pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -279,15 +279,18 @@ class OidcProvider(pulumi.CustomResource):
279
279
  import json
280
280
  import pulumi_vault as vault
281
281
 
282
- test_oidc_key = vault.identity.OidcKey("testOidcKey",
282
+ test = vault.identity.OidcKey("test",
283
+ name="my-key",
283
284
  allowed_client_ids=["*"],
284
285
  rotation_period=3600,
285
286
  verification_ttl=3600)
286
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
287
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
288
+ name="my-assignment",
287
289
  entity_ids=["fake-ascbascas-2231a-sdfaa"],
288
290
  group_ids=["fake-sajkdsad-32414-sfsada"])
289
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
290
- key=test_oidc_key.name,
291
+ test_oidc_client = vault.identity.OidcClient("test",
292
+ name="application",
293
+ key=test.name,
291
294
  redirect_uris=[
292
295
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
293
296
  "http://127.0.0.1:8251/callback",
@@ -296,12 +299,14 @@ class OidcProvider(pulumi.CustomResource):
296
299
  assignments=[test_oidc_assignment.name],
297
300
  id_token_ttl=2400,
298
301
  access_token_ttl=7200)
299
- test_oidc_scope = vault.identity.OidcScope("testOidcScope",
302
+ test_oidc_scope = vault.identity.OidcScope("test",
303
+ name="groups",
300
304
  template=json.dumps({
301
305
  "groups": "{{identity.entity.groups.names}}",
302
306
  }),
303
307
  description="Groups scope.")
304
- test_oidc_provider = vault.identity.OidcProvider("testOidcProvider",
308
+ test_oidc_provider = vault.identity.OidcProvider("test",
309
+ name="my-provider",
305
310
  https_enabled=False,
306
311
  issuer_host="127.0.0.1:8200",
307
312
  allowed_client_ids=[test_oidc_client.client_id],
@@ -348,15 +353,18 @@ class OidcProvider(pulumi.CustomResource):
348
353
  import json
349
354
  import pulumi_vault as vault
350
355
 
351
- test_oidc_key = vault.identity.OidcKey("testOidcKey",
356
+ test = vault.identity.OidcKey("test",
357
+ name="my-key",
352
358
  allowed_client_ids=["*"],
353
359
  rotation_period=3600,
354
360
  verification_ttl=3600)
355
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
361
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
362
+ name="my-assignment",
356
363
  entity_ids=["fake-ascbascas-2231a-sdfaa"],
357
364
  group_ids=["fake-sajkdsad-32414-sfsada"])
358
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
359
- key=test_oidc_key.name,
365
+ test_oidc_client = vault.identity.OidcClient("test",
366
+ name="application",
367
+ key=test.name,
360
368
  redirect_uris=[
361
369
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
362
370
  "http://127.0.0.1:8251/callback",
@@ -365,12 +373,14 @@ class OidcProvider(pulumi.CustomResource):
365
373
  assignments=[test_oidc_assignment.name],
366
374
  id_token_ttl=2400,
367
375
  access_token_ttl=7200)
368
- test_oidc_scope = vault.identity.OidcScope("testOidcScope",
376
+ test_oidc_scope = vault.identity.OidcScope("test",
377
+ name="groups",
369
378
  template=json.dumps({
370
379
  "groups": "{{identity.entity.groups.names}}",
371
380
  }),
372
381
  description="Groups scope.")
373
- test_oidc_provider = vault.identity.OidcProvider("testOidcProvider",
382
+ test_oidc_provider = vault.identity.OidcProvider("test",
383
+ name="my-provider",
374
384
  https_enabled=False,
375
385
  issuer_host="127.0.0.1:8200",
376
386
  allowed_client_ids=[test_oidc_client.client_id],
@@ -276,11 +276,15 @@ class OidcRole(pulumi.CustomResource):
276
276
  import pulumi_vault as vault
277
277
 
278
278
  config = pulumi.Config()
279
+ # Name of the OIDC Key
279
280
  key = config.get("key")
280
281
  if key is None:
281
282
  key = "key"
282
- role = vault.identity.OidcRole("role", key=key)
283
- key_oidc_key = vault.identity.OidcKey("keyOidcKey",
283
+ role = vault.identity.OidcRole("role",
284
+ name="role",
285
+ key=key)
286
+ key_oidc_key = vault.identity.OidcKey("key",
287
+ name=key,
284
288
  algorithm="RS256",
285
289
  allowed_client_ids=[role.client_id])
286
290
  ```
@@ -295,11 +299,15 @@ class OidcRole(pulumi.CustomResource):
295
299
  import pulumi
296
300
  import pulumi_vault as vault
297
301
 
298
- key = vault.identity.OidcKey("key", algorithm="RS256")
299
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
300
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
302
+ key = vault.identity.OidcKey("key",
303
+ name="key",
304
+ algorithm="RS256")
305
+ role = vault.identity.OidcRole("role",
306
+ name="role",
307
+ key=key.name)
308
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
301
309
  key_name=key.name,
302
- allowed_client_id=role_oidc_role.client_id)
310
+ allowed_client_id=role.client_id)
303
311
  ```
304
312
  <!--End PulumiCodeChooser -->
305
313
 
@@ -348,11 +356,15 @@ class OidcRole(pulumi.CustomResource):
348
356
  import pulumi_vault as vault
349
357
 
350
358
  config = pulumi.Config()
359
+ # Name of the OIDC Key
351
360
  key = config.get("key")
352
361
  if key is None:
353
362
  key = "key"
354
- role = vault.identity.OidcRole("role", key=key)
355
- key_oidc_key = vault.identity.OidcKey("keyOidcKey",
363
+ role = vault.identity.OidcRole("role",
364
+ name="role",
365
+ key=key)
366
+ key_oidc_key = vault.identity.OidcKey("key",
367
+ name=key,
356
368
  algorithm="RS256",
357
369
  allowed_client_ids=[role.client_id])
358
370
  ```
@@ -367,11 +379,15 @@ class OidcRole(pulumi.CustomResource):
367
379
  import pulumi
368
380
  import pulumi_vault as vault
369
381
 
370
- key = vault.identity.OidcKey("key", algorithm="RS256")
371
- role_oidc_role = vault.identity.OidcRole("roleOidcRole", key=key.name)
372
- role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("roleOidcKeyAllowedClientID",
382
+ key = vault.identity.OidcKey("key",
383
+ name="key",
384
+ algorithm="RS256")
385
+ role = vault.identity.OidcRole("role",
386
+ name="role",
387
+ key=key.name)
388
+ role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
373
389
  key_name=key.name,
374
- allowed_client_id=role_oidc_role.client_id)
390
+ allowed_client_id=role.client_id)
375
391
  ```
376
392
  <!--End PulumiCodeChooser -->
377
393
 
@@ -189,8 +189,9 @@ class OidcScope(pulumi.CustomResource):
189
189
  import pulumi_vault as vault
190
190
 
191
191
  groups = vault.identity.OidcScope("groups",
192
- description="Vault OIDC Groups Scope",
193
- template="{\\"groups\\":{{identity.entity.groups.names}}}")
192
+ name="groups",
193
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
194
+ description="Vault OIDC Groups Scope")
194
195
  ```
195
196
  <!--End PulumiCodeChooser -->
196
197
 
@@ -230,8 +231,9 @@ class OidcScope(pulumi.CustomResource):
230
231
  import pulumi_vault as vault
231
232
 
232
233
  groups = vault.identity.OidcScope("groups",
233
- description="Vault OIDC Groups Scope",
234
- template="{\\"groups\\":{{identity.entity.groups.names}}}")
234
+ name="groups",
235
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
236
+ description="Vault OIDC Groups Scope")
235
237
  ```
236
238
  <!--End PulumiCodeChooser -->
237
239
 
@@ -782,10 +782,10 @@ class AuthBackend(pulumi.CustomResource):
782
782
  import pulumi_vault as vault
783
783
 
784
784
  example = vault.jwt.AuthBackend("example",
785
- bound_issuer="https://myco.auth0.com/",
786
785
  description="Demonstration of the Terraform JWT auth backend",
786
+ path="jwt",
787
787
  oidc_discovery_url="https://myco.auth0.com/",
788
- path="jwt")
788
+ bound_issuer="https://myco.auth0.com/")
789
789
  ```
790
790
  <!--End PulumiCodeChooser -->
791
791
 
@@ -797,16 +797,16 @@ class AuthBackend(pulumi.CustomResource):
797
797
  import pulumi_vault as vault
798
798
 
799
799
  example = vault.jwt.AuthBackend("example",
800
- bound_issuer="https://myco.auth0.com/",
801
800
  description="Demonstration of the Terraform JWT auth backend",
801
+ path="oidc",
802
+ type="oidc",
803
+ oidc_discovery_url="https://myco.auth0.com/",
802
804
  oidc_client_id="1234567890",
803
805
  oidc_client_secret="secret123456",
804
- oidc_discovery_url="https://myco.auth0.com/",
805
- path="oidc",
806
+ bound_issuer="https://myco.auth0.com/",
806
807
  tune=vault.jwt.AuthBackendTuneArgs(
807
808
  listing_visibility="unauth",
808
- ),
809
- type="oidc")
809
+ ))
810
810
  ```
811
811
  <!--End PulumiCodeChooser -->
812
812
 
@@ -821,13 +821,13 @@ class AuthBackend(pulumi.CustomResource):
821
821
  description="OIDC backend",
822
822
  oidc_discovery_url="https://accounts.google.com",
823
823
  path="oidc",
824
+ type="oidc",
824
825
  provider_config={
826
+ "provider": "gsuite",
825
827
  "fetch_groups": "true",
826
828
  "fetch_user_info": "true",
827
829
  "groups_recurse_max_depth": "1",
828
- "provider": "gsuite",
829
- },
830
- type="oidc")
830
+ })
831
831
  ```
832
832
  <!--End PulumiCodeChooser -->
833
833
 
@@ -895,10 +895,10 @@ class AuthBackend(pulumi.CustomResource):
895
895
  import pulumi_vault as vault
896
896
 
897
897
  example = vault.jwt.AuthBackend("example",
898
- bound_issuer="https://myco.auth0.com/",
899
898
  description="Demonstration of the Terraform JWT auth backend",
899
+ path="jwt",
900
900
  oidc_discovery_url="https://myco.auth0.com/",
901
- path="jwt")
901
+ bound_issuer="https://myco.auth0.com/")
902
902
  ```
903
903
  <!--End PulumiCodeChooser -->
904
904
 
@@ -910,16 +910,16 @@ class AuthBackend(pulumi.CustomResource):
910
910
  import pulumi_vault as vault
911
911
 
912
912
  example = vault.jwt.AuthBackend("example",
913
- bound_issuer="https://myco.auth0.com/",
914
913
  description="Demonstration of the Terraform JWT auth backend",
914
+ path="oidc",
915
+ type="oidc",
916
+ oidc_discovery_url="https://myco.auth0.com/",
915
917
  oidc_client_id="1234567890",
916
918
  oidc_client_secret="secret123456",
917
- oidc_discovery_url="https://myco.auth0.com/",
918
- path="oidc",
919
+ bound_issuer="https://myco.auth0.com/",
919
920
  tune=vault.jwt.AuthBackendTuneArgs(
920
921
  listing_visibility="unauth",
921
- ),
922
- type="oidc")
922
+ ))
923
923
  ```
924
924
  <!--End PulumiCodeChooser -->
925
925
 
@@ -934,13 +934,13 @@ class AuthBackend(pulumi.CustomResource):
934
934
  description="OIDC backend",
935
935
  oidc_discovery_url="https://accounts.google.com",
936
936
  path="oidc",
937
+ type="oidc",
937
938
  provider_config={
939
+ "provider": "gsuite",
938
940
  "fetch_groups": "true",
939
941
  "fetch_user_info": "true",
940
942
  "groups_recurse_max_depth": "1",
941
- "provider": "gsuite",
942
- },
943
- type="oidc")
943
+ })
944
944
  ```
945
945
  <!--End PulumiCodeChooser -->
946
946
 
@@ -494,17 +494,17 @@ class SecretBackend(pulumi.CustomResource):
494
494
  import pulumi_vault as vault
495
495
 
496
496
  default = vault.kmip.SecretBackend("default",
497
- default_tls_client_key_bits=4096,
498
- default_tls_client_key_type="rsa",
499
- default_tls_client_ttl=86400,
497
+ path="kmip",
500
498
  description="Vault KMIP backend",
501
499
  listen_addrs=[
502
500
  "127.0.0.1:5696",
503
501
  "127.0.0.1:8080",
504
502
  ],
505
- path="kmip",
503
+ tls_ca_key_type="rsa",
506
504
  tls_ca_key_bits=4096,
507
- tls_ca_key_type="rsa")
505
+ default_tls_client_key_type="rsa",
506
+ default_tls_client_key_bits=4096,
507
+ default_tls_client_ttl=86400)
508
508
  ```
509
509
  <!--End PulumiCodeChooser -->
510
510
 
@@ -556,17 +556,17 @@ class SecretBackend(pulumi.CustomResource):
556
556
  import pulumi_vault as vault
557
557
 
558
558
  default = vault.kmip.SecretBackend("default",
559
- default_tls_client_key_bits=4096,
560
- default_tls_client_key_type="rsa",
561
- default_tls_client_ttl=86400,
559
+ path="kmip",
562
560
  description="Vault KMIP backend",
563
561
  listen_addrs=[
564
562
  "127.0.0.1:5696",
565
563
  "127.0.0.1:8080",
566
564
  ],
567
- path="kmip",
565
+ tls_ca_key_type="rsa",
568
566
  tls_ca_key_bits=4096,
569
- tls_ca_key_type="rsa")
567
+ default_tls_client_key_type="rsa",
568
+ default_tls_client_key_bits=4096,
569
+ default_tls_client_ttl=86400)
570
570
  ```
571
571
  <!--End PulumiCodeChooser -->
572
572
 
@@ -183,17 +183,19 @@ def get_service_account_token(backend: Optional[str] = None,
183
183
  <!--Start PulumiCodeChooser -->
184
184
  ```python
185
185
  import pulumi
186
+ import pulumi_std as std
186
187
  import pulumi_vault as vault
187
188
 
188
189
  config = vault.kubernetes.SecretBackend("config",
189
190
  path="kubernetes",
190
191
  description="kubernetes secrets engine description",
191
192
  kubernetes_host="https://127.0.0.1:61233",
192
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
193
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
193
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
194
+ service_account_jwt=std.file(input="/path/to/token").result,
194
195
  disable_local_ca_jwt=False)
195
196
  role = vault.kubernetes.SecretBackendRole("role",
196
197
  backend=config.path,
198
+ name="service-account-name-role",
197
199
  allowed_kubernetes_namespaces=["*"],
198
200
  token_max_ttl=43200,
199
201
  token_default_ttl=21600,
@@ -270,17 +272,19 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
270
272
  <!--Start PulumiCodeChooser -->
271
273
  ```python
272
274
  import pulumi
275
+ import pulumi_std as std
273
276
  import pulumi_vault as vault
274
277
 
275
278
  config = vault.kubernetes.SecretBackend("config",
276
279
  path="kubernetes",
277
280
  description="kubernetes secrets engine description",
278
281
  kubernetes_host="https://127.0.0.1:61233",
279
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
280
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
282
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
283
+ service_account_jwt=std.file(input="/path/to/token").result,
281
284
  disable_local_ca_jwt=False)
282
285
  role = vault.kubernetes.SecretBackendRole("role",
283
286
  backend=config.path,
287
+ name="service-account-name-role",
284
288
  allowed_kubernetes_namespaces=["*"],
285
289
  token_max_ttl=43200,
286
290
  token_default_ttl=21600,
@@ -626,6 +626,7 @@ class SecretBackend(pulumi.CustomResource):
626
626
  <!--Start PulumiCodeChooser -->
627
627
  ```python
628
628
  import pulumi
629
+ import pulumi_std as std
629
630
  import pulumi_vault as vault
630
631
 
631
632
  config = vault.kubernetes.SecretBackend("config",
@@ -634,8 +635,8 @@ class SecretBackend(pulumi.CustomResource):
634
635
  default_lease_ttl_seconds=43200,
635
636
  max_lease_ttl_seconds=86400,
636
637
  kubernetes_host="https://127.0.0.1:61233",
637
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
638
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
638
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
639
+ service_account_jwt=std.file(input="/path/to/token").result,
639
640
  disable_local_ca_jwt=False)
640
641
  ```
641
642
  <!--End PulumiCodeChooser -->
@@ -690,6 +691,7 @@ class SecretBackend(pulumi.CustomResource):
690
691
  <!--Start PulumiCodeChooser -->
691
692
  ```python
692
693
  import pulumi
694
+ import pulumi_std as std
693
695
  import pulumi_vault as vault
694
696
 
695
697
  config = vault.kubernetes.SecretBackend("config",
@@ -698,8 +700,8 @@ class SecretBackend(pulumi.CustomResource):
698
700
  default_lease_ttl_seconds=43200,
699
701
  max_lease_ttl_seconds=86400,
700
702
  kubernetes_host="https://127.0.0.1:61233",
701
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
702
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
703
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
704
+ service_account_jwt=std.file(input="/path/to/token").result,
703
705
  disable_local_ca_jwt=False)
704
706
  ```
705
707
  <!--End PulumiCodeChooser -->
@@ -594,17 +594,19 @@ class SecretBackendRole(pulumi.CustomResource):
594
594
  <!--Start PulumiCodeChooser -->
595
595
  ```python
596
596
  import pulumi
597
+ import pulumi_std as std
597
598
  import pulumi_vault as vault
598
599
 
599
600
  config = vault.kubernetes.SecretBackend("config",
600
601
  path="kubernetes",
601
602
  description="kubernetes secrets engine description",
602
603
  kubernetes_host="https://127.0.0.1:61233",
603
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
604
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
604
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
605
+ service_account_jwt=std.file(input="/path/to/token").result,
605
606
  disable_local_ca_jwt=False)
606
607
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
607
608
  backend=config.path,
609
+ name="service-account-name-role",
608
610
  allowed_kubernetes_namespaces=["*"],
609
611
  token_max_ttl=43200,
610
612
  token_default_ttl=21600,
@@ -625,17 +627,19 @@ class SecretBackendRole(pulumi.CustomResource):
625
627
  <!--Start PulumiCodeChooser -->
626
628
  ```python
627
629
  import pulumi
630
+ import pulumi_std as std
628
631
  import pulumi_vault as vault
629
632
 
630
633
  config = vault.kubernetes.SecretBackend("config",
631
634
  path="kubernetes",
632
635
  description="kubernetes secrets engine description",
633
636
  kubernetes_host="https://127.0.0.1:61233",
634
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
635
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
637
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
638
+ service_account_jwt=std.file(input="/path/to/token").result,
636
639
  disable_local_ca_jwt=False)
637
640
  name_example = vault.kubernetes.SecretBackendRole("name-example",
638
641
  backend=config.path,
642
+ name="service-account-name-role",
639
643
  allowed_kubernetes_namespaces=["*"],
640
644
  token_max_ttl=43200,
641
645
  token_default_ttl=21600,
@@ -656,17 +660,19 @@ class SecretBackendRole(pulumi.CustomResource):
656
660
  <!--Start PulumiCodeChooser -->
657
661
  ```python
658
662
  import pulumi
663
+ import pulumi_std as std
659
664
  import pulumi_vault as vault
660
665
 
661
666
  config = vault.kubernetes.SecretBackend("config",
662
667
  path="kubernetes",
663
668
  description="kubernetes secrets engine description",
664
669
  kubernetes_host="https://127.0.0.1:61233",
665
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
666
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
670
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
671
+ service_account_jwt=std.file(input="/path/to/token").result,
667
672
  disable_local_ca_jwt=False)
668
673
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
669
674
  backend=config.path,
675
+ name="service-account-name-role",
670
676
  allowed_kubernetes_namespaces=["*"],
671
677
  token_max_ttl=43200,
672
678
  token_default_ttl=21600,
@@ -751,17 +757,19 @@ class SecretBackendRole(pulumi.CustomResource):
751
757
  <!--Start PulumiCodeChooser -->
752
758
  ```python
753
759
  import pulumi
760
+ import pulumi_std as std
754
761
  import pulumi_vault as vault
755
762
 
756
763
  config = vault.kubernetes.SecretBackend("config",
757
764
  path="kubernetes",
758
765
  description="kubernetes secrets engine description",
759
766
  kubernetes_host="https://127.0.0.1:61233",
760
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
761
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
767
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
768
+ service_account_jwt=std.file(input="/path/to/token").result,
762
769
  disable_local_ca_jwt=False)
763
770
  sa_example = vault.kubernetes.SecretBackendRole("sa-example",
764
771
  backend=config.path,
772
+ name="service-account-name-role",
765
773
  allowed_kubernetes_namespaces=["*"],
766
774
  token_max_ttl=43200,
767
775
  token_default_ttl=21600,
@@ -782,17 +790,19 @@ class SecretBackendRole(pulumi.CustomResource):
782
790
  <!--Start PulumiCodeChooser -->
783
791
  ```python
784
792
  import pulumi
793
+ import pulumi_std as std
785
794
  import pulumi_vault as vault
786
795
 
787
796
  config = vault.kubernetes.SecretBackend("config",
788
797
  path="kubernetes",
789
798
  description="kubernetes secrets engine description",
790
799
  kubernetes_host="https://127.0.0.1:61233",
791
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
792
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
800
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
801
+ service_account_jwt=std.file(input="/path/to/token").result,
793
802
  disable_local_ca_jwt=False)
794
803
  name_example = vault.kubernetes.SecretBackendRole("name-example",
795
804
  backend=config.path,
805
+ name="service-account-name-role",
796
806
  allowed_kubernetes_namespaces=["*"],
797
807
  token_max_ttl=43200,
798
808
  token_default_ttl=21600,
@@ -813,17 +823,19 @@ class SecretBackendRole(pulumi.CustomResource):
813
823
  <!--Start PulumiCodeChooser -->
814
824
  ```python
815
825
  import pulumi
826
+ import pulumi_std as std
816
827
  import pulumi_vault as vault
817
828
 
818
829
  config = vault.kubernetes.SecretBackend("config",
819
830
  path="kubernetes",
820
831
  description="kubernetes secrets engine description",
821
832
  kubernetes_host="https://127.0.0.1:61233",
822
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
823
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
833
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
834
+ service_account_jwt=std.file(input="/path/to/token").result,
824
835
  disable_local_ca_jwt=False)
825
836
  rules_example = vault.kubernetes.SecretBackendRole("rules-example",
826
837
  backend=config.path,
838
+ name="service-account-name-role",
827
839
  allowed_kubernetes_namespaces=["*"],
828
840
  token_max_ttl=43200,
829
841
  token_default_ttl=21600,
@@ -147,8 +147,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
147
147
  "version": "2",
148
148
  },
149
149
  description="KV Version 2 secret engine mount")
150
- aws_secret = vault.kv.SecretV2("awsSecret",
150
+ aws_secret = vault.kv.SecretV2("aws_secret",
151
151
  mount=kvv2.path,
152
+ name="aws_secret",
152
153
  data_json=json.dumps({
153
154
  "zip": "zap",
154
155
  "foo": "bar",
@@ -223,8 +224,9 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
223
224
  "version": "2",
224
225
  },
225
226
  description="KV Version 2 secret engine mount")
226
- aws_secret = vault.kv.SecretV2("awsSecret",
227
+ aws_secret = vault.kv.SecretV2("aws_secret",
227
228
  mount=kvv2.path,
229
+ name="aws_secret",
228
230
  data_json=json.dumps({
229
231
  "zip": "zap",
230
232
  "foo": "bar",
@@ -179,6 +179,37 @@ def get_secret_v2(mount: Optional[str] = None,
179
179
  """
180
180
  ## Example Usage
181
181
 
182
+ <!--Start PulumiCodeChooser -->
183
+ ```python
184
+ import pulumi
185
+ import json
186
+ import pulumi_vault as vault
187
+
188
+ kvv2 = vault.Mount("kvv2",
189
+ path="kvv2",
190
+ type="kv",
191
+ options={
192
+ "version": "2",
193
+ },
194
+ description="KV Version 2 secret engine mount")
195
+ example_secret_v2 = vault.kv.SecretV2("example",
196
+ mount=kvv2.path,
197
+ name="secret",
198
+ cas=1,
199
+ delete_all_versions=True,
200
+ data_json=json.dumps({
201
+ "zip": "zap",
202
+ "foo": "bar",
203
+ }))
204
+ example = vault.kv.get_secret_v2_output(mount=kvv2.path,
205
+ name=example_secret_v2.name)
206
+ ```
207
+ <!--End PulumiCodeChooser -->
208
+
209
+ ## Required Vault Capabilities
210
+
211
+ Use of this resource requires the `read` capability on the given path.
212
+
182
213
 
183
214
  :param str mount: Path where KV-V2 engine is mounted.
184
215
  :param str name: Full name of the secret. For a nested secret
@@ -223,6 +254,37 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
223
254
  """
224
255
  ## Example Usage
225
256
 
257
+ <!--Start PulumiCodeChooser -->
258
+ ```python
259
+ import pulumi
260
+ import json
261
+ import pulumi_vault as vault
262
+
263
+ kvv2 = vault.Mount("kvv2",
264
+ path="kvv2",
265
+ type="kv",
266
+ options={
267
+ "version": "2",
268
+ },
269
+ description="KV Version 2 secret engine mount")
270
+ example_secret_v2 = vault.kv.SecretV2("example",
271
+ mount=kvv2.path,
272
+ name="secret",
273
+ cas=1,
274
+ delete_all_versions=True,
275
+ data_json=json.dumps({
276
+ "zip": "zap",
277
+ "foo": "bar",
278
+ }))
279
+ example = vault.kv.get_secret_v2_output(mount=kvv2.path,
280
+ name=example_secret_v2.name)
281
+ ```
282
+ <!--End PulumiCodeChooser -->
283
+
284
+ ## Required Vault Capabilities
285
+
286
+ Use of this resource requires the `read` capability on the given path.
287
+
226
288
 
227
289
  :param str mount: Path where KV-V2 engine is mounted.
228
290
  :param str name: Full name of the secret. For a nested secret