pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -224,6 +224,7 @@ class SyncAssociation(pulumi.CustomResource):
224
224
  """
225
225
  ## Example Usage
226
226
 
227
+ <!--Start PulumiCodeChooser -->
227
228
  ```python
228
229
  import pulumi
229
230
  import json
@@ -238,23 +239,21 @@ class SyncAssociation(pulumi.CustomResource):
238
239
  description="KV Version 2 secret engine mount")
239
240
  token = vault.kv.SecretV2("token",
240
241
  mount=kvv2.path,
241
- name="token",
242
242
  data_json=json.dumps({
243
243
  "dev": "B!gS3cr3t",
244
244
  "prod": "S3cureP4$$",
245
245
  }))
246
246
  gh = vault.secrets.SyncGhDestination("gh",
247
- name="gh-dest",
248
- access_token=access_token,
249
- repository_owner=repo_owner,
247
+ access_token=var["access_token"],
248
+ repository_owner=var["repo_owner"],
250
249
  repository_name="repo-name-example",
251
250
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
252
- gh_token = vault.secrets.SyncAssociation("gh_token",
253
- name=gh.name,
251
+ gh_token = vault.secrets.SyncAssociation("ghToken",
254
252
  type=gh.type,
255
253
  mount=kvv2.path,
256
254
  secret_name=token.name)
257
255
  ```
256
+ <!--End PulumiCodeChooser -->
258
257
 
259
258
  :param str resource_name: The name of the resource.
260
259
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -275,6 +274,7 @@ class SyncAssociation(pulumi.CustomResource):
275
274
  """
276
275
  ## Example Usage
277
276
 
277
+ <!--Start PulumiCodeChooser -->
278
278
  ```python
279
279
  import pulumi
280
280
  import json
@@ -289,23 +289,21 @@ class SyncAssociation(pulumi.CustomResource):
289
289
  description="KV Version 2 secret engine mount")
290
290
  token = vault.kv.SecretV2("token",
291
291
  mount=kvv2.path,
292
- name="token",
293
292
  data_json=json.dumps({
294
293
  "dev": "B!gS3cr3t",
295
294
  "prod": "S3cureP4$$",
296
295
  }))
297
296
  gh = vault.secrets.SyncGhDestination("gh",
298
- name="gh-dest",
299
- access_token=access_token,
300
- repository_owner=repo_owner,
297
+ access_token=var["access_token"],
298
+ repository_owner=var["repo_owner"],
301
299
  repository_name="repo-name-example",
302
300
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
303
- gh_token = vault.secrets.SyncAssociation("gh_token",
304
- name=gh.name,
301
+ gh_token = vault.secrets.SyncAssociation("ghToken",
305
302
  type=gh.type,
306
303
  mount=kvv2.path,
307
304
  secret_name=token.name)
308
305
  ```
306
+ <!--End PulumiCodeChooser -->
309
307
 
310
308
  :param str resource_name: The name of the resource.
311
309
  :param SyncAssociationArgs args: The arguments to use to populate this resource's properties.
@@ -454,14 +454,14 @@ class SyncAwsDestination(pulumi.CustomResource):
454
454
  """
455
455
  ## Example Usage
456
456
 
457
+ <!--Start PulumiCodeChooser -->
457
458
  ```python
458
459
  import pulumi
459
460
  import pulumi_vault as vault
460
461
 
461
462
  aws = vault.secrets.SyncAwsDestination("aws",
462
- name="aws-dest",
463
- access_key_id=access_key_id,
464
- secret_access_key=secret_access_key,
463
+ access_key_id=var["access_key_id"],
464
+ secret_access_key=var["secret_access_key"],
465
465
  region="us-east-1",
466
466
  role_arn="role-arn",
467
467
  external_id="external-id",
@@ -470,6 +470,7 @@ class SyncAwsDestination(pulumi.CustomResource):
470
470
  "foo": "bar",
471
471
  })
472
472
  ```
473
+ <!--End PulumiCodeChooser -->
473
474
 
474
475
  ## Import
475
476
 
@@ -519,14 +520,14 @@ class SyncAwsDestination(pulumi.CustomResource):
519
520
  """
520
521
  ## Example Usage
521
522
 
523
+ <!--Start PulumiCodeChooser -->
522
524
  ```python
523
525
  import pulumi
524
526
  import pulumi_vault as vault
525
527
 
526
528
  aws = vault.secrets.SyncAwsDestination("aws",
527
- name="aws-dest",
528
- access_key_id=access_key_id,
529
- secret_access_key=secret_access_key,
529
+ access_key_id=var["access_key_id"],
530
+ secret_access_key=var["secret_access_key"],
530
531
  region="us-east-1",
531
532
  role_arn="role-arn",
532
533
  external_id="external-id",
@@ -535,6 +536,7 @@ class SyncAwsDestination(pulumi.CustomResource):
535
536
  "foo": "bar",
536
537
  })
537
538
  ```
539
+ <!--End PulumiCodeChooser -->
538
540
 
539
541
  ## Import
540
542
 
@@ -430,21 +430,22 @@ class SyncAzureDestination(pulumi.CustomResource):
430
430
  """
431
431
  ## Example Usage
432
432
 
433
+ <!--Start PulumiCodeChooser -->
433
434
  ```python
434
435
  import pulumi
435
436
  import pulumi_vault as vault
436
437
 
437
438
  az = vault.secrets.SyncAzureDestination("az",
438
- name="az-dest",
439
- key_vault_uri=key_vault_uri,
440
- client_id=client_id,
441
- client_secret=client_secret,
442
- tenant_id=tenant_id,
439
+ key_vault_uri=var["key_vault_uri"],
440
+ client_id=var["client_id"],
441
+ client_secret=var["client_secret"],
442
+ tenant_id=var["tenant_id"],
443
443
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
444
444
  custom_tags={
445
445
  "foo": "bar",
446
446
  })
447
447
  ```
448
+ <!--End PulumiCodeChooser -->
448
449
 
449
450
  ## Import
450
451
 
@@ -488,21 +489,22 @@ class SyncAzureDestination(pulumi.CustomResource):
488
489
  """
489
490
  ## Example Usage
490
491
 
492
+ <!--Start PulumiCodeChooser -->
491
493
  ```python
492
494
  import pulumi
493
495
  import pulumi_vault as vault
494
496
 
495
497
  az = vault.secrets.SyncAzureDestination("az",
496
- name="az-dest",
497
- key_vault_uri=key_vault_uri,
498
- client_id=client_id,
499
- client_secret=client_secret,
500
- tenant_id=tenant_id,
498
+ key_vault_uri=var["key_vault_uri"],
499
+ client_id=var["client_id"],
500
+ client_secret=var["client_secret"],
501
+ tenant_id=var["tenant_id"],
501
502
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
502
503
  custom_tags={
503
504
  "foo": "bar",
504
505
  })
505
506
  ```
507
+ <!--End PulumiCodeChooser -->
506
508
 
507
509
  ## Import
508
510
 
@@ -150,14 +150,16 @@ class SyncConfig(pulumi.CustomResource):
150
150
 
151
151
  ## Example Usage
152
152
 
153
+ <!--Start PulumiCodeChooser -->
153
154
  ```python
154
155
  import pulumi
155
156
  import pulumi_vault as vault
156
157
 
157
- global_config = vault.secrets.SyncConfig("global_config",
158
+ global_config = vault.secrets.SyncConfig("globalConfig",
158
159
  disabled=True,
159
160
  queue_capacity=500000)
160
161
  ```
162
+ <!--End PulumiCodeChooser -->
161
163
 
162
164
  ## Import
163
165
 
@@ -189,14 +191,16 @@ class SyncConfig(pulumi.CustomResource):
189
191
 
190
192
  ## Example Usage
191
193
 
194
+ <!--Start PulumiCodeChooser -->
192
195
  ```python
193
196
  import pulumi
194
197
  import pulumi_vault as vault
195
198
 
196
- global_config = vault.secrets.SyncConfig("global_config",
199
+ global_config = vault.secrets.SyncConfig("globalConfig",
197
200
  disabled=True,
198
201
  queue_capacity=500000)
199
202
  ```
203
+ <!--End PulumiCodeChooser -->
200
204
 
201
205
  ## Import
202
206
 
@@ -319,20 +319,20 @@ class SyncGcpDestination(pulumi.CustomResource):
319
319
  """
320
320
  ## Example Usage
321
321
 
322
+ <!--Start PulumiCodeChooser -->
322
323
  ```python
323
324
  import pulumi
324
- import pulumi_std as std
325
325
  import pulumi_vault as vault
326
326
 
327
327
  gcp = vault.secrets.SyncGcpDestination("gcp",
328
- name="gcp-dest",
329
328
  project_id="gcp-project-id",
330
- credentials=std.file(input=credentials_file).result,
329
+ credentials=(lambda path: open(path).read())(var["credentials_file"]),
331
330
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
332
331
  custom_tags={
333
332
  "foo": "bar",
334
333
  })
335
334
  ```
335
+ <!--End PulumiCodeChooser -->
336
336
 
337
337
  ## Import
338
338
 
@@ -370,20 +370,20 @@ class SyncGcpDestination(pulumi.CustomResource):
370
370
  """
371
371
  ## Example Usage
372
372
 
373
+ <!--Start PulumiCodeChooser -->
373
374
  ```python
374
375
  import pulumi
375
- import pulumi_std as std
376
376
  import pulumi_vault as vault
377
377
 
378
378
  gcp = vault.secrets.SyncGcpDestination("gcp",
379
- name="gcp-dest",
380
379
  project_id="gcp-project-id",
381
- credentials=std.file(input=credentials_file).result,
380
+ credentials=(lambda path: open(path).read())(var["credentials_file"]),
382
381
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
383
382
  custom_tags={
384
383
  "foo": "bar",
385
384
  })
386
385
  ```
386
+ <!--End PulumiCodeChooser -->
387
387
 
388
388
  ## Import
389
389
 
@@ -401,17 +401,18 @@ class SyncGhDestination(pulumi.CustomResource):
401
401
  """
402
402
  ## Example Usage
403
403
 
404
+ <!--Start PulumiCodeChooser -->
404
405
  ```python
405
406
  import pulumi
406
407
  import pulumi_vault as vault
407
408
 
408
409
  gh = vault.secrets.SyncGhDestination("gh",
409
- name="gh-dest",
410
- access_token=access_token,
411
- repository_owner=repo_owner,
410
+ access_token=var["access_token"],
411
+ repository_owner=var["repo_owner"],
412
412
  repository_name="repo-name-example",
413
413
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
414
414
  ```
415
+ <!--End PulumiCodeChooser -->
415
416
 
416
417
  ## Import
417
418
 
@@ -455,17 +456,18 @@ class SyncGhDestination(pulumi.CustomResource):
455
456
  """
456
457
  ## Example Usage
457
458
 
459
+ <!--Start PulumiCodeChooser -->
458
460
  ```python
459
461
  import pulumi
460
462
  import pulumi_vault as vault
461
463
 
462
464
  gh = vault.secrets.SyncGhDestination("gh",
463
- name="gh-dest",
464
- access_token=access_token,
465
- repository_owner=repo_owner,
465
+ access_token=var["access_token"],
466
+ repository_owner=var["repo_owner"],
466
467
  repository_name="repo-name-example",
467
468
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
468
469
  ```
470
+ <!--End PulumiCodeChooser -->
469
471
 
470
472
  ## Import
471
473
 
@@ -190,16 +190,16 @@ class SyncGithubApps(pulumi.CustomResource):
190
190
  """
191
191
  ## Example Usage
192
192
 
193
+ <!--Start PulumiCodeChooser -->
193
194
  ```python
194
195
  import pulumi
195
- import pulumi_std as std
196
196
  import pulumi_vault as vault
197
197
 
198
198
  github_apps = vault.secrets.SyncGithubApps("github-apps",
199
- name="gh-apps",
200
- app_id=app_id,
201
- private_key=std.file(input=privatekey_file).result)
199
+ app_id=var["app_id"],
200
+ private_key=(lambda path: open(path).read())(var["privatekey_file"]))
202
201
  ```
202
+ <!--End PulumiCodeChooser -->
203
203
 
204
204
  ## Import
205
205
 
@@ -227,16 +227,16 @@ class SyncGithubApps(pulumi.CustomResource):
227
227
  """
228
228
  ## Example Usage
229
229
 
230
+ <!--Start PulumiCodeChooser -->
230
231
  ```python
231
232
  import pulumi
232
- import pulumi_std as std
233
233
  import pulumi_vault as vault
234
234
 
235
235
  github_apps = vault.secrets.SyncGithubApps("github-apps",
236
- name="gh-apps",
237
- app_id=app_id,
238
- private_key=std.file(input=privatekey_file).result)
236
+ app_id=var["app_id"],
237
+ private_key=(lambda path: open(path).read())(var["privatekey_file"]))
239
238
  ```
239
+ <!--End PulumiCodeChooser -->
240
240
 
241
241
  ## Import
242
242
 
@@ -337,14 +337,14 @@ class SyncVercelDestination(pulumi.CustomResource):
337
337
  """
338
338
  ## Example Usage
339
339
 
340
+ <!--Start PulumiCodeChooser -->
340
341
  ```python
341
342
  import pulumi
342
343
  import pulumi_vault as vault
343
344
 
344
345
  vercel = vault.secrets.SyncVercelDestination("vercel",
345
- name="vercel-dest",
346
- access_token=access_token,
347
- project_id=project_id,
346
+ access_token=var["access_token"],
347
+ project_id=var["project_id"],
348
348
  deployment_environments=[
349
349
  "development",
350
350
  "preview",
@@ -352,6 +352,7 @@ class SyncVercelDestination(pulumi.CustomResource):
352
352
  ],
353
353
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
354
354
  ```
355
+ <!--End PulumiCodeChooser -->
355
356
 
356
357
  ## Import
357
358
 
@@ -387,14 +388,14 @@ class SyncVercelDestination(pulumi.CustomResource):
387
388
  """
388
389
  ## Example Usage
389
390
 
391
+ <!--Start PulumiCodeChooser -->
390
392
  ```python
391
393
  import pulumi
392
394
  import pulumi_vault as vault
393
395
 
394
396
  vercel = vault.secrets.SyncVercelDestination("vercel",
395
- name="vercel-dest",
396
- access_token=access_token,
397
- project_id=project_id,
397
+ access_token=var["access_token"],
398
+ project_id=var["project_id"],
398
399
  deployment_environments=[
399
400
  "development",
400
401
  "preview",
@@ -402,6 +403,7 @@ class SyncVercelDestination(pulumi.CustomResource):
402
403
  ],
403
404
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
404
405
  ```
406
+ <!--End PulumiCodeChooser -->
405
407
 
406
408
  ## Import
407
409
 
@@ -19,9 +19,22 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
19
19
  lengths: pulumi.Input[Sequence[pulumi.Input[int]]],
20
20
  type: pulumi.Input[str]):
21
21
  """
22
- :param pulumi.Input[Sequence[pulumi.Input[int]]] lengths: List of allowed key lengths, vault-1.10 and above
23
- :param pulumi.Input[str] type: Key type, choices:
24
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
22
+ :param pulumi.Input[Sequence[pulumi.Input[int]]] lengths: A list of allowed key lengths as integers.
23
+ For key types that do not support setting the length a value of `[0]` should be used.
24
+ Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
25
+ must be set to a single element list.
26
+
27
+ Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
+
29
+ <!--Start PulumiCodeChooser -->
30
+ ```python
31
+ import pulumi
32
+ ```
33
+ <!--End PulumiCodeChooser -->
34
+ :param pulumi.Input[str] type: The SSH public key type.
35
+ *Supported key types are:*
36
+ `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
37
+ `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
25
38
  """
26
39
  pulumi.set(__self__, "lengths", lengths)
27
40
  pulumi.set(__self__, "type", type)
@@ -30,7 +43,18 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
30
43
  @pulumi.getter
31
44
  def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[int]]]:
32
45
  """
33
- List of allowed key lengths, vault-1.10 and above
46
+ A list of allowed key lengths as integers.
47
+ For key types that do not support setting the length a value of `[0]` should be used.
48
+ Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
49
+ must be set to a single element list.
50
+
51
+ Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
+
53
+ <!--Start PulumiCodeChooser -->
54
+ ```python
55
+ import pulumi
56
+ ```
57
+ <!--End PulumiCodeChooser -->
34
58
  """
35
59
  return pulumi.get(self, "lengths")
36
60
 
@@ -42,8 +66,10 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
42
66
  @pulumi.getter
43
67
  def type(self) -> pulumi.Input[str]:
44
68
  """
45
- Key type, choices:
46
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
69
+ The SSH public key type.
70
+ *Supported key types are:*
71
+ `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
72
+ `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
47
73
  """
48
74
  return pulumi.get(self, "type")
49
75
 
@@ -19,9 +19,22 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
19
19
  lengths: Sequence[int],
20
20
  type: str):
21
21
  """
22
- :param Sequence[int] lengths: List of allowed key lengths, vault-1.10 and above
23
- :param str type: Key type, choices:
24
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
22
+ :param Sequence[int] lengths: A list of allowed key lengths as integers.
23
+ For key types that do not support setting the length a value of `[0]` should be used.
24
+ Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
25
+ must be set to a single element list.
26
+
27
+ Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
+
29
+ <!--Start PulumiCodeChooser -->
30
+ ```python
31
+ import pulumi
32
+ ```
33
+ <!--End PulumiCodeChooser -->
34
+ :param str type: The SSH public key type.
35
+ *Supported key types are:*
36
+ `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
37
+ `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
25
38
  """
26
39
  pulumi.set(__self__, "lengths", lengths)
27
40
  pulumi.set(__self__, "type", type)
@@ -30,7 +43,18 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
30
43
  @pulumi.getter
31
44
  def lengths(self) -> Sequence[int]:
32
45
  """
33
- List of allowed key lengths, vault-1.10 and above
46
+ A list of allowed key lengths as integers.
47
+ For key types that do not support setting the length a value of `[0]` should be used.
48
+ Setting multiple lengths is only supported on Vault 1.10+. For prior releases `length`
49
+ must be set to a single element list.
50
+
51
+ Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
+
53
+ <!--Start PulumiCodeChooser -->
54
+ ```python
55
+ import pulumi
56
+ ```
57
+ <!--End PulumiCodeChooser -->
34
58
  """
35
59
  return pulumi.get(self, "lengths")
36
60
 
@@ -38,8 +62,10 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
38
62
  @pulumi.getter
39
63
  def type(self) -> str:
40
64
  """
41
- Key type, choices:
42
- rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
65
+ The SSH public key type.
66
+ *Supported key types are:*
67
+ `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
68
+ `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`
43
69
  """
44
70
  return pulumi.get(self, "type")
45
71