pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -16,8 +16,6 @@ class SecretBackendCaArgs:
16
16
  def __init__(__self__, *,
17
17
  backend: Optional[pulumi.Input[str]] = None,
18
18
  generate_signing_key: Optional[pulumi.Input[bool]] = None,
19
- key_bits: Optional[pulumi.Input[int]] = None,
20
- key_type: Optional[pulumi.Input[str]] = None,
21
19
  namespace: Optional[pulumi.Input[str]] = None,
22
20
  private_key: Optional[pulumi.Input[str]] = None,
23
21
  public_key: Optional[pulumi.Input[str]] = None):
@@ -25,8 +23,6 @@ class SecretBackendCaArgs:
25
23
  The set of arguments for constructing a SecretBackendCa resource.
26
24
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
27
25
  :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
28
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
29
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
30
26
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
27
  The value should not contain leading or trailing forward slashes.
32
28
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -38,10 +34,6 @@ class SecretBackendCaArgs:
38
34
  pulumi.set(__self__, "backend", backend)
39
35
  if generate_signing_key is not None:
40
36
  pulumi.set(__self__, "generate_signing_key", generate_signing_key)
41
- if key_bits is not None:
42
- pulumi.set(__self__, "key_bits", key_bits)
43
- if key_type is not None:
44
- pulumi.set(__self__, "key_type", key_type)
45
37
  if namespace is not None:
46
38
  pulumi.set(__self__, "namespace", namespace)
47
39
  if private_key is not None:
@@ -73,30 +65,6 @@ class SecretBackendCaArgs:
73
65
  def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
74
66
  pulumi.set(self, "generate_signing_key", value)
75
67
 
76
- @property
77
- @pulumi.getter(name="keyBits")
78
- def key_bits(self) -> Optional[pulumi.Input[int]]:
79
- """
80
- Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
81
- """
82
- return pulumi.get(self, "key_bits")
83
-
84
- @key_bits.setter
85
- def key_bits(self, value: Optional[pulumi.Input[int]]):
86
- pulumi.set(self, "key_bits", value)
87
-
88
- @property
89
- @pulumi.getter(name="keyType")
90
- def key_type(self) -> Optional[pulumi.Input[str]]:
91
- """
92
- Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
93
- """
94
- return pulumi.get(self, "key_type")
95
-
96
- @key_type.setter
97
- def key_type(self, value: Optional[pulumi.Input[str]]):
98
- pulumi.set(self, "key_type", value)
99
-
100
68
  @property
101
69
  @pulumi.getter
102
70
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -142,8 +110,6 @@ class _SecretBackendCaState:
142
110
  def __init__(__self__, *,
143
111
  backend: Optional[pulumi.Input[str]] = None,
144
112
  generate_signing_key: Optional[pulumi.Input[bool]] = None,
145
- key_bits: Optional[pulumi.Input[int]] = None,
146
- key_type: Optional[pulumi.Input[str]] = None,
147
113
  namespace: Optional[pulumi.Input[str]] = None,
148
114
  private_key: Optional[pulumi.Input[str]] = None,
149
115
  public_key: Optional[pulumi.Input[str]] = None):
@@ -151,8 +117,6 @@ class _SecretBackendCaState:
151
117
  Input properties used for looking up and filtering SecretBackendCa resources.
152
118
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
153
119
  :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
154
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
155
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
156
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
157
121
  The value should not contain leading or trailing forward slashes.
158
122
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -164,10 +128,6 @@ class _SecretBackendCaState:
164
128
  pulumi.set(__self__, "backend", backend)
165
129
  if generate_signing_key is not None:
166
130
  pulumi.set(__self__, "generate_signing_key", generate_signing_key)
167
- if key_bits is not None:
168
- pulumi.set(__self__, "key_bits", key_bits)
169
- if key_type is not None:
170
- pulumi.set(__self__, "key_type", key_type)
171
131
  if namespace is not None:
172
132
  pulumi.set(__self__, "namespace", namespace)
173
133
  if private_key is not None:
@@ -199,30 +159,6 @@ class _SecretBackendCaState:
199
159
  def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
200
160
  pulumi.set(self, "generate_signing_key", value)
201
161
 
202
- @property
203
- @pulumi.getter(name="keyBits")
204
- def key_bits(self) -> Optional[pulumi.Input[int]]:
205
- """
206
- Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
207
- """
208
- return pulumi.get(self, "key_bits")
209
-
210
- @key_bits.setter
211
- def key_bits(self, value: Optional[pulumi.Input[int]]):
212
- pulumi.set(self, "key_bits", value)
213
-
214
- @property
215
- @pulumi.getter(name="keyType")
216
- def key_type(self) -> Optional[pulumi.Input[str]]:
217
- """
218
- Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
219
- """
220
- return pulumi.get(self, "key_type")
221
-
222
- @key_type.setter
223
- def key_type(self, value: Optional[pulumi.Input[str]]):
224
- pulumi.set(self, "key_type", value)
225
-
226
162
  @property
227
163
  @pulumi.getter
228
164
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -270,8 +206,6 @@ class SecretBackendCa(pulumi.CustomResource):
270
206
  opts: Optional[pulumi.ResourceOptions] = None,
271
207
  backend: Optional[pulumi.Input[str]] = None,
272
208
  generate_signing_key: Optional[pulumi.Input[bool]] = None,
273
- key_bits: Optional[pulumi.Input[int]] = None,
274
- key_type: Optional[pulumi.Input[str]] = None,
275
209
  namespace: Optional[pulumi.Input[str]] = None,
276
210
  private_key: Optional[pulumi.Input[str]] = None,
277
211
  public_key: Optional[pulumi.Input[str]] = None,
@@ -282,6 +216,7 @@ class SecretBackendCa(pulumi.CustomResource):
282
216
 
283
217
  ## Example Usage
284
218
 
219
+ <!--Start PulumiCodeChooser -->
285
220
  ```python
286
221
  import pulumi
287
222
  import pulumi_vault as vault
@@ -289,6 +224,7 @@ class SecretBackendCa(pulumi.CustomResource):
289
224
  example = vault.Mount("example", type="ssh")
290
225
  foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
291
226
  ```
227
+ <!--End PulumiCodeChooser -->
292
228
 
293
229
  ## Import
294
230
 
@@ -302,8 +238,6 @@ class SecretBackendCa(pulumi.CustomResource):
302
238
  :param pulumi.ResourceOptions opts: Options for the resource.
303
239
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
304
240
  :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
305
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
306
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
307
241
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
308
242
  The value should not contain leading or trailing forward slashes.
309
243
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -323,6 +257,7 @@ class SecretBackendCa(pulumi.CustomResource):
323
257
 
324
258
  ## Example Usage
325
259
 
260
+ <!--Start PulumiCodeChooser -->
326
261
  ```python
327
262
  import pulumi
328
263
  import pulumi_vault as vault
@@ -330,6 +265,7 @@ class SecretBackendCa(pulumi.CustomResource):
330
265
  example = vault.Mount("example", type="ssh")
331
266
  foo = vault.ssh.SecretBackendCa("foo", backend=example.path)
332
267
  ```
268
+ <!--End PulumiCodeChooser -->
333
269
 
334
270
  ## Import
335
271
 
@@ -356,8 +292,6 @@ class SecretBackendCa(pulumi.CustomResource):
356
292
  opts: Optional[pulumi.ResourceOptions] = None,
357
293
  backend: Optional[pulumi.Input[str]] = None,
358
294
  generate_signing_key: Optional[pulumi.Input[bool]] = None,
359
- key_bits: Optional[pulumi.Input[int]] = None,
360
- key_type: Optional[pulumi.Input[str]] = None,
361
295
  namespace: Optional[pulumi.Input[str]] = None,
362
296
  private_key: Optional[pulumi.Input[str]] = None,
363
297
  public_key: Optional[pulumi.Input[str]] = None,
@@ -372,8 +306,6 @@ class SecretBackendCa(pulumi.CustomResource):
372
306
 
373
307
  __props__.__dict__["backend"] = backend
374
308
  __props__.__dict__["generate_signing_key"] = generate_signing_key
375
- __props__.__dict__["key_bits"] = key_bits
376
- __props__.__dict__["key_type"] = key_type
377
309
  __props__.__dict__["namespace"] = namespace
378
310
  __props__.__dict__["private_key"] = None if private_key is None else pulumi.Output.secret(private_key)
379
311
  __props__.__dict__["public_key"] = public_key
@@ -391,8 +323,6 @@ class SecretBackendCa(pulumi.CustomResource):
391
323
  opts: Optional[pulumi.ResourceOptions] = None,
392
324
  backend: Optional[pulumi.Input[str]] = None,
393
325
  generate_signing_key: Optional[pulumi.Input[bool]] = None,
394
- key_bits: Optional[pulumi.Input[int]] = None,
395
- key_type: Optional[pulumi.Input[str]] = None,
396
326
  namespace: Optional[pulumi.Input[str]] = None,
397
327
  private_key: Optional[pulumi.Input[str]] = None,
398
328
  public_key: Optional[pulumi.Input[str]] = None) -> 'SecretBackendCa':
@@ -405,8 +335,6 @@ class SecretBackendCa(pulumi.CustomResource):
405
335
  :param pulumi.ResourceOptions opts: Options for the resource.
406
336
  :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
407
337
  :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
408
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
409
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
410
338
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
411
339
  The value should not contain leading or trailing forward slashes.
412
340
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -420,8 +348,6 @@ class SecretBackendCa(pulumi.CustomResource):
420
348
 
421
349
  __props__.__dict__["backend"] = backend
422
350
  __props__.__dict__["generate_signing_key"] = generate_signing_key
423
- __props__.__dict__["key_bits"] = key_bits
424
- __props__.__dict__["key_type"] = key_type
425
351
  __props__.__dict__["namespace"] = namespace
426
352
  __props__.__dict__["private_key"] = private_key
427
353
  __props__.__dict__["public_key"] = public_key
@@ -443,22 +369,6 @@ class SecretBackendCa(pulumi.CustomResource):
443
369
  """
444
370
  return pulumi.get(self, "generate_signing_key")
445
371
 
446
- @property
447
- @pulumi.getter(name="keyBits")
448
- def key_bits(self) -> pulumi.Output[Optional[int]]:
449
- """
450
- Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
451
- """
452
- return pulumi.get(self, "key_bits")
453
-
454
- @property
455
- @pulumi.getter(name="keyType")
456
- def key_type(self) -> pulumi.Output[Optional[str]]:
457
- """
458
- Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
459
- """
460
- return pulumi.get(self, "key_type")
461
-
462
372
  @property
463
373
  @pulumi.getter
464
374
  def namespace(self) -> pulumi.Output[Optional[str]]:
@@ -921,24 +921,24 @@ class SecretBackendRole(pulumi.CustomResource):
921
921
 
922
922
  ## Example Usage
923
923
 
924
+ <!--Start PulumiCodeChooser -->
924
925
  ```python
925
926
  import pulumi
926
927
  import pulumi_vault as vault
927
928
 
928
929
  example = vault.Mount("example", type="ssh")
929
930
  foo = vault.ssh.SecretBackendRole("foo",
930
- name="my-role",
931
931
  backend=example.path,
932
932
  key_type="ca",
933
933
  allow_user_certificates=True)
934
934
  bar = vault.ssh.SecretBackendRole("bar",
935
- name="otp-role",
936
935
  backend=example.path,
937
936
  key_type="otp",
938
937
  default_user="default",
939
938
  allowed_users="default,baz",
940
939
  cidr_list="0.0.0.0/0")
941
940
  ```
941
+ <!--End PulumiCodeChooser -->
942
942
 
943
943
  ## Import
944
944
 
@@ -995,24 +995,24 @@ class SecretBackendRole(pulumi.CustomResource):
995
995
 
996
996
  ## Example Usage
997
997
 
998
+ <!--Start PulumiCodeChooser -->
998
999
  ```python
999
1000
  import pulumi
1000
1001
  import pulumi_vault as vault
1001
1002
 
1002
1003
  example = vault.Mount("example", type="ssh")
1003
1004
  foo = vault.ssh.SecretBackendRole("foo",
1004
- name="my-role",
1005
1005
  backend=example.path,
1006
1006
  key_type="ca",
1007
1007
  allow_user_certificates=True)
1008
1008
  bar = vault.ssh.SecretBackendRole("bar",
1009
- name="otp-role",
1010
1009
  backend=example.path,
1011
1010
  key_type="otp",
1012
1011
  default_user="default",
1013
1012
  allowed_users="default,baz",
1014
1013
  cidr_list="0.0.0.0/0")
1015
1014
  ```
1015
+ <!--End PulumiCodeChooser -->
1016
1016
 
1017
1017
  ## Import
1018
1018
 
@@ -25,6 +25,9 @@ class SecretBackendArgs:
25
25
  token: Optional[pulumi.Input[str]] = None):
26
26
  """
27
27
  The set of arguments for constructing a SecretBackend resource.
28
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
29
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
30
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
28
31
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
29
32
  :param pulumi.Input[str] description: A human-friendly description for this backend.
30
33
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -35,6 +38,7 @@ class SecretBackendArgs:
35
38
  The value should not contain leading or trailing forward slashes.
36
39
  The `namespace` is always relative to the provider's configured namespace.
37
40
  *Available only for Vault Enterprise*.
41
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
38
42
  """
39
43
  if address is not None:
40
44
  pulumi.set(__self__, "address", address)
@@ -58,6 +62,9 @@ class SecretBackendArgs:
58
62
  @property
59
63
  @pulumi.getter
60
64
  def address(self) -> Optional[pulumi.Input[str]]:
65
+ """
66
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
67
+ """
61
68
  return pulumi.get(self, "address")
62
69
 
63
70
  @address.setter
@@ -67,6 +74,9 @@ class SecretBackendArgs:
67
74
  @property
68
75
  @pulumi.getter
69
76
  def backend(self) -> Optional[pulumi.Input[str]]:
77
+ """
78
+ Unique name of the Vault Terraform Cloud mount to configure
79
+ """
70
80
  return pulumi.get(self, "backend")
71
81
 
72
82
  @backend.setter
@@ -76,6 +86,9 @@ class SecretBackendArgs:
76
86
  @property
77
87
  @pulumi.getter(name="basePath")
78
88
  def base_path(self) -> Optional[pulumi.Input[str]]:
89
+ """
90
+ Specifies the base path for the Terraform Cloud or Enterprise API.
91
+ """
79
92
  return pulumi.get(self, "base_path")
80
93
 
81
94
  @base_path.setter
@@ -150,6 +163,9 @@ class SecretBackendArgs:
150
163
  @property
151
164
  @pulumi.getter
152
165
  def token(self) -> Optional[pulumi.Input[str]]:
166
+ """
167
+ Specifies the Terraform Cloud access token to use.
168
+ """
153
169
  return pulumi.get(self, "token")
154
170
 
155
171
  @token.setter
@@ -171,6 +187,9 @@ class _SecretBackendState:
171
187
  token: Optional[pulumi.Input[str]] = None):
172
188
  """
173
189
  Input properties used for looking up and filtering SecretBackend resources.
190
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
191
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
192
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
174
193
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
175
194
  :param pulumi.Input[str] description: A human-friendly description for this backend.
176
195
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -181,6 +200,7 @@ class _SecretBackendState:
181
200
  The value should not contain leading or trailing forward slashes.
182
201
  The `namespace` is always relative to the provider's configured namespace.
183
202
  *Available only for Vault Enterprise*.
203
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
184
204
  """
185
205
  if address is not None:
186
206
  pulumi.set(__self__, "address", address)
@@ -204,6 +224,9 @@ class _SecretBackendState:
204
224
  @property
205
225
  @pulumi.getter
206
226
  def address(self) -> Optional[pulumi.Input[str]]:
227
+ """
228
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
229
+ """
207
230
  return pulumi.get(self, "address")
208
231
 
209
232
  @address.setter
@@ -213,6 +236,9 @@ class _SecretBackendState:
213
236
  @property
214
237
  @pulumi.getter
215
238
  def backend(self) -> Optional[pulumi.Input[str]]:
239
+ """
240
+ Unique name of the Vault Terraform Cloud mount to configure
241
+ """
216
242
  return pulumi.get(self, "backend")
217
243
 
218
244
  @backend.setter
@@ -222,6 +248,9 @@ class _SecretBackendState:
222
248
  @property
223
249
  @pulumi.getter(name="basePath")
224
250
  def base_path(self) -> Optional[pulumi.Input[str]]:
251
+ """
252
+ Specifies the base path for the Terraform Cloud or Enterprise API.
253
+ """
225
254
  return pulumi.get(self, "base_path")
226
255
 
227
256
  @base_path.setter
@@ -296,6 +325,9 @@ class _SecretBackendState:
296
325
  @property
297
326
  @pulumi.getter
298
327
  def token(self) -> Optional[pulumi.Input[str]]:
328
+ """
329
+ Specifies the Terraform Cloud access token to use.
330
+ """
299
331
  return pulumi.get(self, "token")
300
332
 
301
333
  @token.setter
@@ -321,6 +353,7 @@ class SecretBackend(pulumi.CustomResource):
321
353
  """
322
354
  ## Example Usage
323
355
 
356
+ <!--Start PulumiCodeChooser -->
324
357
  ```python
325
358
  import pulumi
326
359
  import pulumi_vault as vault
@@ -330,6 +363,7 @@ class SecretBackend(pulumi.CustomResource):
330
363
  description="Manages the Terraform Cloud backend",
331
364
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
332
365
  ```
366
+ <!--End PulumiCodeChooser -->
333
367
 
334
368
  ## Import
335
369
 
@@ -341,6 +375,9 @@ class SecretBackend(pulumi.CustomResource):
341
375
 
342
376
  :param str resource_name: The name of the resource.
343
377
  :param pulumi.ResourceOptions opts: Options for the resource.
378
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
379
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
380
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
344
381
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
345
382
  :param pulumi.Input[str] description: A human-friendly description for this backend.
346
383
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -351,6 +388,7 @@ class SecretBackend(pulumi.CustomResource):
351
388
  The value should not contain leading or trailing forward slashes.
352
389
  The `namespace` is always relative to the provider's configured namespace.
353
390
  *Available only for Vault Enterprise*.
391
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
354
392
  """
355
393
  ...
356
394
  @overload
@@ -361,6 +399,7 @@ class SecretBackend(pulumi.CustomResource):
361
399
  """
362
400
  ## Example Usage
363
401
 
402
+ <!--Start PulumiCodeChooser -->
364
403
  ```python
365
404
  import pulumi
366
405
  import pulumi_vault as vault
@@ -370,6 +409,7 @@ class SecretBackend(pulumi.CustomResource):
370
409
  description="Manages the Terraform Cloud backend",
371
410
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
372
411
  ```
412
+ <!--End PulumiCodeChooser -->
373
413
 
374
414
  ## Import
375
415
 
@@ -449,6 +489,9 @@ class SecretBackend(pulumi.CustomResource):
449
489
  :param str resource_name: The unique name of the resulting resource.
450
490
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
451
491
  :param pulumi.ResourceOptions opts: Options for the resource.
492
+ :param pulumi.Input[str] address: Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
493
+ :param pulumi.Input[str] backend: Unique name of the Vault Terraform Cloud mount to configure
494
+ :param pulumi.Input[str] base_path: Specifies the base path for the Terraform Cloud or Enterprise API.
452
495
  :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
453
496
  :param pulumi.Input[str] description: A human-friendly description for this backend.
454
497
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
@@ -459,6 +502,7 @@ class SecretBackend(pulumi.CustomResource):
459
502
  The value should not contain leading or trailing forward slashes.
460
503
  The `namespace` is always relative to the provider's configured namespace.
461
504
  *Available only for Vault Enterprise*.
505
+ :param pulumi.Input[str] token: Specifies the Terraform Cloud access token to use.
462
506
  """
463
507
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
464
508
 
@@ -478,16 +522,25 @@ class SecretBackend(pulumi.CustomResource):
478
522
  @property
479
523
  @pulumi.getter
480
524
  def address(self) -> pulumi.Output[Optional[str]]:
525
+ """
526
+ Specifies the address of the Terraform Cloud instance, provided as "host:port" like "127.0.0.1:8500".
527
+ """
481
528
  return pulumi.get(self, "address")
482
529
 
483
530
  @property
484
531
  @pulumi.getter
485
532
  def backend(self) -> pulumi.Output[Optional[str]]:
533
+ """
534
+ Unique name of the Vault Terraform Cloud mount to configure
535
+ """
486
536
  return pulumi.get(self, "backend")
487
537
 
488
538
  @property
489
539
  @pulumi.getter(name="basePath")
490
540
  def base_path(self) -> pulumi.Output[Optional[str]]:
541
+ """
542
+ Specifies the base path for the Terraform Cloud or Enterprise API.
543
+ """
491
544
  return pulumi.get(self, "base_path")
492
545
 
493
546
  @property
@@ -538,5 +591,8 @@ class SecretBackend(pulumi.CustomResource):
538
591
  @property
539
592
  @pulumi.getter
540
593
  def token(self) -> pulumi.Output[Optional[str]]:
594
+ """
595
+ Specifies the Terraform Cloud access token to use.
596
+ """
541
597
  return pulumi.get(self, "token")
542
598
 
@@ -19,6 +19,7 @@ class SecretCredsArgs:
19
19
  namespace: Optional[pulumi.Input[str]] = None):
20
20
  """
21
21
  The set of arguments for constructing a SecretCreds resource.
22
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
22
23
  :param pulumi.Input[str] role: Name of the role.
23
24
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
24
25
  The value should not contain leading or trailing forward slashes.
@@ -33,6 +34,9 @@ class SecretCredsArgs:
33
34
  @property
34
35
  @pulumi.getter
35
36
  def backend(self) -> pulumi.Input[str]:
37
+ """
38
+ Terraform Cloud secret backend to generate tokens from
39
+ """
36
40
  return pulumi.get(self, "backend")
37
41
 
38
42
  @backend.setter
@@ -80,6 +84,7 @@ class _SecretCredsState:
80
84
  token_id: Optional[pulumi.Input[str]] = None):
81
85
  """
82
86
  Input properties used for looking up and filtering SecretCreds resources.
87
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
83
88
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
84
89
  Vault lease associated with them.
85
90
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -114,6 +119,9 @@ class _SecretCredsState:
114
119
  @property
115
120
  @pulumi.getter
116
121
  def backend(self) -> Optional[pulumi.Input[str]]:
122
+ """
123
+ Terraform Cloud secret backend to generate tokens from
124
+ """
117
125
  return pulumi.get(self, "backend")
118
126
 
119
127
  @backend.setter
@@ -223,6 +231,7 @@ class SecretCreds(pulumi.CustomResource):
223
231
  """
224
232
  ## Example Usage
225
233
 
234
+ <!--Start PulumiCodeChooser -->
226
235
  ```python
227
236
  import pulumi
228
237
  import pulumi_vault as vault
@@ -233,16 +242,17 @@ class SecretCreds(pulumi.CustomResource):
233
242
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
234
243
  example = vault.terraformcloud.SecretRole("example",
235
244
  backend=test.backend,
236
- name="test-role",
237
245
  organization="example-organization-name",
238
246
  team_id="team-ieF4isC...")
239
247
  token = vault.terraformcloud.SecretCreds("token",
240
248
  backend=test.backend,
241
249
  role=example.name)
242
250
  ```
251
+ <!--End PulumiCodeChooser -->
243
252
 
244
253
  :param str resource_name: The name of the resource.
245
254
  :param pulumi.ResourceOptions opts: Options for the resource.
255
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
246
256
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
247
257
  The value should not contain leading or trailing forward slashes.
248
258
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -258,6 +268,7 @@ class SecretCreds(pulumi.CustomResource):
258
268
  """
259
269
  ## Example Usage
260
270
 
271
+ <!--Start PulumiCodeChooser -->
261
272
  ```python
262
273
  import pulumi
263
274
  import pulumi_vault as vault
@@ -268,13 +279,13 @@ class SecretCreds(pulumi.CustomResource):
268
279
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
269
280
  example = vault.terraformcloud.SecretRole("example",
270
281
  backend=test.backend,
271
- name="test-role",
272
282
  organization="example-organization-name",
273
283
  team_id="team-ieF4isC...")
274
284
  token = vault.terraformcloud.SecretCreds("token",
275
285
  backend=test.backend,
276
286
  role=example.name)
277
287
  ```
288
+ <!--End PulumiCodeChooser -->
278
289
 
279
290
  :param str resource_name: The name of the resource.
280
291
  :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
@@ -342,6 +353,7 @@ class SecretCreds(pulumi.CustomResource):
342
353
  :param str resource_name: The unique name of the resulting resource.
343
354
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
344
355
  :param pulumi.ResourceOptions opts: Options for the resource.
356
+ :param pulumi.Input[str] backend: Terraform Cloud secret backend to generate tokens from
345
357
  :param pulumi.Input[str] lease_id: The lease associated with the token. Only user tokens will have a
346
358
  Vault lease associated with them.
347
359
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -373,6 +385,9 @@ class SecretCreds(pulumi.CustomResource):
373
385
  @property
374
386
  @pulumi.getter
375
387
  def backend(self) -> pulumi.Output[str]:
388
+ """
389
+ Terraform Cloud secret backend to generate tokens from
390
+ """
376
391
  return pulumi.get(self, "backend")
377
392
 
378
393
  @property