pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,302 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretCacheConfigArgs', 'SecretCacheConfig']
18
+
19
+ @pulumi.input_type
20
+ class SecretCacheConfigArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ size: pulumi.Input[_builtins.int],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
25
+ """
26
+ The set of arguments for constructing a SecretCacheConfig resource.
27
+ :param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
28
+ :param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
29
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
30
+ The value should not contain leading or trailing forward slashes.
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
+ *Available only for Vault Enterprise*.
33
+ """
34
+ pulumi.set(__self__, "backend", backend)
35
+ pulumi.set(__self__, "size", size)
36
+ if namespace is not None:
37
+ pulumi.set(__self__, "namespace", namespace)
38
+
39
+ @_builtins.property
40
+ @pulumi.getter
41
+ def backend(self) -> pulumi.Input[_builtins.str]:
42
+ """
43
+ The path the transit secret backend is mounted at, with no leading or trailing `/`s.
44
+ """
45
+ return pulumi.get(self, "backend")
46
+
47
+ @backend.setter
48
+ def backend(self, value: pulumi.Input[_builtins.str]):
49
+ pulumi.set(self, "backend", value)
50
+
51
+ @_builtins.property
52
+ @pulumi.getter
53
+ def size(self) -> pulumi.Input[_builtins.int]:
54
+ """
55
+ The number of cache entries. 0 means unlimited.
56
+ """
57
+ return pulumi.get(self, "size")
58
+
59
+ @size.setter
60
+ def size(self, value: pulumi.Input[_builtins.int]):
61
+ pulumi.set(self, "size", value)
62
+
63
+ @_builtins.property
64
+ @pulumi.getter
65
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
66
+ """
67
+ The namespace to provision the resource in.
68
+ The value should not contain leading or trailing forward slashes.
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
70
+ *Available only for Vault Enterprise*.
71
+ """
72
+ return pulumi.get(self, "namespace")
73
+
74
+ @namespace.setter
75
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
76
+ pulumi.set(self, "namespace", value)
77
+
78
+
79
+ @pulumi.input_type
80
+ class _SecretCacheConfigState:
81
+ def __init__(__self__, *,
82
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
83
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
84
+ size: Optional[pulumi.Input[_builtins.int]] = None):
85
+ """
86
+ Input properties used for looking up and filtering SecretCacheConfig resources.
87
+ :param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
88
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
89
+ The value should not contain leading or trailing forward slashes.
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
91
+ *Available only for Vault Enterprise*.
92
+ :param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
93
+ """
94
+ if backend is not None:
95
+ pulumi.set(__self__, "backend", backend)
96
+ if namespace is not None:
97
+ pulumi.set(__self__, "namespace", namespace)
98
+ if size is not None:
99
+ pulumi.set(__self__, "size", size)
100
+
101
+ @_builtins.property
102
+ @pulumi.getter
103
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
104
+ """
105
+ The path the transit secret backend is mounted at, with no leading or trailing `/`s.
106
+ """
107
+ return pulumi.get(self, "backend")
108
+
109
+ @backend.setter
110
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
111
+ pulumi.set(self, "backend", value)
112
+
113
+ @_builtins.property
114
+ @pulumi.getter
115
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
116
+ """
117
+ The namespace to provision the resource in.
118
+ The value should not contain leading or trailing forward slashes.
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
+ *Available only for Vault Enterprise*.
121
+ """
122
+ return pulumi.get(self, "namespace")
123
+
124
+ @namespace.setter
125
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
126
+ pulumi.set(self, "namespace", value)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter
130
+ def size(self) -> Optional[pulumi.Input[_builtins.int]]:
131
+ """
132
+ The number of cache entries. 0 means unlimited.
133
+ """
134
+ return pulumi.get(self, "size")
135
+
136
+ @size.setter
137
+ def size(self, value: Optional[pulumi.Input[_builtins.int]]):
138
+ pulumi.set(self, "size", value)
139
+
140
+
141
+ @pulumi.type_token("vault:transit/secretCacheConfig:SecretCacheConfig")
142
+ class SecretCacheConfig(pulumi.CustomResource):
143
+ @overload
144
+ def __init__(__self__,
145
+ resource_name: str,
146
+ opts: Optional[pulumi.ResourceOptions] = None,
147
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
148
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
149
+ size: Optional[pulumi.Input[_builtins.int]] = None,
150
+ __props__=None):
151
+ """
152
+ Configure the cache for the Transit Secret Backend in Vault.
153
+
154
+ ## Example Usage
155
+
156
+ ```python
157
+ import pulumi
158
+ import pulumi_vault as vault
159
+
160
+ transit = vault.Mount("transit",
161
+ path="transit",
162
+ type="transit",
163
+ description="Example description",
164
+ default_lease_ttl_seconds=3600,
165
+ max_lease_ttl_seconds=86400)
166
+ cfg = vault.transit.SecretCacheConfig("cfg",
167
+ backend=transit.path,
168
+ size=500)
169
+ ```
170
+
171
+ :param str resource_name: The name of the resource.
172
+ :param pulumi.ResourceOptions opts: Options for the resource.
173
+ :param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
174
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
175
+ The value should not contain leading or trailing forward slashes.
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
+ *Available only for Vault Enterprise*.
178
+ :param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
179
+ """
180
+ ...
181
+ @overload
182
+ def __init__(__self__,
183
+ resource_name: str,
184
+ args: SecretCacheConfigArgs,
185
+ opts: Optional[pulumi.ResourceOptions] = None):
186
+ """
187
+ Configure the cache for the Transit Secret Backend in Vault.
188
+
189
+ ## Example Usage
190
+
191
+ ```python
192
+ import pulumi
193
+ import pulumi_vault as vault
194
+
195
+ transit = vault.Mount("transit",
196
+ path="transit",
197
+ type="transit",
198
+ description="Example description",
199
+ default_lease_ttl_seconds=3600,
200
+ max_lease_ttl_seconds=86400)
201
+ cfg = vault.transit.SecretCacheConfig("cfg",
202
+ backend=transit.path,
203
+ size=500)
204
+ ```
205
+
206
+ :param str resource_name: The name of the resource.
207
+ :param SecretCacheConfigArgs args: The arguments to use to populate this resource's properties.
208
+ :param pulumi.ResourceOptions opts: Options for the resource.
209
+ """
210
+ ...
211
+ def __init__(__self__, resource_name: str, *args, **kwargs):
212
+ resource_args, opts = _utilities.get_resource_args_opts(SecretCacheConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
213
+ if resource_args is not None:
214
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
215
+ else:
216
+ __self__._internal_init(resource_name, *args, **kwargs)
217
+
218
+ def _internal_init(__self__,
219
+ resource_name: str,
220
+ opts: Optional[pulumi.ResourceOptions] = None,
221
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
222
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
223
+ size: Optional[pulumi.Input[_builtins.int]] = None,
224
+ __props__=None):
225
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
226
+ if not isinstance(opts, pulumi.ResourceOptions):
227
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
228
+ if opts.id is None:
229
+ if __props__ is not None:
230
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
231
+ __props__ = SecretCacheConfigArgs.__new__(SecretCacheConfigArgs)
232
+
233
+ if backend is None and not opts.urn:
234
+ raise TypeError("Missing required property 'backend'")
235
+ __props__.__dict__["backend"] = backend
236
+ __props__.__dict__["namespace"] = namespace
237
+ if size is None and not opts.urn:
238
+ raise TypeError("Missing required property 'size'")
239
+ __props__.__dict__["size"] = size
240
+ super(SecretCacheConfig, __self__).__init__(
241
+ 'vault:transit/secretCacheConfig:SecretCacheConfig',
242
+ resource_name,
243
+ __props__,
244
+ opts)
245
+
246
+ @staticmethod
247
+ def get(resource_name: str,
248
+ id: pulumi.Input[str],
249
+ opts: Optional[pulumi.ResourceOptions] = None,
250
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
251
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
252
+ size: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretCacheConfig':
253
+ """
254
+ Get an existing SecretCacheConfig resource's state with the given name, id, and optional extra
255
+ properties used to qualify the lookup.
256
+
257
+ :param str resource_name: The unique name of the resulting resource.
258
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
259
+ :param pulumi.ResourceOptions opts: Options for the resource.
260
+ :param pulumi.Input[_builtins.str] backend: The path the transit secret backend is mounted at, with no leading or trailing `/`s.
261
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
262
+ The value should not contain leading or trailing forward slashes.
263
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
264
+ *Available only for Vault Enterprise*.
265
+ :param pulumi.Input[_builtins.int] size: The number of cache entries. 0 means unlimited.
266
+ """
267
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
268
+
269
+ __props__ = _SecretCacheConfigState.__new__(_SecretCacheConfigState)
270
+
271
+ __props__.__dict__["backend"] = backend
272
+ __props__.__dict__["namespace"] = namespace
273
+ __props__.__dict__["size"] = size
274
+ return SecretCacheConfig(resource_name, opts=opts, __props__=__props__)
275
+
276
+ @_builtins.property
277
+ @pulumi.getter
278
+ def backend(self) -> pulumi.Output[_builtins.str]:
279
+ """
280
+ The path the transit secret backend is mounted at, with no leading or trailing `/`s.
281
+ """
282
+ return pulumi.get(self, "backend")
283
+
284
+ @_builtins.property
285
+ @pulumi.getter
286
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
287
+ """
288
+ The namespace to provision the resource in.
289
+ The value should not contain leading or trailing forward slashes.
290
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
291
+ *Available only for Vault Enterprise*.
292
+ """
293
+ return pulumi.get(self, "namespace")
294
+
295
+ @_builtins.property
296
+ @pulumi.getter
297
+ def size(self) -> pulumi.Output[_builtins.int]:
298
+ """
299
+ The number of cache entries. 0 means unlimited.
300
+ """
301
+ return pulumi.get(self, "size")
302
+
@@ -0,0 +1,92 @@
1
+ Metadata-Version: 2.4
2
+ Name: pulumi_vault
3
+ Version: 7.6.0a1764657486
4
+ Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
+ License: Apache-2.0
6
+ Project-URL: Homepage, https://pulumi.io
7
+ Project-URL: Repository, https://github.com/pulumi/pulumi-vault
8
+ Keywords: pulumi,vault
9
+ Requires-Python: >=3.9
10
+ Description-Content-Type: text/markdown
11
+ Requires-Dist: parver>=0.2.1
12
+ Requires-Dist: pulumi<4.0.0,>=3.165.0
13
+ Requires-Dist: semver>=2.8.1
14
+ Requires-Dist: typing-extensions<5,>=4.11; python_version < "3.11"
15
+
16
+ [![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)
17
+
18
+ # Hashicorp Vault Resource Provider
19
+
20
+ The Vault resource provider for Pulumi lets you manage Vault resources in your cloud programs. To use
21
+ this package, please [install the Pulumi CLI first](https://pulumi.io/).
22
+
23
+ ## Installing
24
+
25
+ This package is available in many languages in the standard packaging formats.
26
+
27
+ ### Node.js (Java/TypeScript)
28
+
29
+ To use from JavaScript or TypeScript in Node.js, install using either `npm`:
30
+
31
+ $ npm install @pulumi/vault
32
+
33
+ or `yarn`:
34
+
35
+ $ yarn add @pulumi/vault
36
+
37
+ ### Python
38
+
39
+ To use from Python, install using `pip`:
40
+
41
+ $ pip install pulumi_vault
42
+
43
+ ### Go
44
+
45
+ To use from Go, use `go get` to grab the latest version of the library
46
+
47
+ $ go get github.com/pulumi/pulumi-vault/sdk/v6
48
+
49
+ ### .NET
50
+
51
+ To use from .NET, install using `dotnet add package`:
52
+
53
+ $ dotnet add package Pulumi.Vault
54
+
55
+ ## Configuration
56
+
57
+ The following configuration points are available:
58
+
59
+ - `vault:address` - (Required) Origin URL of the Vault server. This is a URL with a scheme, a hostname and a port but with no path.
60
+ May be set via the `VAULT_ADDR` environment variable.
61
+ - `vault:token` - (Required) Vault token that will be used by the provider to authenticate. May be set via the `VAULT_TOKEN`
62
+ environment variable. If none is otherwise supplied, the provider will attempt to read it from ~/.vault-token (where the vault
63
+ command stores its current token). The provider will issue itself a new token that is a child of the one given, with a short TTL
64
+ to limit the exposure of any requested secrets. Note that the given token must have the update capability on the `auth/token/create`
65
+ path in Vault in order to create child tokens.
66
+ - `vault:tokenName` - (Optional) Token name to use for creating the Vault child token. May be set via the `VAULT_TOKEN_NAME`
67
+ environment variable.
68
+ - `vault:ca_cert_file` - (Optional) Path to a file on local disk that will be used to validate the certificate presented by
69
+ the Vault server. May be set via the `VAULT_CACERT` environment variable.
70
+ - `vault:ca_cert_dir` - (Optional) Path to a directory on local disk that contains one or more certificate files that will
71
+ be used to validate the certificate presented by the Vault server. May be set via the `VAULT_CAPATH` environment variable.
72
+ - `vault:client_auth` - (Optional) A configuration block, described below, that provides credentials used by the provider
73
+ to authenticate with the Vault server. At present there is little reason to set this, because the provider does not
74
+ support the TLS certificate authentication mechanism.
75
+ - `vault:cert_file` - (Required) Path to a file on local disk that contains the PEM-encoded certificate to present to the server.
76
+ - `vault:key_file` - (Required) Path to a file on local disk that contains the PEM-encoded private key for which the
77
+ authentication certificate was issued.
78
+ - `vault:skip_tls_verify` - (Optional) Set this to true to disable verification of the Vault server's TLS certificate. This
79
+ is strongly discouraged except in prototype or development environments, since it exposes the possibility that the provider
80
+ can be tricked into writing secrets to a server controlled by an intruder. May be set via the `VAULT_SKIP_VERIFY` environment variable.
81
+ - `vault:max_lease_ttl_seconds` - (Optional) Used as the duration for the intermediate Vault token the provider issues itself,
82
+ which in turn limits the duration of secret leases issued by Vault. Defaults to `20` minutes and may be set via the
83
+ `TERRAFORM_VAULT_MAX_TTL` environment variable. See the section above on Using Vault credentials in the provider configuration
84
+ for the implications of this setting.
85
+ - `vault:max_retries` - (Optional) Used as the maximum number of retries when a 5xx error code is encountered. Defaults to `2`
86
+ retries and may be set via the VAULT_MAX_RETRIES environment variable.
87
+ - `vault:namespace` - (Optional) Set the namespace to use. May be set via the `VAULT_NAMESPACE` environment variable. Available
88
+ only for Vault Enterprise.
89
+
90
+ ## Reference
91
+
92
+ For further information, please visit [the Vault provider docs](https://www.pulumi.com/docs/intro/cloud-providers/vault) or for detailed reference documentation, please visit [the API docs](https://www.pulumi.com/docs/reference/pkg/vault).