inheritable: Optional[pulumi.Input[bool]] = None,
402
367
  max_leases: Optional[pulumi.Input[int]] = None,
403
368
  name: Optional[pulumi.Input[str]] = None,
404
369
  namespace: Optional[pulumi.Input[str]] = None,
@@ -411,7 +376,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
411
376
  :param str resource_name: The unique name of the resulting resource.
412
377
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
413
378
  :param pulumi.ResourceOptions opts: Options for the resource.
414
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
415
379
  :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
416
380
  rule. The `max_leases` must be positive.
417
381
  :param pulumi.Input[str] name: Name of the rate limit quota
@@ -431,7 +395,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
431
395
 
432
396
  __props__ = _QuotaLeaseCountState.__new__(_QuotaLeaseCountState)
433
397
 
434
- __props__.__dict__["inheritable"] = inheritable
435
398
  __props__.__dict__["max_leases"] = max_leases
436
399
  __props__.__dict__["name"] = name
437
400
  __props__.__dict__["namespace"] = namespace
@@ -439,14 +402,6 @@ class QuotaLeaseCount(pulumi.CustomResource):
439
402
  __props__.__dict__["role"] = role
440
403
  return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
441
404
 
442
- @property
443
- @pulumi.getter
444
- def inheritable(self) -> pulumi.Output[Optional[bool]]:
445
- """
446
- If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
447
- """
448
- return pulumi.get(self, "inheritable")
449
-
450
405
  @property
451
406
  @pulumi.getter(name="maxLeases")
452
407
  def max_leases(self) -> pulumi.Output[int]: