pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +2 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  20. pulumi_vault/azure/auth_backend_config.py +6 -10
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +16 -24
  23. pulumi_vault/azure/backend_role.py +14 -18
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +75 -208
  26. pulumi_vault/consul/secret_backend.py +10 -18
  27. pulumi_vault/consul/secret_backend_role.py +2 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +2 -4
  31. pulumi_vault/database/secret_backend_role.py +4 -4
  32. pulumi_vault/database/secret_backend_static_role.py +10 -8
  33. pulumi_vault/database/secrets_mount.py +4 -4
  34. pulumi_vault/egp_policy.py +4 -8
  35. pulumi_vault/gcp/auth_backend.py +0 -36
  36. pulumi_vault/gcp/auth_backend_role.py +63 -264
  37. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  38. pulumi_vault/gcp/secret_backend.py +4 -6
  39. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  40. pulumi_vault/gcp/secret_roleset.py +4 -6
  41. pulumi_vault/gcp/secret_static_account.py +14 -16
  42. pulumi_vault/generic/endpoint.py +4 -8
  43. pulumi_vault/generic/get_secret.py +40 -4
  44. pulumi_vault/get_auth_backend.py +0 -4
  45. pulumi_vault/get_auth_backends.py +0 -8
  46. pulumi_vault/get_namespace.py +0 -12
  47. pulumi_vault/get_namespaces.py +4 -12
  48. pulumi_vault/get_nomad_access_token.py +0 -4
  49. pulumi_vault/get_policy_document.py +8 -8
  50. pulumi_vault/get_raft_autopilot_state.py +0 -4
  51. pulumi_vault/github/auth_backend.py +0 -4
  52. pulumi_vault/github/team.py +2 -6
  53. pulumi_vault/github/user.py +2 -6
  54. pulumi_vault/identity/entity.py +6 -8
  55. pulumi_vault/identity/entity_alias.py +6 -8
  56. pulumi_vault/identity/entity_policies.py +12 -12
  57. pulumi_vault/identity/get_entity.py +0 -4
  58. pulumi_vault/identity/get_group.py +0 -4
  59. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  60. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  61. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  62. pulumi_vault/identity/group.py +38 -42
  63. pulumi_vault/identity/group_alias.py +2 -4
  64. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  65. pulumi_vault/identity/group_member_group_ids.py +24 -20
  66. pulumi_vault/identity/group_policies.py +4 -8
  67. pulumi_vault/identity/mfa_duo.py +4 -8
  68. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  69. pulumi_vault/identity/mfa_okta.py +4 -8
  70. pulumi_vault/identity/mfa_pingid.py +0 -4
  71. pulumi_vault/identity/mfa_totp.py +0 -4
  72. pulumi_vault/identity/oidc.py +0 -4
  73. pulumi_vault/identity/oidc_assignment.py +10 -6
  74. pulumi_vault/identity/oidc_client.py +10 -10
  75. pulumi_vault/identity/oidc_key.py +16 -12
  76. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  77. pulumi_vault/identity/oidc_provider.py +22 -16
  78. pulumi_vault/identity/oidc_role.py +28 -20
  79. pulumi_vault/identity/oidc_scope.py +6 -8
  80. pulumi_vault/jwt/auth_backend.py +20 -32
  81. pulumi_vault/jwt/auth_backend_role.py +63 -190
  82. pulumi_vault/kmip/secret_backend.py +10 -14
  83. pulumi_vault/kmip/secret_role.py +0 -4
  84. pulumi_vault/kmip/secret_scope.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  86. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  87. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  88. pulumi_vault/kubernetes/secret_backend.py +6 -8
  89. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  90. pulumi_vault/kv/get_secret.py +0 -4
  91. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  92. pulumi_vault/kv/get_secret_v2.py +58 -0
  93. pulumi_vault/kv/get_secrets_list.py +4 -8
  94. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  95. pulumi_vault/kv/secret.py +0 -4
  96. pulumi_vault/kv/secret_backend_v2.py +0 -4
  97. pulumi_vault/kv/secret_v2.py +2 -4
  98. pulumi_vault/ldap/auth_backend.py +66 -161
  99. pulumi_vault/ldap/auth_backend_group.py +0 -4
  100. pulumi_vault/ldap/auth_backend_user.py +0 -4
  101. pulumi_vault/ldap/secret_backend.py +4 -8
  102. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  103. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  104. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  105. pulumi_vault/managed/_inputs.py +84 -132
  106. pulumi_vault/managed/keys.py +7 -28
  107. pulumi_vault/managed/outputs.py +84 -132
  108. pulumi_vault/mfa_duo.py +4 -6
  109. pulumi_vault/mfa_okta.py +4 -6
  110. pulumi_vault/mfa_pingid.py +4 -6
  111. pulumi_vault/mfa_totp.py +10 -12
  112. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  113. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  114. pulumi_vault/mount.py +26 -42
  115. pulumi_vault/nomad_secret_backend.py +4 -8
  116. pulumi_vault/nomad_secret_role.py +0 -4
  117. pulumi_vault/okta/_inputs.py +8 -8
  118. pulumi_vault/okta/auth_backend.py +6 -10
  119. pulumi_vault/okta/auth_backend_group.py +0 -4
  120. pulumi_vault/okta/auth_backend_user.py +0 -4
  121. pulumi_vault/okta/outputs.py +8 -8
  122. pulumi_vault/outputs.py +0 -20
  123. pulumi_vault/password_policy.py +6 -8
  124. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  126. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  128. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  130. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  131. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  134. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  135. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  136. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  138. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  139. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  140. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  141. pulumi_vault/quota_lease_count.py +6 -8
  142. pulumi_vault/quota_rate_limit.py +2 -4
  143. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  144. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  145. pulumi_vault/raft_autopilot.py +0 -4
  146. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  147. pulumi_vault/rgp_policy.py +2 -6
  148. pulumi_vault/saml/auth_backend.py +8 -12
  149. pulumi_vault/saml/auth_backend_role.py +64 -178
  150. pulumi_vault/secrets/sync_association.py +12 -10
  151. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  152. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  153. pulumi_vault/secrets/sync_config.py +2 -6
  154. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  155. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  156. pulumi_vault/secrets/sync_github_apps.py +8 -8
  157. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  158. pulumi_vault/ssh/_inputs.py +6 -32
  159. pulumi_vault/ssh/outputs.py +6 -32
  160. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  161. pulumi_vault/ssh/secret_backend_role.py +4 -4
  162. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  163. pulumi_vault/terraformcloud/secret_creds.py +2 -4
  164. pulumi_vault/terraformcloud/secret_role.py +2 -4
  165. pulumi_vault/token.py +14 -18
  166. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  167. pulumi_vault/transform/alphabet.py +4 -6
  168. pulumi_vault/transform/get_decode.py +4 -4
  169. pulumi_vault/transform/get_encode.py +4 -4
  170. pulumi_vault/transform/role.py +4 -6
  171. pulumi_vault/transform/template.py +4 -4
  172. pulumi_vault/transit/get_decrypt.py +4 -20
  173. pulumi_vault/transit/get_encrypt.py +0 -14
  174. pulumi_vault/transit/secret_backend_key.py +6 -6
  175. pulumi_vault/transit/secret_cache_config.py +0 -4
  176. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
  177. pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
  178. pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
  179. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
  180. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -311,7 +311,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
311
311
 
312
312
  ## Example Usage
313
313
 
314
- <!--Start PulumiCodeChooser -->
315
314
  ```python
316
315
  import pulumi
317
316
  import pulumi_vault as vault
@@ -320,7 +319,6 @@ def get_auth_backend_role(backend: Optional[str] = None,
320
319
  role_name="my-role")
321
320
  pulumi.export("role-id", role.role_id)
322
321
  ```
323
- <!--End PulumiCodeChooser -->
324
322
 
325
323
 
326
324
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -416,7 +414,6 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
416
414
 
417
415
  ## Example Usage
418
416
 
419
- <!--Start PulumiCodeChooser -->
420
417
  ```python
421
418
  import pulumi
422
419
  import pulumi_vault as vault
@@ -425,7 +422,6 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
425
422
  role_name="my-role")
426
423
  pulumi.export("role-id", role.role_id)
427
424
  ```
428
- <!--End PulumiCodeChooser -->
429
425
 
430
426
 
431
427
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -328,14 +328,13 @@ class SecretBackend(pulumi.CustomResource):
328
328
  """
329
329
  ## Example Usage
330
330
 
331
- <!--Start PulumiCodeChooser -->
332
331
  ```python
333
332
  import pulumi
333
+ import pulumi_std as std
334
334
  import pulumi_vault as vault
335
335
 
336
- gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
336
+ gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
337
337
  ```
338
- <!--End PulumiCodeChooser -->
339
338
 
340
339
  :param str resource_name: The name of the resource.
341
340
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -364,14 +363,13 @@ class SecretBackend(pulumi.CustomResource):
364
363
  """
365
364
  ## Example Usage
366
365
 
367
- <!--Start PulumiCodeChooser -->
368
366
  ```python
369
367
  import pulumi
368
+ import pulumi_std as std
370
369
  import pulumi_vault as vault
371
370
 
372
- gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
371
+ gcp = vault.gcp.SecretBackend("gcp", credentials=std.file(input="credentials.json").result)
373
372
  ```
374
- <!--End PulumiCodeChooser -->
375
373
 
376
374
  :param str resource_name: The name of the resource.
377
375
  :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
@@ -219,23 +219,22 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
219
219
 
220
220
  ## Example Usage
221
221
 
222
- <!--Start PulumiCodeChooser -->
223
222
  ```python
224
223
  import pulumi
225
- import pulumi_gcp as gcp
224
+ import pulumi_google as google
225
+ import pulumi_std as std
226
226
  import pulumi_vault as vault
227
227
 
228
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
228
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
229
229
  gcp = vault.gcp.SecretBackend("gcp",
230
230
  path="gcp",
231
- credentials=(lambda path: open(path).read())("credentials.json"))
232
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
231
+ credentials=std.file(input="credentials.json").result)
232
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
233
233
  backend=gcp.path,
234
234
  impersonated_account="this",
235
- service_account_email=this.email,
235
+ service_account_email=this["email"],
236
236
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
237
237
  ```
238
- <!--End PulumiCodeChooser -->
239
238
 
240
239
  ## Import
241
240
 
@@ -267,23 +266,22 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
267
266
 
268
267
  ## Example Usage
269
268
 
270
- <!--Start PulumiCodeChooser -->
271
269
  ```python
272
270
  import pulumi
273
- import pulumi_gcp as gcp
271
+ import pulumi_google as google
272
+ import pulumi_std as std
274
273
  import pulumi_vault as vault
275
274
 
276
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
275
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
277
276
  gcp = vault.gcp.SecretBackend("gcp",
278
277
  path="gcp",
279
- credentials=(lambda path: open(path).read())("credentials.json"))
280
- impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonatedAccount",
278
+ credentials=std.file(input="credentials.json").result)
279
+ impersonated_account = vault.gcp.SecretImpersonatedAccount("impersonated_account",
281
280
  backend=gcp.path,
282
281
  impersonated_account="this",
283
- service_account_email=this.email,
282
+ service_account_email=this["email"],
284
283
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
285
284
  ```
286
- <!--End PulumiCodeChooser -->
287
285
 
288
286
  ## Import
289
287
 
@@ -297,15 +297,15 @@ class SecretRoleset(pulumi.CustomResource):
297
297
 
298
298
  ## Example Usage
299
299
 
300
- <!--Start PulumiCodeChooser -->
301
300
  ```python
302
301
  import pulumi
302
+ import pulumi_std as std
303
303
  import pulumi_vault as vault
304
304
 
305
305
  project = "my-awesome-project"
306
306
  gcp = vault.gcp.SecretBackend("gcp",
307
307
  path="gcp",
308
- credentials=(lambda path: open(path).read())("credentials.json"))
308
+ credentials=std.file(input="credentials.json").result)
309
309
  roleset = vault.gcp.SecretRoleset("roleset",
310
310
  backend=gcp.path,
311
311
  roleset="project_viewer",
@@ -317,7 +317,6 @@ class SecretRoleset(pulumi.CustomResource):
317
317
  roles=["roles/viewer"],
318
318
  )])
319
319
  ```
320
- <!--End PulumiCodeChooser -->
321
320
 
322
321
  ## Import
323
322
 
@@ -353,15 +352,15 @@ class SecretRoleset(pulumi.CustomResource):
353
352
 
354
353
  ## Example Usage
355
354
 
356
- <!--Start PulumiCodeChooser -->
357
355
  ```python
358
356
  import pulumi
357
+ import pulumi_std as std
359
358
  import pulumi_vault as vault
360
359
 
361
360
  project = "my-awesome-project"
362
361
  gcp = vault.gcp.SecretBackend("gcp",
363
362
  path="gcp",
364
- credentials=(lambda path: open(path).read())("credentials.json"))
363
+ credentials=std.file(input="credentials.json").result)
365
364
  roleset = vault.gcp.SecretRoleset("roleset",
366
365
  backend=gcp.path,
367
366
  roleset="project_viewer",
@@ -373,7 +372,6 @@ class SecretRoleset(pulumi.CustomResource):
373
372
  roles=["roles/viewer"],
374
373
  )])
375
374
  ```
376
- <!--End PulumiCodeChooser -->
377
375
 
378
376
  ## Import
379
377
 
@@ -299,28 +299,27 @@ class SecretStaticAccount(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
- <!--Start PulumiCodeChooser -->
303
302
  ```python
304
303
  import pulumi
305
- import pulumi_gcp as gcp
304
+ import pulumi_google as google
305
+ import pulumi_std as std
306
306
  import pulumi_vault as vault
307
307
 
308
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
308
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
309
309
  gcp = vault.gcp.SecretBackend("gcp",
310
310
  path="gcp",
311
- credentials=(lambda path: open(path).read())("credentials.json"))
312
- static_account = vault.gcp.SecretStaticAccount("staticAccount",
311
+ credentials=std.file(input="credentials.json").result)
312
+ static_account = vault.gcp.SecretStaticAccount("static_account",
313
313
  backend=gcp.path,
314
314
  static_account="project_viewer",
315
315
  secret_type="access_token",
316
316
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
317
- service_account_email=this.email,
317
+ service_account_email=this["email"],
318
318
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
319
- resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
319
+ resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
320
320
  roles=["roles/viewer"],
321
321
  )])
322
322
  ```
323
- <!--End PulumiCodeChooser -->
324
323
 
325
324
  ## Import
326
325
 
@@ -357,28 +356,27 @@ class SecretStaticAccount(pulumi.CustomResource):
357
356
 
358
357
  ## Example Usage
359
358
 
360
- <!--Start PulumiCodeChooser -->
361
359
  ```python
362
360
  import pulumi
363
- import pulumi_gcp as gcp
361
+ import pulumi_google as google
362
+ import pulumi_std as std
364
363
  import pulumi_vault as vault
365
364
 
366
- this = gcp.service_account.Account("this", account_id="my-awesome-account")
365
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
367
366
  gcp = vault.gcp.SecretBackend("gcp",
368
367
  path="gcp",
369
- credentials=(lambda path: open(path).read())("credentials.json"))
370
- static_account = vault.gcp.SecretStaticAccount("staticAccount",
368
+ credentials=std.file(input="credentials.json").result)
369
+ static_account = vault.gcp.SecretStaticAccount("static_account",
371
370
  backend=gcp.path,
372
371
  static_account="project_viewer",
373
372
  secret_type="access_token",
374
373
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
375
- service_account_email=this.email,
374
+ service_account_email=this["email"],
376
375
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
377
- resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
376
+ resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
378
377
  roles=["roles/viewer"],
379
378
  )])
380
379
  ```
381
- <!--End PulumiCodeChooser -->
382
380
 
383
381
  ## Import
384
382
 
@@ -407,7 +407,6 @@ class Endpoint(pulumi.CustomResource):
407
407
  """
408
408
  ## Example Usage
409
409
 
410
- <!--Start PulumiCodeChooser -->
411
410
  ```python
412
411
  import pulumi
413
412
  import pulumi_vault as vault
@@ -422,7 +421,7 @@ class Endpoint(pulumi.CustomResource):
422
421
  }
423
422
  \"\"\",
424
423
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
425
- u1_token = vault.generic.Endpoint("u1Token",
424
+ u1_token = vault.generic.Endpoint("u1_token",
426
425
  path="auth/userpass/login/u1",
427
426
  disable_read=True,
428
427
  disable_delete=True,
@@ -431,7 +430,7 @@ class Endpoint(pulumi.CustomResource):
431
430
  }
432
431
  \"\"\",
433
432
  opts=pulumi.ResourceOptions(depends_on=[u1]))
434
- u1_entity = vault.generic.Endpoint("u1Entity",
433
+ u1_entity = vault.generic.Endpoint("u1_entity",
435
434
  disable_read=True,
436
435
  disable_delete=True,
437
436
  path="identity/lookup/entity",
@@ -445,7 +444,6 @@ class Endpoint(pulumi.CustomResource):
445
444
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
446
445
  pulumi.export("u1Id", u1_entity.write_data["id"])
447
446
  ```
448
- <!--End PulumiCodeChooser -->
449
447
 
450
448
  ## Required Vault Capabilities
451
449
 
@@ -502,7 +500,6 @@ class Endpoint(pulumi.CustomResource):
502
500
  """
503
501
  ## Example Usage
504
502
 
505
- <!--Start PulumiCodeChooser -->
506
503
  ```python
507
504
  import pulumi
508
505
  import pulumi_vault as vault
@@ -517,7 +514,7 @@ class Endpoint(pulumi.CustomResource):
517
514
  }
518
515
  \"\"\",
519
516
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
520
- u1_token = vault.generic.Endpoint("u1Token",
517
+ u1_token = vault.generic.Endpoint("u1_token",
521
518
  path="auth/userpass/login/u1",
522
519
  disable_read=True,
523
520
  disable_delete=True,
@@ -526,7 +523,7 @@ class Endpoint(pulumi.CustomResource):
526
523
  }
527
524
  \"\"\",
528
525
  opts=pulumi.ResourceOptions(depends_on=[u1]))
529
- u1_entity = vault.generic.Endpoint("u1Entity",
526
+ u1_entity = vault.generic.Endpoint("u1_entity",
530
527
  disable_read=True,
531
528
  disable_delete=True,
532
529
  path="identity/lookup/entity",
@@ -540,7 +537,6 @@ class Endpoint(pulumi.CustomResource):
540
537
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
541
538
  pulumi.export("u1Id", u1_entity.write_data["id"])
542
539
  ```
543
- <!--End PulumiCodeChooser -->
544
540
 
545
541
  ## Required Vault Capabilities
546
542
 
@@ -162,14 +162,32 @@ def get_secret(namespace: Optional[str] = None,
162
162
 
163
163
  ### Generic secret
164
164
 
165
- <!--Start PulumiCodeChooser -->
166
165
  ```python
167
166
  import pulumi
168
167
  import pulumi_vault as vault
169
168
 
170
169
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
171
170
  ```
172
- <!--End PulumiCodeChooser -->
171
+
172
+ ### KV
173
+
174
+ For this example, consider `example` as a path for a KV engine.
175
+
176
+ ```python
177
+ import pulumi
178
+ import pulumi_vault as vault
179
+
180
+
181
+ def not_implemented(msg):
182
+ raise NotImplementedError(msg)
183
+
184
+ example_creds = vault.generic.get_secret(path="example/creds")
185
+ example_template = not_implemented("The template_file data resource is not yet supported.")
186
+ ```
187
+
188
+ ## Required Vault Capabilities
189
+
190
+ Use of this resource requires the `read` capability on the given path.
173
191
 
174
192
 
175
193
  :param str namespace: The namespace of the target resource.
@@ -221,14 +239,32 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
221
239
 
222
240
  ### Generic secret
223
241
 
224
- <!--Start PulumiCodeChooser -->
225
242
  ```python
226
243
  import pulumi
227
244
  import pulumi_vault as vault
228
245
 
229
246
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
230
247
  ```
231
- <!--End PulumiCodeChooser -->
248
+
249
+ ### KV
250
+
251
+ For this example, consider `example` as a path for a KV engine.
252
+
253
+ ```python
254
+ import pulumi
255
+ import pulumi_vault as vault
256
+
257
+
258
+ def not_implemented(msg):
259
+ raise NotImplementedError(msg)
260
+
261
+ example_creds = vault.generic.get_secret(path="example/creds")
262
+ example_template = not_implemented("The template_file data resource is not yet supported.")
263
+ ```
264
+
265
+ ## Required Vault Capabilities
266
+
267
+ Use of this resource requires the `read` capability on the given path.
232
268
 
233
269
 
234
270
  :param str namespace: The namespace of the target resource.
@@ -152,14 +152,12 @@ def get_auth_backend(namespace: Optional[str] = None,
152
152
  """
153
153
  ## Example Usage
154
154
 
155
- <!--Start PulumiCodeChooser -->
156
155
  ```python
157
156
  import pulumi
158
157
  import pulumi_vault as vault
159
158
 
160
159
  example = vault.get_auth_backend(path="userpass")
161
160
  ```
162
- <!--End PulumiCodeChooser -->
163
161
 
164
162
 
165
163
  :param str namespace: The namespace of the target resource.
@@ -194,14 +192,12 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
194
192
  """
195
193
  ## Example Usage
196
194
 
197
- <!--Start PulumiCodeChooser -->
198
195
  ```python
199
196
  import pulumi
200
197
  import pulumi_vault as vault
201
198
 
202
199
  example = vault.get_auth_backend(path="userpass")
203
200
  ```
204
- <!--End PulumiCodeChooser -->
205
201
 
206
202
 
207
203
  :param str namespace: The namespace of the target resource.
@@ -92,23 +92,19 @@ def get_auth_backends(namespace: Optional[str] = None,
92
92
  """
93
93
  ## Example Usage
94
94
 
95
- <!--Start PulumiCodeChooser -->
96
95
  ```python
97
96
  import pulumi
98
97
  import pulumi_vault as vault
99
98
 
100
99
  example = vault.get_auth_backends()
101
100
  ```
102
- <!--End PulumiCodeChooser -->
103
101
 
104
- <!--Start PulumiCodeChooser -->
105
102
  ```python
106
103
  import pulumi
107
104
  import pulumi_vault as vault
108
105
 
109
106
  example_filter = vault.get_auth_backends(type="kubernetes")
110
107
  ```
111
- <!--End PulumiCodeChooser -->
112
108
 
113
109
 
114
110
  :param str namespace: The namespace of the target resource.
@@ -138,23 +134,19 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
138
134
  """
139
135
  ## Example Usage
140
136
 
141
- <!--Start PulumiCodeChooser -->
142
137
  ```python
143
138
  import pulumi
144
139
  import pulumi_vault as vault
145
140
 
146
141
  example = vault.get_auth_backends()
147
142
  ```
148
- <!--End PulumiCodeChooser -->
149
143
 
150
- <!--Start PulumiCodeChooser -->
151
144
  ```python
152
145
  import pulumi
153
146
  import pulumi_vault as vault
154
147
 
155
148
  example_filter = vault.get_auth_backends(type="kubernetes")
156
149
  ```
157
- <!--End PulumiCodeChooser -->
158
150
 
159
151
 
160
152
  :param str namespace: The namespace of the target resource.
@@ -110,29 +110,24 @@ def get_namespace(namespace: Optional[str] = None,
110
110
 
111
111
  ### Current namespace
112
112
 
113
- <!--Start PulumiCodeChooser -->
114
113
  ```python
115
114
  import pulumi
116
115
  import pulumi_vault as vault
117
116
 
118
117
  current = vault.get_namespace()
119
118
  ```
120
- <!--End PulumiCodeChooser -->
121
119
 
122
120
  ### Single namespace
123
121
 
124
- <!--Start PulumiCodeChooser -->
125
122
  ```python
126
123
  import pulumi
127
124
  import pulumi_vault as vault
128
125
 
129
126
  ns1 = vault.get_namespace(path="ns1")
130
127
  ```
131
- <!--End PulumiCodeChooser -->
132
128
 
133
129
  ### Nested namespace
134
130
 
135
- <!--Start PulumiCodeChooser -->
136
131
  ```python
137
132
  import pulumi
138
133
  import pulumi_vault as vault
@@ -143,7 +138,6 @@ def get_namespace(namespace: Optional[str] = None,
143
138
  # -> foo/parent/child/
144
139
  path_fq = child.path_fq
145
140
  ```
146
- <!--End PulumiCodeChooser -->
147
141
 
148
142
 
149
143
  :param str namespace: The namespace to provision the resource in.
@@ -178,29 +172,24 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
178
172
 
179
173
  ### Current namespace
180
174
 
181
- <!--Start PulumiCodeChooser -->
182
175
  ```python
183
176
  import pulumi
184
177
  import pulumi_vault as vault
185
178
 
186
179
  current = vault.get_namespace()
187
180
  ```
188
- <!--End PulumiCodeChooser -->
189
181
 
190
182
  ### Single namespace
191
183
 
192
- <!--Start PulumiCodeChooser -->
193
184
  ```python
194
185
  import pulumi
195
186
  import pulumi_vault as vault
196
187
 
197
188
  ns1 = vault.get_namespace(path="ns1")
198
189
  ```
199
- <!--End PulumiCodeChooser -->
200
190
 
201
191
  ### Nested namespace
202
192
 
203
- <!--Start PulumiCodeChooser -->
204
193
  ```python
205
194
  import pulumi
206
195
  import pulumi_vault as vault
@@ -211,7 +200,6 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
211
200
  # -> foo/parent/child/
212
201
  path_fq = child.path_fq
213
202
  ```
214
- <!--End PulumiCodeChooser -->
215
203
 
216
204
 
217
205
  :param str namespace: The namespace to provision the resource in.
@@ -72,29 +72,25 @@ def get_namespaces(namespace: Optional[str] = None,
72
72
 
73
73
  ### Child namespaces
74
74
 
75
- <!--Start PulumiCodeChooser -->
76
75
  ```python
77
76
  import pulumi
78
77
  import pulumi_vault as vault
79
78
 
80
79
  children = vault.get_namespaces()
81
80
  ```
82
- <!--End PulumiCodeChooser -->
83
81
 
84
82
  ### Nested namespace
85
83
 
86
84
  To fetch the details of nested namespaces:
87
85
 
88
- <!--Start PulumiCodeChooser -->
89
86
  ```python
90
87
  import pulumi
91
88
  import pulumi_vault as vault
92
89
 
93
90
  children = vault.get_namespaces(namespace="parent")
94
- child = [vault.get_namespace(namespace=children.namespace,
95
- path=__key) for __key, __value in children.paths]
91
+ child = {__key: vault.get_namespace(namespace=children.namespace,
92
+ path=__key) for __key, __value in children.paths}
96
93
  ```
97
- <!--End PulumiCodeChooser -->
98
94
 
99
95
 
100
96
  :param str namespace: The namespace to provision the resource in.
@@ -120,29 +116,25 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
120
116
 
121
117
  ### Child namespaces
122
118
 
123
- <!--Start PulumiCodeChooser -->
124
119
  ```python
125
120
  import pulumi
126
121
  import pulumi_vault as vault
127
122
 
128
123
  children = vault.get_namespaces()
129
124
  ```
130
- <!--End PulumiCodeChooser -->
131
125
 
132
126
  ### Nested namespace
133
127
 
134
128
  To fetch the details of nested namespaces:
135
129
 
136
- <!--Start PulumiCodeChooser -->
137
130
  ```python
138
131
  import pulumi
139
132
  import pulumi_vault as vault
140
133
 
141
134
  children = vault.get_namespaces(namespace="parent")
142
- child = [vault.get_namespace(namespace=children.namespace,
143
- path=__key) for __key, __value in children.paths]
135
+ child = {__key: vault.get_namespace(namespace=children.namespace,
136
+ path=__key) for __key, __value in children.paths}
144
137
  ```
145
- <!--End PulumiCodeChooser -->
146
138
 
147
139
 
148
140
  :param str namespace: The namespace to provision the resource in.
@@ -103,7 +103,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
103
103
  """
104
104
  ## Example Usage
105
105
 
106
- <!--Start PulumiCodeChooser -->
107
106
  ```python
108
107
  import pulumi
109
108
  import pulumi_vault as vault
@@ -123,7 +122,6 @@ def get_nomad_access_token(backend: Optional[str] = None,
123
122
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
124
123
  role=role))
125
124
  ```
126
- <!--End PulumiCodeChooser -->
127
125
 
128
126
 
129
127
  :param str backend: The path to the Nomad secret backend to
@@ -159,7 +157,6 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
159
157
  """
160
158
  ## Example Usage
161
159
 
162
- <!--Start PulumiCodeChooser -->
163
160
  ```python
164
161
  import pulumi
165
162
  import pulumi_vault as vault
@@ -179,7 +176,6 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
179
176
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
180
177
  role=role))
181
178
  ```
182
- <!--End PulumiCodeChooser -->
183
179
 
184
180
 
185
181
  :param str backend: The path to the Nomad secret backend to