pulumi-vault 6.2.0a1712991499__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1712991499.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -155,7 +155,7 @@ class SyncConfig(pulumi.CustomResource):
155
155
  import pulumi
156
156
  import pulumi_vault as vault
157
157
 
158
- global_config = vault.secrets.SyncConfig("globalConfig",
158
+ global_config = vault.secrets.SyncConfig("global_config",
159
159
  disabled=True,
160
160
  queue_capacity=500000)
161
161
  ```
@@ -196,7 +196,7 @@ class SyncConfig(pulumi.CustomResource):
196
196
  import pulumi
197
197
  import pulumi_vault as vault
198
198
 
199
- global_config = vault.secrets.SyncConfig("globalConfig",
199
+ global_config = vault.secrets.SyncConfig("global_config",
200
200
  disabled=True,
201
201
  queue_capacity=500000)
202
202
  ```
@@ -322,11 +322,13 @@ class SyncGcpDestination(pulumi.CustomResource):
322
322
  <!--Start PulumiCodeChooser -->
323
323
  ```python
324
324
  import pulumi
325
+ import pulumi_std as std
325
326
  import pulumi_vault as vault
326
327
 
327
328
  gcp = vault.secrets.SyncGcpDestination("gcp",
329
+ name="gcp-dest",
328
330
  project_id="gcp-project-id",
329
- credentials=(lambda path: open(path).read())(var["credentials_file"]),
331
+ credentials=std.file(input=credentials_file).result,
330
332
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
331
333
  custom_tags={
332
334
  "foo": "bar",
@@ -373,11 +375,13 @@ class SyncGcpDestination(pulumi.CustomResource):
373
375
  <!--Start PulumiCodeChooser -->
374
376
  ```python
375
377
  import pulumi
378
+ import pulumi_std as std
376
379
  import pulumi_vault as vault
377
380
 
378
381
  gcp = vault.secrets.SyncGcpDestination("gcp",
382
+ name="gcp-dest",
379
383
  project_id="gcp-project-id",
380
- credentials=(lambda path: open(path).read())(var["credentials_file"]),
384
+ credentials=std.file(input=credentials_file).result,
381
385
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
382
386
  custom_tags={
383
387
  "foo": "bar",
@@ -407,8 +407,9 @@ class SyncGhDestination(pulumi.CustomResource):
407
407
  import pulumi_vault as vault
408
408
 
409
409
  gh = vault.secrets.SyncGhDestination("gh",
410
- access_token=var["access_token"],
411
- repository_owner=var["repo_owner"],
410
+ name="gh-dest",
411
+ access_token=access_token,
412
+ repository_owner=repo_owner,
412
413
  repository_name="repo-name-example",
413
414
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
414
415
  ```
@@ -462,8 +463,9 @@ class SyncGhDestination(pulumi.CustomResource):
462
463
  import pulumi_vault as vault
463
464
 
464
465
  gh = vault.secrets.SyncGhDestination("gh",
465
- access_token=var["access_token"],
466
- repository_owner=var["repo_owner"],
466
+ name="gh-dest",
467
+ access_token=access_token,
468
+ repository_owner=repo_owner,
467
469
  repository_name="repo-name-example",
468
470
  secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
469
471
  ```
@@ -193,11 +193,13 @@ class SyncGithubApps(pulumi.CustomResource):
193
193
  <!--Start PulumiCodeChooser -->
194
194
  ```python
195
195
  import pulumi
196
+ import pulumi_std as std
196
197
  import pulumi_vault as vault
197
198
 
198
199
  github_apps = vault.secrets.SyncGithubApps("github-apps",
199
- app_id=var["app_id"],
200
- private_key=(lambda path: open(path).read())(var["privatekey_file"]))
200
+ name="gh-apps",
201
+ app_id=app_id,
202
+ private_key=std.file(input=privatekey_file).result)
201
203
  ```
202
204
  <!--End PulumiCodeChooser -->
203
205
 
@@ -230,11 +232,13 @@ class SyncGithubApps(pulumi.CustomResource):
230
232
  <!--Start PulumiCodeChooser -->
231
233
  ```python
232
234
  import pulumi
235
+ import pulumi_std as std
233
236
  import pulumi_vault as vault
234
237
 
235
238
  github_apps = vault.secrets.SyncGithubApps("github-apps",
236
- app_id=var["app_id"],
237
- private_key=(lambda path: open(path).read())(var["privatekey_file"]))
239
+ name="gh-apps",
240
+ app_id=app_id,
241
+ private_key=std.file(input=privatekey_file).result)
238
242
  ```
239
243
  <!--End PulumiCodeChooser -->
240
244
 
@@ -343,8 +343,9 @@ class SyncVercelDestination(pulumi.CustomResource):
343
343
  import pulumi_vault as vault
344
344
 
345
345
  vercel = vault.secrets.SyncVercelDestination("vercel",
346
- access_token=var["access_token"],
347
- project_id=var["project_id"],
346
+ name="vercel-dest",
347
+ access_token=access_token,
348
+ project_id=project_id,
348
349
  deployment_environments=[
349
350
  "development",
350
351
  "preview",
@@ -394,8 +395,9 @@ class SyncVercelDestination(pulumi.CustomResource):
394
395
  import pulumi_vault as vault
395
396
 
396
397
  vercel = vault.secrets.SyncVercelDestination("vercel",
397
- access_token=var["access_token"],
398
- project_id=var["project_id"],
398
+ name="vercel-dest",
399
+ access_token=access_token,
400
+ project_id=project_id,
399
401
  deployment_environments=[
400
402
  "development",
401
403
  "preview",
@@ -25,12 +25,6 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
25
25
  must be set to a single element list.
26
26
 
27
27
  Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
-
29
- <!--Start PulumiCodeChooser -->
30
- ```python
31
- import pulumi
32
- ```
33
- <!--End PulumiCodeChooser -->
34
28
  :param pulumi.Input[str] type: The SSH public key type.
35
29
  *Supported key types are:*
36
30
  `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
@@ -49,12 +43,6 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
49
43
  must be set to a single element list.
50
44
 
51
45
  Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
-
53
- <!--Start PulumiCodeChooser -->
54
- ```python
55
- import pulumi
56
- ```
57
- <!--End PulumiCodeChooser -->
58
46
  """
59
47
  return pulumi.get(self, "lengths")
60
48
 
@@ -25,12 +25,6 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
25
25
  must be set to a single element list.
26
26
 
27
27
  Example configuration blocks that might be included in the `ssh.SecretBackendRole`
28
-
29
- <!--Start PulumiCodeChooser -->
30
- ```python
31
- import pulumi
32
- ```
33
- <!--End PulumiCodeChooser -->
34
28
  :param str type: The SSH public key type.
35
29
  *Supported key types are:*
36
30
  `rsa`, `ecdsa`, `ec`, `dsa`, `ed25519`, `ssh-rsa`, `ssh-dss`, `ssh-ed25519`,
@@ -49,12 +43,6 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
49
43
  must be set to a single element list.
50
44
 
51
45
  Example configuration blocks that might be included in the `ssh.SecretBackendRole`
52
-
53
- <!--Start PulumiCodeChooser -->
54
- ```python
55
- import pulumi
56
- ```
57
- <!--End PulumiCodeChooser -->
58
46
  """
59
47
  return pulumi.get(self, "lengths")
60
48
 
@@ -928,10 +928,12 @@ class SecretBackendRole(pulumi.CustomResource):
928
928
 
929
929
  example = vault.Mount("example", type="ssh")
930
930
  foo = vault.ssh.SecretBackendRole("foo",
931
+ name="my-role",
931
932
  backend=example.path,
932
933
  key_type="ca",
933
934
  allow_user_certificates=True)
934
935
  bar = vault.ssh.SecretBackendRole("bar",
936
+ name="otp-role",
935
937
  backend=example.path,
936
938
  key_type="otp",
937
939
  default_user="default",
@@ -1002,10 +1004,12 @@ class SecretBackendRole(pulumi.CustomResource):
1002
1004
 
1003
1005
  example = vault.Mount("example", type="ssh")
1004
1006
  foo = vault.ssh.SecretBackendRole("foo",
1007
+ name="my-role",
1005
1008
  backend=example.path,
1006
1009
  key_type="ca",
1007
1010
  allow_user_certificates=True)
1008
1011
  bar = vault.ssh.SecretBackendRole("bar",
1012
+ name="otp-role",
1009
1013
  backend=example.path,
1010
1014
  key_type="otp",
1011
1015
  default_user="default",
@@ -242,6 +242,7 @@ class SecretCreds(pulumi.CustomResource):
242
242
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
243
243
  example = vault.terraformcloud.SecretRole("example",
244
244
  backend=test.backend,
245
+ name="test-role",
245
246
  organization="example-organization-name",
246
247
  team_id="team-ieF4isC...")
247
248
  token = vault.terraformcloud.SecretCreds("token",
@@ -279,6 +280,7 @@ class SecretCreds(pulumi.CustomResource):
279
280
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
280
281
  example = vault.terraformcloud.SecretRole("example",
281
282
  backend=test.backend,
283
+ name="test-role",
282
284
  organization="example-organization-name",
283
285
  team_id="team-ieF4isC...")
284
286
  token = vault.terraformcloud.SecretCreds("token",
@@ -323,6 +323,7 @@ class SecretRole(pulumi.CustomResource):
323
323
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
324
  example = vault.terraformcloud.SecretRole("example",
325
325
  backend=test.backend,
326
+ name="test-role",
326
327
  organization="example-organization-name",
327
328
  team_id="team-ieF4isC...")
328
329
  ```
@@ -370,6 +371,7 @@ class SecretRole(pulumi.CustomResource):
370
371
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
371
372
  example = vault.terraformcloud.SecretRole("example",
372
373
  backend=test.backend,
374
+ name="test-role",
373
375
  organization="example-organization-name",
374
376
  team_id="team-ieF4isC...")
375
377
  ```
pulumi_vault/token.py CHANGED
@@ -629,18 +629,18 @@ class Token(pulumi.CustomResource):
629
629
  import pulumi_vault as vault
630
630
 
631
631
  example = vault.Token("example",
632
- metadata={
633
- "purpose": "service-account",
634
- },
632
+ role_name="app",
635
633
  policies=[
636
634
  "policy1",
637
635
  "policy2",
638
636
  ],
639
- renew_increment=86400,
640
- renew_min_lease=43200,
641
637
  renewable=True,
642
- role_name="app",
643
- ttl="24h")
638
+ ttl="24h",
639
+ renew_min_lease=43200,
640
+ renew_increment=86400,
641
+ metadata={
642
+ "purpose": "service-account",
643
+ })
644
644
  ```
645
645
  <!--End PulumiCodeChooser -->
646
646
 
@@ -688,18 +688,18 @@ class Token(pulumi.CustomResource):
688
688
  import pulumi_vault as vault
689
689
 
690
690
  example = vault.Token("example",
691
- metadata={
692
- "purpose": "service-account",
693
- },
691
+ role_name="app",
694
692
  policies=[
695
693
  "policy1",
696
694
  "policy2",
697
695
  ],
698
- renew_increment=86400,
699
- renew_min_lease=43200,
700
696
  renewable=True,
701
- role_name="app",
702
- ttl="24h")
697
+ ttl="24h",
698
+ renew_min_lease=43200,
699
+ renew_increment=86400,
700
+ metadata={
701
+ "purpose": "service-account",
702
+ })
703
703
  ```
704
704
  <!--End PulumiCodeChooser -->
705
705
 
@@ -756,18 +756,18 @@ class AuthBackendRole(pulumi.CustomResource):
756
756
  import pulumi_vault as vault
757
757
 
758
758
  example = vault.tokenauth.AuthBackendRole("example",
759
- allowed_entity_aliases=["test_entity"],
759
+ role_name="my-role",
760
760
  allowed_policies=[
761
761
  "dev",
762
762
  "test",
763
763
  ],
764
764
  disallowed_policies=["default"],
765
+ allowed_entity_aliases=["test_entity"],
765
766
  orphan=True,
766
- path_suffix="path-suffix",
767
+ token_period=86400,
767
768
  renewable=True,
768
- role_name="my-role",
769
769
  token_explicit_max_ttl=115200,
770
- token_period=86400)
770
+ path_suffix="path-suffix")
771
771
  ```
772
772
  <!--End PulumiCodeChooser -->
773
773
 
@@ -841,18 +841,18 @@ class AuthBackendRole(pulumi.CustomResource):
841
841
  import pulumi_vault as vault
842
842
 
843
843
  example = vault.tokenauth.AuthBackendRole("example",
844
- allowed_entity_aliases=["test_entity"],
844
+ role_name="my-role",
845
845
  allowed_policies=[
846
846
  "dev",
847
847
  "test",
848
848
  ],
849
849
  disallowed_policies=["default"],
850
+ allowed_entity_aliases=["test_entity"],
850
851
  orphan=True,
851
- path_suffix="path-suffix",
852
+ token_period=86400,
852
853
  renewable=True,
853
- role_name="my-role",
854
854
  token_explicit_max_ttl=115200,
855
- token_period=86400)
855
+ path_suffix="path-suffix")
856
856
  ```
857
857
  <!--End PulumiCodeChooser -->
858
858
 
@@ -188,11 +188,12 @@ class Alphabet(pulumi.CustomResource):
188
188
  import pulumi
189
189
  import pulumi_vault as vault
190
190
 
191
- mount_transform = vault.Mount("mountTransform",
191
+ mount_transform = vault.Mount("mount_transform",
192
192
  path="transform",
193
193
  type="transform")
194
194
  test = vault.transform.Alphabet("test",
195
195
  path=mount_transform.path,
196
+ name="numerics",
196
197
  alphabet="0123456789")
197
198
  ```
198
199
  <!--End PulumiCodeChooser -->
@@ -225,11 +226,12 @@ class Alphabet(pulumi.CustomResource):
225
226
  import pulumi
226
227
  import pulumi_vault as vault
227
228
 
228
- mount_transform = vault.Mount("mountTransform",
229
+ mount_transform = vault.Mount("mount_transform",
229
230
  path="transform",
230
231
  type="transform")
231
232
  test = vault.transform.Alphabet("test",
232
233
  path=mount_transform.path,
234
+ name="numerics",
233
235
  alphabet="0123456789")
234
236
  ```
235
237
  <!--End PulumiCodeChooser -->
@@ -152,12 +152,14 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
152
152
  type="transform")
153
153
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
154
154
  path=transform.path,
155
+ name="ccn-fpe",
155
156
  type="fpe",
156
157
  template="builtin/creditcardnumber",
157
158
  tweak_source="internal",
158
159
  allowed_roles=["payments"])
159
160
  payments = vault.transform.Role("payments",
160
161
  path=ccn_fpe.path,
162
+ name="payments",
161
163
  transformations=["ccn-fpe"])
162
164
  test = vault.transform.get_decode_output(path=payments.path,
163
165
  role_name="payments",
@@ -233,12 +235,14 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
233
235
  type="transform")
234
236
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
235
237
  path=transform.path,
238
+ name="ccn-fpe",
236
239
  type="fpe",
237
240
  template="builtin/creditcardnumber",
238
241
  tweak_source="internal",
239
242
  allowed_roles=["payments"])
240
243
  payments = vault.transform.Role("payments",
241
244
  path=ccn_fpe.path,
245
+ name="payments",
242
246
  transformations=["ccn-fpe"])
243
247
  test = vault.transform.get_decode_output(path=payments.path,
244
248
  role_name="payments",
@@ -152,12 +152,14 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
152
152
  type="transform")
153
153
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
154
154
  path=transform.path,
155
+ name="ccn-fpe",
155
156
  type="fpe",
156
157
  template="builtin/creditcardnumber",
157
158
  tweak_source="internal",
158
159
  allowed_roles=["payments"])
159
160
  payments = vault.transform.Role("payments",
160
161
  path=ccn_fpe.path,
162
+ name="payments",
161
163
  transformations=["ccn-fpe"])
162
164
  test = vault.transform.get_encode_output(path=payments.path,
163
165
  role_name="payments",
@@ -235,12 +237,14 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
235
237
  type="transform")
236
238
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
237
239
  path=transform.path,
240
+ name="ccn-fpe",
238
241
  type="fpe",
239
242
  template="builtin/creditcardnumber",
240
243
  tweak_source="internal",
241
244
  allowed_roles=["payments"])
242
245
  payments = vault.transform.Role("payments",
243
246
  path=ccn_fpe.path,
247
+ name="payments",
244
248
  transformations=["ccn-fpe"])
245
249
  test = vault.transform.get_encode_output(path=payments.path,
246
250
  role_name="payments",
@@ -189,11 +189,12 @@ class Role(pulumi.CustomResource):
189
189
  import pulumi
190
190
  import pulumi_vault as vault
191
191
 
192
- mount_transform = vault.Mount("mountTransform",
192
+ mount_transform = vault.Mount("mount_transform",
193
193
  path="transform",
194
194
  type="transform")
195
195
  test = vault.transform.Role("test",
196
196
  path=mount_transform.path,
197
+ name="payments",
197
198
  transformations=["ccn-fpe"])
198
199
  ```
199
200
  <!--End PulumiCodeChooser -->
@@ -227,11 +228,12 @@ class Role(pulumi.CustomResource):
227
228
  import pulumi
228
229
  import pulumi_vault as vault
229
230
 
230
- mount_transform = vault.Mount("mountTransform",
231
+ mount_transform = vault.Mount("mount_transform",
231
232
  path="transform",
232
233
  type="transform")
233
234
  test = vault.transform.Role("test",
234
235
  path=mount_transform.path,
236
+ name="payments",
235
237
  transformations=["ccn-fpe"])
236
238
  ```
237
239
  <!--End PulumiCodeChooser -->
@@ -344,9 +344,11 @@ class Template(pulumi.CustomResource):
344
344
  type="transform")
345
345
  numerics = vault.transform.Alphabet("numerics",
346
346
  path=transform.path,
347
+ name="numerics",
347
348
  alphabet="0123456789")
348
349
  test = vault.transform.Template("test",
349
350
  path=numerics.path,
351
+ name="ccn",
350
352
  type="regex",
351
353
  pattern="(\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})",
352
354
  alphabet="numerics",
@@ -407,9 +409,11 @@ class Template(pulumi.CustomResource):
407
409
  type="transform")
408
410
  numerics = vault.transform.Alphabet("numerics",
409
411
  path=transform.path,
412
+ name="numerics",
410
413
  alphabet="0123456789")
411
414
  test = vault.transform.Template("test",
412
415
  path=numerics.path,
416
+ name="ccn",
413
417
  type="regex",
414
418
  pattern="(\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})[- ](\\\\d{4})",
415
419
  alphabet="numerics",
@@ -118,8 +118,8 @@ def get_decrypt(backend: Optional[str] = None,
118
118
  import pulumi_vault as vault
119
119
 
120
120
  test = vault.transit.get_decrypt(backend="transit",
121
- ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==",
122
- key="test")
121
+ key="test",
122
+ ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
123
123
  ```
124
124
  <!--End PulumiCodeChooser -->
125
125
 
@@ -166,8 +166,8 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
166
166
  import pulumi_vault as vault
167
167
 
168
168
  test = vault.transit.get_decrypt(backend="transit",
169
- ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==",
170
- key="test")
169
+ key="test",
170
+ ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
171
171
  ```
172
172
  <!--End PulumiCodeChooser -->
173
173
 
@@ -617,7 +617,9 @@ class SecretBackendKey(pulumi.CustomResource):
617
617
  description="Example description",
618
618
  default_lease_ttl_seconds=3600,
619
619
  max_lease_ttl_seconds=86400)
620
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
620
+ key = vault.transit.SecretBackendKey("key",
621
+ backend=transit.path,
622
+ name="my_key")
621
623
  ```
622
624
  <!--End PulumiCodeChooser -->
623
625
 
@@ -673,7 +675,9 @@ class SecretBackendKey(pulumi.CustomResource):
673
675
  description="Example description",
674
676
  default_lease_ttl_seconds=3600,
675
677
  max_lease_ttl_seconds=86400)
676
- key = vault.transit.SecretBackendKey("key", backend=transit.path)
678
+ key = vault.transit.SecretBackendKey("key",
679
+ backend=transit.path,
680
+ name="my_key")
677
681
  ```
678
682
  <!--End PulumiCodeChooser -->
679
683
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.2.0a1712991499
3
+ Version: 6.2.0a1713561465
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io