pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -21,9 +21,6 @@ class BackendArgs:
21
21
  description: Optional[pulumi.Input[str]] = None,
22
22
  disable_remount: Optional[pulumi.Input[bool]] = None,
23
23
  environment: Optional[pulumi.Input[str]] = None,
24
- identity_token_audience: Optional[pulumi.Input[str]] = None,
25
- identity_token_key: Optional[pulumi.Input[str]] = None,
26
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
27
24
  namespace: Optional[pulumi.Input[str]] = None,
28
25
  path: Optional[pulumi.Input[str]] = None,
29
26
  use_microsoft_graph_api: Optional[pulumi.Input[bool]] = None):
@@ -37,12 +34,6 @@ class BackendArgs:
37
34
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
38
35
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
39
36
  :param pulumi.Input[str] environment: The Azure environment.
40
- :param pulumi.Input[str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
41
- *Available only for Vault Enterprise*
42
- :param pulumi.Input[str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
43
- *Available only for Vault Enterprise*
44
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
45
- *Available only for Vault Enterprise*
46
37
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
47
38
  The value should not contain leading or trailing forward slashes.
48
39
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -62,19 +53,10 @@ class BackendArgs:
62
53
  pulumi.set(__self__, "disable_remount", disable_remount)
63
54
  if environment is not None:
64
55
  pulumi.set(__self__, "environment", environment)
65
- if identity_token_audience is not None:
66
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
67
- if identity_token_key is not None:
68
- pulumi.set(__self__, "identity_token_key", identity_token_key)
69
- if identity_token_ttl is not None:
70
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
71
56
  if namespace is not None:
72
57
  pulumi.set(__self__, "namespace", namespace)
73
58
  if path is not None:
74
59
  pulumi.set(__self__, "path", path)
75
- if use_microsoft_graph_api is not None:
76
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
77
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
78
60
  if use_microsoft_graph_api is not None:
79
61
  pulumi.set(__self__, "use_microsoft_graph_api", use_microsoft_graph_api)
80
62
 
@@ -163,45 +145,6 @@ class BackendArgs:
163
145
  def environment(self, value: Optional[pulumi.Input[str]]):
164
146
  pulumi.set(self, "environment", value)
165
147
 
166
- @property
167
- @pulumi.getter(name="identityTokenAudience")
168
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
169
- """
170
- The audience claim value. Requires Vault 1.17+.
171
- *Available only for Vault Enterprise*
172
- """
173
- return pulumi.get(self, "identity_token_audience")
174
-
175
- @identity_token_audience.setter
176
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
177
- pulumi.set(self, "identity_token_audience", value)
178
-
179
- @property
180
- @pulumi.getter(name="identityTokenKey")
181
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
182
- """
183
- The key to use for signing identity tokens. Requires Vault 1.17+.
184
- *Available only for Vault Enterprise*
185
- """
186
- return pulumi.get(self, "identity_token_key")
187
-
188
- @identity_token_key.setter
189
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
190
- pulumi.set(self, "identity_token_key", value)
191
-
192
- @property
193
- @pulumi.getter(name="identityTokenTtl")
194
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
195
- """
196
- The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
197
- *Available only for Vault Enterprise*
198
- """
199
- return pulumi.get(self, "identity_token_ttl")
200
-
201
- @identity_token_ttl.setter
202
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
203
- pulumi.set(self, "identity_token_ttl", value)
204
-
205
148
  @property
206
149
  @pulumi.getter
207
150
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -235,9 +178,6 @@ class BackendArgs:
235
178
  """
236
179
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
237
180
  """
238
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
239
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
240
-
241
181
  return pulumi.get(self, "use_microsoft_graph_api")
242
182
 
243
183
  @use_microsoft_graph_api.setter
@@ -253,9 +193,6 @@ class _BackendState:
253
193
  description: Optional[pulumi.Input[str]] = None,
254
194
  disable_remount: Optional[pulumi.Input[bool]] = None,
255
195
  environment: Optional[pulumi.Input[str]] = None,
256
- identity_token_audience: Optional[pulumi.Input[str]] = None,
257
- identity_token_key: Optional[pulumi.Input[str]] = None,
258
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
259
196
  namespace: Optional[pulumi.Input[str]] = None,
260
197
  path: Optional[pulumi.Input[str]] = None,
261
198
  subscription_id: Optional[pulumi.Input[str]] = None,
@@ -269,12 +206,6 @@ class _BackendState:
269
206
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
270
207
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
271
208
  :param pulumi.Input[str] environment: The Azure environment.
272
- :param pulumi.Input[str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
273
- *Available only for Vault Enterprise*
274
- :param pulumi.Input[str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
275
- *Available only for Vault Enterprise*
276
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
277
- *Available only for Vault Enterprise*
278
209
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
279
210
  The value should not contain leading or trailing forward slashes.
280
211
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -294,12 +225,6 @@ class _BackendState:
294
225
  pulumi.set(__self__, "disable_remount", disable_remount)
295
226
  if environment is not None:
296
227
  pulumi.set(__self__, "environment", environment)
297
- if identity_token_audience is not None:
298
- pulumi.set(__self__, "identity_token_audience", identity_token_audience)
299
- if identity_token_key is not None:
300
- pulumi.set(__self__, "identity_token_key", identity_token_key)
301
- if identity_token_ttl is not None:
302
- pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
303
228
  if namespace is not None:
304
229
  pulumi.set(__self__, "namespace", namespace)
305
230
  if path is not None:
@@ -308,9 +233,6 @@ class _BackendState:
308
233
  pulumi.set(__self__, "subscription_id", subscription_id)
309
234
  if tenant_id is not None:
310
235
  pulumi.set(__self__, "tenant_id", tenant_id)
311
- if use_microsoft_graph_api is not None:
312
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
313
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
314
236
  if use_microsoft_graph_api is not None:
315
237
  pulumi.set(__self__, "use_microsoft_graph_api", use_microsoft_graph_api)
316
238
 
@@ -375,45 +297,6 @@ class _BackendState:
375
297
  def environment(self, value: Optional[pulumi.Input[str]]):
376
298
  pulumi.set(self, "environment", value)
377
299
 
378
- @property
379
- @pulumi.getter(name="identityTokenAudience")
380
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
381
- """
382
- The audience claim value. Requires Vault 1.17+.
383
- *Available only for Vault Enterprise*
384
- """
385
- return pulumi.get(self, "identity_token_audience")
386
-
387
- @identity_token_audience.setter
388
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
389
- pulumi.set(self, "identity_token_audience", value)
390
-
391
- @property
392
- @pulumi.getter(name="identityTokenKey")
393
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
394
- """
395
- The key to use for signing identity tokens. Requires Vault 1.17+.
396
- *Available only for Vault Enterprise*
397
- """
398
- return pulumi.get(self, "identity_token_key")
399
-
400
- @identity_token_key.setter
401
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
402
- pulumi.set(self, "identity_token_key", value)
403
-
404
- @property
405
- @pulumi.getter(name="identityTokenTtl")
406
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
407
- """
408
- The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
409
- *Available only for Vault Enterprise*
410
- """
411
- return pulumi.get(self, "identity_token_ttl")
412
-
413
- @identity_token_ttl.setter
414
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
415
- pulumi.set(self, "identity_token_ttl", value)
416
-
417
300
  @property
418
301
  @pulumi.getter
419
302
  def namespace(self) -> Optional[pulumi.Input[str]]:
@@ -471,9 +354,6 @@ class _BackendState:
471
354
  """
472
355
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
473
356
  """
474
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
475
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
476
-
477
357
  return pulumi.get(self, "use_microsoft_graph_api")
478
358
 
479
359
  @use_microsoft_graph_api.setter
@@ -491,9 +371,6 @@ class Backend(pulumi.CustomResource):
491
371
  description: Optional[pulumi.Input[str]] = None,
492
372
  disable_remount: Optional[pulumi.Input[bool]] = None,
493
373
  environment: Optional[pulumi.Input[str]] = None,
494
- identity_token_audience: Optional[pulumi.Input[str]] = None,
495
- identity_token_key: Optional[pulumi.Input[str]] = None,
496
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
497
374
  namespace: Optional[pulumi.Input[str]] = None,
498
375
  path: Optional[pulumi.Input[str]] = None,
499
376
  subscription_id: Optional[pulumi.Input[str]] = None,
@@ -505,46 +382,37 @@ class Backend(pulumi.CustomResource):
505
382
 
506
383
  ### *Vault-1.9 And Above*
507
384
 
508
- You can setup the Azure secrets engine with Workload Identity Federation (WIF) for a secret-less configuration:
385
+ <!--Start PulumiCodeChooser -->
509
386
  ```python
510
387
  import pulumi
511
388
  import pulumi_vault as vault
512
389
 
513
390
  azure = vault.azure.Backend("azure",
514
- subscription_id="11111111-2222-3333-4444-111111111111",
515
- tenant_id="11111111-2222-3333-4444-222222222222",
516
391
  client_id="11111111-2222-3333-4444-333333333333",
517
- identity_token_audience="<TOKEN_AUDIENCE>",
518
- identity_token_ttl="<TOKEN_TTL>")
519
- ```
520
-
521
- ```python
522
- import pulumi
523
- import pulumi_vault as vault
524
-
525
- azure = vault.azure.Backend("azure",
526
- use_microsoft_graph_api=True,
392
+ client_secret="12345678901234567890",
393
+ environment="AzurePublicCloud",
527
394
  subscription_id="11111111-2222-3333-4444-111111111111",
528
395
  tenant_id="11111111-2222-3333-4444-222222222222",
529
- client_id="11111111-2222-3333-4444-333333333333",
530
- client_secret="12345678901234567890",
531
- environment="AzurePublicCloud")
396
+ use_microsoft_graph_api=True)
532
397
  ```
398
+ <!--End PulumiCodeChooser -->
533
399
 
534
400
  ### *Vault-1.8 And Below*
535
401
 
402
+ <!--Start PulumiCodeChooser -->
536
403
  ```python
537
404
  import pulumi
538
405
  import pulumi_vault as vault
539
406
 
540
407
  azure = vault.azure.Backend("azure",
541
- use_microsoft_graph_api=False,
542
- subscription_id="11111111-2222-3333-4444-111111111111",
543
- tenant_id="11111111-2222-3333-4444-222222222222",
544
408
  client_id="11111111-2222-3333-4444-333333333333",
545
409
  client_secret="12345678901234567890",
546
- environment="AzurePublicCloud")
410
+ environment="AzurePublicCloud",
411
+ subscription_id="11111111-2222-3333-4444-111111111111",
412
+ tenant_id="11111111-2222-3333-4444-222222222222",
413
+ use_microsoft_graph_api=False)
547
414
  ```
415
+ <!--End PulumiCodeChooser -->
548
416
 
549
417
  :param str resource_name: The name of the resource.
550
418
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -554,12 +422,6 @@ class Backend(pulumi.CustomResource):
554
422
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
555
423
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
556
424
  :param pulumi.Input[str] environment: The Azure environment.
557
- :param pulumi.Input[str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
558
- *Available only for Vault Enterprise*
559
- :param pulumi.Input[str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
560
- *Available only for Vault Enterprise*
561
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
562
- *Available only for Vault Enterprise*
563
425
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
564
426
  The value should not contain leading or trailing forward slashes.
565
427
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -580,46 +442,37 @@ class Backend(pulumi.CustomResource):
580
442
 
581
443
  ### *Vault-1.9 And Above*
582
444
 
583
- You can setup the Azure secrets engine with Workload Identity Federation (WIF) for a secret-less configuration:
445
+ <!--Start PulumiCodeChooser -->
584
446
  ```python
585
447
  import pulumi
586
448
  import pulumi_vault as vault
587
449
 
588
450
  azure = vault.azure.Backend("azure",
589
- subscription_id="11111111-2222-3333-4444-111111111111",
590
- tenant_id="11111111-2222-3333-4444-222222222222",
591
451
  client_id="11111111-2222-3333-4444-333333333333",
592
- identity_token_audience="<TOKEN_AUDIENCE>",
593
- identity_token_ttl="<TOKEN_TTL>")
594
- ```
595
-
596
- ```python
597
- import pulumi
598
- import pulumi_vault as vault
599
-
600
- azure = vault.azure.Backend("azure",
601
- use_microsoft_graph_api=True,
452
+ client_secret="12345678901234567890",
453
+ environment="AzurePublicCloud",
602
454
  subscription_id="11111111-2222-3333-4444-111111111111",
603
455
  tenant_id="11111111-2222-3333-4444-222222222222",
604
- client_id="11111111-2222-3333-4444-333333333333",
605
- client_secret="12345678901234567890",
606
- environment="AzurePublicCloud")
456
+ use_microsoft_graph_api=True)
607
457
  ```
458
+ <!--End PulumiCodeChooser -->
608
459
 
609
460
  ### *Vault-1.8 And Below*
610
461
 
462
+ <!--Start PulumiCodeChooser -->
611
463
  ```python
612
464
  import pulumi
613
465
  import pulumi_vault as vault
614
466
 
615
467
  azure = vault.azure.Backend("azure",
616
- use_microsoft_graph_api=False,
617
- subscription_id="11111111-2222-3333-4444-111111111111",
618
- tenant_id="11111111-2222-3333-4444-222222222222",
619
468
  client_id="11111111-2222-3333-4444-333333333333",
620
469
  client_secret="12345678901234567890",
621
- environment="AzurePublicCloud")
470
+ environment="AzurePublicCloud",
471
+ subscription_id="11111111-2222-3333-4444-111111111111",
472
+ tenant_id="11111111-2222-3333-4444-222222222222",
473
+ use_microsoft_graph_api=False)
622
474
  ```
475
+ <!--End PulumiCodeChooser -->
623
476
 
624
477
  :param str resource_name: The name of the resource.
625
478
  :param BackendArgs args: The arguments to use to populate this resource's properties.
@@ -641,9 +494,6 @@ class Backend(pulumi.CustomResource):
641
494
  description: Optional[pulumi.Input[str]] = None,
642
495
  disable_remount: Optional[pulumi.Input[bool]] = None,
643
496
  environment: Optional[pulumi.Input[str]] = None,
644
- identity_token_audience: Optional[pulumi.Input[str]] = None,
645
- identity_token_key: Optional[pulumi.Input[str]] = None,
646
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
647
497
  namespace: Optional[pulumi.Input[str]] = None,
648
498
  path: Optional[pulumi.Input[str]] = None,
649
499
  subscription_id: Optional[pulumi.Input[str]] = None,
@@ -663,9 +513,6 @@ class Backend(pulumi.CustomResource):
663
513
  __props__.__dict__["description"] = description
664
514
  __props__.__dict__["disable_remount"] = disable_remount
665
515
  __props__.__dict__["environment"] = environment
666
- __props__.__dict__["identity_token_audience"] = identity_token_audience
667
- __props__.__dict__["identity_token_key"] = identity_token_key
668
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
669
516
  __props__.__dict__["namespace"] = namespace
670
517
  __props__.__dict__["path"] = path
671
518
  if subscription_id is None and not opts.urn:
@@ -692,9 +539,6 @@ class Backend(pulumi.CustomResource):
692
539
  description: Optional[pulumi.Input[str]] = None,
693
540
  disable_remount: Optional[pulumi.Input[bool]] = None,
694
541
  environment: Optional[pulumi.Input[str]] = None,
695
- identity_token_audience: Optional[pulumi.Input[str]] = None,
696
- identity_token_key: Optional[pulumi.Input[str]] = None,
697
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
698
542
  namespace: Optional[pulumi.Input[str]] = None,
699
543
  path: Optional[pulumi.Input[str]] = None,
700
544
  subscription_id: Optional[pulumi.Input[str]] = None,
@@ -713,12 +557,6 @@ class Backend(pulumi.CustomResource):
713
557
  :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
714
558
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
715
559
  :param pulumi.Input[str] environment: The Azure environment.
716
- :param pulumi.Input[str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
717
- *Available only for Vault Enterprise*
718
- :param pulumi.Input[str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
719
- *Available only for Vault Enterprise*
720
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
721
- *Available only for Vault Enterprise*
722
560
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
723
561
  The value should not contain leading or trailing forward slashes.
724
562
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
@@ -737,9 +575,6 @@ class Backend(pulumi.CustomResource):
737
575
  __props__.__dict__["description"] = description
738
576
  __props__.__dict__["disable_remount"] = disable_remount
739
577
  __props__.__dict__["environment"] = environment
740
- __props__.__dict__["identity_token_audience"] = identity_token_audience
741
- __props__.__dict__["identity_token_key"] = identity_token_key
742
- __props__.__dict__["identity_token_ttl"] = identity_token_ttl
743
578
  __props__.__dict__["namespace"] = namespace
744
579
  __props__.__dict__["path"] = path
745
580
  __props__.__dict__["subscription_id"] = subscription_id
@@ -788,33 +623,6 @@ class Backend(pulumi.CustomResource):
788
623
  """
789
624
  return pulumi.get(self, "environment")
790
625
 
791
- @property
792
- @pulumi.getter(name="identityTokenAudience")
793
- def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
794
- """
795
- The audience claim value. Requires Vault 1.17+.
796
- *Available only for Vault Enterprise*
797
- """
798
- return pulumi.get(self, "identity_token_audience")
799
-
800
- @property
801
- @pulumi.getter(name="identityTokenKey")
802
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
803
- """
804
- The key to use for signing identity tokens. Requires Vault 1.17+.
805
- *Available only for Vault Enterprise*
806
- """
807
- return pulumi.get(self, "identity_token_key")
808
-
809
- @property
810
- @pulumi.getter(name="identityTokenTtl")
811
- def identity_token_ttl(self) -> pulumi.Output[int]:
812
- """
813
- The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
814
- *Available only for Vault Enterprise*
815
- """
816
- return pulumi.get(self, "identity_token_ttl")
817
-
818
626
  @property
819
627
  @pulumi.getter
820
628
  def namespace(self) -> pulumi.Output[Optional[str]]:
@@ -856,8 +664,5 @@ class Backend(pulumi.CustomResource):
856
664
  """
857
665
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
858
666
  """
859
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
860
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
861
-
862
667
  return pulumi.get(self, "use_microsoft_graph_api")
863
668
 
@@ -465,16 +465,17 @@ class BackendRole(pulumi.CustomResource):
465
465
  """
466
466
  ## Example Usage
467
467
 
468
+ <!--Start PulumiCodeChooser -->
468
469
  ```python
469
470
  import pulumi
470
471
  import pulumi_vault as vault
471
472
 
472
473
  azure = vault.azure.Backend("azure",
473
- subscription_id=subscription_id,
474
- tenant_id=tenant_id,
475
- client_secret=client_secret,
476
- client_id=client_id)
477
- generated_role = vault.azure.BackendRole("generated_role",
474
+ subscription_id=var["subscription_id"],
475
+ tenant_id=var["tenant_id"],
476
+ client_secret=var["client_secret"],
477
+ client_id=var["client_id"])
478
+ generated_role = vault.azure.BackendRole("generatedRole",
478
479
  backend=azure.path,
479
480
  role="generated_role",
480
481
  sign_in_audience="AzureADMyOrg",
@@ -486,15 +487,16 @@ class BackendRole(pulumi.CustomResource):
486
487
  max_ttl="600",
487
488
  azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
488
489
  role_name="Reader",
489
- scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
490
+ scope=f"/subscriptions/{var['subscription_id']}/resourceGroups/azure-vault-group",
490
491
  )])
491
- existing_object_id = vault.azure.BackendRole("existing_object_id",
492
+ existing_object_id = vault.azure.BackendRole("existingObjectId",
492
493
  backend=azure.path,
493
494
  role="existing_object_id",
494
495
  application_object_id="11111111-2222-3333-4444-44444444444",
495
496
  ttl="300",
496
497
  max_ttl="600")
497
498
  ```
499
+ <!--End PulumiCodeChooser -->
498
500
 
499
501
  :param str resource_name: The name of the resource.
500
502
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -528,16 +530,17 @@ class BackendRole(pulumi.CustomResource):
528
530
  """
529
531
  ## Example Usage
530
532
 
533
+ <!--Start PulumiCodeChooser -->
531
534
  ```python
532
535
  import pulumi
533
536
  import pulumi_vault as vault
534
537
 
535
538
  azure = vault.azure.Backend("azure",
536
- subscription_id=subscription_id,
537
- tenant_id=tenant_id,
538
- client_secret=client_secret,
539
- client_id=client_id)
540
- generated_role = vault.azure.BackendRole("generated_role",
539
+ subscription_id=var["subscription_id"],
540
+ tenant_id=var["tenant_id"],
541
+ client_secret=var["client_secret"],
542
+ client_id=var["client_id"])
543
+ generated_role = vault.azure.BackendRole("generatedRole",
541
544
  backend=azure.path,
542
545
  role="generated_role",
543
546
  sign_in_audience="AzureADMyOrg",
@@ -549,15 +552,16 @@ class BackendRole(pulumi.CustomResource):
549
552
  max_ttl="600",
550
553
  azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
551
554
  role_name="Reader",
552
- scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
555
+ scope=f"/subscriptions/{var['subscription_id']}/resourceGroups/azure-vault-group",
553
556
  )])
554
- existing_object_id = vault.azure.BackendRole("existing_object_id",
557
+ existing_object_id = vault.azure.BackendRole("existingObjectId",
555
558
  backend=azure.path,
556
559
  role="existing_object_id",
557
560
  application_object_id="11111111-2222-3333-4444-44444444444",
558
561
  ttl="300",
559
562
  max_ttl="600")
560
563
  ```
564
+ <!--End PulumiCodeChooser -->
561
565
 
562
566
  :param str resource_name: The name of the resource.
563
567
  :param BackendRoleArgs args: The arguments to use to populate this resource's properties.
@@ -216,6 +216,7 @@ def get_access_credentials(backend: Optional[str] = None,
216
216
  """
217
217
  ## Example Usage
218
218
 
219
+ <!--Start PulumiCodeChooser -->
219
220
  ```python
220
221
  import pulumi
221
222
  import pulumi_vault as vault
@@ -226,6 +227,7 @@ def get_access_credentials(backend: Optional[str] = None,
226
227
  num_seconds_between_tests=1,
227
228
  max_cred_validation_seconds=300)
228
229
  ```
230
+ <!--End PulumiCodeChooser -->
229
231
 
230
232
  ## Caveats
231
233
 
@@ -315,6 +317,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
315
317
  """
316
318
  ## Example Usage
317
319
 
320
+ <!--Start PulumiCodeChooser -->
318
321
  ```python
319
322
  import pulumi
320
323
  import pulumi_vault as vault
@@ -325,6 +328,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
325
328
  num_seconds_between_tests=1,
326
329
  max_cred_validation_seconds=300)
327
330
  ```
331
+ <!--End PulumiCodeChooser -->
328
332
 
329
333
  ## Caveats
330
334