pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713561465__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (120) hide show
  1. pulumi_vault/ad/secret_backend.py +2 -2
  2. pulumi_vault/ad/secret_library.py +2 -0
  3. pulumi_vault/alicloud/auth_backend_role.py +6 -6
  4. pulumi_vault/audit.py +12 -12
  5. pulumi_vault/audit_request_header.py +6 -2
  6. pulumi_vault/aws/auth_backend_client.py +6 -6
  7. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -6
  8. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -6
  9. pulumi_vault/aws/secret_backend_role.py +2 -0
  10. pulumi_vault/aws/secret_backend_static_role.py +2 -0
  11. pulumi_vault/azure/auth_backend_config.py +6 -6
  12. pulumi_vault/azure/backend.py +16 -16
  13. pulumi_vault/azure/backend_role.py +14 -14
  14. pulumi_vault/cert_auth_backend_role.py +12 -8
  15. pulumi_vault/consul/secret_backend.py +10 -10
  16. pulumi_vault/consul/secret_backend_role.py +2 -0
  17. pulumi_vault/database/secret_backend_connection.py +2 -0
  18. pulumi_vault/database/secret_backend_role.py +4 -0
  19. pulumi_vault/database/secret_backend_static_role.py +10 -4
  20. pulumi_vault/database/secrets_mount.py +4 -0
  21. pulumi_vault/egp_policy.py +4 -4
  22. pulumi_vault/gcp/auth_backend.py +0 -36
  23. pulumi_vault/gcp/secret_backend.py +4 -2
  24. pulumi_vault/gcp/secret_impersonated_account.py +12 -10
  25. pulumi_vault/gcp/secret_roleset.py +4 -2
  26. pulumi_vault/gcp/secret_static_account.py +14 -12
  27. pulumi_vault/generic/endpoint.py +4 -4
  28. pulumi_vault/generic/get_secret.py +44 -0
  29. pulumi_vault/get_namespaces.py +4 -4
  30. pulumi_vault/get_policy_document.py +8 -4
  31. pulumi_vault/github/team.py +2 -2
  32. pulumi_vault/github/user.py +2 -2
  33. pulumi_vault/identity/entity.py +6 -4
  34. pulumi_vault/identity/entity_alias.py +6 -4
  35. pulumi_vault/identity/entity_policies.py +12 -4
  36. pulumi_vault/identity/get_oidc_client_creds.py +2 -0
  37. pulumi_vault/identity/get_oidc_openid_config.py +10 -2
  38. pulumi_vault/identity/get_oidc_public_keys.py +10 -2
  39. pulumi_vault/identity/group.py +38 -30
  40. pulumi_vault/identity/group_alias.py +2 -0
  41. pulumi_vault/identity/group_member_entity_ids.py +12 -8
  42. pulumi_vault/identity/group_member_group_ids.py +24 -12
  43. pulumi_vault/identity/group_policies.py +4 -0
  44. pulumi_vault/identity/mfa_duo.py +4 -4
  45. pulumi_vault/identity/mfa_login_enforcement.py +8 -4
  46. pulumi_vault/identity/mfa_okta.py +4 -4
  47. pulumi_vault/identity/oidc_assignment.py +10 -2
  48. pulumi_vault/identity/oidc_client.py +10 -6
  49. pulumi_vault/identity/oidc_key.py +16 -8
  50. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -8
  51. pulumi_vault/identity/oidc_provider.py +22 -12
  52. pulumi_vault/identity/oidc_role.py +28 -12
  53. pulumi_vault/identity/oidc_scope.py +6 -4
  54. pulumi_vault/jwt/auth_backend.py +20 -20
  55. pulumi_vault/kmip/secret_backend.py +10 -10
  56. pulumi_vault/kubernetes/get_service_account_token.py +8 -4
  57. pulumi_vault/kubernetes/secret_backend.py +6 -4
  58. pulumi_vault/kubernetes/secret_backend_role.py +24 -12
  59. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -2
  60. pulumi_vault/kv/get_secret_v2.py +62 -0
  61. pulumi_vault/kv/get_secrets_list.py +4 -4
  62. pulumi_vault/kv/get_secrets_list_v2.py +14 -8
  63. pulumi_vault/kv/secret_v2.py +2 -0
  64. pulumi_vault/ldap/auth_backend.py +10 -10
  65. pulumi_vault/ldap/secret_backend.py +4 -4
  66. pulumi_vault/ldap/secret_backend_library_set.py +2 -0
  67. pulumi_vault/mfa_duo.py +4 -2
  68. pulumi_vault/mfa_okta.py +4 -2
  69. pulumi_vault/mfa_pingid.py +4 -2
  70. pulumi_vault/mfa_totp.py +10 -8
  71. pulumi_vault/mongodbatlas/secret_role.py +2 -0
  72. pulumi_vault/mount.py +26 -26
  73. pulumi_vault/nomad_secret_backend.py +4 -4
  74. pulumi_vault/okta/auth_backend.py +6 -6
  75. pulumi_vault/password_policy.py +6 -4
  76. pulumi_vault/pkisecret/get_backend_issuer.py +40 -0
  77. pulumi_vault/pkisecret/get_backend_key.py +2 -2
  78. pulumi_vault/pkisecret/secret_backend_cert.py +6 -4
  79. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -4
  80. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -2
  81. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -4
  82. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -10
  83. pulumi_vault/pkisecret/secret_backend_role.py +2 -0
  84. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -4
  85. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -6
  86. pulumi_vault/pkisecret/secret_backend_sign.py +6 -4
  87. pulumi_vault/quota_lease_count.py +6 -4
  88. pulumi_vault/quota_rate_limit.py +2 -0
  89. pulumi_vault/rabbitmq/secret_backend.py +4 -4
  90. pulumi_vault/rabbitmq/secret_backend_role.py +2 -0
  91. pulumi_vault/raft_snapshot_agent_config.py +18 -12
  92. pulumi_vault/rgp_policy.py +2 -2
  93. pulumi_vault/saml/auth_backend.py +8 -8
  94. pulumi_vault/saml/auth_backend_role.py +8 -6
  95. pulumi_vault/secrets/sync_association.py +12 -6
  96. pulumi_vault/secrets/sync_aws_destination.py +6 -4
  97. pulumi_vault/secrets/sync_azure_destination.py +10 -8
  98. pulumi_vault/secrets/sync_config.py +2 -2
  99. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  100. pulumi_vault/secrets/sync_gh_destination.py +6 -4
  101. pulumi_vault/secrets/sync_github_apps.py +8 -4
  102. pulumi_vault/secrets/sync_vercel_destination.py +6 -4
  103. pulumi_vault/ssh/_inputs.py +0 -12
  104. pulumi_vault/ssh/outputs.py +0 -12
  105. pulumi_vault/ssh/secret_backend_role.py +4 -0
  106. pulumi_vault/terraformcloud/secret_creds.py +2 -0
  107. pulumi_vault/terraformcloud/secret_role.py +2 -0
  108. pulumi_vault/token.py +14 -14
  109. pulumi_vault/tokenauth/auth_backend_role.py +8 -8
  110. pulumi_vault/transform/alphabet.py +4 -2
  111. pulumi_vault/transform/get_decode.py +4 -0
  112. pulumi_vault/transform/get_encode.py +4 -0
  113. pulumi_vault/transform/role.py +4 -2
  114. pulumi_vault/transform/template.py +4 -0
  115. pulumi_vault/transit/get_decrypt.py +4 -4
  116. pulumi_vault/transit/secret_backend_key.py +6 -2
  117. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/METADATA +1 -1
  118. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/RECORD +120 -120
  119. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/WHEEL +0 -0
  120. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713561465.dist-info}/top_level.txt +0 -0
@@ -1162,6 +1162,7 @@ class SecretsMount(pulumi.CustomResource):
1162
1162
  allowed_roles=["dev2"],
1163
1163
  )])
1164
1164
  dev1 = vault.database.SecretBackendRole("dev1",
1165
+ name="dev1",
1165
1166
  backend=db.path,
1166
1167
  db_name=db.mssqls[0].name,
1167
1168
  creation_statements=[
@@ -1170,6 +1171,7 @@ class SecretsMount(pulumi.CustomResource):
1170
1171
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1171
1172
  ])
1172
1173
  dev2 = vault.database.SecretBackendRole("dev2",
1174
+ name="dev2",
1173
1175
  backend=db.path,
1174
1176
  db_name=db.postgresqls[0].name,
1175
1177
  creation_statements=[
@@ -1272,6 +1274,7 @@ class SecretsMount(pulumi.CustomResource):
1272
1274
  allowed_roles=["dev2"],
1273
1275
  )])
1274
1276
  dev1 = vault.database.SecretBackendRole("dev1",
1277
+ name="dev1",
1275
1278
  backend=db.path,
1276
1279
  db_name=db.mssqls[0].name,
1277
1280
  creation_statements=[
@@ -1280,6 +1283,7 @@ class SecretsMount(pulumi.CustomResource):
1280
1283
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1281
1284
  ])
1282
1285
  dev2 = vault.database.SecretBackendRole("dev2",
1286
+ name="dev2",
1283
1287
  backend=db.path,
1284
1288
  db_name=db.postgresqls[0].name,
1285
1289
  creation_statements=[
@@ -220,12 +220,12 @@ class EgpPolicy(pulumi.CustomResource):
220
220
  import pulumi_vault as vault
221
221
 
222
222
  allow_all = vault.EgpPolicy("allow-all",
223
- enforcement_level="soft-mandatory",
223
+ name="allow-all",
224
224
  paths=["*"],
225
+ enforcement_level="soft-mandatory",
225
226
  policy=\"\"\"main = rule {
226
227
  true
227
228
  }
228
-
229
229
  \"\"\")
230
230
  ```
231
231
  <!--End PulumiCodeChooser -->
@@ -260,12 +260,12 @@ class EgpPolicy(pulumi.CustomResource):
260
260
  import pulumi_vault as vault
261
261
 
262
262
  allow_all = vault.EgpPolicy("allow-all",
263
- enforcement_level="soft-mandatory",
263
+ name="allow-all",
264
264
  paths=["*"],
265
+ enforcement_level="soft-mandatory",
265
266
  policy=\"\"\"main = rule {
266
267
  true
267
268
  }
268
-
269
269
  \"\"\")
270
270
  ```
271
271
  <!--End PulumiCodeChooser -->
@@ -498,24 +498,6 @@ class AuthBackend(pulumi.CustomResource):
498
498
  """
499
499
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
500
500
 
501
- ## Example Usage
502
-
503
- <!--Start PulumiCodeChooser -->
504
- ```python
505
- import pulumi
506
- import pulumi_vault as vault
507
-
508
- gcp = vault.gcp.AuthBackend("gcp",
509
- credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
510
- custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
511
- api="www.googleapis.com",
512
- iam="iam.googleapis.com",
513
- crm="cloudresourcemanager.googleapis.com",
514
- compute="compute.googleapis.com",
515
- ))
516
- ```
517
- <!--End PulumiCodeChooser -->
518
-
519
501
  ## Import
520
502
 
521
503
  GCP authentication backends can be imported using the backend name, e.g.
@@ -560,24 +542,6 @@ class AuthBackend(pulumi.CustomResource):
560
542
  """
561
543
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
562
544
 
563
- ## Example Usage
564
-
565
- <!--Start PulumiCodeChooser -->
566
- ```python
567
- import pulumi
568
- import pulumi_vault as vault
569
-
570
- gcp = vault.gcp.AuthBackend("gcp",
571
- credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
572
- custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
573
- api="www.googleapis.com",
574
- iam="iam.googleapis.com",
575
- crm="cloudresourcemanager.googleapis.com",
576
- compute="compute.googleapis.com",
577
- ))
578
- ```
579
- <!--End PulumiCodeChooser -->
580
-
581
545
  ## Import
582
546
 
583
547
  GCP authentication backends can be imported using the backend name, e.g.
@@ -331,9 +331,10 @@ class SecretBackend(pulumi.CustomResource):
331
331
  <!--Start PulumiCodeChooser -->
332
332
  ```python
333
333
  import pulumi
334
+ import pulumi_std as std
334
335
  import pulumi_vault as vault
335
336
 
336
- gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
337
+ gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
337
338
  ```
338
339
  <!--End PulumiCodeChooser -->
339
340
 
@@ -367,9 +368,10 @@ class SecretBackend(pulumi.CustomResource):
367
368
  <!--Start PulumiCodeChooser -->
368
369
  ```python
369
370
  import pulumi
371
+ import pulumi_std as std
370
372
  import pulumi_vault as vault
371
373
 
372
- gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
374
+ gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
373
375
  ```
374
376
  <!--End PulumiCodeChooser -->
375
377
 
@@ -222,17 +222,18 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
222
222
  <!--Start PulumiCodeChooser -->
223
223
  ```python
224
224
  import pulumi
225
- import pulumi_gcp as gcp
225
+ import pulumi_google as google
226
+ import pulumi_std as std
226
227
  import pulumi_vault as vault
227
228
 
228
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
229
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
229
230
  gcp = vault.gcp.SecretBackend("gcp",
230
231
  path="gcp",
231
- credentials=(lambda path: open(path).read())("credentials.json"))
232
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
232
+ credentials=std.file(input="credentials.json").result)
233
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
233
234
  backend=gcp.path,
234
235
  impersonated_account="this",
235
- service_account_email=this.email,
236
+ service_account_email=this["email"],
236
237
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
237
238
  ```
238
239
  <!--End PulumiCodeChooser -->
@@ -270,17 +271,18 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
270
271
  <!--Start PulumiCodeChooser -->
271
272
  ```python
272
273
  import pulumi
273
- import pulumi_gcp as gcp
274
+ import pulumi_google as google
275
+ import pulumi_std as std
274
276
  import pulumi_vault as vault
275
277
 
276
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
278
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
277
279
  gcp = vault.gcp.SecretBackend("gcp",
278
280
  path="gcp",
279
- credentials=(lambda path: open(path).read())("credentials.json"))
280
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
281
+ credentials=std.file(input="credentials.json").result)
282
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
281
283
  backend=gcp.path,
282
284
  impersonated_account="this",
283
- service_account_email=this.email,
285
+ service_account_email=this["email"],
284
286
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
285
287
  ```
286
288
  <!--End PulumiCodeChooser -->
@@ -300,12 +300,13 @@ class SecretRoleset(pulumi.CustomResource):
300
300
  <!--Start PulumiCodeChooser -->
301
301
  ```python
302
302
  import pulumi
303
+ import pulumi_std as std
303
304
  import pulumi_vault as vault
304
305
 
305
306
  project = "my-awesome-project"
306
307
  gcp = vault.gcp.SecretBackend("gcp",
307
308
  path="gcp",
308
- credentials=(lambda path: open(path).read())("credentials.json"))
309
+ credentials=std.file(input="credentials.json").result)
309
310
  roleset = vault.gcp.SecretRoleset("roleset",
310
311
  backend=gcp.path,
311
312
  roleset="project_viewer",
@@ -356,12 +357,13 @@ class SecretRoleset(pulumi.CustomResource):
356
357
  <!--Start PulumiCodeChooser -->
357
358
  ```python
358
359
  import pulumi
360
+ import pulumi_std as std
359
361
  import pulumi_vault as vault
360
362
 
361
363
  project = "my-awesome-project"
362
364
  gcp = vault.gcp.SecretBackend("gcp",
363
365
  path="gcp",
364
- credentials=(lambda path: open(path).read())("credentials.json"))
366
+ credentials=std.file(input="credentials.json").result)
365
367
  roleset = vault.gcp.SecretRoleset("roleset",
366
368
  backend=gcp.path,
367
369
  roleset="project_viewer",
@@ -302,21 +302,22 @@ class SecretStaticAccount(pulumi.CustomResource):
302
302
  <!--Start PulumiCodeChooser -->
303
303
  ```python
304
304
  import pulumi
305
- import pulumi_gcp as gcp
305
+ import pulumi_google as google
306
+ import pulumi_std as std
306
307
  import pulumi_vault as vault
307
308
 
308
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
309
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
309
310
  gcp = vault.gcp.SecretBackend("gcp",
310
311
  path="gcp",
311
- credentials=(lambda path: open(path).read())("credentials.json"))
312
- static_account = vault.gcp.SecretStaticAccount("staticAccount",
312
+ credentials=std.file(input="credentials.json").result)
313
+ static_account = vault.gcp.SecretStaticAccount("static_account",
313
314
  backend=gcp.path,
314
315
  static_account="project_viewer",
315
316
  secret_type="access_token",
316
317
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
317
- service_account_email=this.email,
318
+ service_account_email=this["email"],
318
319
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
319
- resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
320
+ resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
320
321
  roles=["roles/viewer"],
321
322
  )])
322
323
  ```
@@ -360,21 +361,22 @@ class SecretStaticAccount(pulumi.CustomResource):
360
361
  <!--Start PulumiCodeChooser -->
361
362
  ```python
362
363
  import pulumi
363
- import pulumi_gcp as gcp
364
+ import pulumi_google as google
365
+ import pulumi_std as std
364
366
  import pulumi_vault as vault
365
367
 
366
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
368
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
367
369
  gcp = vault.gcp.SecretBackend("gcp",
368
370
  path="gcp",
369
- credentials=(lambda path: open(path).read())("credentials.json"))
370
- static_account = vault.gcp.SecretStaticAccount("staticAccount",
371
+ credentials=std.file(input="credentials.json").result)
372
+ static_account = vault.gcp.SecretStaticAccount("static_account",
371
373
  backend=gcp.path,
372
374
  static_account="project_viewer",
373
375
  secret_type="access_token",
374
376
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
375
- service_account_email=this.email,
377
+ service_account_email=this["email"],
376
378
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
377
- resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
379
+ resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
378
380
  roles=["roles/viewer"],
379
381
  )])
380
382
  ```
@@ -422,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
422
422
  }
423
423
  \"\"\",
424
424
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
425
- u1_token = vault.generic.Endpoint("u1Token",
425
+ u1_token = vault.generic.Endpoint("u1_token",
426
426
  path="auth/userpass/login/u1",
427
427
  disable_read=True,
428
428
  disable_delete=True,
@@ -431,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
431
431
  }
432
432
  \"\"\",
433
433
  opts=pulumi.ResourceOptions(depends_on=[u1]))
434
- u1_entity = vault.generic.Endpoint("u1Entity",
434
+ u1_entity = vault.generic.Endpoint("u1_entity",
435
435
  disable_read=True,
436
436
  disable_delete=True,
437
437
  path="identity/lookup/entity",
@@ -517,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
517
517
  }
518
518
  \"\"\",
519
519
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
520
- u1_token = vault.generic.Endpoint("u1Token",
520
+ u1_token = vault.generic.Endpoint("u1_token",
521
521
  path="auth/userpass/login/u1",
522
522
  disable_read=True,
523
523
  disable_delete=True,
@@ -526,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
526
526
  }
527
527
  \"\"\",
528
528
  opts=pulumi.ResourceOptions(depends_on=[u1]))
529
- u1_entity = vault.generic.Endpoint("u1Entity",
529
+ u1_entity = vault.generic.Endpoint("u1_entity",
530
530
  disable_read=True,
531
531
  disable_delete=True,
532
532
  path="identity/lookup/entity",
@@ -171,6 +171,28 @@ def get_secret(namespace: Optional[str] = None,
171
171
  ```
172
172
  <!--End PulumiCodeChooser -->
173
173
 
174
+ ### KV
175
+
176
+ For this example, consider `example` as a path for a KV engine.
177
+
178
+ <!--Start PulumiCodeChooser -->
179
+ ```python
180
+ import pulumi
181
+ import pulumi_vault as vault
182
+
183
+
184
+ def not_implemented(msg):
185
+ raise NotImplementedError(msg)
186
+
187
+ example_creds = vault.generic.get_secret(path="example/creds")
188
+ example_template = not_implemented("The template_file data resource is not yet supported.")
189
+ ```
190
+ <!--End PulumiCodeChooser -->
191
+
192
+ ## Required Vault Capabilities
193
+
194
+ Use of this resource requires the `read` capability on the given path.
195
+
174
196
 
175
197
  :param str namespace: The namespace of the target resource.
176
198
  The value should not contain leading or trailing forward slashes.
@@ -230,6 +252,28 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
230
252
  ```
231
253
  <!--End PulumiCodeChooser -->
232
254
 
255
+ ### KV
256
+
257
+ For this example, consider `example` as a path for a KV engine.
258
+
259
+ <!--Start PulumiCodeChooser -->
260
+ ```python
261
+ import pulumi
262
+ import pulumi_vault as vault
263
+
264
+
265
+ def not_implemented(msg):
266
+ raise NotImplementedError(msg)
267
+
268
+ example_creds = vault.generic.get_secret(path="example/creds")
269
+ example_template = not_implemented("The template_file data resource is not yet supported.")
270
+ ```
271
+ <!--End PulumiCodeChooser -->
272
+
273
+ ## Required Vault Capabilities
274
+
275
+ Use of this resource requires the `read` capability on the given path.
276
+
233
277
 
234
278
  :param str namespace: The namespace of the target resource.
235
279
  The value should not contain leading or trailing forward slashes.
@@ -91,8 +91,8 @@ def get_namespaces(namespace: Optional[str] = None,
91
91
  import pulumi_vault as vault
92
92
 
93
93
  children = vault.get_namespaces(namespace="parent")
94
- child = [vault.get_namespace(namespace=children.namespace,
95
- path=__key) for __key, __value in children.paths]
94
+ child = {__key: vault.get_namespace(namespace=children.namespace,
95
+ path=__key) for __key, __value in children.paths}
96
96
  ```
97
97
  <!--End PulumiCodeChooser -->
98
98
 
@@ -139,8 +139,8 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
139
139
  import pulumi_vault as vault
140
140
 
141
141
  children = vault.get_namespaces(namespace="parent")
142
- child = [vault.get_namespace(namespace=children.namespace,
143
- path=__key) for __key, __value in children.paths]
142
+ child = {__key: vault.get_namespace(namespace=children.namespace,
143
+ path=__key) for __key, __value in children.paths}
144
144
  ```
145
145
  <!--End PulumiCodeChooser -->
146
146
 
@@ -89,7 +89,7 @@ def get_policy_document(namespace: Optional[str] = None,
89
89
  import pulumi
90
90
  import pulumi_vault as vault
91
91
 
92
- example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
+ example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
93
93
  path="secret/*",
94
94
  capabilities=[
95
95
  "create",
@@ -100,7 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
100
100
  ],
101
101
  description="allow all on secrets",
102
102
  )])
103
- example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
103
+ example_policy = vault.Policy("example",
104
+ name="example_policy",
105
+ policy=example.hcl)
104
106
  ```
105
107
  <!--End PulumiCodeChooser -->
106
108
  """
@@ -131,7 +133,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
131
133
  import pulumi
132
134
  import pulumi_vault as vault
133
135
 
134
- example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
136
+ example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
135
137
  path="secret/*",
136
138
  capabilities=[
137
139
  "create",
@@ -142,7 +144,9 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
142
144
  ],
143
145
  description="allow all on secrets",
144
146
  )])
145
- example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
147
+ example_policy = vault.Policy("example",
148
+ name="example_policy",
149
+ policy=example.hcl)
146
150
  ```
147
151
  <!--End PulumiCodeChooser -->
148
152
  """
@@ -197,7 +197,7 @@ class Team(pulumi.CustomResource):
197
197
  import pulumi_vault as vault
198
198
 
199
199
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_devs = vault.github.Team("tfDevs",
200
+ tf_devs = vault.github.Team("tf_devs",
201
201
  backend=example.id,
202
202
  team="terraform-developers",
203
203
  policies=[
@@ -246,7 +246,7 @@ class Team(pulumi.CustomResource):
246
246
  import pulumi_vault as vault
247
247
 
248
248
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_devs = vault.github.Team("tfDevs",
249
+ tf_devs = vault.github.Team("tf_devs",
250
250
  backend=example.id,
251
251
  team="terraform-developers",
252
252
  policies=[
@@ -197,7 +197,7 @@ class User(pulumi.CustomResource):
197
197
  import pulumi_vault as vault
198
198
 
199
199
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_user = vault.github.User("tfUser",
200
+ tf_user = vault.github.User("tf_user",
201
201
  backend=example.id,
202
202
  user="john.doe",
203
203
  policies=[
@@ -246,7 +246,7 @@ class User(pulumi.CustomResource):
246
246
  import pulumi_vault as vault
247
247
 
248
248
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_user = vault.github.User("tfUser",
249
+ tf_user = vault.github.User("tf_user",
250
250
  backend=example.id,
251
251
  user="john.doe",
252
252
  policies=[
@@ -252,10 +252,11 @@ class Entity(pulumi.CustomResource):
252
252
  import pulumi_vault as vault
253
253
 
254
254
  test = vault.identity.Entity("test",
255
+ name="tester1",
256
+ policies=["test"],
255
257
  metadata={
256
258
  "foo": "bar",
257
- },
258
- policies=["test"])
259
+ })
259
260
  ```
260
261
  <!--End PulumiCodeChooser -->
261
262
 
@@ -294,10 +295,11 @@ class Entity(pulumi.CustomResource):
294
295
  import pulumi_vault as vault
295
296
 
296
297
  test = vault.identity.Entity("test",
298
+ name="tester1",
299
+ policies=["test"],
297
300
  metadata={
298
301
  "foo": "bar",
299
- },
300
- policies=["test"])
302
+ })
301
303
  ```
302
304
  <!--End PulumiCodeChooser -->
303
305
 
@@ -217,8 +217,9 @@ class EntityAlias(pulumi.CustomResource):
217
217
  import pulumi_vault as vault
218
218
 
219
219
  test = vault.identity.EntityAlias("test",
220
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
221
- mount_accessor="token_1f2bd5")
220
+ name="user_1",
221
+ mount_accessor="token_1f2bd5",
222
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
222
223
  ```
223
224
  <!--End PulumiCodeChooser -->
224
225
 
@@ -256,8 +257,9 @@ class EntityAlias(pulumi.CustomResource):
256
257
  import pulumi_vault as vault
257
258
 
258
259
  test = vault.identity.EntityAlias("test",
259
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
260
- mount_accessor="token_1f2bd5")
260
+ name="user_1",
261
+ mount_accessor="token_1f2bd5",
262
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
261
263
  ```
262
264
  <!--End PulumiCodeChooser -->
263
265
 
@@ -219,7 +219,9 @@ class EntityPolicies(pulumi.CustomResource):
219
219
  import pulumi
220
220
  import pulumi_vault as vault
221
221
 
222
- entity = vault.identity.Entity("entity", external_policies=True)
222
+ entity = vault.identity.Entity("entity",
223
+ name="entity",
224
+ external_policies=True)
223
225
  policies = vault.identity.EntityPolicies("policies",
224
226
  policies=[
225
227
  "default",
@@ -237,7 +239,9 @@ class EntityPolicies(pulumi.CustomResource):
237
239
  import pulumi
238
240
  import pulumi_vault as vault
239
241
 
240
- entity = vault.identity.Entity("entity", external_policies=True)
242
+ entity = vault.identity.Entity("entity",
243
+ name="entity",
244
+ external_policies=True)
241
245
  default = vault.identity.EntityPolicies("default",
242
246
  policies=[
243
247
  "default",
@@ -284,7 +288,9 @@ class EntityPolicies(pulumi.CustomResource):
284
288
  import pulumi
285
289
  import pulumi_vault as vault
286
290
 
287
- entity = vault.identity.Entity("entity", external_policies=True)
291
+ entity = vault.identity.Entity("entity",
292
+ name="entity",
293
+ external_policies=True)
288
294
  policies = vault.identity.EntityPolicies("policies",
289
295
  policies=[
290
296
  "default",
@@ -302,7 +308,9 @@ class EntityPolicies(pulumi.CustomResource):
302
308
  import pulumi
303
309
  import pulumi_vault as vault
304
310
 
305
- entity = vault.identity.Entity("entity", external_policies=True)
311
+ entity = vault.identity.Entity("entity",
312
+ name="entity",
313
+ external_policies=True)
306
314
  default = vault.identity.EntityPolicies("default",
307
315
  policies=[
308
316
  "default",
@@ -99,6 +99,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
99
99
  import pulumi_vault as vault
100
100
 
101
101
  app = vault.identity.OidcClient("app",
102
+ name="application",
102
103
  redirect_uris=[
103
104
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
104
105
  "http://127.0.0.1:8251/callback",
@@ -144,6 +145,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
144
145
  import pulumi_vault as vault
145
146
 
146
147
  app = vault.identity.OidcClient("app",
148
+ name="application",
147
149
  redirect_uris=[
148
150
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
149
151
  "http://127.0.0.1:8251/callback",
@@ -220,10 +220,12 @@ def get_oidc_openid_config(name: Optional[str] = None,
220
220
  import pulumi_vault as vault
221
221
 
222
222
  key = vault.identity.OidcKey("key",
223
+ name="key",
223
224
  allowed_client_ids=["*"],
224
225
  rotation_period=3600,
225
226
  verification_ttl=3600)
226
227
  app = vault.identity.OidcClient("app",
228
+ name="application",
227
229
  key=key.name,
228
230
  redirect_uris=[
229
231
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -232,7 +234,9 @@ def get_oidc_openid_config(name: Optional[str] = None,
232
234
  ],
233
235
  id_token_ttl=2400,
234
236
  access_token_ttl=7200)
235
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
237
+ provider = vault.identity.OidcProvider("provider",
238
+ name="provider",
239
+ allowed_client_ids=[test["clientId"]])
236
240
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
237
241
  ```
238
242
  <!--End PulumiCodeChooser -->
@@ -281,10 +285,12 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
281
285
  import pulumi_vault as vault
282
286
 
283
287
  key = vault.identity.OidcKey("key",
288
+ name="key",
284
289
  allowed_client_ids=["*"],
285
290
  rotation_period=3600,
286
291
  verification_ttl=3600)
287
292
  app = vault.identity.OidcClient("app",
293
+ name="application",
288
294
  key=key.name,
289
295
  redirect_uris=[
290
296
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -293,7 +299,9 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
293
299
  ],
294
300
  id_token_ttl=2400,
295
301
  access_token_ttl=7200)
296
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
302
+ provider = vault.identity.OidcProvider("provider",
303
+ name="provider",
304
+ allowed_client_ids=[test["clientId"]])
297
305
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
298
306
  ```
299
307
  <!--End PulumiCodeChooser -->