pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -18,7 +18,6 @@ class SecretBackendRoleArgs:
18
18
  credential_type: pulumi.Input[str],
19
19
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
20
20
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
- iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
21
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
23
22
  name: Optional[pulumi.Input[str]] = None,
24
23
  namespace: Optional[pulumi.Input[str]] = None,
@@ -45,8 +44,6 @@ class SecretBackendRoleArgs:
45
44
  corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
46
45
  policies from each group in `iam_groups` combined with the `policy_document`
47
46
  and `policy_arns` parameters.
48
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
49
- to be used as tags for any IAM user that is created by this role.
50
47
  :param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
51
48
  (credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
52
49
  one of `assumed_role` or `federation_token`.
@@ -84,8 +81,6 @@ class SecretBackendRoleArgs:
84
81
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
85
82
  if iam_groups is not None:
86
83
  pulumi.set(__self__, "iam_groups", iam_groups)
87
- if iam_tags is not None:
88
- pulumi.set(__self__, "iam_tags", iam_tags)
89
84
  if max_sts_ttl is not None:
90
85
  pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
91
86
  if name is not None:
@@ -163,19 +158,6 @@ class SecretBackendRoleArgs:
163
158
  def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
164
159
  pulumi.set(self, "iam_groups", value)
165
160
 
166
- @property
167
- @pulumi.getter(name="iamTags")
168
- def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
169
- """
170
- A map of strings representing key/value pairs
171
- to be used as tags for any IAM user that is created by this role.
172
- """
173
- return pulumi.get(self, "iam_tags")
174
-
175
- @iam_tags.setter
176
- def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
177
- pulumi.set(self, "iam_tags", value)
178
-
179
161
  @property
180
162
  @pulumi.getter(name="maxStsTtl")
181
163
  def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
@@ -302,7 +284,6 @@ class _SecretBackendRoleState:
302
284
  credential_type: Optional[pulumi.Input[str]] = None,
303
285
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
304
286
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
305
- iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
306
287
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
307
288
  name: Optional[pulumi.Input[str]] = None,
308
289
  namespace: Optional[pulumi.Input[str]] = None,
@@ -329,8 +310,6 @@ class _SecretBackendRoleState:
329
310
  corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
330
311
  policies from each group in `iam_groups` combined with the `policy_document`
331
312
  and `policy_arns` parameters.
332
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
333
- to be used as tags for any IAM user that is created by this role.
334
313
  :param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
335
314
  (credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
336
315
  one of `assumed_role` or `federation_token`.
@@ -370,8 +349,6 @@ class _SecretBackendRoleState:
370
349
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
371
350
  if iam_groups is not None:
372
351
  pulumi.set(__self__, "iam_groups", iam_groups)
373
- if iam_tags is not None:
374
- pulumi.set(__self__, "iam_tags", iam_tags)
375
352
  if max_sts_ttl is not None:
376
353
  pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
377
354
  if name is not None:
@@ -449,19 +426,6 @@ class _SecretBackendRoleState:
449
426
  def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
450
427
  pulumi.set(self, "iam_groups", value)
451
428
 
452
- @property
453
- @pulumi.getter(name="iamTags")
454
- def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
455
- """
456
- A map of strings representing key/value pairs
457
- to be used as tags for any IAM user that is created by this role.
458
- """
459
- return pulumi.get(self, "iam_tags")
460
-
461
- @iam_tags.setter
462
- def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
463
- pulumi.set(self, "iam_tags", value)
464
-
465
429
  @property
466
430
  @pulumi.getter(name="maxStsTtl")
467
431
  def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
@@ -590,7 +554,6 @@ class SecretBackendRole(pulumi.CustomResource):
590
554
  credential_type: Optional[pulumi.Input[str]] = None,
591
555
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
592
556
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
593
- iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
594
557
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
595
558
  name: Optional[pulumi.Input[str]] = None,
596
559
  namespace: Optional[pulumi.Input[str]] = None,
@@ -603,6 +566,7 @@ class SecretBackendRole(pulumi.CustomResource):
603
566
  """
604
567
  ## Example Usage
605
568
 
569
+ <!--Start PulumiCodeChooser -->
606
570
  ```python
607
571
  import pulumi
608
572
  import pulumi_vault as vault
@@ -612,7 +576,6 @@ class SecretBackendRole(pulumi.CustomResource):
612
576
  secret_key="AWS secret key")
613
577
  role = vault.aws.SecretBackendRole("role",
614
578
  backend=aws.path,
615
- name="deploy",
616
579
  credential_type="iam_user",
617
580
  policy_document=\"\"\"{
618
581
  "Version": "2012-10-17",
@@ -626,6 +589,7 @@ class SecretBackendRole(pulumi.CustomResource):
626
589
  }
627
590
  \"\"\")
628
591
  ```
592
+ <!--End PulumiCodeChooser -->
629
593
 
630
594
  ## Import
631
595
 
@@ -653,8 +617,6 @@ class SecretBackendRole(pulumi.CustomResource):
653
617
  corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
654
618
  policies from each group in `iam_groups` combined with the `policy_document`
655
619
  and `policy_arns` parameters.
656
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
657
- to be used as tags for any IAM user that is created by this role.
658
620
  :param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
659
621
  (credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
660
622
  one of `assumed_role` or `federation_token`.
@@ -695,6 +657,7 @@ class SecretBackendRole(pulumi.CustomResource):
695
657
  """
696
658
  ## Example Usage
697
659
 
660
+ <!--Start PulumiCodeChooser -->
698
661
  ```python
699
662
  import pulumi
700
663
  import pulumi_vault as vault
@@ -704,7 +667,6 @@ class SecretBackendRole(pulumi.CustomResource):
704
667
  secret_key="AWS secret key")
705
668
  role = vault.aws.SecretBackendRole("role",
706
669
  backend=aws.path,
707
- name="deploy",
708
670
  credential_type="iam_user",
709
671
  policy_document=\"\"\"{
710
672
  "Version": "2012-10-17",
@@ -718,6 +680,7 @@ class SecretBackendRole(pulumi.CustomResource):
718
680
  }
719
681
  \"\"\")
720
682
  ```
683
+ <!--End PulumiCodeChooser -->
721
684
 
722
685
  ## Import
723
686
 
@@ -746,7 +709,6 @@ class SecretBackendRole(pulumi.CustomResource):
746
709
  credential_type: Optional[pulumi.Input[str]] = None,
747
710
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
748
711
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
749
- iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
750
712
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
751
713
  name: Optional[pulumi.Input[str]] = None,
752
714
  namespace: Optional[pulumi.Input[str]] = None,
@@ -772,7 +734,6 @@ class SecretBackendRole(pulumi.CustomResource):
772
734
  __props__.__dict__["credential_type"] = credential_type
773
735
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
774
736
  __props__.__dict__["iam_groups"] = iam_groups
775
- __props__.__dict__["iam_tags"] = iam_tags
776
737
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
777
738
  __props__.__dict__["name"] = name
778
739
  __props__.__dict__["namespace"] = namespace
@@ -795,7 +756,6 @@ class SecretBackendRole(pulumi.CustomResource):
795
756
  credential_type: Optional[pulumi.Input[str]] = None,
796
757
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
797
758
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
798
- iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
799
759
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
800
760
  name: Optional[pulumi.Input[str]] = None,
801
761
  namespace: Optional[pulumi.Input[str]] = None,
@@ -827,8 +787,6 @@ class SecretBackendRole(pulumi.CustomResource):
827
787
  corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
828
788
  policies from each group in `iam_groups` combined with the `policy_document`
829
789
  and `policy_arns` parameters.
830
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
831
- to be used as tags for any IAM user that is created by this role.
832
790
  :param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
833
791
  (credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
834
792
  one of `assumed_role` or `federation_token`.
@@ -868,7 +826,6 @@ class SecretBackendRole(pulumi.CustomResource):
868
826
  __props__.__dict__["credential_type"] = credential_type
869
827
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
870
828
  __props__.__dict__["iam_groups"] = iam_groups
871
- __props__.__dict__["iam_tags"] = iam_tags
872
829
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
873
830
  __props__.__dict__["name"] = name
874
831
  __props__.__dict__["namespace"] = namespace
@@ -923,15 +880,6 @@ class SecretBackendRole(pulumi.CustomResource):
923
880
  """
924
881
  return pulumi.get(self, "iam_groups")
925
882
 
926
- @property
927
- @pulumi.getter(name="iamTags")
928
- def iam_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
929
- """
930
- A map of strings representing key/value pairs
931
- to be used as tags for any IAM user that is created by this role.
932
- """
933
- return pulumi.get(self, "iam_tags")
934
-
935
883
  @property
936
884
  @pulumi.getter(name="maxStsTtl")
937
885
  def max_sts_ttl(self) -> pulumi.Output[int]:
@@ -219,6 +219,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
219
219
  """
220
220
  ## Example Usage
221
221
 
222
+ <!--Start PulumiCodeChooser -->
222
223
  ```python
223
224
  import pulumi
224
225
  import pulumi_vault as vault
@@ -228,10 +229,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
228
229
  description="Obtain AWS credentials.")
229
230
  role = vault.aws.SecretBackendStaticRole("role",
230
231
  backend=aws.path,
231
- name="test",
232
232
  username="my-test-user",
233
233
  rotation_period=3600)
234
234
  ```
235
+ <!--End PulumiCodeChooser -->
235
236
 
236
237
  ## Import
237
238
 
@@ -264,6 +265,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
264
265
  """
265
266
  ## Example Usage
266
267
 
268
+ <!--Start PulumiCodeChooser -->
267
269
  ```python
268
270
  import pulumi
269
271
  import pulumi_vault as vault
@@ -273,10 +275,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
273
275
  description="Obtain AWS credentials.")
274
276
  role = vault.aws.SecretBackendStaticRole("role",
275
277
  backend=aws.path,
276
- name="test",
277
278
  username="my-test-user",
278
279
  rotation_period=3600)
279
280
  ```
281
+ <!--End PulumiCodeChooser -->
280
282
 
281
283
  ## Import
282
284
 
@@ -20,8 +20,6 @@ class AuthBackendConfigArgs:
20
20
  client_id: Optional[pulumi.Input[str]] = None,
21
21
  client_secret: Optional[pulumi.Input[str]] = None,
22
22
  environment: Optional[pulumi.Input[str]] = None,
23
- identity_token_audience: Optional[pulumi.Input[str]] = None,
24
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
25
23
  namespace: Optional[pulumi.Input[str]] = None):
26
24
  """
27
25
  The set of arguments for constructing a AuthBackendConfig resource.
@@ -38,9 +36,6 @@ class AuthBackendConfigArgs:
38
36
  :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
39
37
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
40
38
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
41
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
42
- *Available only for Vault Enterprise*
43
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
44
39
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
45
40
  The value should not contain leading or trailing forward slashes.
46
41
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -56,10 +51,6 @@ class AuthBackendConfigArgs:
56
51
  pulumi.set(__self__, "client_secret", client_secret)
57
52
  if environment is not None:
58
53
  pulumi.set(__self__, "environment", environment)
59
- if identity_token_audience is not None:
60
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
61
- if identity_token_ttl is not None:
62
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
63
54
  if namespace is not None:
64
55
  pulumi.set(__self__, "namespace", namespace)
65
56
 
@@ -142,31 +133,6 @@ class AuthBackendConfigArgs:
142
133
  def environment(self, value: Optional[pulumi.Input[str]]):
143
134
  pulumi.set(self, "environment", value)
144
135
 
145
- @property
146
- @pulumi.getter(name="identityTokenAudience")
147
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
148
- """
149
- The audience claim value for plugin identity tokens. Requires Vault 1.17+.
150
- *Available only for Vault Enterprise*
151
- """
152
- return pulumi.get(self, "identity_token_audience")
153
-
154
- @identity_token_audience.setter
155
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
156
- pulumi.set(self, "identity_token_audience", value)
157
-
158
- @property
159
- @pulumi.getter(name="identityTokenTtl")
160
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
161
- """
162
- The TTL of generated identity tokens in seconds.
163
- """
164
- return pulumi.get(self, "identity_token_ttl")
165
-
166
- @identity_token_ttl.setter
167
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
168
- pulumi.set(self, "identity_token_ttl", value)
169
-
170
136
  @property
171
137
  @pulumi.getter
172
138
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -190,8 +156,6 @@ class _AuthBackendConfigState:
190
156
  client_id: Optional[pulumi.Input[str]] = None,
191
157
  client_secret: Optional[pulumi.Input[str]] = None,
192
158
  environment: Optional[pulumi.Input[str]] = None,
193
- identity_token_audience: Optional[pulumi.Input[str]] = None,
194
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
195
159
  namespace: Optional[pulumi.Input[str]] = None,
196
160
  resource: Optional[pulumi.Input[str]] = None,
197
161
  tenant_id: Optional[pulumi.Input[str]] = None):
@@ -206,9 +170,6 @@ class _AuthBackendConfigState:
206
170
  :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
207
171
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
208
172
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
209
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
210
- *Available only for Vault Enterprise*
211
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
212
173
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
213
174
  The value should not contain leading or trailing forward slashes.
214
175
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -226,10 +187,6 @@ class _AuthBackendConfigState:
226
187
  pulumi.set(__self__, "client_secret", client_secret)
227
188
  if environment is not None:
228
189
  pulumi.set(__self__, "environment", environment)
229
- if identity_token_audience is not None:
230
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
231
- if identity_token_ttl is not None:
232
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
233
190
  if namespace is not None:
234
191
  pulumi.set(__self__, "namespace", namespace)
235
192
  if resource is not None:
@@ -290,31 +247,6 @@ class _AuthBackendConfigState:
290
247
  def environment(self, value: Optional[pulumi.Input[str]]):
291
248
  pulumi.set(self, "environment", value)
292
249
 
293
- @property
294
- @pulumi.getter(name="identityTokenAudience")
295
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
296
- """
297
- The audience claim value for plugin identity tokens. Requires Vault 1.17+.
298
- *Available only for Vault Enterprise*
299
- """
300
- return pulumi.get(self, "identity_token_audience")
301
-
302
- @identity_token_audience.setter
303
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
304
- pulumi.set(self, "identity_token_audience", value)
305
-
306
- @property
307
- @pulumi.getter(name="identityTokenTtl")
308
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
309
- """
310
- The TTL of generated identity tokens in seconds.
311
- """
312
- return pulumi.get(self, "identity_token_ttl")
313
-
314
- @identity_token_ttl.setter
315
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
316
- pulumi.set(self, "identity_token_ttl", value)
317
-
318
250
  @property
319
251
  @pulumi.getter
320
252
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -366,8 +298,6 @@ class AuthBackendConfig(pulumi.CustomResource):
366
298
  client_id: Optional[pulumi.Input[str]] = None,
367
299
  client_secret: Optional[pulumi.Input[str]] = None,
368
300
  environment: Optional[pulumi.Input[str]] = None,
369
- identity_token_audience: Optional[pulumi.Input[str]] = None,
370
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
371
301
  namespace: Optional[pulumi.Input[str]] = None,
372
302
  resource: Optional[pulumi.Input[str]] = None,
373
303
  tenant_id: Optional[pulumi.Input[str]] = None,
@@ -375,34 +305,20 @@ class AuthBackendConfig(pulumi.CustomResource):
375
305
  """
376
306
  ## Example Usage
377
307
 
378
- You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
379
- ```python
380
- import pulumi
381
- import pulumi_vault as vault
382
-
383
- example = vault.AuthBackend("example",
384
- type="azure",
385
- identity_token_key="example-key")
386
- example_auth_backend_config = vault.azure.AuthBackendConfig("example",
387
- backend=example.path,
388
- tenant_id="11111111-2222-3333-4444-555555555555",
389
- client_id="11111111-2222-3333-4444-555555555555",
390
- identity_token_audience="<TOKEN_AUDIENCE>",
391
- identity_token_ttl="<TOKEN_TTL>")
392
- ```
393
-
308
+ <!--Start PulumiCodeChooser -->
394
309
  ```python
395
310
  import pulumi
396
311
  import pulumi_vault as vault
397
312
 
398
- example = vault.AuthBackend("example", type="azure")
399
- example_auth_backend_config = vault.azure.AuthBackendConfig("example",
400
- backend=example.path,
313
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
314
+ example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
315
+ backend=example_auth_backend.path,
401
316
  tenant_id="11111111-2222-3333-4444-555555555555",
402
317
  client_id="11111111-2222-3333-4444-555555555555",
403
318
  client_secret="01234567890123456789",
404
319
  resource="https://vault.hashicorp.com")
405
320
  ```
321
+ <!--End PulumiCodeChooser -->
406
322
 
407
323
  ## Import
408
324
 
@@ -423,9 +339,6 @@ class AuthBackendConfig(pulumi.CustomResource):
423
339
  :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
424
340
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
425
341
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
426
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
427
- *Available only for Vault Enterprise*
428
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
429
342
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
430
343
  The value should not contain leading or trailing forward slashes.
431
344
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -444,34 +357,20 @@ class AuthBackendConfig(pulumi.CustomResource):
444
357
  """
445
358
  ## Example Usage
446
359
 
447
- You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
448
- ```python
449
- import pulumi
450
- import pulumi_vault as vault
451
-
452
- example = vault.AuthBackend("example",
453
- type="azure",
454
- identity_token_key="example-key")
455
- example_auth_backend_config = vault.azure.AuthBackendConfig("example",
456
- backend=example.path,
457
- tenant_id="11111111-2222-3333-4444-555555555555",
458
- client_id="11111111-2222-3333-4444-555555555555",
459
- identity_token_audience="<TOKEN_AUDIENCE>",
460
- identity_token_ttl="<TOKEN_TTL>")
461
- ```
462
-
360
+ <!--Start PulumiCodeChooser -->
463
361
  ```python
464
362
  import pulumi
465
363
  import pulumi_vault as vault
466
364
 
467
- example = vault.AuthBackend("example", type="azure")
468
- example_auth_backend_config = vault.azure.AuthBackendConfig("example",
469
- backend=example.path,
365
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
366
+ example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
367
+ backend=example_auth_backend.path,
470
368
  tenant_id="11111111-2222-3333-4444-555555555555",
471
369
  client_id="11111111-2222-3333-4444-555555555555",
472
370
  client_secret="01234567890123456789",
473
371
  resource="https://vault.hashicorp.com")
474
372
  ```
373
+ <!--End PulumiCodeChooser -->
475
374
 
476
375
  ## Import
477
376
 
@@ -500,8 +399,6 @@ class AuthBackendConfig(pulumi.CustomResource):
500
399
  client_id: Optional[pulumi.Input[str]] = None,
501
400
  client_secret: Optional[pulumi.Input[str]] = None,
502
401
  environment: Optional[pulumi.Input[str]] = None,
503
- identity_token_audience: Optional[pulumi.Input[str]] = None,
504
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
505
402
  namespace: Optional[pulumi.Input[str]] = None,
506
403
  resource: Optional[pulumi.Input[str]] = None,
507
404
  tenant_id: Optional[pulumi.Input[str]] = None,
@@ -518,8 +415,6 @@ class AuthBackendConfig(pulumi.CustomResource):
518
415
  __props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
519
416
  __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
520
417
  __props__.__dict__["environment"] = environment
521
- __props__.__dict__["identity_token_audience"] = identity_token_audience
522
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
523
418
  __props__.__dict__["namespace"] = namespace
524
419
  if resource is None and not opts.urn:
525
420
  raise TypeError("Missing required property 'resource'")
@@ -543,8 +438,6 @@ class AuthBackendConfig(pulumi.CustomResource):
543
438
  client_id: Optional[pulumi.Input[str]] = None,
544
439
  client_secret: Optional[pulumi.Input[str]] = None,
545
440
  environment: Optional[pulumi.Input[str]] = None,
546
- identity_token_audience: Optional[pulumi.Input[str]] = None,
547
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
548
441
  namespace: Optional[pulumi.Input[str]] = None,
549
442
  resource: Optional[pulumi.Input[str]] = None,
550
443
  tenant_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfig':
@@ -564,9 +457,6 @@ class AuthBackendConfig(pulumi.CustomResource):
564
457
  :param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
565
458
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
566
459
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
567
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
568
- *Available only for Vault Enterprise*
569
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
570
460
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
571
461
  The value should not contain leading or trailing forward slashes.
572
462
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -584,8 +474,6 @@ class AuthBackendConfig(pulumi.CustomResource):
584
474
  __props__.__dict__["client_id"] = client_id
585
475
  __props__.__dict__["client_secret"] = client_secret
586
476
  __props__.__dict__["environment"] = environment
587
- __props__.__dict__["identity_token_audience"] = identity_token_audience
588
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
589
477
  __props__.__dict__["namespace"] = namespace
590
478
  __props__.__dict__["resource"] = resource
591
479
  __props__.__dict__["tenant_id"] = tenant_id
@@ -628,23 +516,6 @@ class AuthBackendConfig(pulumi.CustomResource):
628
516
  """
629
517
  return pulumi.get(self, "environment")
630
518
 
631
- @property
632
- @pulumi.getter(name="identityTokenAudience")
633
- def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
634
- """
635
- The audience claim value for plugin identity tokens. Requires Vault 1.17+.
636
- *Available only for Vault Enterprise*
637
- """
638
- return pulumi.get(self, "identity_token_audience")
639
-
640
- @property
641
- @pulumi.getter(name="identityTokenTtl")
642
- def identity_token_ttl(self) -> pulumi.Output[int]:
643
- """
644
- The TTL of generated identity tokens in seconds.
645
- """
646
- return pulumi.get(self, "identity_token_ttl")
647
-
648
519
  @property
649
520
  @pulumi.getter
650
521
  def namespace(self) -> pulumi.Output[Optional[str]]: