pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -151,7 +151,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
151
151
  import pulumi_vault as vault
152
152
 
153
153
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
154
- backend=vault_mount["intermediate"]["path"],
154
+ backend=intermediate_vault_mount["path"],
155
155
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
156
156
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
157
157
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -201,7 +201,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
201
201
  MUR4qFxeUOW/GJGccMUd
202
202
  -----END CERTIFICATE-----
203
203
  \"\"\",
204
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
204
+ opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
205
205
  ```
206
206
  <!--End PulumiCodeChooser -->
207
207
 
@@ -229,7 +229,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
229
229
  import pulumi_vault as vault
230
230
 
231
231
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
232
- backend=vault_mount["intermediate"]["path"],
232
+ backend=intermediate_vault_mount["path"],
233
233
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
234
234
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
235
235
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -279,7 +279,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
279
279
  MUR4qFxeUOW/GJGccMUd
280
280
  -----END CERTIFICATE-----
281
281
  \"\"\",
282
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
282
+ opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
283
283
  ```
284
284
  <!--End PulumiCodeChooser -->
285
285
 
@@ -500,7 +500,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
500
500
  type="pki",
501
501
  default_lease_ttl_seconds=3600,
502
502
  max_lease_ttl_seconds=86400)
503
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
503
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
504
504
  backend=pki.path,
505
505
  expiry="72h",
506
506
  disable=False)
@@ -550,7 +550,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
550
550
  type="pki",
551
551
  default_lease_ttl_seconds=3600,
552
552
  max_lease_ttl_seconds=86400)
553
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
553
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
554
554
  backend=pki.path,
555
555
  expiry="72h",
556
556
  disable=False)
@@ -968,10 +968,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
968
968
  import pulumi_vault as vault
969
969
 
970
970
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
971
- backend=vault_mount["pki"]["path"],
971
+ backend=pki["path"],
972
972
  type="internal",
973
973
  common_name="app.my.domain",
974
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
974
+ opts=pulumi.ResourceOptions(depends_on=[pki]))
975
975
  ```
976
976
  <!--End PulumiCodeChooser -->
977
977
 
@@ -1028,10 +1028,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1028
1028
  import pulumi_vault as vault
1029
1029
 
1030
1030
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
1031
- backend=vault_mount["pki"]["path"],
1031
+ backend=pki["path"],
1032
1032
  type="internal",
1033
1033
  common_name="app.my.domain",
1034
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1034
+ opts=pulumi.ResourceOptions(depends_on=[pki]))
1035
1035
  ```
1036
1036
  <!--End PulumiCodeChooser -->
1037
1037
 
@@ -204,7 +204,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
204
204
  description="intermediate",
205
205
  default_lease_ttl_seconds=86400,
206
206
  max_lease_ttl_seconds=86400)
207
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
207
+ example = vault.pki_secret.SecretBackendRootCert("example",
208
208
  backend=root.path,
209
209
  type="internal",
210
210
  common_name="RootOrg Root CA",
@@ -219,11 +219,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
219
219
  country="US",
220
220
  locality="San Francisco",
221
221
  province="CA")
222
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
222
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
223
223
  backend=intermediate.path,
224
- type=example_secret_backend_root_cert.type,
224
+ type=example.type,
225
225
  common_name="SubOrg Intermediate CA")
226
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
226
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
227
227
  backend=root.path,
228
228
  csr=example_secret_backend_intermediate_cert_request.csr,
229
229
  common_name="SubOrg Intermediate CA",
@@ -234,7 +234,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
234
234
  locality="San Francisco",
235
235
  province="CA",
236
236
  revoke=True)
237
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
237
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
238
238
  backend=intermediate.path,
239
239
  certificate=example_secret_backend_root_sign_intermediate.certificate)
240
240
  ```
@@ -277,7 +277,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
277
277
  description="intermediate",
278
278
  default_lease_ttl_seconds=86400,
279
279
  max_lease_ttl_seconds=86400)
280
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
280
+ example = vault.pki_secret.SecretBackendRootCert("example",
281
281
  backend=root.path,
282
282
  type="internal",
283
283
  common_name="RootOrg Root CA",
@@ -292,11 +292,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
292
292
  country="US",
293
293
  locality="San Francisco",
294
294
  province="CA")
295
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
295
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
296
296
  backend=intermediate.path,
297
- type=example_secret_backend_root_cert.type,
297
+ type=example.type,
298
298
  common_name="SubOrg Intermediate CA")
299
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
299
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
300
300
  backend=root.path,
301
301
  csr=example_secret_backend_intermediate_cert_request.csr,
302
302
  common_name="SubOrg Intermediate CA",
@@ -307,7 +307,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
307
307
  locality="San Francisco",
308
308
  province="CA",
309
309
  revoke=True)
310
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
310
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
311
311
  backend=intermediate.path,
312
312
  certificate=example_secret_backend_root_sign_intermediate.certificate)
313
313
  ```
@@ -1605,6 +1605,7 @@ class SecretBackendRole(pulumi.CustomResource):
1605
1605
  max_lease_ttl_seconds=86400)
1606
1606
  role = vault.pki_secret.SecretBackendRole("role",
1607
1607
  backend=pki.path,
1608
+ name="my_role",
1608
1609
  ttl="3600",
1609
1610
  allow_ip_sans=True,
1610
1611
  key_type="rsa",
@@ -1706,6 +1707,7 @@ class SecretBackendRole(pulumi.CustomResource):
1706
1707
  max_lease_ttl_seconds=86400)
1707
1708
  role = vault.pki_secret.SecretBackendRole("role",
1708
1709
  backend=pki.path,
1710
+ name="my_role",
1709
1711
  ttl="3600",
1710
1712
  allow_ip_sans=True,
1711
1713
  key_type="rsa",
@@ -1079,7 +1079,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1079
1079
  import pulumi_vault as vault
1080
1080
 
1081
1081
  test = vault.pki_secret.SecretBackendRootCert("test",
1082
- backend=vault_mount["pki"]["path"],
1082
+ backend=pki["path"],
1083
1083
  type="internal",
1084
1084
  common_name="Root CA",
1085
1085
  ttl="315360000",
@@ -1090,7 +1090,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1090
1090
  exclude_cn_from_sans=True,
1091
1091
  ou="My OU",
1092
1092
  organization="My organization",
1093
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1093
+ opts=pulumi.ResourceOptions(depends_on=[pki]))
1094
1094
  ```
1095
1095
  <!--End PulumiCodeChooser -->
1096
1096
 
@@ -1149,7 +1149,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1149
1149
  import pulumi_vault as vault
1150
1150
 
1151
1151
  test = vault.pki_secret.SecretBackendRootCert("test",
1152
- backend=vault_mount["pki"]["path"],
1152
+ backend=pki["path"],
1153
1153
  type="internal",
1154
1154
  common_name="Root CA",
1155
1155
  ttl="315360000",
@@ -1160,7 +1160,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1160
1160
  exclude_cn_from_sans=True,
1161
1161
  ou="My OU",
1162
1162
  organization="My organization",
1163
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1163
+ opts=pulumi.ResourceOptions(depends_on=[pki]))
1164
1164
  ```
1165
1165
  <!--End PulumiCodeChooser -->
1166
1166
 
@@ -906,13 +906,13 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
906
906
  import pulumi_vault as vault
907
907
 
908
908
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
909
- backend=vault_mount["root"]["path"],
910
- csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
909
+ backend=root_vault_mount["path"],
910
+ csr=intermediate["csr"],
911
911
  common_name="Intermediate CA",
912
912
  exclude_cn_from_sans=True,
913
913
  ou="My OU",
914
914
  organization="My organization",
915
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
915
+ opts=pulumi.ResourceOptions(depends_on=[intermediate]))
916
916
  ```
917
917
  <!--End PulumiCodeChooser -->
918
918
 
@@ -965,13 +965,13 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
965
965
  import pulumi_vault as vault
966
966
 
967
967
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
968
- backend=vault_mount["root"]["path"],
969
- csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
968
+ backend=root_vault_mount["path"],
969
+ csr=intermediate["csr"],
970
970
  common_name="Intermediate CA",
971
971
  exclude_cn_from_sans=True,
972
972
  ou="My OU",
973
973
  organization="My organization",
974
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
974
+ opts=pulumi.ResourceOptions(depends_on=[intermediate]))
975
975
  ```
976
976
  <!--End PulumiCodeChooser -->
977
977
 
@@ -654,7 +654,8 @@ class SecretBackendSign(pulumi.CustomResource):
654
654
  import pulumi_vault as vault
655
655
 
656
656
  test = vault.pki_secret.SecretBackendSign("test",
657
- backend=vault_mount["pki"]["path"],
657
+ backend=pki["path"],
658
+ name=admin["name"],
658
659
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
659
660
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
660
661
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -684,7 +685,7 @@ class SecretBackendSign(pulumi.CustomResource):
684
685
  -----END CERTIFICATE REQUEST-----
685
686
  \"\"\",
686
687
  common_name="test.my.domain",
687
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
688
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
688
689
  ```
689
690
  <!--End PulumiCodeChooser -->
690
691
 
@@ -727,7 +728,8 @@ class SecretBackendSign(pulumi.CustomResource):
727
728
  import pulumi_vault as vault
728
729
 
729
730
  test = vault.pki_secret.SecretBackendSign("test",
730
- backend=vault_mount["pki"]["path"],
731
+ backend=pki["path"],
732
+ name=admin["name"],
731
733
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
732
734
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
733
735
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -757,7 +759,7 @@ class SecretBackendSign(pulumi.CustomResource):
757
759
  -----END CERTIFICATE REQUEST-----
758
760
  \"\"\",
759
761
  common_name="test.my.domain",
760
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
762
+ opts=pulumi.ResourceOptions(depends_on=[admin]))
761
763
  ```
762
764
  <!--End PulumiCodeChooser -->
763
765
 
@@ -251,8 +251,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
251
251
  import pulumi_vault as vault
252
252
 
253
253
  global_ = vault.QuotaLeaseCount("global",
254
- max_leases=100,
255
- path="")
254
+ name="global",
255
+ path="",
256
+ max_leases=100)
256
257
  ```
257
258
  <!--End PulumiCodeChooser -->
258
259
 
@@ -305,8 +306,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
305
306
  import pulumi_vault as vault
306
307
 
307
308
  global_ = vault.QuotaLeaseCount("global",
308
- max_leases=100,
309
- path="")
309
+ name="global",
310
+ path="",
311
+ max_leases=100)
310
312
  ```
311
313
  <!--End PulumiCodeChooser -->
312
314
 
@@ -319,6 +319,7 @@ class QuotaRateLimit(pulumi.CustomResource):
319
319
  import pulumi_vault as vault
320
320
 
321
321
  global_ = vault.QuotaRateLimit("global",
322
+ name="global",
322
323
  path="",
323
324
  rate=100)
324
325
  ```
@@ -374,6 +375,7 @@ class QuotaRateLimit(pulumi.CustomResource):
374
375
  import pulumi_vault as vault
375
376
 
376
377
  global_ = vault.QuotaRateLimit("global",
378
+ name="global",
377
379
  path="",
378
380
  rate=100)
379
381
  ```
@@ -468,8 +468,8 @@ class SecretBackend(pulumi.CustomResource):
468
468
 
469
469
  rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
470
470
  connection_uri="https://.....",
471
- password="password",
472
- username="user")
471
+ username="user",
472
+ password="password")
473
473
  ```
474
474
  <!--End PulumiCodeChooser -->
475
475
 
@@ -520,8 +520,8 @@ class SecretBackend(pulumi.CustomResource):
520
520
 
521
521
  rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
522
522
  connection_uri="https://.....",
523
- password="password",
524
- username="user")
523
+ username="user",
524
+ password="password")
525
525
  ```
526
526
  <!--End PulumiCodeChooser -->
527
527
 
@@ -266,6 +266,7 @@ class SecretBackendRole(pulumi.CustomResource):
266
266
  password="password")
267
267
  role = vault.rabbit_mq.SecretBackendRole("role",
268
268
  backend=rabbitmq.path,
269
+ name="deploy",
269
270
  tags="tag1,tag2",
270
271
  vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
271
272
  host="/",
@@ -326,6 +327,7 @@ class SecretBackendRole(pulumi.CustomResource):
326
327
  password="password")
327
328
  role = vault.rabbit_mq.SecretBackendRole("role",
328
329
  backend=rabbitmq.path,
330
+ name="deploy",
329
331
  tags="tag1,tag2",
330
332
  vhosts=[vault.rabbit_mq.SecretBackendRoleVhostArgs(
331
333
  host="/",
@@ -1119,12 +1119,13 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1119
1119
  import pulumi
1120
1120
  import pulumi_vault as vault
1121
1121
 
1122
- local_backups = vault.RaftSnapshotAgentConfig("localBackups",
1122
+ local_backups = vault.RaftSnapshotAgentConfig("local_backups",
1123
+ name="local",
1123
1124
  interval_seconds=86400,
1124
- local_max_space=10000000,
1125
- path_prefix="/opt/vault/snapshots/",
1126
1125
  retain=7,
1127
- storage_type="local")
1126
+ path_prefix="/opt/vault/snapshots/",
1127
+ storage_type="local",
1128
+ local_max_space=10000000)
1128
1129
  ```
1129
1130
  <!--End PulumiCodeChooser -->
1130
1131
 
@@ -1139,7 +1140,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1139
1140
  aws_access_key_id = config.require_object("awsAccessKeyId")
1140
1141
  aws_secret_access_key = config.require_object("awsSecretAccessKey")
1141
1142
  current = aws.get_region()
1142
- s3_backups = vault.RaftSnapshotAgentConfig("s3Backups",
1143
+ s3_backups = vault.RaftSnapshotAgentConfig("s3_backups",
1144
+ name="s3",
1143
1145
  interval_seconds=86400,
1144
1146
  retain=7,
1145
1147
  path_prefix="/path/in/bucket",
@@ -1162,7 +1164,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1162
1164
  config = pulumi.Config()
1163
1165
  azure_account_name = config.require_object("azureAccountName")
1164
1166
  azure_account_key = config.require_object("azureAccountKey")
1165
- azure_backups = vault.RaftSnapshotAgentConfig("azureBackups",
1167
+ azure_backups = vault.RaftSnapshotAgentConfig("azure_backups",
1168
+ name="azure_backup",
1166
1169
  interval_seconds=86400,
1167
1170
  retain=7,
1168
1171
  path_prefix="/",
@@ -1266,12 +1269,13 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1266
1269
  import pulumi
1267
1270
  import pulumi_vault as vault
1268
1271
 
1269
- local_backups = vault.RaftSnapshotAgentConfig("localBackups",
1272
+ local_backups = vault.RaftSnapshotAgentConfig("local_backups",
1273
+ name="local",
1270
1274
  interval_seconds=86400,
1271
- local_max_space=10000000,
1272
- path_prefix="/opt/vault/snapshots/",
1273
1275
  retain=7,
1274
- storage_type="local")
1276
+ path_prefix="/opt/vault/snapshots/",
1277
+ storage_type="local",
1278
+ local_max_space=10000000)
1275
1279
  ```
1276
1280
  <!--End PulumiCodeChooser -->
1277
1281
 
@@ -1286,7 +1290,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1286
1290
  aws_access_key_id = config.require_object("awsAccessKeyId")
1287
1291
  aws_secret_access_key = config.require_object("awsSecretAccessKey")
1288
1292
  current = aws.get_region()
1289
- s3_backups = vault.RaftSnapshotAgentConfig("s3Backups",
1293
+ s3_backups = vault.RaftSnapshotAgentConfig("s3_backups",
1294
+ name="s3",
1290
1295
  interval_seconds=86400,
1291
1296
  retain=7,
1292
1297
  path_prefix="/path/in/bucket",
@@ -1309,7 +1314,8 @@ class RaftSnapshotAgentConfig(pulumi.CustomResource):
1309
1314
  config = pulumi.Config()
1310
1315
  azure_account_name = config.require_object("azureAccountName")
1311
1316
  azure_account_key = config.require_object("azureAccountKey")
1312
- azure_backups = vault.RaftSnapshotAgentConfig("azureBackups",
1317
+ azure_backups = vault.RaftSnapshotAgentConfig("azure_backups",
1318
+ name="azure_backup",
1313
1319
  interval_seconds=86400,
1314
1320
  retain=7,
1315
1321
  path_prefix="/",
@@ -188,11 +188,11 @@ class RgpPolicy(pulumi.CustomResource):
188
188
  import pulumi_vault as vault
189
189
 
190
190
  allow_all = vault.RgpPolicy("allow-all",
191
+ name="allow-all",
191
192
  enforcement_level="soft-mandatory",
192
193
  policy=\"\"\"main = rule {
193
194
  true
194
195
  }
195
-
196
196
  \"\"\")
197
197
  ```
198
198
  <!--End PulumiCodeChooser -->
@@ -226,11 +226,11 @@ class RgpPolicy(pulumi.CustomResource):
226
226
  import pulumi_vault as vault
227
227
 
228
228
  allow_all = vault.RgpPolicy("allow-all",
229
+ name="allow-all",
229
230
  enforcement_level="soft-mandatory",
230
231
  policy=\"\"\"main = rule {
231
232
  true
232
233
  }
233
-
234
234
  \"\"\")
235
235
  ```
236
236
  <!--End PulumiCodeChooser -->
@@ -451,11 +451,11 @@ class AuthBackend(pulumi.CustomResource):
451
451
  import pulumi_vault as vault
452
452
 
453
453
  test = vault.saml.AuthBackend("test",
454
- acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
455
- default_role="admin",
456
- entity_id="https://my.vault/v1/auth/saml",
454
+ path="saml",
457
455
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
458
- path="saml")
456
+ entity_id="https://my.vault/v1/auth/saml",
457
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
458
+ default_role="admin")
459
459
  ```
460
460
  <!--End PulumiCodeChooser -->
461
461
 
@@ -511,11 +511,11 @@ class AuthBackend(pulumi.CustomResource):
511
511
  import pulumi_vault as vault
512
512
 
513
513
  test = vault.saml.AuthBackend("test",
514
- acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
515
- default_role="admin",
516
- entity_id="https://my.vault/v1/auth/saml",
514
+ path="saml",
517
515
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
518
- path="saml")
516
+ entity_id="https://my.vault/v1/auth/saml",
517
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
518
+ default_role="admin")
519
519
  ```
520
520
  <!--End PulumiCodeChooser -->
521
521
 
@@ -693,14 +693,15 @@ class AuthBackendRole(pulumi.CustomResource):
693
693
  import pulumi
694
694
  import pulumi_vault as vault
695
695
 
696
- example_auth_backend = vault.saml.AuthBackend("exampleAuthBackend",
696
+ example = vault.saml.AuthBackend("example",
697
697
  path="saml",
698
698
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
699
699
  entity_id="https://my.vault/v1/auth/saml",
700
700
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
701
701
  default_role="default-role")
702
- example_auth_backend_role = vault.saml.AuthBackendRole("exampleAuthBackendRole",
703
- path=example_auth_backend.path,
702
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
703
+ path=example.path,
704
+ name="my-role",
704
705
  groups_attribute="groups",
705
706
  bound_attributes={
706
707
  "group": "admin",
@@ -779,14 +780,15 @@ class AuthBackendRole(pulumi.CustomResource):
779
780
  import pulumi
780
781
  import pulumi_vault as vault
781
782
 
782
- example_auth_backend = vault.saml.AuthBackend("exampleAuthBackend",
783
+ example = vault.saml.AuthBackend("example",
783
784
  path="saml",
784
785
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
785
786
  entity_id="https://my.vault/v1/auth/saml",
786
787
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
787
788
  default_role="default-role")
788
- example_auth_backend_role = vault.saml.AuthBackendRole("exampleAuthBackendRole",
789
- path=example_auth_backend.path,
789
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
790
+ path=example.path,
791
+ name="my-role",
790
792
  groups_attribute="groups",
791
793
  bound_attributes={
792
794
  "group": "admin",
@@ -239,16 +239,19 @@ class SyncAssociation(pulumi.CustomResource):
239
239
  description="KV Version 2 secret engine mount")
240
240
  token = vault.kv.SecretV2("token",
241
241
  mount=kvv2.path,
242
+ name="token",
242
243
  data_json=json.dumps({
243
244
  "dev": "B!gS3cr3t",
244
245
  "prod": "S3cureP4$$",
245
246
  }))
246
247
  gh = vault.secrets.SyncGhDestination("gh",
247
- access_token=var["access_token"],
248
- repository_owner=var["repo_owner"],
248
+ name="gh-dest",
249
+ access_token=access_token,
250
+ repository_owner=repo_owner,
249
251
  repository_name="repo-name-example",
250
252
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
251
- gh_token = vault.secrets.SyncAssociation("ghToken",
253
+ gh_token = vault.secrets.SyncAssociation("gh_token",
254
+ name=gh.name,
252
255
  type=gh.type,
253
256
  mount=kvv2.path,
254
257
  secret_name=token.name)
@@ -289,16 +292,19 @@ class SyncAssociation(pulumi.CustomResource):
289
292
  description="KV Version 2 secret engine mount")
290
293
  token = vault.kv.SecretV2("token",
291
294
  mount=kvv2.path,
295
+ name="token",
292
296
  data_json=json.dumps({
293
297
  "dev": "B!gS3cr3t",
294
298
  "prod": "S3cureP4$$",
295
299
  }))
296
300
  gh = vault.secrets.SyncGhDestination("gh",
297
- access_token=var["access_token"],
298
- repository_owner=var["repo_owner"],
301
+ name="gh-dest",
302
+ access_token=access_token,
303
+ repository_owner=repo_owner,
299
304
  repository_name="repo-name-example",
300
305
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
301
- gh_token = vault.secrets.SyncAssociation("ghToken",
306
+ gh_token = vault.secrets.SyncAssociation("gh_token",
307
+ name=gh.name,
302
308
  type=gh.type,
303
309
  mount=kvv2.path,
304
310
  secret_name=token.name)
@@ -460,8 +460,9 @@ class SyncAwsDestination(pulumi.CustomResource):
460
460
  import pulumi_vault as vault
461
461
 
462
462
  aws = vault.secrets.SyncAwsDestination("aws",
463
- access_key_id=var["access_key_id"],
464
- secret_access_key=var["secret_access_key"],
463
+ name="aws-dest",
464
+ access_key_id=access_key_id,
465
+ secret_access_key=secret_access_key,
465
466
  region="us-east-1",
466
467
  role_arn="role-arn",
467
468
  external_id="external-id",
@@ -526,8 +527,9 @@ class SyncAwsDestination(pulumi.CustomResource):
526
527
  import pulumi_vault as vault
527
528
 
528
529
  aws = vault.secrets.SyncAwsDestination("aws",
529
- access_key_id=var["access_key_id"],
530
- secret_access_key=var["secret_access_key"],
530
+ name="aws-dest",
531
+ access_key_id=access_key_id,
532
+ secret_access_key=secret_access_key,
531
533
  region="us-east-1",
532
534
  role_arn="role-arn",
533
535
  external_id="external-id",
@@ -436,10 +436,11 @@ class SyncAzureDestination(pulumi.CustomResource):
436
436
  import pulumi_vault as vault
437
437
 
438
438
  az = vault.secrets.SyncAzureDestination("az",
439
- key_vault_uri=var["key_vault_uri"],
440
- client_id=var["client_id"],
441
- client_secret=var["client_secret"],
442
- tenant_id=var["tenant_id"],
439
+ name="az-dest",
440
+ key_vault_uri=key_vault_uri,
441
+ client_id=client_id,
442
+ client_secret=client_secret,
443
+ tenant_id=tenant_id,
443
444
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
444
445
  custom_tags={
445
446
  "foo": "bar",
@@ -495,10 +496,11 @@ class SyncAzureDestination(pulumi.CustomResource):
495
496
  import pulumi_vault as vault
496
497
 
497
498
  az = vault.secrets.SyncAzureDestination("az",
498
- key_vault_uri=var["key_vault_uri"],
499
- client_id=var["client_id"],
500
- client_secret=var["client_secret"],
501
- tenant_id=var["tenant_id"],
499
+ name="az-dest",
500
+ key_vault_uri=key_vault_uri,
501
+ client_id=client_id,
502
+ client_secret=client_secret,
503
+ tenant_id=tenant_id,
502
504
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
503
505
  custom_tags={
504
506
  "foo": "bar",