pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -93,12 +93,12 @@ def get_secrets_list(namespace: Optional[str] = None,
93
93
  "version": "1",
94
94
  },
95
95
  description="KV Version 1 secret engine mount")
96
- aws_secret = vault.kv.Secret("awsSecret",
96
+ aws_secret = vault.kv.Secret("aws_secret",
97
97
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
98
98
  data_json=json.dumps({
99
99
  "zip": "zap",
100
100
  }))
101
- azure_secret = vault.kv.Secret("azureSecret",
101
+ azure_secret = vault.kv.Secret("azure_secret",
102
102
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
103
103
  data_json=json.dumps({
104
104
  "foo": "bar",
@@ -151,12 +151,12 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
151
151
  "version": "1",
152
152
  },
153
153
  description="KV Version 1 secret engine mount")
154
- aws_secret = vault.kv.Secret("awsSecret",
154
+ aws_secret = vault.kv.Secret("aws_secret",
155
155
  path=kvv1.path.apply(lambda path: f"{path}/aws-secret"),
156
156
  data_json=json.dumps({
157
157
  "zip": "zap",
158
158
  }))
159
- azure_secret = vault.kv.Secret("azureSecret",
159
+ azure_secret = vault.kv.Secret("azure_secret",
160
160
  path=kvv1.path.apply(lambda path: f"{path}/azure-secret"),
161
161
  data_json=json.dumps({
162
162
  "foo": "bar",
@@ -115,24 +115,27 @@ def get_secrets_list_v2(mount: Optional[str] = None,
115
115
  "version": "2",
116
116
  },
117
117
  description="KV Version 2 secret engine mount")
118
- aws_secret = vault.kv.SecretV2("awsSecret",
118
+ aws_secret = vault.kv.SecretV2("aws_secret",
119
119
  mount=kvv2.path,
120
+ name="aws_secret",
120
121
  data_json=json.dumps({
121
122
  "zip": "zap",
122
123
  }))
123
- azure_secret = vault.kv.SecretV2("azureSecret",
124
+ azure_secret = vault.kv.SecretV2("azure_secret",
124
125
  mount=kvv2.path,
126
+ name="azure_secret",
125
127
  data_json=json.dumps({
126
128
  "foo": "bar",
127
129
  }))
128
- nested_secret = vault.kv.SecretV2("nestedSecret",
130
+ nested_secret = vault.kv.SecretV2("nested_secret",
129
131
  mount=kvv2.path,
132
+ name=azure_secret.name.apply(lambda name: f"{name}/dev"),
130
133
  data_json=json.dumps({
131
134
  "password": "test",
132
135
  }))
133
136
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
134
137
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
135
- name=vault_kv_secret_v2["test_2"]["name"]))
138
+ name=test2["name"]))
136
139
  ```
137
140
  <!--End PulumiCodeChooser -->
138
141
 
@@ -188,24 +191,27 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
188
191
  "version": "2",
189
192
  },
190
193
  description="KV Version 2 secret engine mount")
191
- aws_secret = vault.kv.SecretV2("awsSecret",
194
+ aws_secret = vault.kv.SecretV2("aws_secret",
192
195
  mount=kvv2.path,
196
+ name="aws_secret",
193
197
  data_json=json.dumps({
194
198
  "zip": "zap",
195
199
  }))
196
- azure_secret = vault.kv.SecretV2("azureSecret",
200
+ azure_secret = vault.kv.SecretV2("azure_secret",
197
201
  mount=kvv2.path,
202
+ name="azure_secret",
198
203
  data_json=json.dumps({
199
204
  "foo": "bar",
200
205
  }))
201
- nested_secret = vault.kv.SecretV2("nestedSecret",
206
+ nested_secret = vault.kv.SecretV2("nested_secret",
202
207
  mount=kvv2.path,
208
+ name=azure_secret.name.apply(lambda name: f"{name}/dev"),
203
209
  data_json=json.dumps({
204
210
  "password": "test",
205
211
  }))
206
212
  secrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)
207
213
  nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
208
- name=vault_kv_secret_v2["test_2"]["name"]))
214
+ name=test2["name"]))
209
215
  ```
210
216
  <!--End PulumiCodeChooser -->
211
217
 
@@ -463,6 +463,7 @@ class SecretV2(pulumi.CustomResource):
463
463
  description="KV Version 2 secret engine mount")
464
464
  example = vault.kv.SecretV2("example",
465
465
  mount=kvv2.path,
466
+ name="secret",
466
467
  cas=1,
467
468
  delete_all_versions=True,
468
469
  data_json=json.dumps({
@@ -561,6 +562,7 @@ class SecretV2(pulumi.CustomResource):
561
562
  description="KV Version 2 secret engine mount")
562
563
  example = vault.kv.SecretV2("example",
563
564
  mount=kvv2.path,
565
+ name="secret",
564
566
  cas=1,
565
567
  delete_all_versions=True,
566
568
  data_json=json.dumps({
@@ -1336,14 +1336,14 @@ class AuthBackend(pulumi.CustomResource):
1336
1336
  import pulumi_vault as vault
1337
1337
 
1338
1338
  ldap = vault.ldap.AuthBackend("ldap",
1339
- discoverdn=False,
1340
- groupdn="OU=Groups,DC=example,DC=org",
1341
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1342
1339
  path="ldap",
1343
- upndomain="EXAMPLE.ORG",
1344
1340
  url="ldaps://dc-01.example.org",
1341
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1345
1342
  userattr="sAMAccountName",
1346
- userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1343
+ upndomain="EXAMPLE.ORG",
1344
+ discoverdn=False,
1345
+ groupdn="OU=Groups,DC=example,DC=org",
1346
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1347
1347
  ```
1348
1348
  <!--End PulumiCodeChooser -->
1349
1349
 
@@ -1428,14 +1428,14 @@ class AuthBackend(pulumi.CustomResource):
1428
1428
  import pulumi_vault as vault
1429
1429
 
1430
1430
  ldap = vault.ldap.AuthBackend("ldap",
1431
- discoverdn=False,
1432
- groupdn="OU=Groups,DC=example,DC=org",
1433
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1434
1431
  path="ldap",
1435
- upndomain="EXAMPLE.ORG",
1436
1432
  url="ldaps://dc-01.example.org",
1433
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1437
1434
  userattr="sAMAccountName",
1438
- userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1435
+ upndomain="EXAMPLE.ORG",
1436
+ discoverdn=False,
1437
+ groupdn="OU=Groups,DC=example,DC=org",
1438
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1439
1439
  ```
1440
1440
  <!--End PulumiCodeChooser -->
1441
1441
 
@@ -1057,11 +1057,11 @@ class SecretBackend(pulumi.CustomResource):
1057
1057
  import pulumi_vault as vault
1058
1058
 
1059
1059
  config = vault.ldap.SecretBackend("config",
1060
+ path="my-custom-ldap",
1060
1061
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1061
1062
  bindpass="SuperSecretPassw0rd",
1062
- insecure_tls=True,
1063
- path="my-custom-ldap",
1064
1063
  url="ldaps://localhost",
1064
+ insecure_tls=True,
1065
1065
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1066
1066
  ```
1067
1067
  <!--End PulumiCodeChooser -->
@@ -1132,11 +1132,11 @@ class SecretBackend(pulumi.CustomResource):
1132
1132
  import pulumi_vault as vault
1133
1133
 
1134
1134
  config = vault.ldap.SecretBackend("config",
1135
+ path="my-custom-ldap",
1135
1136
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1136
1137
  bindpass="SuperSecretPassw0rd",
1137
- insecure_tls=True,
1138
- path="my-custom-ldap",
1139
1138
  url="ldaps://localhost",
1139
+ insecure_tls=True,
1140
1140
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1141
1141
  ```
1142
1142
  <!--End PulumiCodeChooser -->
@@ -312,6 +312,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
312
312
  userdn="CN=Users,DC=corp,DC=example,DC=net")
313
313
  qa = vault.ldap.SecretBackendLibrarySet("qa",
314
314
  mount=config.path,
315
+ name="qa",
315
316
  service_account_names=[
316
317
  "Bob",
317
318
  "Mary",
@@ -371,6 +372,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
371
372
  userdn="CN=Users,DC=corp,DC=example,DC=net")
372
373
  qa = vault.ldap.SecretBackendLibrarySet("qa",
373
374
  mount=config.path,
375
+ name="qa",
374
376
  service_account_names=[
375
377
  "Bob",
376
378
  "Mary",
pulumi_vault/mfa_duo.py CHANGED
@@ -336,7 +336,8 @@ class MfaDuo(pulumi.CustomResource):
336
336
  userpass = vault.AuthBackend("userpass",
337
337
  type="userpass",
338
338
  path="userpass")
339
- my_duo = vault.MfaDuo("myDuo",
339
+ my_duo = vault.MfaDuo("my_duo",
340
+ name="my_duo",
340
341
  mount_accessor=userpass.accessor,
341
342
  secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
342
343
  integration_key="BIACEUEAXI20BNWTEYXT",
@@ -391,7 +392,8 @@ class MfaDuo(pulumi.CustomResource):
391
392
  userpass = vault.AuthBackend("userpass",
392
393
  type="userpass",
393
394
  path="userpass")
394
- my_duo = vault.MfaDuo("myDuo",
395
+ my_duo = vault.MfaDuo("my_duo",
396
+ name="my_duo",
395
397
  mount_accessor=userpass.accessor,
396
398
  secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
397
399
  integration_key="BIACEUEAXI20BNWTEYXT",
pulumi_vault/mfa_okta.py CHANGED
@@ -357,7 +357,8 @@ class MfaOkta(pulumi.CustomResource):
357
357
  userpass = vault.AuthBackend("userpass",
358
358
  type="userpass",
359
359
  path="userpass")
360
- my_okta = vault.MfaOkta("myOkta",
360
+ my_okta = vault.MfaOkta("my_okta",
361
+ name="my_okta",
361
362
  mount_accessor=userpass.accessor,
362
363
  username_format="user@example.com",
363
364
  org_name="hashicorp",
@@ -417,7 +418,8 @@ class MfaOkta(pulumi.CustomResource):
417
418
  userpass = vault.AuthBackend("userpass",
418
419
  type="userpass",
419
420
  path="userpass")
420
- my_okta = vault.MfaOkta("myOkta",
421
+ my_okta = vault.MfaOkta("my_okta",
422
+ name="my_okta",
421
423
  mount_accessor=userpass.accessor,
422
424
  username_format="user@example.com",
423
425
  org_name="hashicorp",
@@ -369,7 +369,8 @@ class MfaPingid(pulumi.CustomResource):
369
369
  userpass = vault.AuthBackend("userpass",
370
370
  type="userpass",
371
371
  path="userpass")
372
- my_pingid = vault.MfaPingid("myPingid",
372
+ my_pingid = vault.MfaPingid("my_pingid",
373
+ name="my_pingid",
373
374
  mount_accessor=userpass.accessor,
374
375
  username_format="user@example.com",
375
376
  settings_file_base64=settings_file)
@@ -426,7 +427,8 @@ class MfaPingid(pulumi.CustomResource):
426
427
  userpass = vault.AuthBackend("userpass",
427
428
  type="userpass",
428
429
  path="userpass")
429
- my_pingid = vault.MfaPingid("myPingid",
430
+ my_pingid = vault.MfaPingid("my_pingid",
431
+ name="my_pingid",
430
432
  mount_accessor=userpass.accessor,
431
433
  username_format="user@example.com",
432
434
  settings_file_base64=settings_file)
pulumi_vault/mfa_totp.py CHANGED
@@ -365,12 +365,13 @@ class MfaTotp(pulumi.CustomResource):
365
365
  import pulumi
366
366
  import pulumi_vault as vault
367
367
 
368
- my_totp = vault.MfaTotp("myTotp",
368
+ my_totp = vault.MfaTotp("my_totp",
369
+ name="my_totp",
370
+ issuer="hashicorp",
371
+ period=60,
369
372
  algorithm="SHA256",
370
373
  digits=8,
371
- issuer="hashicorp",
372
- key_size=20,
373
- period=60)
374
+ key_size=20)
374
375
  ```
375
376
  <!--End PulumiCodeChooser -->
376
377
 
@@ -418,12 +419,13 @@ class MfaTotp(pulumi.CustomResource):
418
419
  import pulumi
419
420
  import pulumi_vault as vault
420
421
 
421
- my_totp = vault.MfaTotp("myTotp",
422
+ my_totp = vault.MfaTotp("my_totp",
423
+ name="my_totp",
424
+ issuer="hashicorp",
425
+ period=60,
422
426
  algorithm="SHA256",
423
427
  digits=8,
424
- issuer="hashicorp",
425
- key_size=20,
426
- period=60)
428
+ key_size=20)
427
429
  ```
428
430
  <!--End PulumiCodeChooser -->
429
431
 
@@ -432,6 +432,7 @@ class SecretRole(pulumi.CustomResource):
432
432
  public_key="publicKey")
433
433
  role = vault.mongodbatlas.SecretRole("role",
434
434
  mount=mongo.path,
435
+ name="tf-test-role",
435
436
  organization_id="7cf5a45a9ccf6400e60981b7",
436
437
  project_id="5cf5a45a9ccf6400e60981b6",
437
438
  roles=["ORG_READ_ONLY"],
@@ -495,6 +496,7 @@ class SecretRole(pulumi.CustomResource):
495
496
  public_key="publicKey")
496
497
  role = vault.mongodbatlas.SecretRole("role",
497
498
  mount=mongo.path,
499
+ name="tf-test-role",
498
500
  organization_id="7cf5a45a9ccf6400e60981b7",
499
501
  project_id="5cf5a45a9ccf6400e60981b6",
500
502
  roles=["ORG_READ_ONLY"],
pulumi_vault/mount.py CHANGED
@@ -499,9 +499,9 @@ class Mount(pulumi.CustomResource):
499
499
  import pulumi_vault as vault
500
500
 
501
501
  example = vault.Mount("example",
502
- description="This is an example mount",
503
502
  path="dummy",
504
- type="generic")
503
+ type="generic",
504
+ description="This is an example mount")
505
505
  ```
506
506
  <!--End PulumiCodeChooser -->
507
507
 
@@ -511,13 +511,13 @@ class Mount(pulumi.CustomResource):
511
511
  import pulumi_vault as vault
512
512
 
513
513
  kvv2_example = vault.Mount("kvv2-example",
514
- description="This is an example KV Version 2 secret engine mount",
514
+ path="version2-example",
515
+ type="kv-v2",
515
516
  options={
516
- "type": "kv-v2",
517
517
  "version": "2",
518
+ "type": "kv-v2",
518
519
  },
519
- path="version2-example",
520
- type="kv-v2")
520
+ description="This is an example KV Version 2 secret engine mount")
521
521
  ```
522
522
  <!--End PulumiCodeChooser -->
523
523
 
@@ -527,12 +527,12 @@ class Mount(pulumi.CustomResource):
527
527
  import pulumi_vault as vault
528
528
 
529
529
  transit_example = vault.Mount("transit-example",
530
+ path="transit-example",
531
+ type="transit",
530
532
  description="This is an example transit secret engine mount",
531
533
  options={
532
534
  "convergent_encryption": False,
533
- },
534
- path="transit-example",
535
- type="transit")
535
+ })
536
536
  ```
537
537
  <!--End PulumiCodeChooser -->
538
538
 
@@ -542,11 +542,11 @@ class Mount(pulumi.CustomResource):
542
542
  import pulumi_vault as vault
543
543
 
544
544
  pki_example = vault.Mount("pki-example",
545
- default_lease_ttl_seconds=3600,
546
- description="This is an example PKI mount",
547
- max_lease_ttl_seconds=86400,
548
545
  path="pki-example",
549
- type="pki")
546
+ type="pki",
547
+ description="This is an example PKI mount",
548
+ default_lease_ttl_seconds=3600,
549
+ max_lease_ttl_seconds=86400)
550
550
  ```
551
551
  <!--End PulumiCodeChooser -->
552
552
 
@@ -594,9 +594,9 @@ class Mount(pulumi.CustomResource):
594
594
  import pulumi_vault as vault
595
595
 
596
596
  example = vault.Mount("example",
597
- description="This is an example mount",
598
597
  path="dummy",
599
- type="generic")
598
+ type="generic",
599
+ description="This is an example mount")
600
600
  ```
601
601
  <!--End PulumiCodeChooser -->
602
602
 
@@ -606,13 +606,13 @@ class Mount(pulumi.CustomResource):
606
606
  import pulumi_vault as vault
607
607
 
608
608
  kvv2_example = vault.Mount("kvv2-example",
609
- description="This is an example KV Version 2 secret engine mount",
609
+ path="version2-example",
610
+ type="kv-v2",
610
611
  options={
611
- "type": "kv-v2",
612
612
  "version": "2",
613
+ "type": "kv-v2",
613
614
  },
614
- path="version2-example",
615
- type="kv-v2")
615
+ description="This is an example KV Version 2 secret engine mount")
616
616
  ```
617
617
  <!--End PulumiCodeChooser -->
618
618
 
@@ -622,12 +622,12 @@ class Mount(pulumi.CustomResource):
622
622
  import pulumi_vault as vault
623
623
 
624
624
  transit_example = vault.Mount("transit-example",
625
+ path="transit-example",
626
+ type="transit",
625
627
  description="This is an example transit secret engine mount",
626
628
  options={
627
629
  "convergent_encryption": False,
628
- },
629
- path="transit-example",
630
- type="transit")
630
+ })
631
631
  ```
632
632
  <!--End PulumiCodeChooser -->
633
633
 
@@ -637,11 +637,11 @@ class Mount(pulumi.CustomResource):
637
637
  import pulumi_vault as vault
638
638
 
639
639
  pki_example = vault.Mount("pki-example",
640
- default_lease_ttl_seconds=3600,
641
- description="This is an example PKI mount",
642
- max_lease_ttl_seconds=86400,
643
640
  path="pki-example",
644
- type="pki")
641
+ type="pki",
642
+ description="This is an example PKI mount",
643
+ default_lease_ttl_seconds=3600,
644
+ max_lease_ttl_seconds=86400)
645
645
  ```
646
646
  <!--End PulumiCodeChooser -->
647
647
 
@@ -577,12 +577,12 @@ class NomadSecretBackend(pulumi.CustomResource):
577
577
  import pulumi_vault as vault
578
578
 
579
579
  config = vault.NomadSecretBackend("config",
580
- address="https://127.0.0.1:4646",
581
580
  backend="nomad",
582
- default_lease_ttl_seconds=3600,
583
581
  description="test description",
582
+ default_lease_ttl_seconds=3600,
584
583
  max_lease_ttl_seconds=7200,
585
584
  max_ttl=240,
585
+ address="https://127.0.0.1:4646",
586
586
  token="ae20ceaa-...",
587
587
  ttl=120)
588
588
  ```
@@ -639,12 +639,12 @@ class NomadSecretBackend(pulumi.CustomResource):
639
639
  import pulumi_vault as vault
640
640
 
641
641
  config = vault.NomadSecretBackend("config",
642
- address="https://127.0.0.1:4646",
643
642
  backend="nomad",
644
- default_lease_ttl_seconds=3600,
645
643
  description="test description",
644
+ default_lease_ttl_seconds=3600,
646
645
  max_lease_ttl_seconds=7200,
647
646
  max_ttl=240,
647
+ address="https://127.0.0.1:4646",
648
648
  token="ae20ceaa-...",
649
649
  ttl=120)
650
650
  ```
@@ -495,6 +495,8 @@ class AuthBackend(pulumi.CustomResource):
495
495
 
496
496
  example = vault.okta.AuthBackend("example",
497
497
  description="Demonstration of the Terraform Okta auth backend",
498
+ organization="example",
499
+ token="something that should be kept secret",
498
500
  groups=[vault.okta.AuthBackendGroupArgs(
499
501
  group_name="foo",
500
502
  policies=[
@@ -502,11 +504,9 @@ class AuthBackend(pulumi.CustomResource):
502
504
  "two",
503
505
  ],
504
506
  )],
505
- organization="example",
506
- token="something that should be kept secret",
507
507
  users=[vault.okta.AuthBackendUserArgs(
508
- groups=["foo"],
509
508
  username="bar",
509
+ groups=["foo"],
510
510
  )])
511
511
  ```
512
512
  <!--End PulumiCodeChooser -->
@@ -562,6 +562,8 @@ class AuthBackend(pulumi.CustomResource):
562
562
 
563
563
  example = vault.okta.AuthBackend("example",
564
564
  description="Demonstration of the Terraform Okta auth backend",
565
+ organization="example",
566
+ token="something that should be kept secret",
565
567
  groups=[vault.okta.AuthBackendGroupArgs(
566
568
  group_name="foo",
567
569
  policies=[
@@ -569,11 +571,9 @@ class AuthBackend(pulumi.CustomResource):
569
571
  "two",
570
572
  ],
571
573
  )],
572
- organization="example",
573
- token="something that should be kept secret",
574
574
  users=[vault.okta.AuthBackendUserArgs(
575
- groups=["foo"],
576
575
  username="bar",
576
+ groups=["foo"],
577
577
  )])
578
578
  ```
579
579
  <!--End PulumiCodeChooser -->
@@ -155,11 +155,12 @@ class PasswordPolicy(pulumi.CustomResource):
155
155
  import pulumi
156
156
  import pulumi_vault as vault
157
157
 
158
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
158
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
159
+ name="alphanumeric",
160
+ policy=\"\"\" length = 20
159
161
  rule "charset" {
160
162
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
161
163
  }
162
-
163
164
  \"\"\")
164
165
  ```
165
166
  <!--End PulumiCodeChooser -->
@@ -199,11 +200,12 @@ class PasswordPolicy(pulumi.CustomResource):
199
200
  import pulumi
200
201
  import pulumi_vault as vault
201
202
 
202
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
203
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
204
+ name="alphanumeric",
205
+ policy=\"\"\" length = 20
203
206
  rule "charset" {
204
207
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
205
208
  }
206
-
207
209
  \"\"\")
208
210
  ```
209
211
  <!--End PulumiCodeChooser -->
@@ -175,6 +175,26 @@ def get_backend_issuer(backend: Optional[str] = None,
175
175
  """
176
176
  ## Example Usage
177
177
 
178
+ <!--Start PulumiCodeChooser -->
179
+ ```python
180
+ import pulumi
181
+ import pulumi_vault as vault
182
+
183
+ pki = vault.Mount("pki",
184
+ path="pki",
185
+ type="pki",
186
+ description="PKI secret engine mount")
187
+ root = vault.pki_secret.SecretBackendRootCert("root",
188
+ backend=pki.path,
189
+ type="internal",
190
+ common_name="example",
191
+ ttl="86400",
192
+ issuer_name="example")
193
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
194
+ issuer_ref=issuer_id))
195
+ ```
196
+ <!--End PulumiCodeChooser -->
197
+
178
198
 
179
199
  :param str backend: The path to the PKI secret backend to
180
200
  read the issuer from, with no leading or trailing `/`s.
@@ -214,6 +234,26 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
214
234
  """
215
235
  ## Example Usage
216
236
 
237
+ <!--Start PulumiCodeChooser -->
238
+ ```python
239
+ import pulumi
240
+ import pulumi_vault as vault
241
+
242
+ pki = vault.Mount("pki",
243
+ path="pki",
244
+ type="pki",
245
+ description="PKI secret engine mount")
246
+ root = vault.pki_secret.SecretBackendRootCert("root",
247
+ backend=pki.path,
248
+ type="internal",
249
+ common_name="example",
250
+ ttl="86400",
251
+ issuer_name="example")
252
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
253
+ issuer_ref=issuer_id))
254
+ ```
255
+ <!--End PulumiCodeChooser -->
256
+
217
257
 
218
258
  :param str backend: The path to the PKI secret backend to
219
259
  read the issuer from, with no leading or trailing `/`s.
@@ -129,7 +129,7 @@ def get_backend_key(backend: Optional[str] = None,
129
129
  key_name="example",
130
130
  key_type="rsa",
131
131
  key_bits=4096)
132
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
132
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
133
133
  key_ref=key_id))
134
134
  ```
135
135
  <!--End PulumiCodeChooser -->
@@ -183,7 +183,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
183
183
  key_name="example",
184
184
  key_type="rsa",
185
185
  key_bits=4096)
186
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
186
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
187
187
  key_ref=key_id))
188
188
  ```
189
189
  <!--End PulumiCodeChooser -->
@@ -741,9 +741,10 @@ class SecretBackendCert(pulumi.CustomResource):
741
741
  import pulumi_vault as vault
742
742
 
743
743
  app = vault.pki_secret.SecretBackendCert("app",
744
- backend=vault_mount["intermediate"]["path"],
744
+ backend=intermediate["path"],
745
+ name=test["name"],
745
746
  common_name="app.my.domain",
746
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
747
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
747
748
  ```
748
749
  <!--End PulumiCodeChooser -->
749
750
 
@@ -785,9 +786,10 @@ class SecretBackendCert(pulumi.CustomResource):
785
786
  import pulumi_vault as vault
786
787
 
787
788
  app = vault.pki_secret.SecretBackendCert("app",
788
- backend=vault_mount["intermediate"]["path"],
789
+ backend=intermediate["path"],
790
+ name=test["name"],
789
791
  common_name="app.my.domain",
790
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
792
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
791
793
  ```
792
794
  <!--End PulumiCodeChooser -->
793
795