pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -1261,8 +1261,8 @@ class SecretBackend(pulumi.CustomResource):
1261
1261
  backend="ad",
1262
1262
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1263
1263
  bindpass="SuperSecretPassw0rd",
1264
- insecure_tls=True,
1265
1264
  url="ldaps://ad",
1265
+ insecure_tls=True,
1266
1266
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1267
1267
  ```
1268
1268
  <!--End PulumiCodeChooser -->
@@ -1354,8 +1354,8 @@ class SecretBackend(pulumi.CustomResource):
1354
1354
  backend="ad",
1355
1355
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1356
1356
  bindpass="SuperSecretPassw0rd",
1357
- insecure_tls=True,
1358
1357
  url="ldaps://ad",
1358
+ insecure_tls=True,
1359
1359
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1360
1360
  ```
1361
1361
  <!--End PulumiCodeChooser -->
@@ -307,6 +307,7 @@ class SecretLibrary(pulumi.CustomResource):
307
307
  userdn="CN=Users,DC=corp,DC=example,DC=net")
308
308
  qa = vault.ad.SecretLibrary("qa",
309
309
  backend=config.backend,
310
+ name="qa",
310
311
  service_account_names=[
311
312
  "Bob",
312
313
  "Mary",
@@ -365,6 +366,7 @@ class SecretLibrary(pulumi.CustomResource):
365
366
  userdn="CN=Users,DC=corp,DC=example,DC=net")
366
367
  qa = vault.ad.SecretLibrary("qa",
367
368
  backend=config.backend,
369
+ name="qa",
368
370
  service_account_names=[
369
371
  "Bob",
370
372
  "Mary",
@@ -566,11 +566,11 @@ class AuthBackendRole(pulumi.CustomResource):
566
566
  import pulumi
567
567
  import pulumi_vault as vault
568
568
 
569
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
569
+ alicloud = vault.AuthBackend("alicloud",
570
570
  type="alicloud",
571
571
  path="alicloud")
572
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
573
- backend=alicloud_auth_backend.path,
572
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
573
+ backend=alicloud.path,
574
574
  role="example",
575
575
  arn="acs:ram:123456:tf:role/foobar")
576
576
  ```
@@ -640,11 +640,11 @@ class AuthBackendRole(pulumi.CustomResource):
640
640
  import pulumi
641
641
  import pulumi_vault as vault
642
642
 
643
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
643
+ alicloud = vault.AuthBackend("alicloud",
644
644
  type="alicloud",
645
645
  path="alicloud")
646
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
647
- backend=alicloud_auth_backend.path,
646
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
647
+ backend=alicloud.path,
648
648
  role="example",
649
649
  arn="acs:ram:123456:tf:role/foobar")
650
650
  ```
pulumi_vault/audit.py CHANGED
@@ -260,10 +260,10 @@ class Audit(pulumi.CustomResource):
260
260
  import pulumi_vault as vault
261
261
 
262
262
  test = vault.Audit("test",
263
+ type="file",
263
264
  options={
264
265
  "file_path": "C:/temp/audit.txt",
265
- },
266
- type="file")
266
+ })
267
267
  ```
268
268
  <!--End PulumiCodeChooser -->
269
269
 
@@ -275,14 +275,14 @@ class Audit(pulumi.CustomResource):
275
275
  import pulumi_vault as vault
276
276
 
277
277
  test = vault.Audit("test",
278
+ type="socket",
279
+ path="app_socket",
278
280
  local=False,
279
281
  options={
280
282
  "address": "127.0.0.1:8000",
281
- "description": "application x socket",
282
283
  "socket_type": "tcp",
283
- },
284
- path="app_socket",
285
- type="socket")
284
+ "description": "application x socket",
285
+ })
286
286
  ```
287
287
  <!--End PulumiCodeChooser -->
288
288
 
@@ -325,10 +325,10 @@ class Audit(pulumi.CustomResource):
325
325
  import pulumi_vault as vault
326
326
 
327
327
  test = vault.Audit("test",
328
+ type="file",
328
329
  options={
329
330
  "file_path": "C:/temp/audit.txt",
330
- },
331
- type="file")
331
+ })
332
332
  ```
333
333
  <!--End PulumiCodeChooser -->
334
334
 
@@ -340,14 +340,14 @@ class Audit(pulumi.CustomResource):
340
340
  import pulumi_vault as vault
341
341
 
342
342
  test = vault.Audit("test",
343
+ type="socket",
344
+ path="app_socket",
343
345
  local=False,
344
346
  options={
345
347
  "address": "127.0.0.1:8000",
346
- "description": "application x socket",
347
348
  "socket_type": "tcp",
348
- },
349
- path="app_socket",
350
- type="socket")
349
+ "description": "application x socket",
350
+ })
351
351
  ```
352
352
  <!--End PulumiCodeChooser -->
353
353
 
@@ -147,7 +147,9 @@ class AuditRequestHeader(pulumi.CustomResource):
147
147
  import pulumi
148
148
  import pulumi_vault as vault
149
149
 
150
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
150
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
151
+ name="X-Forwarded-For",
152
+ hmac=False)
151
153
  ```
152
154
  <!--End PulumiCodeChooser -->
153
155
 
@@ -178,7 +180,9 @@ class AuditRequestHeader(pulumi.CustomResource):
178
180
  import pulumi
179
181
  import pulumi_vault as vault
180
182
 
181
- x_forwarded_for = vault.AuditRequestHeader("xForwardedFor", hmac=False)
183
+ x_forwarded_for = vault.AuditRequestHeader("x_forwarded_for",
184
+ name="X-Forwarded-For",
185
+ hmac=False)
182
186
  ```
183
187
  <!--End PulumiCodeChooser -->
184
188
 
@@ -435,9 +435,9 @@ class AuthBackendClient(pulumi.CustomResource):
435
435
  import pulumi
436
436
  import pulumi_vault as vault
437
437
 
438
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
439
- example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
440
- backend=example_auth_backend.path,
438
+ example = vault.AuthBackend("example", type="aws")
439
+ example_auth_backend_client = vault.aws.AuthBackendClient("example",
440
+ backend=example.path,
441
441
  access_key="INSERT_AWS_ACCESS_KEY",
442
442
  secret_key="INSERT_AWS_SECRET_KEY")
443
443
  ```
@@ -494,9 +494,9 @@ class AuthBackendClient(pulumi.CustomResource):
494
494
  import pulumi
495
495
  import pulumi_vault as vault
496
496
 
497
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
498
- example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
499
- backend=example_auth_backend.path,
497
+ example = vault.AuthBackend("example", type="aws")
498
+ example_auth_backend_client = vault.aws.AuthBackendClient("example",
499
+ backend=example.path,
500
500
  access_key="INSERT_AWS_ACCESS_KEY",
501
501
  secret_key="INSERT_AWS_SECRET_KEY")
502
502
  ```
@@ -202,9 +202,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
202
202
  import pulumi
203
203
  import pulumi_vault as vault
204
204
 
205
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
207
- backend=example_auth_backend.path,
205
+ example = vault.AuthBackend("example", type="aws")
206
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
207
+ backend=example.path,
208
208
  safety_buffer=3600)
209
209
  ```
210
210
  <!--End PulumiCodeChooser -->
@@ -249,9 +249,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
249
249
  import pulumi
250
250
  import pulumi_vault as vault
251
251
 
252
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
253
- example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
254
- backend=example_auth_backend.path,
252
+ example = vault.AuthBackend("example", type="aws")
253
+ example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
254
+ backend=example.path,
255
255
  safety_buffer=3600)
256
256
  ```
257
257
  <!--End PulumiCodeChooser -->
@@ -202,9 +202,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
202
202
  import pulumi
203
203
  import pulumi_vault as vault
204
204
 
205
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
207
- backend=example_auth_backend.path,
205
+ example = vault.AuthBackend("example", type="aws")
206
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
207
+ backend=example.path,
208
208
  safety_buffer=360)
209
209
  ```
210
210
  <!--End PulumiCodeChooser -->
@@ -239,9 +239,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
239
239
  import pulumi
240
240
  import pulumi_vault as vault
241
241
 
242
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
243
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
244
- backend=example_auth_backend.path,
242
+ example = vault.AuthBackend("example", type="aws")
243
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
244
+ backend=example.path,
245
245
  safety_buffer=360)
246
246
  ```
247
247
  <!--End PulumiCodeChooser -->
@@ -576,6 +576,7 @@ class SecretBackendRole(pulumi.CustomResource):
576
576
  secret_key="AWS secret key")
577
577
  role = vault.aws.SecretBackendRole("role",
578
578
  backend=aws.path,
579
+ name="deploy",
579
580
  credential_type="iam_user",
580
581
  policy_document=\"\"\"{
581
582
  "Version": "2012-10-17",
@@ -667,6 +668,7 @@ class SecretBackendRole(pulumi.CustomResource):
667
668
  secret_key="AWS secret key")
668
669
  role = vault.aws.SecretBackendRole("role",
669
670
  backend=aws.path,
671
+ name="deploy",
670
672
  credential_type="iam_user",
671
673
  policy_document=\"\"\"{
672
674
  "Version": "2012-10-17",
@@ -229,6 +229,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
229
229
  description="Obtain AWS credentials.")
230
230
  role = vault.aws.SecretBackendStaticRole("role",
231
231
  backend=aws.path,
232
+ name="test",
232
233
  username="my-test-user",
233
234
  rotation_period=3600)
234
235
  ```
@@ -275,6 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
275
276
  description="Obtain AWS credentials.")
276
277
  role = vault.aws.SecretBackendStaticRole("role",
277
278
  backend=aws.path,
279
+ name="test",
278
280
  username="my-test-user",
279
281
  rotation_period=3600)
280
282
  ```
@@ -310,9 +310,9 @@ class AuthBackendConfig(pulumi.CustomResource):
310
310
  import pulumi
311
311
  import pulumi_vault as vault
312
312
 
313
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
314
- example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
315
- backend=example_auth_backend.path,
313
+ example = vault.AuthBackend("example", type="azure")
314
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
315
+ backend=example.path,
316
316
  tenant_id="11111111-2222-3333-4444-555555555555",
317
317
  client_id="11111111-2222-3333-4444-555555555555",
318
318
  client_secret="01234567890123456789",
@@ -362,9 +362,9 @@ class AuthBackendConfig(pulumi.CustomResource):
362
362
  import pulumi
363
363
  import pulumi_vault as vault
364
364
 
365
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
366
- example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
367
- backend=example_auth_backend.path,
365
+ example = vault.AuthBackend("example", type="azure")
366
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
367
+ backend=example.path,
368
368
  tenant_id="11111111-2222-3333-4444-555555555555",
369
369
  client_id="11111111-2222-3333-4444-555555555555",
370
370
  client_secret="01234567890123456789",
@@ -388,12 +388,12 @@ class Backend(pulumi.CustomResource):
388
388
  import pulumi_vault as vault
389
389
 
390
390
  azure = vault.azure.Backend("azure",
391
- client_id="11111111-2222-3333-4444-333333333333",
392
- client_secret="12345678901234567890",
393
- environment="AzurePublicCloud",
391
+ use_microsoft_graph_api=True,
394
392
  subscription_id="11111111-2222-3333-4444-111111111111",
395
393
  tenant_id="11111111-2222-3333-4444-222222222222",
396
- use_microsoft_graph_api=True)
394
+ client_id="11111111-2222-3333-4444-333333333333",
395
+ client_secret="12345678901234567890",
396
+ environment="AzurePublicCloud")
397
397
  ```
398
398
  <!--End PulumiCodeChooser -->
399
399
 
@@ -405,12 +405,12 @@ class Backend(pulumi.CustomResource):
405
405
  import pulumi_vault as vault
406
406
 
407
407
  azure = vault.azure.Backend("azure",
408
- client_id="11111111-2222-3333-4444-333333333333",
409
- client_secret="12345678901234567890",
410
- environment="AzurePublicCloud",
408
+ use_microsoft_graph_api=False,
411
409
  subscription_id="11111111-2222-3333-4444-111111111111",
412
410
  tenant_id="11111111-2222-3333-4444-222222222222",
413
- use_microsoft_graph_api=False)
411
+ client_id="11111111-2222-3333-4444-333333333333",
412
+ client_secret="12345678901234567890",
413
+ environment="AzurePublicCloud")
414
414
  ```
415
415
  <!--End PulumiCodeChooser -->
416
416
 
@@ -448,12 +448,12 @@ class Backend(pulumi.CustomResource):
448
448
  import pulumi_vault as vault
449
449
 
450
450
  azure = vault.azure.Backend("azure",
451
- client_id="11111111-2222-3333-4444-333333333333",
452
- client_secret="12345678901234567890",
453
- environment="AzurePublicCloud",
451
+ use_microsoft_graph_api=True,
454
452
  subscription_id="11111111-2222-3333-4444-111111111111",
455
453
  tenant_id="11111111-2222-3333-4444-222222222222",
456
- use_microsoft_graph_api=True)
454
+ client_id="11111111-2222-3333-4444-333333333333",
455
+ client_secret="12345678901234567890",
456
+ environment="AzurePublicCloud")
457
457
  ```
458
458
  <!--End PulumiCodeChooser -->
459
459
 
@@ -465,12 +465,12 @@ class Backend(pulumi.CustomResource):
465
465
  import pulumi_vault as vault
466
466
 
467
467
  azure = vault.azure.Backend("azure",
468
- client_id="11111111-2222-3333-4444-333333333333",
469
- client_secret="12345678901234567890",
470
- environment="AzurePublicCloud",
468
+ use_microsoft_graph_api=False,
471
469
  subscription_id="11111111-2222-3333-4444-111111111111",
472
470
  tenant_id="11111111-2222-3333-4444-222222222222",
473
- use_microsoft_graph_api=False)
471
+ client_id="11111111-2222-3333-4444-333333333333",
472
+ client_secret="12345678901234567890",
473
+ environment="AzurePublicCloud")
474
474
  ```
475
475
  <!--End PulumiCodeChooser -->
476
476
 
@@ -471,11 +471,11 @@ class BackendRole(pulumi.CustomResource):
471
471
  import pulumi_vault as vault
472
472
 
473
473
  azure = vault.azure.Backend("azure",
474
- subscription_id=var["subscription_id"],
475
- tenant_id=var["tenant_id"],
476
- client_secret=var["client_secret"],
477
- client_id=var["client_id"])
478
- generated_role = vault.azure.BackendRole("generatedRole",
474
+ subscription_id=subscription_id,
475
+ tenant_id=tenant_id,
476
+ client_secret=client_secret,
477
+ client_id=client_id)
478
+ generated_role = vault.azure.BackendRole("generated_role",
479
479
  backend=azure.path,
480
480
  role="generated_role",
481
481
  sign_in_audience="AzureADMyOrg",
@@ -487,9 +487,9 @@ class BackendRole(pulumi.CustomResource):
487
487
  max_ttl="600",
488
488
  azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
489
489
  role_name="Reader",
490
- scope=f"/subscriptions/{var['subscription_id']}/resourceGroups/azure-vault-group",
490
+ scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
491
491
  )])
492
- existing_object_id = vault.azure.BackendRole("existingObjectId",
492
+ existing_object_id = vault.azure.BackendRole("existing_object_id",
493
493
  backend=azure.path,
494
494
  role="existing_object_id",
495
495
  application_object_id="11111111-2222-3333-4444-44444444444",
@@ -536,11 +536,11 @@ class BackendRole(pulumi.CustomResource):
536
536
  import pulumi_vault as vault
537
537
 
538
538
  azure = vault.azure.Backend("azure",
539
- subscription_id=var["subscription_id"],
540
- tenant_id=var["tenant_id"],
541
- client_secret=var["client_secret"],
542
- client_id=var["client_id"])
543
- generated_role = vault.azure.BackendRole("generatedRole",
539
+ subscription_id=subscription_id,
540
+ tenant_id=tenant_id,
541
+ client_secret=client_secret,
542
+ client_id=client_id)
543
+ generated_role = vault.azure.BackendRole("generated_role",
544
544
  backend=azure.path,
545
545
  role="generated_role",
546
546
  sign_in_audience="AzureADMyOrg",
@@ -552,9 +552,9 @@ class BackendRole(pulumi.CustomResource):
552
552
  max_ttl="600",
553
553
  azure_roles=[vault.azure.BackendRoleAzureRoleArgs(
554
554
  role_name="Reader",
555
- scope=f"/subscriptions/{var['subscription_id']}/resourceGroups/azure-vault-group",
555
+ scope=f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
556
556
  )])
557
- existing_object_id = vault.azure.BackendRole("existingObjectId",
557
+ existing_object_id = vault.azure.BackendRole("existing_object_id",
558
558
  backend=azure.path,
559
559
  role="existing_object_id",
560
560
  application_object_id="11111111-2222-3333-4444-44444444444",
@@ -1038,14 +1038,16 @@ class CertAuthBackendRole(pulumi.CustomResource):
1038
1038
  <!--Start PulumiCodeChooser -->
1039
1039
  ```python
1040
1040
  import pulumi
1041
+ import pulumi_std as std
1041
1042
  import pulumi_vault as vault
1042
1043
 
1043
- cert_auth_backend = vault.AuthBackend("certAuthBackend",
1044
+ cert = vault.AuthBackend("cert",
1044
1045
  path="cert",
1045
1046
  type="cert")
1046
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1047
- certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1048
- backend=cert_auth_backend.path,
1047
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
1048
+ name="foo",
1049
+ certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
1050
+ backend=cert.path,
1049
1051
  allowed_names=[
1050
1052
  "foo.example.org",
1051
1053
  "baz.example.org",
@@ -1134,14 +1136,16 @@ class CertAuthBackendRole(pulumi.CustomResource):
1134
1136
  <!--Start PulumiCodeChooser -->
1135
1137
  ```python
1136
1138
  import pulumi
1139
+ import pulumi_std as std
1137
1140
  import pulumi_vault as vault
1138
1141
 
1139
- cert_auth_backend = vault.AuthBackend("certAuthBackend",
1142
+ cert = vault.AuthBackend("cert",
1140
1143
  path="cert",
1141
1144
  type="cert")
1142
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1143
- certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1144
- backend=cert_auth_backend.path,
1145
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
1146
+ name="foo",
1147
+ certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
1148
+ backend=cert.path,
1145
1149
  allowed_names=[
1146
1150
  "foo.example.org",
1147
1151
  "baz.example.org",
@@ -536,9 +536,9 @@ class SecretBackend(pulumi.CustomResource):
536
536
  import pulumi_vault as vault
537
537
 
538
538
  test = vault.consul.SecretBackend("test",
539
- address="127.0.0.1:8500",
540
- description="Manages the Consul backend",
541
539
  path="consul",
540
+ description="Manages the Consul backend",
541
+ address="127.0.0.1:8500",
542
542
  token="4240861b-ce3d-8530-115a-521ff070dd29")
543
543
  ```
544
544
  <!--End PulumiCodeChooser -->
@@ -550,10 +550,10 @@ class SecretBackend(pulumi.CustomResource):
550
550
  import pulumi_vault as vault
551
551
 
552
552
  test = vault.consul.SecretBackend("test",
553
- address="127.0.0.1:8500",
554
- bootstrap=True,
553
+ path="consul",
555
554
  description="Bootstrap the Consul backend",
556
- path="consul")
555
+ address="127.0.0.1:8500",
556
+ bootstrap=True)
557
557
  ```
558
558
  <!--End PulumiCodeChooser -->
559
559
 
@@ -606,9 +606,9 @@ class SecretBackend(pulumi.CustomResource):
606
606
  import pulumi_vault as vault
607
607
 
608
608
  test = vault.consul.SecretBackend("test",
609
- address="127.0.0.1:8500",
610
- description="Manages the Consul backend",
611
609
  path="consul",
610
+ description="Manages the Consul backend",
611
+ address="127.0.0.1:8500",
612
612
  token="4240861b-ce3d-8530-115a-521ff070dd29")
613
613
  ```
614
614
  <!--End PulumiCodeChooser -->
@@ -620,10 +620,10 @@ class SecretBackend(pulumi.CustomResource):
620
620
  import pulumi_vault as vault
621
621
 
622
622
  test = vault.consul.SecretBackend("test",
623
- address="127.0.0.1:8500",
624
- bootstrap=True,
623
+ path="consul",
625
624
  description="Bootstrap the Consul backend",
626
- path="consul")
625
+ address="127.0.0.1:8500",
626
+ bootstrap=True)
627
627
  ```
628
628
  <!--End PulumiCodeChooser -->
629
629
 
@@ -518,6 +518,7 @@ class SecretBackendRole(pulumi.CustomResource):
518
518
  address="127.0.0.1:8500",
519
519
  token="4240861b-ce3d-8530-115a-521ff070dd29")
520
520
  example = vault.consul.SecretBackendRole("example",
521
+ name="test-role",
521
522
  backend=test.path,
522
523
  consul_policies=["example-policy"])
523
524
  ```
@@ -585,6 +586,7 @@ class SecretBackendRole(pulumi.CustomResource):
585
586
  address="127.0.0.1:8500",
586
587
  token="4240861b-ce3d-8530-115a-521ff070dd29")
587
588
  example = vault.consul.SecretBackendRole("example",
589
+ name="test-role",
588
590
  backend=test.path,
589
591
  consul_policies=["example-policy"])
590
592
  ```
@@ -933,6 +933,7 @@ class SecretBackendConnection(pulumi.CustomResource):
933
933
  type="database")
934
934
  postgres = vault.database.SecretBackendConnection("postgres",
935
935
  backend=db.path,
936
+ name="postgres",
936
937
  allowed_roles=[
937
938
  "dev",
938
939
  "prod",
@@ -1006,6 +1007,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1006
1007
  type="database")
1007
1008
  postgres = vault.database.SecretBackendConnection("postgres",
1008
1009
  backend=db.path,
1010
+ name="postgres",
1009
1011
  allowed_roles=[
1010
1012
  "dev",
1011
1013
  "prod",
@@ -499,6 +499,7 @@ class SecretBackendRole(pulumi.CustomResource):
499
499
  type="database")
500
500
  postgres = vault.database.SecretBackendConnection("postgres",
501
501
  backend=db.path,
502
+ name="postgres",
502
503
  allowed_roles=[
503
504
  "dev",
504
505
  "prod",
@@ -508,6 +509,7 @@ class SecretBackendRole(pulumi.CustomResource):
508
509
  ))
509
510
  role = vault.database.SecretBackendRole("role",
510
511
  backend=db.path,
512
+ name="dev",
511
513
  db_name=postgres.name,
512
514
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
513
515
  ```
@@ -570,6 +572,7 @@ class SecretBackendRole(pulumi.CustomResource):
570
572
  type="database")
571
573
  postgres = vault.database.SecretBackendConnection("postgres",
572
574
  backend=db.path,
575
+ name="postgres",
573
576
  allowed_roles=[
574
577
  "dev",
575
578
  "prod",
@@ -579,6 +582,7 @@ class SecretBackendRole(pulumi.CustomResource):
579
582
  ))
580
583
  role = vault.database.SecretBackendRole("role",
581
584
  backend=db.path,
585
+ name="dev",
582
586
  db_name=postgres.name,
583
587
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
584
588
  ```
@@ -380,20 +380,23 @@ class SecretBackendStaticRole(pulumi.CustomResource):
380
380
  type="database")
381
381
  postgres = vault.database.SecretBackendConnection("postgres",
382
382
  backend=db.path,
383
+ name="postgres",
383
384
  allowed_roles=["*"],
384
385
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
385
386
  connection_url="postgres://username:password@host:port/database",
386
387
  ))
387
388
  # configure a static role with period-based rotations
388
- period_role = vault.database.SecretBackendStaticRole("periodRole",
389
+ period_role = vault.database.SecretBackendStaticRole("period_role",
389
390
  backend=db.path,
391
+ name="my-period-role",
390
392
  db_name=postgres.name,
391
393
  username="example",
392
394
  rotation_period=3600,
393
395
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
394
396
  # configure a static role with schedule-based rotations
395
- schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
397
+ schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
396
398
  backend=db.path,
399
+ name="my-schedule-role",
397
400
  db_name=postgres.name,
398
401
  username="example",
399
402
  rotation_schedule="0 0 * * SAT",
@@ -454,20 +457,23 @@ class SecretBackendStaticRole(pulumi.CustomResource):
454
457
  type="database")
455
458
  postgres = vault.database.SecretBackendConnection("postgres",
456
459
  backend=db.path,
460
+ name="postgres",
457
461
  allowed_roles=["*"],
458
462
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
459
463
  connection_url="postgres://username:password@host:port/database",
460
464
  ))
461
465
  # configure a static role with period-based rotations
462
- period_role = vault.database.SecretBackendStaticRole("periodRole",
466
+ period_role = vault.database.SecretBackendStaticRole("period_role",
463
467
  backend=db.path,
468
+ name="my-period-role",
464
469
  db_name=postgres.name,
465
470
  username="example",
466
471
  rotation_period=3600,
467
472
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
468
473
  # configure a static role with schedule-based rotations
469
- schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
474
+ schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
470
475
  backend=db.path,
476
+ name="my-schedule-role",
471
477
  db_name=postgres.name,
472
478
  username="example",
473
479
  rotation_schedule="0 0 * * SAT",