pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -24,12 +24,17 @@ class SecretRoleArgs:
24
24
  user_id: Optional[pulumi.Input[str]] = None):
25
25
  """
26
26
  The set of arguments for constructing a SecretRole resource.
27
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
27
28
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
29
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
28
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
31
  The value should not contain leading or trailing forward slashes.
30
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
33
  *Available only for Vault Enterprise*.
34
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
35
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
32
36
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
37
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
33
38
  """
34
39
  if backend is not None:
35
40
  pulumi.set(__self__, "backend", backend)
@@ -51,6 +56,9 @@ class SecretRoleArgs:
51
56
  @property
52
57
  @pulumi.getter
53
58
  def backend(self) -> Optional[pulumi.Input[str]]:
59
+ """
60
+ The path of the Terraform Cloud Secret Backend the role belongs to.
61
+ """
54
62
  return pulumi.get(self, "backend")
55
63
 
56
64
  @backend.setter
@@ -72,6 +80,9 @@ class SecretRoleArgs:
72
80
  @property
73
81
  @pulumi.getter
74
82
  def name(self) -> Optional[pulumi.Input[str]]:
83
+ """
84
+ The name of an existing role against which to create this Terraform Cloud credential
85
+ """
75
86
  return pulumi.get(self, "name")
76
87
 
77
88
  @name.setter
@@ -96,6 +107,9 @@ class SecretRoleArgs:
96
107
  @property
97
108
  @pulumi.getter
98
109
  def organization(self) -> Optional[pulumi.Input[str]]:
110
+ """
111
+ Name of the Terraform Cloud or Enterprise organization
112
+ """
99
113
  return pulumi.get(self, "organization")
100
114
 
101
115
  @organization.setter
@@ -105,6 +119,9 @@ class SecretRoleArgs:
105
119
  @property
106
120
  @pulumi.getter(name="teamId")
107
121
  def team_id(self) -> Optional[pulumi.Input[str]]:
122
+ """
123
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
124
+ """
108
125
  return pulumi.get(self, "team_id")
109
126
 
110
127
  @team_id.setter
@@ -126,6 +143,9 @@ class SecretRoleArgs:
126
143
  @property
127
144
  @pulumi.getter(name="userId")
128
145
  def user_id(self) -> Optional[pulumi.Input[str]]:
146
+ """
147
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
148
+ """
129
149
  return pulumi.get(self, "user_id")
130
150
 
131
151
  @user_id.setter
@@ -146,12 +166,17 @@ class _SecretRoleState:
146
166
  user_id: Optional[pulumi.Input[str]] = None):
147
167
  """
148
168
  Input properties used for looking up and filtering SecretRole resources.
169
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
149
170
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
171
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
150
172
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
151
173
  The value should not contain leading or trailing forward slashes.
152
174
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
175
  *Available only for Vault Enterprise*.
176
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
177
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
154
178
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
179
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
155
180
  """
156
181
  if backend is not None:
157
182
  pulumi.set(__self__, "backend", backend)
@@ -173,6 +198,9 @@ class _SecretRoleState:
173
198
  @property
174
199
  @pulumi.getter
175
200
  def backend(self) -> Optional[pulumi.Input[str]]:
201
+ """
202
+ The path of the Terraform Cloud Secret Backend the role belongs to.
203
+ """
176
204
  return pulumi.get(self, "backend")
177
205
 
178
206
  @backend.setter
@@ -194,6 +222,9 @@ class _SecretRoleState:
194
222
  @property
195
223
  @pulumi.getter
196
224
  def name(self) -> Optional[pulumi.Input[str]]:
225
+ """
226
+ The name of an existing role against which to create this Terraform Cloud credential
227
+ """
197
228
  return pulumi.get(self, "name")
198
229
 
199
230
  @name.setter
@@ -218,6 +249,9 @@ class _SecretRoleState:
218
249
  @property
219
250
  @pulumi.getter
220
251
  def organization(self) -> Optional[pulumi.Input[str]]:
252
+ """
253
+ Name of the Terraform Cloud or Enterprise organization
254
+ """
221
255
  return pulumi.get(self, "organization")
222
256
 
223
257
  @organization.setter
@@ -227,6 +261,9 @@ class _SecretRoleState:
227
261
  @property
228
262
  @pulumi.getter(name="teamId")
229
263
  def team_id(self) -> Optional[pulumi.Input[str]]:
264
+ """
265
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
266
+ """
230
267
  return pulumi.get(self, "team_id")
231
268
 
232
269
  @team_id.setter
@@ -248,6 +285,9 @@ class _SecretRoleState:
248
285
  @property
249
286
  @pulumi.getter(name="userId")
250
287
  def user_id(self) -> Optional[pulumi.Input[str]]:
288
+ """
289
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
290
+ """
251
291
  return pulumi.get(self, "user_id")
252
292
 
253
293
  @user_id.setter
@@ -272,6 +312,7 @@ class SecretRole(pulumi.CustomResource):
272
312
  """
273
313
  ## Example Usage
274
314
 
315
+ <!--Start PulumiCodeChooser -->
275
316
  ```python
276
317
  import pulumi
277
318
  import pulumi_vault as vault
@@ -282,10 +323,10 @@ class SecretRole(pulumi.CustomResource):
282
323
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
283
324
  example = vault.terraformcloud.SecretRole("example",
284
325
  backend=test.backend,
285
- name="test-role",
286
326
  organization="example-organization-name",
287
327
  team_id="team-ieF4isC...")
288
328
  ```
329
+ <!--End PulumiCodeChooser -->
289
330
 
290
331
  ## Import
291
332
 
@@ -297,12 +338,17 @@ class SecretRole(pulumi.CustomResource):
297
338
 
298
339
  :param str resource_name: The name of the resource.
299
340
  :param pulumi.ResourceOptions opts: Options for the resource.
341
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
300
342
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
343
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
301
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
302
345
  The value should not contain leading or trailing forward slashes.
303
346
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
347
  *Available only for Vault Enterprise*.
348
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
349
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
305
350
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
351
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
306
352
  """
307
353
  ...
308
354
  @overload
@@ -313,6 +359,7 @@ class SecretRole(pulumi.CustomResource):
313
359
  """
314
360
  ## Example Usage
315
361
 
362
+ <!--Start PulumiCodeChooser -->
316
363
  ```python
317
364
  import pulumi
318
365
  import pulumi_vault as vault
@@ -323,10 +370,10 @@ class SecretRole(pulumi.CustomResource):
323
370
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
371
  example = vault.terraformcloud.SecretRole("example",
325
372
  backend=test.backend,
326
- name="test-role",
327
373
  organization="example-organization-name",
328
374
  team_id="team-ieF4isC...")
329
375
  ```
376
+ <!--End PulumiCodeChooser -->
330
377
 
331
378
  ## Import
332
379
 
@@ -401,12 +448,17 @@ class SecretRole(pulumi.CustomResource):
401
448
  :param str resource_name: The unique name of the resulting resource.
402
449
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
403
450
  :param pulumi.ResourceOptions opts: Options for the resource.
451
+ :param pulumi.Input[str] backend: The path of the Terraform Cloud Secret Backend the role belongs to.
404
452
  :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
453
+ :param pulumi.Input[str] name: The name of an existing role against which to create this Terraform Cloud credential
405
454
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
406
455
  The value should not contain leading or trailing forward slashes.
407
456
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
408
457
  *Available only for Vault Enterprise*.
458
+ :param pulumi.Input[str] organization: Name of the Terraform Cloud or Enterprise organization
459
+ :param pulumi.Input[str] team_id: ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
409
460
  :param pulumi.Input[int] ttl: Specifies the TTL for this role.
461
+ :param pulumi.Input[str] user_id: ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
410
462
  """
411
463
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
412
464
 
@@ -425,6 +477,9 @@ class SecretRole(pulumi.CustomResource):
425
477
  @property
426
478
  @pulumi.getter
427
479
  def backend(self) -> pulumi.Output[Optional[str]]:
480
+ """
481
+ The path of the Terraform Cloud Secret Backend the role belongs to.
482
+ """
428
483
  return pulumi.get(self, "backend")
429
484
 
430
485
  @property
@@ -438,6 +493,9 @@ class SecretRole(pulumi.CustomResource):
438
493
  @property
439
494
  @pulumi.getter
440
495
  def name(self) -> pulumi.Output[str]:
496
+ """
497
+ The name of an existing role against which to create this Terraform Cloud credential
498
+ """
441
499
  return pulumi.get(self, "name")
442
500
 
443
501
  @property
@@ -454,11 +512,17 @@ class SecretRole(pulumi.CustomResource):
454
512
  @property
455
513
  @pulumi.getter
456
514
  def organization(self) -> pulumi.Output[Optional[str]]:
515
+ """
516
+ Name of the Terraform Cloud or Enterprise organization
517
+ """
457
518
  return pulumi.get(self, "organization")
458
519
 
459
520
  @property
460
521
  @pulumi.getter(name="teamId")
461
522
  def team_id(self) -> pulumi.Output[Optional[str]]:
523
+ """
524
+ ID of the Terraform Cloud or Enterprise team under organization (e.g., settings/teams/team-xxxxxxxxxxxxx)
525
+ """
462
526
  return pulumi.get(self, "team_id")
463
527
 
464
528
  @property
@@ -472,5 +536,8 @@ class SecretRole(pulumi.CustomResource):
472
536
  @property
473
537
  @pulumi.getter(name="userId")
474
538
  def user_id(self) -> pulumi.Output[Optional[str]]:
539
+ """
540
+ ID of the Terraform Cloud or Enterprise user (e.g., user-xxxxxxxxxxxxxxxx)
541
+ """
475
542
  return pulumi.get(self, "user_id")
476
543
 
pulumi_vault/token.py CHANGED
@@ -623,24 +623,26 @@ class Token(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
+ <!--Start PulumiCodeChooser -->
626
627
  ```python
627
628
  import pulumi
628
629
  import pulumi_vault as vault
629
630
 
630
631
  example = vault.Token("example",
631
- role_name="app",
632
+ metadata={
633
+ "purpose": "service-account",
634
+ },
632
635
  policies=[
633
636
  "policy1",
634
637
  "policy2",
635
638
  ],
636
- renewable=True,
637
- ttl="24h",
638
- renew_min_lease=43200,
639
639
  renew_increment=86400,
640
- metadata={
641
- "purpose": "service-account",
642
- })
640
+ renew_min_lease=43200,
641
+ renewable=True,
642
+ role_name="app",
643
+ ttl="24h")
643
644
  ```
645
+ <!--End PulumiCodeChooser -->
644
646
 
645
647
  ## Import
646
648
 
@@ -680,24 +682,26 @@ class Token(pulumi.CustomResource):
680
682
  """
681
683
  ## Example Usage
682
684
 
685
+ <!--Start PulumiCodeChooser -->
683
686
  ```python
684
687
  import pulumi
685
688
  import pulumi_vault as vault
686
689
 
687
690
  example = vault.Token("example",
688
- role_name="app",
691
+ metadata={
692
+ "purpose": "service-account",
693
+ },
689
694
  policies=[
690
695
  "policy1",
691
696
  "policy2",
692
697
  ],
693
- renewable=True,
694
- ttl="24h",
695
- renew_min_lease=43200,
696
698
  renew_increment=86400,
697
- metadata={
698
- "purpose": "service-account",
699
- })
699
+ renew_min_lease=43200,
700
+ renewable=True,
701
+ role_name="app",
702
+ ttl="24h")
700
703
  ```
704
+ <!--End PulumiCodeChooser -->
701
705
 
702
706
  ## Import
703
707